Cybersecurity and threat news for Europe, the Middle East & Africa
These search results are from across the Techday Network of sites
Study: 80% of enterprises struggle to protect machine identities
The study focused on enterprise machine identity protection challenges and included responses from 350 senior IT security professionals.
Exclusive: Venafi talks weaponisation of machine identities
As companies integrate more digital tools into their business, many of them remain unaware of the risk code-signing certificates are exposing them to.
Scammers spoof UK university domains as part of massive fraud campaign
Action Fraud UK is warning people to be wary of any emails they receive that look like they belong to UK university email addresses.
Venafi announces new enterprise endpoint management solution
Organisations must provide mobile devices of all types with secure machine identities that support authentication, encryption and decryption.
Four Major Misunderstandings about public key infrastructure (PKI)
There’s a misconception that public key infrastructure (PKI) is dead.
70% of security experts say social media should be government regulated
A survey has found the majority believe social media data collection needs to be regulated, despite having little faith in their governments.
Venafi announces business growth and expansion plans
Over the past year, Venafi has seen significant growth and success across every part of its business.
Blunder by Trustico revokes 23,000 website certificates
23,000 customers of Trustico recently received an email informing them their website security certificates will be rendered useless within 24 hours.
Assessing the rising threat of encrypted tunnels
Venafi senior technical manager Nick Hunter takes a look at five key threats posed by encrypted tunnel attacks.
INTERVIEW: What Google’s decision to distrust Symantec certificates means
Last year Chrome announced a formal plan to remove trust from Symantec-issued certificates - Venafi's Walter Goulet discusses the implications.
Malicious Reddit clone fooling users into giving away logins
A simple typo is taking users to a seemingly secure Reddit clone that is actually stealing their login details - we have commentary from two experts.
Four steps organisations can take to protect against encrypted tunnel attacks
Nefarious actors can use encrypted tunnels to pivot across corporate networks, eavesdrop, route traffic to phishing websites & access sensitive data.
Cyber warfare set to surge in 2018 but expert says Britain is not prepared
Cyber war has exploded and is now quite literally on our doorstep - despite this an expert claims Britain's defences are severely underfunded.
Cybersecurity experts opine on confession it’s not if but when UK is attacked
Ciaran Martin says the UK has been ‘fortunate’ to avoid an attack that could cause devastating disruption to elections or critical infrastructure.
Six questions every business needs to consider to measure their cyber security
For those of you reading this that don’t know your binary from a recursive hole in the ground, it’s important to have a little foundational knowledge.
Poor SSH key management an open invitation for malicious threats
Organisations that use Secure Shell (SSH) technologies and keys are doing a poor job of making sure they are secure, survey finds.
LinkedIn’s outage blunder left users exposed and was ‘easily preventable’
LinkedIn went down yesterday in countries across the world due to an SSL certificate expiry, leaving some users' data at risk with no encryption.
Illicit code signing certificates more valuable than handguns
Venafi has released its findings of a six month investigation into the lucrative sale of digital code signing certificates on the dark web.
Experts comment: Behind the Bluetooth 'BlueBorne' zero-days
As news spreads of the Bluetooth zero-day that affects more than 5 billion devices, security experts are warning users to use Bluetooth with caution.
State-sponsored election hacks are acts of cyber warfare - survey
78% of respondents said they would deem an act as cyber war if a nation-state was behind a successful or attempted hack of another country’s election.
AU & NZ: An event worse than Y2K, are you protected?
"People don’t understand and are not ready for the repercussions of what is going to happen on January 1st 2017.”
Whitepaper: How to explain why IT security needs more budget
Do you want to convince your higher-ups that IT and security need more budget?
Whitepaper: The key to compliance is governing access to data
By implementing a governance-based approach to identity governance, companies can secure their organisation’s sensitive data.
Whitepaper: Why it’s critical to detect cyber attacks as they happen
"Many organisations are struggling to keep pace with the speed in which hackers are attacking their systems."
Review: Cut through the noise with AI-driven threat analytics
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.
The crucial guide to deploying a SIEM solution successfully
SIEM solutions have far-reaching benefits, but Gartner says there are a lot of factors to consider to avoid disaster - here's the company's guide.