APIContext’s Global Cloud API Performance Report Show A Decline In Cloud API Availability
IT Security Guru
by The Gurus
14h ago
APIContext has unveiled its 2024 Cloud Service Provider API Report, offering an in-depth examination of the performance of leading cloud service providers in the essential API domain. This annual global analysis scrutinised data stemming from 650 million API calls across over 10,000 distinct API endpoints. These interactions were sourced from a netwrok of over 100 geopraphically dispersed cloud data centers, encompassing major public cloud service providers such as AWS, Azure, Google, and IBM. The results show that, in 2023, globally only 7% of API Services achieved a 99.99% service availabili ..read more
Visit website
Cato Networks to Showcase New Security Evasion Tactics at RSA Conference 2024
IT Security Guru
by The Gurus
18h ago
Cato Networks, the SASE leader, today announced that Cato CTRL, the SASE leader’s cyber threat intelligence (CTI) research team, will demonstrate threat actors’ latest tactics designed to capitalise on organisations’ complex security architectures during presentations at the upcoming RSA Conference 2024. The talks headline Cato’s numerous media, customer, and partner activities at the conference. “Today’s security landscape is plagued by a patchwork of point solutions that often fail to challenge the threats posed by attackers while creating a chaos of complexity to manage,” said Etay Maor, Ch ..read more
Visit website
Coalition Finds More Than Half of Cyber Insurance Claims Originate in the Email Inbox
IT Security Guru
by The Gurus
1d ago
Coalition, the world’s first Active Insurance provider designed to prevent digital risk before it strikes, today published its 2024 Cyber Claims Report, which details emerging cyber trends and their impact on Coalition policyholders throughout 2023. The report found that more than half (56%) of all 2023 claims were a result of funds transfer fraud (FTF) or business email compromise (BEC), highlighting the importance of email security as a critical aspect of cyber risk management. “Threat actors want to get paid, and the email inbox has proven to be an easy place for an attacker to uncover paym ..read more
Visit website
Salt Security Enhances API Security Platform with OAuth Protection Package
IT Security Guru
by Guru Writer
1d ago
Salt Security have announced the release of its new multi-layered OAuth protection package to detect attempts to exploit OAuth and proactively fix vulnerabilities. Salt is enhancing its API protection platform with a comprehensive suite of new OAuth threat detections and posture rules to address the growing challenge of OAuth exploitation. The company is the first API security vendor to launch deep OAuth threat detection capabilities, and these innovations will empower organisations to identify and mitigate malicious attempts to exploit OAuth flows, ultimately safeguarding sensitive data and u ..read more
Visit website
Female Tech Duo take Flight to Dubai to Launch the future of Cyber Leadership
IT Security Guru
by The Gurus
1d ago
Two formidable female tech leaders have joined forces to launch an innovative new leadership development and mentoring platform for the cyber community – Leading Cyber.  Danielle Phillips, Founder and Managing Director of Durham based Inside Out, and Director at CyberNorth has collaborated with Annabel Berry, Founder of The Lamplight, experienced CEO, and Chair of the Strategic Board at CyberNorth, and the duo have headed to Dubai to launch the new company to audiences at GISEC Global 2024.  Leading Cyber was unveiled ahead of the duo visiting UK Cyber W ..read more
Visit website
Interview: Cydea’s Risk Management Platform, Understanding Not Eliminating Risk
IT Security Guru
by Guru Writer
1d ago
Last week, the IT Security Guru team attended Cydea’s Risk Management Platform launch in London. After the event, Robin Oldham, CEO and Founder of Cydea, sat down with the Gurus to answer some questions about risk management and why it’s critical for businesses to take it seriously. Established in 2019, Cydea set out to expel fear, uncertainty and doubt when it comes to really understanding risk. They aim to manage and not abolish risk altogether. Asking: how likely is likely? Firstly, what is the new Cydea Risk Management platform? According to the team, the platform is set to quantify t ..read more
Visit website
AI-driven cyber attacks to be the norm within a year, say security leaders
IT Security Guru
by The Gurus
1d ago
Netacea, the bot detection and response specialist, today announced new research into the threat of AI-driven cyberattacks. It finds that most businesses see “offensive AI” fast becoming a standard tool for cybercriminals, with 93% of security leaders expecting to face daily AI-driven attacks. The research, Cyber security in the age of offensive AI, surveyed security leaders in the UK and US about their experience with AI as a tool in cybersecurity, enhancing both offensive and defensive capabilities. It reveals that not only do most security leaders expect daily AI-driven attacks, two-thirds ..read more
Visit website
Expert Insight: ‘Minding the Gap’: How can we work to make cyber accessible for women?
IT Security Guru
by Guru Writer
2d ago
According to the Department for Science, Innovation and Technology (DSIT), only 17% of the UK cyber sector workforce is female, and this is down from 22% in 2022. To make matters worse, we’re fighting a losing battle against an ever-increasing cyber skills gap. In fact, there’s a shortfall of over 11,000 people to meet the demands of the UK workforce. This issue isn’t exclusive to the UK, however, with ENISA reporting a 300,000 person shortfall in Europe. Plugging that gap is essential to protecting consumers and building digital trust but it needs to be done so thoughtfully and with diversity ..read more
Visit website
Google’s Core Update is ‘Biggest’ Algorithm Update in History
IT Security Guru
by Daniel Tannenbaum
3d ago
Search giant Google is currently undergoing one of its biggest algorithm updates in its history, sources are told. The online search platform which manages more than 8 billion searches per day is doing a significant update to its internal systems which will impact how search queries will be shown, with attention to parasite websites, improved quality rankings and spam policies. The core update as it is known has been processed for around 2 months, starting on 5th March 2024 and ending officially on 5th May 2024, which is shown on the Google Status Dashboard.   Why Does Google Update its A ..read more
Visit website
Expert Insight: Outdated Recruitment Methods Are Impeding The Global Cyber Army
IT Security Guru
by Guru Writer
3d ago
Cybersecurity is ‘inclusive’ by nature: no one is exempt from the fallout of the expanding cyber threat landscape. The notion, therefore, that some groups of individuals are offered fewer opportunities to join the cyber industry than others is frankly absurd. ISC2’s latest Cybersecurity Workforce Study gives us a snapshot into the supply and demand of cybersecurity talent – and it’s not good news. While the cyber workforce has grown by 8.7%, the skills gap has increased by 12.6%, which equates to roughly 4 million empty roles. From a DE&I perspective, we have seen gradual improvements; ISC ..read more
Visit website

Follow IT Security Guru on FeedSpot

Continue with Google
Continue with Apple
OR