Sapphire and Check Point are aware that a Critical Remote Code Execution Vulnerability has been found in Microsoft Windows Remote Desktop Services – (CVE-2019-0708).
Microsoft has released a fix for this vulnerability and we would strongly recommend all organisations using older versions of Windows to immediately evaluate this vulnerability and act according to our recommendation to mitigate this risk.
We have an exciting opportunity to join our Darlington office as a Junior Analyst and Internal IT Support Technician. This technical role will support our UK-wide business in delivering IT security services to our customers as well as supporting our internal users, systems and equipment across our central and regional offices.
This is an exciting opportunity for experienced web application and infrastructure Penetration Testers to join a leading UK security company with offices in Darlington, Glasgow and Basingstoke. The team is growing and we are looking for a wide range of experienced Pen Testers from across the UK.
Candidates must have a minimum of 2 years’ commercial penetration testing experience and display a good knowledge of penetration testing methodology and report writing.
In addition Sapphire will support you in your continued training and development goals on an individual basis to become part of our long serving CHECK team.
Overwhelmed by the number of vulnerabilities your team faces? Uncertain which cyber threats pose the greatest risk to your business? You're not alone. Cybersecurity leaders have been grappling with these challenges for years – and the problem keeps getting worse.
On average, enterprises find 870 vulnerabilities per day across 960 IT assets. There just isn't enough time or resources to fix them all. More than ever, it's essential to know where to prioritize based on risk.
Download the new whitepaper 'Predictive Prioritization: How to Focus on the Vulnerabilities That Matter Most' to:
Learn how to focus on the 3% of vulnerabilities that have been – or will likely be – exploited
Uncover why CVSS is an insufficient metric for prioritization – and the key criteria you need to consider
Understand the Predictive Prioritization process, which uses machine learning to help you differentiate between real and theoretical risks
Ensure you're prioritizing the right vulnerabilities for your team – while reducing everyone's workload. Get the new whitepaper now.
Egress Insider Data Breach Survey 2019 – Research conducted by Opinon Matters
Commissioned by Egress and conducted by independent research company Opinion Matters, the 2019 Insider Data Breach survey gathered responses from 252 U.S. and 253 U.K.-based IT leaders (CIOs, CTOs, CISOs and IT Directors) and 2004 U.S. and 2003 U.K.-based employees to assess the root causes of these employee-driven data breaches, as well as the frequency and impact of such instances.
Moreover, the two surveys dive into the 'intent' behind insider breaches, with a specific look at how employees and executives differ in their views of what constitutes a data breach, what is acceptable behavior when sharing data and who owns company data, in an attempt to explain why insider data breaches continue to rise.
The data shows that there is a disconnect between IT leaders and employees on how each group views sensitive data. This perception gap, combined with the rapid growth in unstructured data and increases in ways for employees to share that data, have the potential to negatively impact an organization's security program.
The results of the research can offer insights that could help to inform the allocation of security budgets and strategies so that investment can be directed to where it will achieve the greatest impact in preventing costly data breaches.