Trouble convincing boss to spend on vulnerability management tools? Dispel the cyber myths...

Are you frustrated that your company isn't taking the issue of cyber security seriously? Chances are high that those resistant to purchasing still believe the common myths that ...
Read More

People Are the Perimeter, We Need a Zero Trust Approach to Security

Data is the new oil—an observation not lost on hackers. In a world of growing interconnectivity, our most valuable digital assets—including our digital identities–have never been ...
Read More

The Benefits of Network Scanning

As a business, you’re no doubt on the lookout for a product that is both cost effective and capable of improving your cybersecurity. Empower yourself There are plenty of products ...
Read More

It Takes 5 Steps To A Cyber Incident Response Plan

The worst has happened and you’ve discovered that your organisation has been hacked. So what should you do next?   The Cyber Security Breaches Survey 2017, endorsed by the UK ...
Read More

DMARC Hasn't Stopped Fake HMRC Emails - email security best practices

n April [2018], the UK’s National Cyber Security Centre (NCSC) published its Active Cyber Defence (ACD) Programme which urged companies to employ the Domain-based message ...
Read More

Hybrid Environments for On-Premise Apps & Remote Workers?

While many organisations are moving to the cloud, the reality is this: most use hybrid environments, and many of their on-premises components aren’t going anywhere soon. Examples ...
Read More

API is it Security in the Wild?

“X (Company) suffers data breach, millions of customer affected” Everybody has seen this headline multiple times. Most recently, it was T-Mobile, but in the last three years ...
Read More

GDPR Compliance and Data Processing Agreements

  Any business that is subject to the EU General Data Protection Regulation (GDPR) as a Controller will need to have in place an appropriate contract with any other Controller ...
Read More

Automated Security Testing is the future of Pen Testing

Automated security testing provides effective cybersecurity,  cheaply and efficiently. There’s been increasing debate online and in the cybersecurity sector recently over both ...
Read More

5 Ways Email Phishing Attacks Have Evolved

The origins of fraud date back to the ancient Greek and Roman empires, when savvy merchants cooked up schemes to borrow money from lenders only to avoid paying back their debts. ...
Read More