DMARC Hasn't Stopped Fake HMRC Emails - email security best practices

n April [2018], the UK’s National Cyber Security Centre (NCSC) published its Active Cyber Defence (ACD) Programme which urged companies to employ the Domain-based message ...
Read More

Hybrid Environments for On-Premise Apps & Remote Workers?

While many organisations are moving to the cloud, the reality is this: most use hybrid environments, and many of their on-premises components aren’t going anywhere soon. Examples ...
Read More

API is it Security in the Wild?

“X (Company) suffers data breach, millions of customer affected” Everybody has seen this headline multiple times. Most recently, it was T-Mobile, but in the last three years ...
Read More

GDPR Compliance and Data Processing Agreements

  Any business that is subject to the EU General Data Protection Regulation (GDPR) as a Controller will need to have in place an appropriate contract with any other Controller ...
Read More

Automated Security Testing is the future of Pen Testing

Automated security testing provides effective cybersecurity,  cheaply and efficiently. There’s been increasing debate online and in the cybersecurity sector recently over both ...
Read More

5 Ways Email Phishing Attacks Have Evolved

The origins of fraud date back to the ancient Greek and Roman empires, when savvy merchants cooked up schemes to borrow money from lenders only to avoid paying back their debts. ...
Read More

IP EXPO EUROPE 2018

EveryCloud, the leading cloud security consultants, we are pleased to be attending the CyberSecurity Europo/IP Expo Europe 2018  3-4th October 2018 ExCel, London   EveryCloud, ...
Read More

Understanding Life Cycle Management

“The only constant in life is change.” While this quote dates back some 2,500 years ago to Ancient Greece, it perhaps ring true now more than ever—particularly with the speed and ...
Read More

CISO V Board – the Eternal Struggle for CyberSecurity Budgets

One of the toughest (if not biggest) challenges faced by the CISO is convincing the Board to invest in continuous cybersecurity.   [Get your free CyberScore]   The expectation ...
Read More

3 Identity Access Management (IAM) deployment models

Each of the identity and access management platform deployment models-on-premises, cloud and hybrid-has trade-offs and different resource requirements.   Source: CSO Identity ...
Read More