What is Digital Transformation?

Digital transformation is more than just a buzzword - it's a process of using technology to radically change your business. Look beyond the hype and you'll find a daunting ...
Read More

A Brief History of Hacking

Cybercrime is a blight on the modern world, but you may be surprised to discover that it’s nothing new. In fact, ever since people first invented communications technology there ...
Read More

Tip of the Week: Hackshit Phishing as a Service (PhaaS)

Last year, Netskope Threat Research Labs discovered Hackshit Phishing as a Service (PhaaS) platform that recorded the victims credentials via websocket service hosted in Amazon ...
Read More

Halfway Through 2018, is This the Year of the Insider Threat?

The likes of Yahoo! made 2016 the year of the data breach; in 2017 WannaCry and its effect on the NHS ensured that ransomware was on everyone's lips. When it comes to ...
Read More

Microsoft ADFS Vulnerability Lets Attackers Bypass MFA

The flaw lets an attacker use the same second factor to bypass multifactor authentication for any account on the same ADFS service. A newly discovered vulnerability in Microsoft's ...
Read More

Just what is AI?

Artificial intelligence is something we continue to see discussed- Elon Musk believes it will be the downfall of humanity, many are concerned its implementation could leave ...
Read More

Incomplete visibility a top security failing

Incomplete visibility of IT environments is among the most common basic enterprise security failings, as most organisations are still failing to achieve basic cyber security ...
Read More

As breaches become more sophisticated, firms must train for the next war, not the last battle

Businesses hit by a cyber attack must not dwell on the past but should instead fortify their organisation for the future. Cyber-attacks are continuing to increase and evolve at an ...
Read More

Cyber-attack! Would your firm handle it better than this?

What's it like being the victim of a live cyber-attack? What should you do to protect your company from further damage? And should you pay that ransom demand? Technology of ...
Read More

GDPR-based extortion could be the next cybercrime trend

Ransomware is so 2017. The popularity of cryptojacking malware ebbs and flows depending on the price of the currencies they mine. Even DDoS attacks are flat after a memcache-based ...
Read More