Microsoft ADFS Vulnerability Lets Attackers Bypass MFA

The flaw lets an attacker use the same second factor to bypass multifactor authentication for any account on the same ADFS service. A newly discovered vulnerability in Microsoft's ...
Read More

Just what is AI?

Artificial intelligence is something we continue to see discussed- Elon Musk believes it will be the downfall of humanity, many are concerned its implementation could leave ...
Read More

Incomplete visibility a top security failing

Incomplete visibility of IT environments is among the most common basic enterprise security failings, as most organisations are still failing to achieve basic cyber security ...
Read More

As breaches become more sophisticated, firms must train for the next war, not the last battle

Businesses hit by a cyber attack must not dwell on the past but should instead fortify their organisation for the future. Cyber-attacks are continuing to increase and evolve at an ...
Read More

Cyber-attack! Would your firm handle it better than this?

What's it like being the victim of a live cyber-attack? What should you do to protect your company from further damage? And should you pay that ransom demand? Technology of ...
Read More

GDPR-based extortion could be the next cybercrime trend

Ransomware is so 2017. The popularity of cryptojacking malware ebbs and flows depending on the price of the currencies they mine. Even DDoS attacks are flat after a memcache-based ...
Read More

Featured Partner CyberScore - Are you as Cyber Secure as you think?

A recent survey by consultancy firm Ovum has shown that UK organisations may be overconfident when it comes to their cybersecurity. Is your business really as secure as your ...
Read More

Gartner Top 10 Security Projects for 2018

CISOs should focus on these ten security projects to reduce risk and make a large impact on the business. The new chief information security officer (CISO) of a global bank is ...
Read More

Positive Business Outcomes to a More Mature Approach to Cloud Security

Cloud Best Practices, Netskope Announcements Netskope just completed some interesting new research with Doug Cahill, a senior cybersecurity analyst at Enterprise Strategy Group ...
Read More

The Insider Threat, risky behaviour and the bad habits you need to grow out of

The insider threat, although very real, isn’t always what it seems. Each and every individual in an organisation has the potential to become an insider threat. Although they ...
Read More