A Brief History of Hacking

Cybercrime is a blight on the modern world, but you may be surprised to discover that it’s nothing new. In fact, ever since people first invented communications technology there ...
Read More

Halfway Through 2018, is This the Year of the Insider Threat?

The likes of Yahoo! made 2016 the year of the data breach; in 2017 WannaCry and its effect on the NHS ensured that ransomware was on everyone's lips. When it comes to ...
Read More

Microsoft ADFS Vulnerability Lets Attackers Bypass MFA

The flaw lets an attacker use the same second factor to bypass multifactor authentication for any account on the same ADFS service. A newly discovered vulnerability in Microsoft's ...
Read More

As breaches become more sophisticated, firms must train for the next war, not the last battle

Businesses hit by a cyber attack must not dwell on the past but should instead fortify their organisation for the future. Cyber-attacks are continuing to increase and evolve at an ...
Read More

Cyber-attack! Would your firm handle it better than this?

What's it like being the victim of a live cyber-attack? What should you do to protect your company from further damage? And should you pay that ransom demand? Technology of ...
Read More

Mitigate Risks with Modern Password Recovery Systems

The ability to reset your password is an essential system requirement. With so many online services available, it’s common to have multiple user accounts for the various apps and ...
Read More

Partner Spotlight - Data Security with Okta and Netskope

When was the last time you heard about a data breach? It wouldn’t be surprising if you said “just recently” or “last week”. According to the IBM-sponsored 2017 Cost of a Data ...
Read More

Cloud Risk Assessment

OBJECTIVES OF THE CRA The objective of the CRA is to provide the end user with a basic “snapshot” in time that helps them to: Identify and build awareness around cloud usage ...
Read More

Increase M&A Agility

Integrate quickly, securely, and without disruptions. As every company becomes a technology company, the nature of mergers and acquisitions becomes more complex Key concerns ...
Read More

The Identity Revolution

With the proliferation of cloud and mobile, and the advent of IoT, today’s IT paradigm requires a new approach. Identity is that new approach. Check out this video below which ...
Read More