The threat of cyber-attacks continue to grow and it’s only a matter of time before your company becomes a target. But where should the responsibility of protecting your business lie?
Posted on 16th January 2018
Posted on 9th January 2018
Last updated: 10 Jan 2018
On 4 January 2018, news broke concerning a pair of CPU vulnerabilities seemingly affecting pretty much all computers. The security flaws, named Meltdown & Spectre, were discovered by security researchers at Google’s Project Zero, and found in processors designed by Intel, AMD and ARM.
Posted on 5th January 2018
Modern industry has never been more reliant on technology to optimise processes and inform strategic decisions.
From finance to retail, healthcare to law, organisations across every sector have seen their operations transformed by computer systems and data-driven insights. But as sure as businesses are turning new technologies to their advantage, they are also grappling with the challenge of keeping their digital infrastructure secure at all times.
Posted on 4th January 2018
On 25 May 2018, the General Data Protection Regulation (GDPR) will be introduced. It has been designed with personal data in mind, and means that organisations will have to be more transparent in terms of the data they hold, how they use it and, crucially, the security of that data.
Posted on 7th December 2017
2017 will be known as the year of viral state-sponsored ransomware, leaks of spy tools from US intelligence agencies, hacked children’s toys, and even the so called end of Wi-Fi as we know it.
But what really happened in 2017, what have we learned, and has it made a difference to the way we defend ourselves?
Posted on 28th November 2017
What keeps you awake at night as a security professional? We believe that these five questions, if left unanswered, will develop into much larger issues.
Posted on 20th November 2017
If 2017 is seen the year of ransomware, there is a strong chance that 2018 will be the year that cyber attacks will ‘go kinetic’.
Posted on 14th November 2017
Never underestimate the intelligence of your fellow colleagues. Coming home from Vegas as DEFCON winners in the IoT Village 0-day contest, our team of ethical hackers more than proved their worth. As word spread, we had an overwhelming amount of interest from the media. Everybody wanted to know more about IoT, and its vulnerability to cyber-attacks.
Posted on 7th November 2017
Time and again we see that a company “doing everything to safeguard their digital assets” means only that a pentest report has been created; a box has been ticked. Money spent, but no action taken. Such a token nod to cybersecurity is actually the most dangerous mindset. Spending money on cybersecurity may make you feel safe, but the first and last line of defence is prepared leaders and employees.