previous arrow
next arrow
Slider

Blog

By Paul Farrington

Supply chain attacks have been on the threat radar of many organizations and their security teams for several years. However, since the infamous SolarWinds attack in 2020 — which led to widespread and damaging compromises of data, networks and systems — the supply chain attack vector has taken on a

By Ian McShane

Technological innovation over the last ten years has been swift. Looking back a decade or so ago, the infosec industry was full of emerging technologies and cloud-backed capabilities which promised to end the threat of malware and to detect threats faster than attackers could weaponise them. Despite that, we’re still

By John Edwards

Throwing money at security threats may be good exercise, but it won’t do much to deter data thieves, ransomware bandits, and other bad guys. While enterprise security leaders usually do well at estimating threats and vulnerability, they often lack the ability to accurately assess business risk when making the case

By Mic Johnson

When you hear the word “security automation”, what are some of the first things that come to mind? You might be wondering if this has something to do with the vulnerability scanning that is performed on websites or the infrastructure of an organization, but what we are discussing is more

By Julien Escribe

Cybersecurity is a top priority for all organisations, but any system will only be as strong as the people who use it. In a world where data breaches can cost millions in fines and disrupt entire countries, it’s more important than ever that companies implement a systematic Security by Design

Locations

Get a Quote

If you have questions or comments, please use this form to reach us, and you will receive a response within one business day. Your can also call us directly at any of our global offices.