Blog
By Paul Farrington
Supply chain attacks have been on the threat radar of many organizations and their security teams for several years. However, since the infamous SolarWinds attack in 2020 — which led to widespread and damaging compromises of data, networks and systems — the supply chain attack vector has taken on a
Removing security complexity to combat cyber threats
August 20, 2022
0 Comment
By Ian McShane
Technological innovation over the last ten years has been swift. Looking back a decade or so ago, the infosec industry was full of emerging technologies and cloud-backed capabilities which promised to end the threat of malware and to detect threats faster than attackers could weaponise them. Despite that, we’re still
How Not to Waste Money on Cybersecurity
August 19, 2022
0 Comment
By John Edwards
Throwing money at security threats may be good exercise, but it won’t do much to deter data thieves, ransomware bandits, and other bad guys. While enterprise security leaders usually do well at estimating threats and vulnerability, they often lack the ability to accurately assess business risk when making the case
How to Automate Security Scanning for Greater Efficiency
August 19, 2022
0 Comment
By Mic Johnson
When you hear the word “security automation”, what are some of the first things that come to mind? You might be wondering if this has something to do with the vulnerability scanning that is performed on websites or the infrastructure of an organization, but what we are discussing is more
Creating A Culture Of Cybersecurity
August 18, 2022
0 Comment
By Julien Escribe
Cybersecurity is a top priority for all organisations, but any system will only be as strong as the people who use it. In a world where data breaches can cost millions in fines and disrupt entire countries, it’s more important than ever that companies implement a systematic Security by Design