previous arrow
next arrow
Slider

Blog

By Lee Howells

AI and machine learning techniques are said to hold great promise in security, enabling organisations to operate an IT predictive security stance and automate reactive measures when needed. Is this perception accurate, or is the importance of automation gravely overestimated? In 2018, 2.8 billion consumer data records were exposed in

By Chris Willis

Proper training is undoubtedly a top defense against cybersecurity breaches. IT policy, physical security, firewalls and other technical precautions are obviously necessary, but teaching workers what to do—and what not to do—lays the groundwork for a strong, secure front line defense to support all other security measures. The importance of

By Warwick Ashford

Business continuity and cyber security remain largely in separate silos, but changes in the IT and cyber threat landscapes mean there is an urgent need for organisations to alter their approach. Business continuity has come into sharp focus in recent months as organisations have had to find ways of keeping

By Danny Palmer

A potent form of Android malware that can steal bank details, personal information, private communications and more has returned with a new campaign that spreads itself via SMS phishing attacks. FakeSpy malware has been active since 2017, initially targeting users in Japan and South Korea, but now it’s targeting Android

By Heleena Thivya

While Covid-19 has resulted in a drop in demand for most industries, it happens to raise demand in the cybersecurity industry. As on May 21, 2020, one of the leading cybersecurity vendors, Palo Alto Networks, proposed Q4 2020 revenue guidance & CEO Nikesh Arora states: “Covid-19 accelerated the [security] trends

Locations

Get a Quote

If you have questions or comments, please use this form to reach us, and you will receive a response within one business day. Your can also call us directly at any of our global offices.