‘Data visibility’ and ‘Data Loss’ are two of the prevailing challenges for organisations into 2021 and beyond thanks to the upsurge of a dispersed... Read more
The Trojan Horse story is well-known, with the old saying – beware of Greeks bearing gifts. Trojan computer viruses take their name from the hollow... Read more
This blog is the final part of our 3-part series on DMARC email security. Read Part 1: What is SPF, DKIM and DMARC? Read Part 2: A closer look at how... Read more
This blog is Part 2 in our 3-part series on DMARC email security. In Part 1, we explored the foundations of DMARC and how it builds on SPF and DKIM... Read more
This blog is Part 1 in our 3-part series on DMARC email security. Read more
On Wednesday 14th of April, Matthew Johnson, one of our senior security consultants released details of a new wireless-based attack dubbed... Read more
To be “slow and low” is an Advanced Persistent Threat (APT) signature. Unnoticed, they penetrate security walls and find their way into networks and... Read more
Trust no-one! The ‘Zero Trust’ approach sets up a framework within cyber security that makes one huge assumption: don’t trust anyone who is accessing... Read more
When it comes to cyber security threats, the obvious ones are still lurking (phishing threats and ransomware, for example). However, the increase in... Read more
Jack Misiura, our Application Security Consultant, has detected eight zero-day vulnerabilities in recent weeks and he’s got a whole lot more in the... Read more
Proofpoint, a leading cyber security and compliance company, recently announced it is extending its partnership with CyberArk, a global leader in... Read more