Our thoughts, industry views and technology trends

Featured

Contributor:

October 29th, 2014

Unravelling the World Wide Web and its impact on IT security

Last year, 73% of the UK population accessed the internet every day, according to figures from the ONS, and in our workplaces, more and more time is spent online.

Today’s workers expect full access to online content in order to do their jobs effectively. With the rising influence of millennial employees, an increasing number expect to be able to access social media and other personal content at all times too.

Continue Reading

Keeping cyber security front of mind this October

Since the mid 90′s, the internet has had a profound impact on our personal and business lives. It’s transformed how we communicate, how we shop, even how we heat our homes. In an enterprise setting, the internet is the lifeblood of the organization, the engine which keeps everything moving. And yet the World Wide Web, on which we’ve come to depend, can also pose a significant threat if we don’t take the appropriate steps to mitigate its risks.

Continue Reading


Shellshock: What you need to know

The InfoSec community has gone into overdrive in the last few days dealing with the ‘Shellshock’ bug. There is good reason for this, millions of systems around the globe are vulnerable to this bug which lets attackers run code on that system.

Continue Reading


Restoring user freedom in the security-first enterprise

It’s been a busy year in the cyber security arena so far, and it doesn’t look like the pace will be slowing down. From hacking schemes like Heartbleed to significant data breaches at Home Depot, P.F. Chang’s and the Montana Health Department, criminals are stepping up their game. But as organizations adapt their security strategies in kind, there is one key stakeholder who often goes unnoticed: the end user.

Continue Reading


Controlling the breach

Once again we are witnessing the aftermath of another major data breach. Although the name of the retailer has changed from Target to Home Depot, the rest of the story remains the same. A large scale exfiltration of customer card data that went undetected for several months.

Continue Reading


SANS Critical Controls: Simple steps to securing the enterprise

In an ever-changing threat landscape, knowing how to mitigate attacks, or even where to start, can be a challenge. To help ease that burden, a number of organizations and government bodies have provided recommendations on defending common real-world attacks.

Continue Reading