How proactive protection can eclipse Shamoon

In recent days, Saudi Arabia has warned organizations in the kingdom to be on the alert for the Shamoon computer virus, a variant of which gained notoriety after being linked to attacks against Saudi Aramco in 2012 and reportedly damaged over 30,000 systems.

Continue Reading


Customer Success: It Takes A Village

Recently I was in a meeting discussing a customer that had been particularly slow to adopt our solution and someone said to me “Isn’t that your job?” and for a moment I felt personally culpable for the failure of a speedy time-to-value for customer X.

Continue Reading


2017 predictions: Looking forward to a new year in cyber security

As another busy year in cyber security draws to an end, our team shares their thoughts on the trends and issues we should keep an eye out for in 2017.  How can we stay protected against the latest threats? I asked our experts for their views and we’d be interested to hear your predictions too…

Continue Reading


The candidate driven market: Why companies should embrace it

Talent. It’s not necessarily hard to find, but to tempt that talent away from their current employer, well that’s another matter. The most successful team members in any organization are exactly that; successful. Their W2s are off the charts, colleagues, both former and current rave about their skills, and customers welcome them with open arms. So, if your market is booming and anyone who’s anyone is hiring, why would a talented person leave their current role? And more importantly, why would they join your company?

Continue Reading


Buy now – breached later

Once again retailers are ramping up operations in time for the infamous Black Friday and Cyber Monday sales. Given the recent huge scale DDoS attacks powered by IOT devices under the control of the Mirai botnet retailers are taking many precautions to keep transactions flowing during the sales. Unfortunately, just as the retailers are getting prepared so are the attackers, ready to seize any opportunity to steal user’s data or hold retailers to ransom.

Continue Reading