Reduce Vulnerabilities and Defend Your Brand Against DDoS Attacks

Distributed denial-of-service (DDoS) attacks are on the rise and the repercussions can be detrimental to businesses. Gartner has estimated the cost of downtime from DDoS attacks to be $300,000 per hour and a successful application attack costs, on average, $4.42 million per incident. Yet, beyond the financial impact – a customer’s trust in a brand is truly […]

Five Data Fundamentals to Quash Cyber Crime

For cyber criminals there’s never been a happier time – and for the rest of us a riskier time – than now, with constantly growing data footprints and operational disruption escalating the potency of cybercrime. Whilst we are only through the first few months of 2022, we have already had several warnings from global and […]

How to outsmart increasingly complex cyber attacks

Threat detection is harder today than it was two years ago. Next year will be harder than this year. Why? It’s a compounding effect from skills shortages and threat varieties that’s making it more challenging for any one product to handle key security wins. And cyber security is a constantly evolving sector with 2022 a […]

Protect customers from fraud with a unique fingerprint for devices

No two people have the exact same fingerprint. It is their uniqueness that makes them effective in aiding criminal investigations. Similarly, no two mobile or web devices leave the same digital fingerprint – a unique profile can be created for each one, and the technology used to develop this profile is crucial for vendors and […]

Modernising SecOps: It’s time to unpick the complex matrix

In the post-pandemic ‘new normal,’ businesses continue to embrace new working models powered by digital transformation, particularly cloud technologies. Eight out of ten employees indicated support for hybrid work models as the future norm, while 86% of businesses expect to accelerate cloud adoption post-pandemic. While urgent solutions to support remote and distributed workforces have fuelled transformation across […]

Keeping it simple helps beat cyber threats

The pace of technological change over the last 10 years has been high. Security products have become more automated, utilising the latest technology, such as artificial intelligence (AI), in an effort to get ahead of the criminals attacking IT infrastructure. Yet, despite all this, and the claims from the security industry that their innovations will […]

Cybersecurity’s too important to have a dysfunctional team

Technology has become vital for businesses across most sectors and industries to continue to operate. As a result, it has become crucial for businesses to recruit and retain tech talent, like software engineers and coders. Research from TechNation, has shown that not only does the UK technology sector have a talent shortage, but that it will […]

It’s not always malware

Every day, cyber incidents and their subsequent downtimes seem to fill the news These downtimes, both costly and damaging to consumer trust, have rightfully been something that CISOs and CIOs work to prevent with increasingly sophisticated security measures. But sometimes the most damaging “disasters” are the simplest. Earlier this year, one of the hyperscalers suffered […]

Cyber Security: The Message that Never makes it up to the Board

Cyber security was never a purely technical problem; it is now a leadership imperative in many firms  For the past 20 years, cyber security – information security in its early days – has been seen primarily as a technical matter, to be solved by technologists using technology means. In most organisations, it has never been […]

Five Critical Ways to Protect Your Software Supply Chain

Every company building software is building a software supply chain. They do this through assembling open source components and libraries to speed up development or access new technologies, through use of third-party APIs from partners or services to add functionality, or the use of open source tools in the software development lifecycle (SDLC). DevOps teams heavily rely […]