Blog

The activereach blog offers education and inspiration in #security, #collaboration and #connectivity. Our aim is to share vital knowledge with business professionals across all functions – so that they can understand the impact of emerging technology trends and gain insight into how these could be adopted in their organisations.

All content is our own, created by our salesteam, support engineers, tech consultants, and directors. We also pick the best of our technology partners’ blogs, re-published with their kind permission. Opinions expressed are the authors’ own. Comments gratefully received at marketing@activereach.net.

Blog

Is AI The New Biggest Threat in DDoS?

Lorna Fimia

In the modern cyber threat landscape, distributed denial of service (DDoS) attacks are something witnessed all too often. They’ve been around for over 30 years now, wreaking havoc on systems and threatening every site on the Internet.

With the development of artificially intelligent technology, the frightening fact of the matter is that malicious actors will start to utilize artificial intelligence (AI) more and therefore attacks will become harder to defend against.

more →

Blog

The Importance of Web Application Security

This month we are sharing a blog from our security partner Oracle + Dyn that takes a look at web application security and what lies ahead.

Websites and apps are increasingly under attack, so effective web application security must be a top priority.

Before 2008, data breaches were somewhat rare, and most occurred because of human error, such as the loss of a laptop, a USB drive, or some other media.

more →

Blog

Will AI Take Over My Job?

Max Pritchard

Over the past couple of decades, since the birth of the web, automation of business processes has progressed at an exponential rate. Responding to public demand for services to be immediately available has been the difference between businesses thriving, or shutting down. One of the latest tools in the drive for organizations to automate and improve has been the recent impacts of machine learning techniques, known collectively (if incorrectly) as “Artificial Intelligence” or AI.

more →

Blog

GDPR, IP Addresses, and Cloud-Based Security – Who is Profiling Your Web Traffic?

Max Pritchard

In Fujitsu’s global survey of consumer attitudes, 88% of people say they are worried about who has access to their data. It seems that you are not alone in your concerns about data privacy. With the inexorable rise of cloud service adoption over recent years, cloud systems and eco-systems of numerous cloud service providers are proving notoriously hard to secure.

more →

Blog

The WAF Market Is Broken – Should You Care?

Max Pritchard

A WAF, standing for a Web Application Firewall, serves the purpose of protecting one or more web applications from being breached. They are widely deployed amongst businesses to help keep company records and customer information secure. Gartner notes that customers characterised WAFs as regularly being ‘frustrating’ and ‘a disappointment’. As the web becomes more complex, it’s becoming increasingly difficult for hardware vendors to meet existing and evolving requirements, such as moving web applications to cloud infrastructure (IaaS).

more →

Blog

UK Financial Sector Must Build Operational Resilience To Counter Cyber Threats

Lorna Fimia

In a 2018 report by McAfee and the Centre for Strategic & International Studies (CSIS), it was found that cyber-crime has a global impact of $600 billion every year on businesses, through everything from losses due to system closures to reputation damage. This has affected many companies, with an attack now being a very real possibility for a lot of organizations.

more →

Blog

Are Online Gaming Sites Gambling with IT Security?

Lorna Fimia

August has seen multiple online gaming sites hit with DDoS attacks, causing tournaments to be halted and players needing reimbursement. Some of these attacks have taken domains offline, lasting for several hours and preventing players from entering the system or playing any games.

DDoS stands for Distributed Denial of Service, meaning that the target site gets flooded with illegitimate requests, which prevents real customers from connecting.

more →

Blog

Recursive DNS – Does Your Organization Have A Security Blind Spot?

This month we share another blog from our technology partner Akamai on the topic of recursive DNS. Targeted threats such as malware, ransomware, data exfiltration, and phishing are increasing in volume yet many organizations have a blind spot when it comes to the Domain Name System (DNS).

Although every action on the Internet relies on recursive DNS, many security organizations fail to install corresponding safeguards.

more →