Blog

IMPENETRABLE. The activereach blog is about network security in simple terms. Our aim is to share vital knowledge with business people across all functions so that they can understand the impact of emerging security trends and gain critical insight into how these could be adopted in their organisations. Security so good, it’s impenetrable.

Blog

GDPR Compliance: The Legal & Financial Consequences Of Technology Failure – A Guide For Security Professionals (Part 1 of 5)

The General Data Protection Regulation will change the way you do business

The EU General Data Protection Regulation (GDPR) comes into force on May 25, 2018. Every organization — regardless of its location — doing business with EU customers will need to make changes to its technology, processes, and people to comply with the new rules.

more →

Blog

Say Goodbye To Moats And Castles With A New Approach To Remote Application Access

This month we share an insight from our technology partner Akamai. We look at how traditional remote application access methods such as VPNs, RDP, and proxies are becoming outdated. It is time to adopt a simple and uncluttered approach.

We are all familiar with the enterprise security approach of treating an organization like a castle, and protecting it with a moat.

more →

Blog

2017 OWASP Top 10 Includes API Protection

This month we share a blog on the recently released OWASP Top 10 Application Security Risks, from our technology partner, Zenedge.

Open Web Application Security Project (OWASP) is an organization composed of international security experts who provide independent intelligence on applications and their security risks. Every four years, the OWASP Top 10 releases a list consisting of the most significant Application Security Risks.

more →

Blog

IoT Security Part 1: Nobody Knows You’re A Hacked Light Bulb

Neil Gershenfeld, the MIT computer pioneer, once made the joke that “On the Internet, nobody knows you’re a lightbulb”.1 2 Speaking back in 2005, he was referring to the then emerging technology platform of the Internet of Things (IoT), where all sorts of devices and sensors such as webcams, lights, thermostats and even coffee pots were starting to be IP-enabled and connected to the Internet.

more →

Blog

My Network Has High Cholesterol: The Danger Of Low And Slow Attacks

This month we share a blog article from our technology partner, Radware. Low and slow DDoS attack traffic is increasingly becoming a strain on business resources, consuming bandwidth and in turn, resulting in a poor customer experience and financial loss – in most instances the targeted organization will absorb such traffic without even noticing or knowing

You know when you get to a certain age, feeling ‘good’ just isn’t enough?

more →

Blog

Defending The App Eco-System: Developing A Modern WAF Strategy

Web and mobile application cyber-attacks are on the increase, with Forrester reporting that 40% of all security breaches are aimed at these services.[1] Even more worryingly, attacks specifically targeting secure Web services such as e-commerce are particularly on the rise, with Arbor Networks recently reporting “a massive increase over last year”.[2]

It is not surprising that cybercriminals are targeting web-based applications.

more →