We all recognise that testing your IT infrastructure is paramount to keeping your systems secure, and we always discuss this with all of our customers. However, when we start to talk about DDoS testing we are often met with the view that conducting pen testing is enough. This lead me to write this blog explaining the two methods of testing, how they differ and where they fit in your network security arsenal.more →
This month we are sharing a blog from our security partner Oracle Dyn that takes a look at dealing with DDoS attacks.
If a DDoS attack hasn’t happened to your organization yet, odds are one will eventually. So it’s crucial to familiarize yourself with DDoS attack mitigation best practices.more →
With yet another data breach in the news, and the focus on digital security at the forefront of most people’s minds, I thought it would be a good time to review the history of HTTP, and the role it plays in current (and future) security measures.
A brief history of HTTP, SSL and TLS
It’s a safe bet that when Tim Berners-Lee was working on HTTP in the 1980’s, he couldn’t have anticipated the hand his new protocol would have in creating and shaping the digital world we all know today.
Technology, social media and business transactions over the internet are key for the success of most organizations in terms of conducting day-to-day business and reaching out to prospective customers. As well as facilitating business they also serve as gateways to cyberattacks. Regardless of who launches them, these attacks can cause huge reputational and monetary damage.more →
This month we are sharing a blog from our security partner Oracle Dyn that takes a look at the five features to look for in a DDoS Mitigation Service.
Organizations know they must have a DDoS mitigation strategy as part of their disaster recovery and online contingency plans.more →
Health insurance company BUPA has been hitting the headlines over the past year or so due a significant data breach that took place in early 2017.
Between January 6th – March 11th 2017, an employee managed to access their customer relationship management system (SWAN), and extract credentials of 547,000 global customers.more →
We recently looked at the many types of hackers, but now we take a closer look at which of hacker tends to perpetrate DDoS attacks and why they use this method.
DDoS attacks are one of the oldest types of cyberattacks, but they have still seen a massive growth recently.more →
A breach detection system (BDS) is a defensive tool designed to detect the activity of malware inside a network after a breach has occurred. A BDS can be either a hardware or software solution designed to look out for signs of threats and alert the organization to the potentially dangerous activity.more →