Data privacy in cyber-security is a hugely regulated sector. New regulations such as the California Consumer Privacy Act (CCPA) and the EU’s General Data Protection Regulation (GDPR) have added to the list of compliance mandates that already included PCI-DSS for financial data and HIPAA for patient information.
more →Tag: data security
Blog
Tackle the Data Deluge Problem for Better Cybersecurity
This month we are sharing a blog from our partner eSentire that takes a look at how artificial intelligence and machine learning can help you deal with data security.
Tap AI and ML to scan security and threat logs as part of a two-pronged approach to security and threat detection
We’re now in a machine-scale world, where the scale, complexity and dynamism of data exceeds human capacity to keep up with it.
more →Blog
Make your Endpoint Protection work smarter not harder with SOAR
When we hear the term ‘Endpoint Security’ we often think of making sure your organization is protected from malicious actors and cyberattacks attacking via an endpoint. This involves making sure that all the access points into an organization’s critical systems and physical devices are protected from unauthorized access to prevent damage to the rest of the network.
more →Blog
Key Data Breaches that Affected the UK Retail Sector

2018 was a busy year for retail in the cyber security arena, with many organizations suffering from data breaches during the year, including British Airways and Vision Direct.
British Airways
British Airways suffered a sophisticated data breach affecting around
380,000 customers using its website and mobile app.
The attack –
more →Blog
What is the future of HTTPS?
With yet another data breach in the news, and the focus on digital security at the forefront of most people’s minds, I thought it would be a good time to review the history of HTTP, and the role it plays in current (and future) security measures.
A brief history of HTTP, SSL and TLS
It’s a safe bet that when Tim Berners-Lee was working on HTTP in the 1980’s, he couldn’t have anticipated the hand his new protocol would have in creating and shaping the digital world we all know today.
Blog
What is so special about a DDoS hacker?

We recently looked at the many types of hackers, but now we take a closer look at which of hacker tends to perpetrate DDoS attacks and why they use this method.
DDoS attacks are one of the oldest types of cyberattacks, but they have still seen a massive growth recently.
more →Blog
Hackers – exactly who, how and why?

In the simplest terms hacking generally refers to unauthorised intrusion into a computer or a network. The person (or persons) engaged in hacking activities is known as a hacker. This hacker may alter system or security features to accomplish a goal that differs from its original purpose. There is a common misconception that your average hacker is a young person in a hoodie holed up in his parent’s basement.
more →Blog
Guess Who? Combining Personal Data With Demographics Increases the Risk of Identity Theft
Guess Who? Identity theft?
“Does your person have blue eyes?” “Does your person have massive eyebrows?” “Is your person wearing a hat?” “Is your person Frank?”
I was playing Guess Who? with my youngest son yesterday. Guess Who? is a game I played as a child and I’ve always enjoyed its simplicity.
more →