IoT devices are everywhere and some businesses are only just starting to realise the security implications of so many unmanaged items on their network. The number of IoT devices is forecast to increase five fold to 75 billion devices by 2025. Couple the roll out of cellular IoT and faster 5G networks with vulnerable IoT devices, and you could be gifting hackers the ability to utilise compromised devices to launch DDoS attacks and/or deploy malware.more →
This month we are sharing a blog from our security partner Oracle Dyn that takes a look at dealing with DDoS attacks.
If a DDoS attack hasn’t happened to your organization yet, odds are one will eventually. So it’s crucial to familiarize yourself with DDoS attack mitigation best practices.more →
This month we are sharing a blog from our partner Radware that takes a look at DDoS mitigation testing.
A couple of months ago, I was on a call with a company that was in the process of evaluating DDoS mitigation services to protect its data centers. This company runs mission critical applications and were looking for comprehensive coverage from various types of attacks, including volumetric, low and slow, encrypted floods, and application-layer attacks.more →
With the prevalence of massive cyber-attacks in recent years, it is no wonder that cyber insurance is a growing industry. See our blog on the types of cyber insurance available.
Some companies are weighing the pros and cons of cyber insurance versus DDoS protection. However perhaps it is not the answer that we should look at, but the question.more →
This month we are sharing a blog from our security partner Oracle Dyn that takes a look at the five features to look for in a DDoS Mitigation Service.
Organizations know they must have a DDoS mitigation strategy as part of their disaster recovery and online contingency plans.more →
What’s the best first step for CISOs when they have just started at a business? If you follow the NIST cybersecurity framework, and many other recommended processes, that step is to IDENTIFY.
According to Gene Abramov, CEO of US-based Depth Security “A new CISO needs to understand what the real-world security posture of the organization is.more →
For Elliot Wicks, IT Manager at top UK wig retailer Hairy Mary, it’s just another Thursday. The sun is shining outside the office in central Manchester, the smell of coffee wafts through the air, life is good.
All of a sudden, Elliot receives hundreds of error messages popping up on his screen.more →
According to the Global Cybersecurity Status Report conducted by ISACA International in 2015, just 38% of global organizations claim they are prepared to handle a sophisticated cyber-attack. This scarily small figure shows just how at risk we are. Cyber-attacks are becoming increasingly common; a 2017 Malwarebytes report found that the frequency of ransomware attacks alone has increased by nearly 2000% in the past 2 years.more →