Thanks to the growing availability of vaccines and immunization campaigns in multiple countries, the world is starting to see a light at the end of the COVID-19 tunnel. We are eager to return to a new normal, being aware that some changes will be permanent, or if not permanent will strongly characterize the next years.more →
Adding Profound Value to Security and Risk Functions
Defending your organization’s attack surface in today’s threat landscape is a global-scale challenge full of continuously changing elements.
Attacker tools have flooded the web, and advanced adversaries target massive vulnerabilities in ubiquitous systems used across the world.more →
SolarWinds: Illuminating the Hidden Patterns That Advance the Story
Below we share an article by Team Atlas updating us on the SolarWinds story and the vital role of RiskIQ.
Though the Russian espionage campaign that compromised the SolarWinds supply chain is progressing, public-facing research into the campaign seems to have stopped.more →
It’s predicted that a ransomware attack will occur every 11 seconds in 2021 and there is more is at stake than just your bottom line. The wide-reaching impact can be extremely detrimental. activereach have teamed up with Guardicore
to improve your security posture against attacks.
Fabb Furniture is the leading regional furniture and carpet retailer in the UK with an established base in the East of England where it has traded for over 40 years.
With 22 sites defined requiring protection, visibility and control of their network, activereach proposed Cisco Umbrella as the solution.more →
Who are Gen Z?
Last year Gen Z became the largest generation, constituting 32 percent of the global population. But what is Generation Z? Definitions vary but are thought to be those born between the mid-1990s and the mid-2000s. Pew Research pins this down to 1997 onwards, with Forbes citing Generation Alpha as 2010-2025.more →
The dizzying speeds of development in today’s technologies create more opportunities for cybercriminals than ever before. Each year we are seeing more and more challenges in the fight against cybercrime. With so many potential targets in the IT environment: on-premise networks, cloud, mobile, and IoT devices, there are many areas that could provide a vulnerability for a cybercriminal to take advantage of.more →
The Domain Name System (DNS) has gone through many changes over the years since its birth around 1985. But even before this, in the very early days of computer networking, it became a necessity to map the computerised machine addresses of computer and network entities to more human friendly names.more →