The Domain Name System (DNS) has gone through many changes over the years since its birth around 1985. But even before this, in the very early days of computer networking, it became a necessity to map the computerised machine addresses of computer and network entities to more human friendly names.more →
In recent times the combination of Cloud and IoT, increased enterprise security threats and escalating damages resulting from breaches has introduced stronger levels of inspection and overall security. This has led to a new approach called de-perimeterization. The focus is on locking down all aspects of the network, both inside and outside of traditional firewalls.more →
What’s the best first step for CISOs when they have just started at a business? If you follow the NIST cybersecurity framework, and many other recommended processes, that step is to IDENTIFY.
According to Gene Abramov, CEO of US-based Depth Security “A new CISO needs to understand what the real-world security posture of the organization is.more →
Health insurance company BUPA has been hitting the headlines over the past year or so due a significant data breach that took place in early 2017.
Between January 6th – March 11th 2017, an employee managed to access their customer relationship management system (SWAN), and extract credentials of 547,000 global customers.more →
For Elliot Wicks, IT Manager at top UK wig retailer Hairy Mary, it’s just another Thursday. The sun is shining outside the office in central Manchester, the smell of coffee wafts through the air, life is good.
All of a sudden, Elliot receives hundreds of error messages popping up on his screen.more →
2018 was a big year for cybersecurity, with increased usage in areas such as cloud adoption, AI and a move away from perimeter-based security systems. 2019 looks set to be an equally important year so we thought we would look ahead to what we think will be at the forefront in the next 12 months and list our 2019 Cybersecurity Predictions.more →
This month we are sharing a blog from our security partner Dome9 that takes a look at the five most likely public cloud threats.
The move to AWS and other public cloud services is a strategic initiative for many enterprises today. While companies rush to expand their cloud presence and use more cloud services, security considerations are lagging behind.more →
Onions have been cultivated for centuries for their characteristic, pungent aroma and flavour, as well as their medicinal properties. They can be as sweet and juicy as they can be spicy and tangy, and they host an abundance of vitamins, minerals, and anti-oxidants. Eating onions can reduce risk of heart disease, obesity, and cancer.more →