Blog

Why You Need Attack Surface Management (ASM)

Attack Surface Management (ASM) is an important part of your security profile, but before we get into exactly why you need it let’s just cover off what an Attack Surface is.

What is a cyber-attack surface?

attack surfaceAn organization’s total attack surface is all the exploitable vulnerabilities that you have on your network (these can be both known and unknown). 

more →

Blog

How Covid-19 has changed the cyber-threat landscape

Even before Covid-19 the cybersecurity threat landscape was evolving at a frightening pace.  The combination of people spending more time online and their uncertainty around the elements of the pandemic and its consequences has played right into the hands of cybercriminals.  Now threat actors are taking full advantage of Covid-19 with a vast portfolio of scams, including ransomware and phishing campaigns.

more →

Blog

Workforce Stress: Are You Looking After Your IT Staff?

Mental health in the workplace is increasingly becoming recognised by CEOs and MDs across the globe, with businesses finding that happier employees means increased productivity. However, it is still a largely unaddressed issue that cannot be ignored. Stress seems to be considered normal; in his 2018 book, Jeremy Pfeffer refers to long working hours as a necessity for employees wanting to advance in their career.

more →

Blog

CISO Perspective: Five Public Cloud Threats You’re Most Likely to Face

This month we are sharing a blog from our security partner Dome9 that takes a look at the five most likely public cloud threats.

The move to AWS and other public cloud services is a strategic initiative for many enterprises today. While companies rush to expand their cloud presence and use more cloud services, security considerations are lagging behind. 

more →

Blog

Stand-alone Web Application Firewalls are not enough!

This month we are publishing a blog from cloud security partner, Zenedge. Here, we explore the evolution of the security threat landscape, from threat actors improving their hacking techniques to the increasingly daunting task of protecting public-facing web applications and API endpoints. Not only do organizations need to get to grips with reality and understand they are under attack nearly 100 percent of the time, they must also come to terms with the fact that their current approach to defending their applications and APIs is woefully deficient.

more →