We highlighted in a recent blog that a Hiscox report had discovered that the energy sector is the industry most at risk from cybercriminals. In this blog we look at why energy and utility companies are the number one target and what those in the sector can do to protect themselves.
more →Tag: Threat Landscape
Blog
Why You Need Attack Surface Management (ASM)
Attack Surface Management (ASM) is an important part of your security profile, but before we get into exactly why you need it let’s just cover off what an Attack Surface is.
What is a cyber-attack surface?
An organization’s total attack surface is all the exploitable vulnerabilities that you have on your network (these can be both known and unknown).Â
Blog
How Covid-19 has changed the cyber-threat landscape
Even before Covid-19 the cybersecurity threat landscape was evolving at a frightening pace. The combination of people spending more time online and their uncertainty around the elements of the pandemic and its consequences has played right into the hands of cybercriminals. Now threat actors are taking full advantage of Covid-19 with a vast portfolio of scams, including ransomware and phishing campaigns.
more →Blog
What We Can All Learn From The BUPA Data Breach
Health insurance company BUPA has been hitting the headlines over the past year or so due a significant data breach that took place in early 2017.
Between January 6th – March 11th 2017, an employee managed to access their customer relationship management system (SWAN), and extract credentials of 547,000 global customers.
more →Blog
Workforce Stress: Are You Looking After Your IT Staff?
Mental health in the workplace is increasingly becoming recognised by CEOs and MDs across the globe, with businesses finding that happier employees means increased productivity. However, it is still a largely unaddressed issue that cannot be ignored. Stress seems to be considered normal; in his 2018 book, Jeremy Pfeffer refers to long working hours as a necessity for employees wanting to advance in their career.
more →Blog
Is the Cloud Now a Circle?

Living In the Clouds
You really can’t talk about IT these days without mentioning cloud or something-as-a-service. For some it is hard to remember a time when we did not have the cloud, at least in some basic form. But I do remember the beginnings, and for me the whole cloud journey has come full circle.
more →Blog
CISO Perspective: Five Public Cloud Threats You’re Most Likely to Face
This month we are sharing a blog from our security partner Dome9 that takes a look at the five most likely public cloud threats.
The move to AWS and other public cloud services is a strategic initiative for many enterprises today. While companies rush to expand their cloud presence and use more cloud services, security considerations are lagging behind.Â
more →Blog
Stand-alone Web Application Firewalls are not enough!
This month we are publishing a blog from cloud security partner, Zenedge. Here, we explore the evolution of the security threat landscape, from threat actors improving their hacking techniques to the increasingly daunting task of protecting public-facing web applications and API endpoints. Not only do organizations need to get to grips with reality and understand they are under attack nearly 100 percent of the time, they must also come to terms with the fact that their current approach to defending their applications and APIs is woefully deficient.
more →