Blog

Is your ISP keeping up with evolving DDoS threats?

Iain Westwood

How DDoS attacks have evolved

As with most IT security threats, distributed denial of service attacks have evolved over time.  Simple attacks at the network level designed to exhaust target bandwidth capacity have been complemented with more complex and subtle attacks that can bring down websites but leave the network standing, often without triggering DDoS mitigation.

more →

Blog

XSS, SQL injection, and WAF

John Baldock

XSS – Cross-site scripting

XSS is a common form of injection attack on public facing web servers. Any web server can be vulnerable to attack, and websites now are feature-rich with multiple embedded databases, comments sections, and media… all of which increase the vector types that can be attempted by cyber criminals for various reasons.

more →

Blog

Don’t be the next Travelex!

Iain Westwood

As a business starts its journey towards the cloud, security focus will often shift outwards towards the Internet.  By moving data from inside the traditional network perimeter to the cloud, a whole new set of cybersecurity considerations occur and questions such as “How can we prevent our cloud environment from a breach and protect our data from theft?” become more relevant than ever.

more →

Blog

Top 6 Risks to the Enterprise from The Internet of Things (IoT)

Sharon Holland

IoT devices are everywhere and some businesses are only just starting to realise the security implications of so many unmanaged items on their network.  The number of IoT devices is forecast to increase five fold to 75 billion devices by 2025.  Couple the roll out of cellular IoT and faster 5G networks with vulnerable IoT devices, and you could be gifting hackers the ability to utilise compromised devices to launch DDoS attacks and/or deploy malware.

more →

Blog

The Importance of Web Application Security

This month we are sharing a blog from our security partner Oracle + Dyn that takes a look at web application security and what lies ahead.

Websites and apps are increasingly under attack, so effective web application security must be a top priority.

Before 2008, data breaches were somewhat rare, and most occurred because of human error, such as the loss of a laptop, a USB drive, or some other media.

more →

Blog

The WAF Market Is Broken – Should You Care?

Max Pritchard

A WAF, standing for a Web Application Firewall, serves the purpose of protecting one or more web applications from being breached. They are widely deployed amongst businesses to help keep company records and customer information secure. Gartner notes that customers characterised WAFs as regularly being ‘frustrating’ and ‘a disappointment’. As the web becomes more complex, it’s becoming increasingly difficult for hardware vendors to meet existing and evolving requirements, such as moving web applications to cloud infrastructure (IaaS).

more →