We have reached that time of year again. The clocks have been put back, the nights get darker, and the weather is getting colder. Halloween is out of the way, so we are all on the countdown to Christmas. And part of the countdown includes two more recent American traditions – Black Friday and Cyber Monday.more →
The Domain Name System (DNS) has gone through many changes over the years since its birth around 1985. But even before this, in the very early days of computer networking, it became a necessity to map the computerised machine addresses of computer and network entities to more human friendly names.more →
This month we are sharing a blog from our partner eSentire that takes a look at the attack life cycle.
Understanding the life cycle of an attack is a key component to being able to prevent, detect and respond. Depending on how attackers target an organization there are specific compensating controls and visibility that can be put in place.more →
Maintaining compliance in the cloud is fundamental to consumer confidence and ensuring organizations meet data regulations, thus avoiding fines and legal action. A recent cloud security report found that 85% of organizations see continuous compliance as a priority when migrating workloads.
So what are the biggest 2019 cloud compliance challenges?more →
Distributed Denial of Service or DDoS is an attack where there is an attempt to render an online service unavailable by overwhelming it with traffic from multiple distributed sources.
The National Cyber Security Centre (NCSC) is a pivotal organization in cyber security advice and supports the most critical organizations in the UK, the wider public sector, industry, SMEs and the general public.more →
DoH, or DNS over HTTPS to be precise, has featured in mainstream media in recent weeks. Both Mozilla and Google have confirmed that their Firefox and Chrome browsers will be implementing DoH by default but what exactly is it and why does it have ISP’s worried?
To recap, DNS (or the Domain Name System) is used to translate a human-readable host address such as www.activereach.net to its underlying IP address that your computer can connect to in order to receive content.more →
On my way home from visiting a customer last week, I was thinking about a question that he had raised. He asked me “What is the best way to prepare for a DDoS attack?”
A DDoS attack is a special type of Denial of Service attack. Malicious traffic is generated from a multitude of sources and orchestrated from one central point.more →
Do You Really Need A Cyber Incident Playbook?
As part of business continuity planning most organisations have a disaster recovery plan in place in case of a fire, flood or other business impacting incidents, so why should planning for a Cyber Security incident be any different? Building a strong Cyber Incident Playbook is vital and works together with in tandem with other procedures should issues arise.more →