The dizzying speeds of development in today’s technologies create more opportunities for cybercriminals than ever before. Each year we are seeing more and more challenges in the fight against cybercrime. With so many potential targets in the IT environment: on-premise networks, cloud, mobile, and IoT devices, there are many areas that could provide a vulnerability for a cybercriminal to take advantage of.more →
This month we are sharing a blog from our partner eSentire that takes a look at how artificial intelligence and machine learning can help you deal with data security.
Tap AI and ML to scan security and threat logs as part of a two-pronged approach to security and threat detection
We’re now in a machine-scale world, where the scale, complexity and dynamism of data exceeds human capacity to keep up with it.more →
We have reached that time of year again. The clocks have been put back, the nights get darker, and the weather is getting colder. Halloween is out of the way, so we are all on the countdown to Christmas. And part of the countdown includes two more recent American traditions – Black Friday and Cyber Monday.more →
The Domain Name System (DNS) has gone through many changes over the years since its birth around 1985. But even before this, in the very early days of computer networking, it became a necessity to map the computerised machine addresses of computer and network entities to more human friendly names.more →
This month we are sharing a blog from our partner eSentire that takes a look at the attack life cycle.
Understanding the life cycle of an attack is a key component to being able to prevent, detect and respond. Depending on how attackers target an organization there are specific compensating controls and visibility that can be put in place.more →
Maintaining compliance in the cloud is fundamental to consumer confidence and ensuring organizations meet data regulations, thus avoiding fines and legal action. A recent cloud security report found that 85% of organizations see continuous compliance as a priority when migrating workloads.
So what are the biggest 2019 cloud compliance challenges?more →
Distributed Denial of Service or DDoS is an attack where there is an attempt to render an online service unavailable by overwhelming it with traffic from multiple distributed sources.
The National Cyber Security Centre (NCSC) is a pivotal organization in cyber security advice and supports the most critical organizations in the UK, the wider public sector, industry, SMEs and the general public.more →
DoH, or DNS over HTTPS to be precise, has featured in mainstream media in recent weeks. Both Mozilla and Google have confirmed that their Firefox and Chrome browsers will be implementing DoH by default but what exactly is it and why does it have ISP’s worried?
To recap, DNS (or the Domain Name System) is used to translate a human-readable host address such as www.activereach.net to its underlying IP address that your computer can connect to in order to receive content.more →