Blog

GDPR: Top 10 Technologies To Aid Compliance (Part 5 of 5)

Max Pritchard

In Part 1 of this GDPR blog series, we looked at the PII threat landscape and the legal & financial consequences of technology failure. In Part 2, we highlighted the major provisions in the GDPR for technological measures to protect data. In Part 3, we examined some of the guiding principles to be considered in relation to the technological impact of the GDPR within an organization.

more →

Blog

Spectre And Meltdown, The Good News

Max Pritchard

Vulnerabilities in modern computers leak passwords and sensitive data

Spectre and Meltdown are the names of theoretical attack techniques which exploit weaknesses in many modern microprocessor chips. The attacks seem to be extremely limited in scope – able only to allow an unauthorised programme to read data from parts of the computer memory that it ought not to have access to.

more →

Blog

Is Your Online Business Vulnerable to Bad Bots?

An ever-increasing amount of internet traffic is generated by non-human users. Increasingly, websites are facing large volumes of traffic caused by automated scripts, or bots. According to Incapsula’s 2016 report, 51.8% of web traffic was caused by bots – total bot traffic now exceeds total human traffic. All this traffic can be a significant drain on available bandwidth for websites, and cause issues for real customers trying to access your site.

more →

Blog

GDPR – Is Data Encryption Really Necessary?

Max Pritchard

It’s no secret that the proposed EU General Data Protection Regulation is technology-agnostic. It demands that companies implement proportionate, cost-effective controls to protect the personal data of EU residents, as well as enabling data subjects to exercise their rights over their own personal data. The only technology areas specifically mentioned in the regulation, currently, are pseudonymization and data encryption.

more →

Blog

Defending The App Eco-System: Developing A Modern WAF Strategy

Web and mobile application cyber-attacks are on the increase, with Forrester reporting that 40% of all security breaches are aimed at these services.[1] Even more worryingly, attacks specifically targeting secure Web services such as e-commerce are particularly on the rise, with Arbor Networks recently reporting “a massive increase over last year”.[2]

It is not surprising that cybercriminals are targeting web-based applications.

more →

Blog

DDoS Attack Simulation: Preparing For Large-Scale DDoS Attacks

Large-scale DDoS (Distributed Denial of Service) botnet attacks are on the rise. Akamai, to take one recent example, has reported five attacks greater than 300 Gbps in the final few months of 2016.1 And it’s not all down to the latest cyber threat that’s keeping the security community awake at night: large-scale botnets built from everyday Internet of Things devices.

more →