Retail is a sector that was quick to react to the pandemic; launching online stores if the retailer did not already have one, or expanding what they were offering online if they already had a store. This included the addition of features such as curbside pick-up. It is estimated the pandemic accelerated the shift to online retail by 5 years.more →
Software as a Service (SaaS) continues to grow at a rapid pace as businesses look to take advantage of the flexibility and economy offered by the cloud. According to Gartner’s forecast of Worldwide Public Cloud Revenue, spending on cloud application services is projected to increase to more than $151 billion by 2022.more →
The popularity and usage of Microsoft 365 had gradually grown over the last few years, but recently this has increased significantly with the explosion in home working as a result of the pandemic. This has led many organizations to now consider MS 365 a business-critical application. As happens to many applications, a rise in usage leads to an increase in interest from threat actors, looking to benefit from any vulnerabilities.more →
Traditional Perimeter Methods Are Not Enough
For organisations with perimeter-based security, a breach gives malicious actors access to your entire network, enabling them to move laterally to wherever they want as soon as they breach defences. This security model sees all applications and data equally and therefore security and access is the same for everything.more →
Fabb Furniture is the leading regional furniture and carpet retailer in the UK with an established base in the East of England where it has traded for over 40 years.
With 22 sites defined requiring protection, visibility and control of their network, activereach proposed Cisco Umbrella as the solution.more →
Attack Surface Management (ASM) is an important part of your security profile, but before we get into exactly why you need it let’s just cover off what an Attack Surface is.
What is a cyber-attack surface?
An organization’s total attack surface is all the exploitable vulnerabilities that you have on your network (these can be both known and unknown).more →
There are many things that can reduce the effectiveness of your SOC operations. We are going to look at what we think are the top 7 challenges that have the most impact on the efficient running of your SOC operations.
1. Volume and validity
The flood of daily alerts, many of which are false, can mean that analyst spend too much of their time hunting down information on alerts instead of identifying risk, responding to incidents, identifying incident impact, and reducing breach detection time.more →