Blog

Commercial DDoS Testing vs DDoS for Hire and Open-Source Testing

Lorna Fimia

DDoS (distributed denial of service) tests are a great way to identify any problems you may have in local or cloud-based mitigation. By simulating a real attack, you can see how malicious actors could infiltrate your systems and carry out a DDoS attack or perpetrate a data breach.

There are numerous different ways to launch a DDoS attack test;

more →

Blog

Optimizing Your Security: Are You Prepared For A Cyber-Attack?

Mike Revell

According to the Global Cybersecurity Status Report conducted by ISACA International in 2015, just 38% of global organizations claim they are prepared to handle a sophisticated cyber-attack. This scarily small figure shows just how at risk we are. Cyber-attacks are becoming increasingly common; a 2017 Malwarebytes report found that the frequency of ransomware attacks alone has increased by nearly 2000% in the past 2 years.

more →

Blog

CISO Perspective: Five Public Cloud Threats You’re Most Likely to Face

This month we are sharing a blog from our security partner Dome9 that takes a look at the five most likely public cloud threats.

The move to AWS and other public cloud services is a strategic initiative for many enterprises today. While companies rush to expand their cloud presence and use more cloud services, security considerations are lagging behind. 

more →

Blog

Ransomware Attack Scenario at “Shoes-4-U” – How Would You React?

Ever wondered what it’s like to experience a cyber-attack? Want to know what the warning signs are? This article recreates a typical ransomware attack scenario of what a business may go through in the first 24 hours when experiencing a data breach.

The Scenario

Fictional high street shoe retailer Shoes-4-U, with branches in every town nationwide, has recently received an email from a supplier.

more →

Blog

Will AI Take Over My Job?

Max Pritchard

Over the past couple of decades, since the birth of the web, automation of business processes has progressed at an exponential rate. Responding to public demand for services to be immediately available has been the difference between businesses thriving, or shutting down. One of the latest tools in the drive for organizations to automate and improve has been the recent impacts of machine learning techniques, known collectively (if incorrectly) as “Artificial Intelligence” or AI.

more →

Blog

GDPR, IP Addresses, and Cloud-Based Security – Who is Profiling Your Web Traffic?

Max Pritchard

In Fujitsu’s global survey of consumer attitudes, 88% of people say they are worried about who has access to their data. It seems that you are not alone in your concerns about data privacy. With the inexorable rise of cloud service adoption over recent years, cloud systems and eco-systems of numerous cloud service providers are proving notoriously hard to secure.

more →