A breach detection system (BDS) is a defensive tool designed to detect the activity of malware inside a network after a breach has occurred. A BDS can be either a hardware or software solution designed to look out for signs of threats and alert the organization to the potentially dangerous activity.more →
DDoS (distributed denial of service) tests are a great way to identify any problems you may have in local or cloud-based mitigation. By simulating a real DDoS attack, you can see how malicious actors could infiltrate your systems and carry out a DDoS attack or perpetrate a data breach.
There are numerous different ways to launch a DDoS test;more →
Living In the Clouds
You really can’t talk about IT these days without mentioning cloud or something-as-a-service. For some it is hard to remember a time when we did not have the cloud, at least in some basic form. But I do remember the beginnings, and for me the whole cloud journey has come full circle.more →
According to the Global Cybersecurity Status Report conducted by ISACA International in 2015, just 38% of global organizations claim they are prepared to handle a sophisticated cyber-attack. This scarily small figure shows just how at risk we are. Cyber-attacks are becoming increasingly common; a 2017 Malwarebytes report found that the frequency of ransomware attacks alone has increased by nearly 2000% in the past 2 years.more →
This month we are sharing a blog from our security partner Dome9 that takes a look at the five most likely public cloud threats.
The move to AWS and other public cloud services is a strategic initiative for many enterprises today. While companies rush to expand their cloud presence and use more cloud services, security considerations are lagging behind.more →
Onions have been cultivated for centuries for their characteristic, pungent aroma and flavour, as well as their medicinal properties. They can be as sweet and juicy as they can be spicy and tangy, and they host an abundance of vitamins, minerals, and anti-oxidants. Eating onions can reduce risk of heart disease, obesity, and cancer.more →
Ever wondered what it’s like to experience a cyber-attack? Want to know what the warning signs are? This article recreates a typical ransomware attack scenario of what a business may go through in the first 24 hours when experiencing a data breach.
Fictional high street shoe retailer Shoes-4-U, with branches in every town nationwide, has recently received an email from a supplier.more →
Over the past couple of decades, since the birth of the web, automation of business processes has progressed at an exponential rate. Responding to public demand for services to be immediately available has been the difference between businesses thriving, or shutting down. One of the latest tools in the drive for organizations to automate and improve has been the recent impacts of machine learning techniques, known collectively (if incorrectly) as “Artificial Intelligence” or AI.more →