Fabb Furniture is the leading regional furniture and carpet retailer in the UK with an established base in the East of England where it has traded for over 40 years.
With 22 sites defined requiring protection, visibility and control of their network, activereach proposed Cisco Umbrella as the solution.more →
Attack Surface Management (ASM) is an important part of your security profile, but before we get into exactly why you need it let’s just cover off what an Attack Surface is.
What is a cyber-attack surface?
An organization’s total attack surface is all the exploitable vulnerabilities that you have on your network (these can be both known and unknown).more →
There are many things that can reduce the effectiveness of your SOC operations. We are going to look at what we think are the top 7 challenges that have the most impact on the efficient running of your SOC operations.
1. Volume and validity
The flood of daily alerts, many of which are false, can mean that analyst spend too much of their time hunting down information on alerts instead of identifying risk, responding to incidents, identifying incident impact, and reducing breach detection time.more →
Security teams agree their cloud infrastructures generate more security alerts than similar on-prem environments. Legacy security tools and SIEMs weren’t built for this cloud transformation and have resulted in more threat visibility gaps than ever before. So what can your organization do to defend against this continuously evolving threat landscape?more →
CASBs (Cloud Access Security Brokers) sit between an organization’s on-premises infrastructure and the cloud provider to ensure enterprise security policies are enforced. CASBs allow enterprises to go beyond their own infrastructure to ensure network traffic between on-premises devices and the cloud comply with their security policies.
Although still relatively young, CASBs have matured a lot recently, having evolved to the point where many analysts feel CASB will soon be as important as firewalls were when we were all working on PCs instead of laptops.more →
Over the years, Remote Access technology has developed to a degree where a lot of businesses can shift from an office-based to a working from home model to allow business continuity in challenging times – as many have done recently in light of the COVID-19 pandemic.
Unfortunately, despite global events, there are still those who will exploit others for financial gain meaning that secure working practices are more important than ever.more →