Detecting Domain Generating Algorithms

Detecting Domain Generating Algorithms

How can we prevent malware from communicating with a C&C server? You may think of using a CTI (Cyber Threat Intelligence) feed with a network blacklisting appliance. You may also think about blocking certain protocols or even using a Next-Generation Firewall to...

read more
The discovery stage of your cloud migration project

The discovery stage of your cloud migration project

The discovery stage of your cloud migration project Migration or digital transformation to the Cloud is at the forefront of every organisation’s plans- It’s no longer a case of if that transformation is happening it’s how Some organisations are not sure where to start...

read more
How to demonstrate ROI from your cyber security strategy

How to demonstrate ROI from your cyber security strategy

How to demonstrate ROI from your cyber security strategy The best outcome from a well-executed cyber security strategy should be that a business experiences no change or disruption to their operations or systems in the case of an external threat However, while this is...

read more
Memory Corruption Issues Lead 2021 CWE Top 25

Memory Corruption Issues Lead 2021 CWE Top 25

Memory Corruption Issues Lead 2021 CWE Top 25 The MITRE Common Weakness Enumeration (CWE) team’s latest list of most dangerous software flaws includes several that shot up in significance since 2020. Memory corruption errors remain one of the most common and dangerous...

read more
Defence in Depth – Time to start thinking outside the box

Defence in Depth – Time to start thinking outside the box

Defence in Depth – Time to start thinking outside the box Spam Prevention, Anti-Virus, Intrusion Prevention – these are just a few solutions you may already be using as part of your cyber security strategy Whilst these are all effective in their own right, have you...

read more

Pin It on Pinterest