The discovery stage of your cloud migration project

The discovery stage of your cloud migration project

The discovery stage of your cloud migration project Migration or digital transformation to the Cloud is at the forefront of every organisation’s plans- It’s no longer a case of if that transformation is happening it’s how Some organisations are not sure where to start...

read more
How to demonstrate ROI from your cyber security strategy

How to demonstrate ROI from your cyber security strategy

How to demonstrate ROI from your cyber security strategy The best outcome from a well-executed cyber security strategy should be that a business experiences no change or disruption to their operations or systems in the case of an external threat However, while this is...

read more
Memory Corruption Issues Lead 2021 CWE Top 25

Memory Corruption Issues Lead 2021 CWE Top 25

Memory Corruption Issues Lead 2021 CWE Top 25 The MITRE Common Weakness Enumeration (CWE) team’s latest list of most dangerous software flaws includes several that shot up in significance since 2020. Memory corruption errors remain one of the most common and dangerous...

read more
Defence in Depth – Time to start thinking outside the box

Defence in Depth – Time to start thinking outside the box

Defence in Depth – Time to start thinking outside the box Spam Prevention, Anti-Virus, Intrusion Prevention – these are just a few solutions you may already be using as part of your cyber security strategy Whilst these are all effective in their own right, have you...

read more
Watch for Cybersecurity Games at the Tokyo Olympics

Watch for Cybersecurity Games at the Tokyo Olympics

Watch for Cybersecurity Games at the Tokyo Olympics The cybersecurity professionals guarding the Summer Olympics are facing at least as much competition as the athletes, and their failure could have steeper ramifications. It was a close call, but the 2018 Pyeongchang...

read more
The True Cost of a Ransomware Attack

The True Cost of a Ransomware Attack

The True Cost of a Ransomware Attack Companies need to prepare for the costs of an attack now, before they get attacked. Here’s a checklist to help. If anyone needed further proof that ransomware is one of the most important digital threats organizations currently...

read more
Stopping threats in today’s threat landscape

Stopping threats in today’s threat landscape

Stopping threats in today’s threat landscape Many adversaries take advantage of new vulnerabilities and convert them into weaponized attacks, while extreme adversaries focus on supply chain and targeted attacks. The work from home (WFH) transition over this past year...

read more

Pin It on Pinterest