
The discovery stage of your cloud migration project
The discovery stage of your cloud migration project Migration or digital transformation to the Cloud is at the forefront of every organisation’s plans- It’s no longer a case of if that transformation is happening it’s how Some organisations are not sure where to start...

How to demonstrate ROI from your cyber security strategy
How to demonstrate ROI from your cyber security strategy The best outcome from a well-executed cyber security strategy should be that a business experiences no change or disruption to their operations or systems in the case of an external threat However, while this is...

Memory Corruption Issues Lead 2021 CWE Top 25
Memory Corruption Issues Lead 2021 CWE Top 25 The MITRE Common Weakness Enumeration (CWE) team’s latest list of most dangerous software flaws includes several that shot up in significance since 2020. Memory corruption errors remain one of the most common and dangerous...

Defence in Depth – Time to start thinking outside the box
Defence in Depth – Time to start thinking outside the box Spam Prevention, Anti-Virus, Intrusion Prevention – these are just a few solutions you may already be using as part of your cyber security strategy Whilst these are all effective in their own right, have you...

Vulnerability in Schneider Electric PLCs allows for undetectable remote takeover
Vulnerability in Schneider Electric PLCs allows for undetectable remote takeover Dubbed Modipwn, the vulnerability affects a wide variety of Modicon programmable logic controllers used in manufacturing, utilities, automation and other roles. A vulnerability discovered...

Watch for Cybersecurity Games at the Tokyo Olympics
Watch for Cybersecurity Games at the Tokyo Olympics The cybersecurity professionals guarding the Summer Olympics are facing at least as much competition as the athletes, and their failure could have steeper ramifications. It was a close call, but the 2018 Pyeongchang...

The True Cost of a Ransomware Attack
The True Cost of a Ransomware Attack Companies need to prepare for the costs of an attack now, before they get attacked. Here’s a checklist to help. If anyone needed further proof that ransomware is one of the most important digital threats organizations currently...

Stopping threats in today’s threat landscape
Stopping threats in today’s threat landscape Many adversaries take advantage of new vulnerabilities and convert them into weaponized attacks, while extreme adversaries focus on supply chain and targeted attacks. The work from home (WFH) transition over this past year...

How to hack into 5500 accounts… just using “credential stuffing”
How to hack into 5500 accounts… just using “credential stuffing” We all ought to know by now that passwords that are easy to guess will get guessed. We recently reminded ourselves of that by guessing, by hand, 17 of the top 20 passwords in the Have I Been Pwned...