Increasing IT complexity is Driving a Rise in Zero Trust Adoption Research Reveals
Zero Trust is the future of enterprise security, and organisations are beginning to embrace it thanks to its enhanced security and ability to improve flexibility [ ... More Here > ]
The ABCs of Cyber Risk Prioritisation: Fixing What Really Matters
We're officially in the busiest season of delivery as all hiring is complete, budgets released, and work continues on improvement before the holiday season. So, [ ... More Here > ]
Cybersecurity Metrics: Are You Measuring What Matters?
When it comes to cybersecurity, you have to be right every time; malicious actors only have to be right once. To better understand your organisation's [ ... More Here > ]
Who Do You Trust? Explore the True Realities of Zero Trust
Changes in working patterns and the expansion of VDI, VPN and internet-based remote access has introduced new attack vectors. This has led to the explosion [ ... More Here > ]
Advisory: Pulse Secure VPN Flaws Exploited by Malicious Actors
The Situation Several malicious hacker groups have been observed in the wild targeting Government and Financial organisations via the exploitation of multiple vulnerabilities in Pulse Secure [ ... More Here > ]
EDR/NDR/XDR/WTFDR? Confused
In the world of cybersecurity, acronyms abound. Many of which represent technologies and concepts that are seemingly indistinguishable from one another. Take EDR, NDR and [ ... More Here > ]
HAFNIUM Targeting Exchange Servers with Zero-Day Exploits
Recent exploitations of on-premises Microsoft Exchange Server products have been highlighted starting around the 3rd of March utilising zero-day exploits. When successfully exploited these allow for [ ... More Here > ]
Security Control Assurance 101: Does It Do What It Says on the Tin?
Are your security controls optimised for success? Verizon estimates that 82% of enterprise breaches should have been stopped by existing security controls but weren’t. Why? [ ... More Here > ]
6,700+ VMWare Servers Exposed Online and Vulnerable to Major New Bug
VMWare releases an urgent security advisory recommending that users update VMware ESXI and VCenter servers to patch new security vulnerabilities. We have provided mitigation recommendations on [ ... More Here > ]
Is Your Domain Name Being Exploited? Find out with DNStwister
Utilising free tools such as DNStwister to seek out domain name permutations can protect your organisation from typosquatting-based phishing attacks and IP infringement. Its process is [ ... More Here > ]
Illuminating Risk Indicators with Readily Available Telemetry Data from Standard Admin Tools
We feel confident when our security controls have handled something – they alerted and confirmed that they quarantined – so we must have backed the [ ... More Here > ]
From Cybersecurity to Cyber Maturity
In the past, we have been too reliant on cyber technology, too focused on projects and driven by threat; it’s time to move forward. The [ ... More Here > ]