NetworkIQ
Once Malware breaches a business, it goes about whatever activity it has been programmed to undertake to be that CnC, file encryption or just general reconnaissance and infection of other devices and networks. The longer the malware remains undetected, the more potential damage it can do. Cisco’s inception the Cisco Security report has tracked the […]
Cisco’s recent mid year Cybersecurity report concludes that it is necessary to raise the security warning flag even higher. Cisco security experts are becoming increasingly concerned about the accelerating pace of change and sophistication in the global cyber threat landscape. While cyber defenders are generally improving their ability to detect threats, prevent attacks and recover […]
When was the last time you had a penetration test of your network or a vulnerability assessment? Penetration testing has traditionally been an annual event for most organisations. Of late we have seen vulnerability assessments delivered as a service with the ability to run tests on demand. Invariably vulnerability assessments are still run once a year oftentimes due to […]
Today’s reliance on IT technology is unparalleled and will only increase. While some businesses are pondering the benefits of IoT deployment or bespoke business applications, others are ploughing ahead and pioneering their initiatives. Some of these initiatives are stuttering and some are big winners that have transformed their business. Digitisation and it’s attendant benefits is the new game in town […]
We all know the cyber security threats landscape is rapidly evolving and it is a real struggle to keep apace with the threats much less get ahead of them, which ideally is where we should be. Organisations especially those small to medium sized ones have limited resources in terms of people, money and time to […]
I attended Infosec2018 this week at London Olympia. It was a vibrant event as you can imagine with every exhibitor enthusiastic to promote their wares. They were also eager to grab your details with their ‘GDPR compliant’ badge scanner. As a technologist of too many years to mention (I started in IT when 5-inch floppy […]
Have you sometimes found yourself bewildered by the sheer volume of bad news out there especially about emerging cyber threats and actual attacks. It is not uncommon to wonder when you will come under a similar threat or worst still is it happening already but you just haven’t detected it yet. What would give us […]
Having GDPR compliant processes and procedures is an essential and fundamental part of ensuring a robust data security and management regime is implemented in your organisation. Another crucial and as important component of compliance is having the right tools in place that will support the necessary management, security and monitoring of data assets. This means […]
What will you pay? With a 750% increase in ransomware attacks in 2016, a first layer of defense is needed. View the infographic for new proactive strategies with Cisco Umbrella and keep your business protected. Click here to view the infographic
We introduce another acronym yesterday, CASB (Cloud Access Security Broker) and we now expand on the features and benefits of deploying a CASB solution as we continue in our approach to cloud security. We noted in our previous blog that cloud security was a shared responsibility between service user and service provider. Gartner analysis indicates […]
- 1
- 2