Vulnerability Scanning
Cisco’s recent mid year Cybersecurity report concludes that it is necessary to raise the security warning flag even higher. Cisco security experts are becoming increasingly concerned about the accelerating pace of change and sophistication in the global cyber threat landscape. While cyber defenders are generally improving their ability to detect threats, prevent attacks and recover […]
The basic objective of a cloud security strategy is to provide a method to monitor and protect the flow of information to and from cloud hosted services. There has been and will continue to be a shift towards public and private cloud services as the age of digitisation is increasingly being embraced by organisations. According […]
When was the last time you had a penetration test of your network or a vulnerability assessment? Penetration testing has traditionally been an annual event for most organisations. Of late we have seen vulnerability assessments delivered as a service with the ability to run tests on demand. Invariably vulnerability assessments are still run once a year oftentimes due to […]
Today’s reliance on IT technology is unparalleled and will only increase. While some businesses are pondering the benefits of IoT deployment or bespoke business applications, others are ploughing ahead and pioneering their initiatives. Some of these initiatives are stuttering and some are big winners that have transformed their business. Digitisation and it’s attendant benefits is the new game in town […]
In our final part of Cisco’s 68 page 2018 Annual Cyber Security Report, we summarise the key findings and highlight the main takeaways contained in the report. While most of the information is already known, put in context it gives a thorough view of the changing landscape and importantly identifies some of the steps that Information Security […]
So now we have confirmed what we already knew, the era of digitisation is bringing unimaginable opportunities for business innovation and differentiation. The big BUT is that our traditional approach to securing IT assets needs to be transformed and be relevant for the emerging world of large scale remote working, cloud based applications and massive […]
In our series exploring the changing IT security landscape, we look at the drivers behind cloud adoption and some of the challenges it presents. Cloud adoption has gathered pace to become the dominant form of user access with Software as a Service (SaaS) applications becoming the norm. This growing trend means that direct branch […]
Ransomware is currently the number one form of cyber attack due to its profitability and simplicity in execution. It is now evolving as a business model where any ‘Joe Bloggs’ can buy ransomware code for a monthly fee – ransomware as a service. Ransomware thrives partly because of bitcoin and the associated anonymity of attackers […]
So it’s all happening in the cloud. Wholesale adoption of cloud services is now a business imperative as the opportunities and benefits of SaaS become ever clearer. Here are some numbers though that tell us not only what’s happening but also some concerns that we need to have at the forefront of our minds. 82% […]