News

When is Data No Longer Valuable?

Monday 25 September 2017

ezembed

We should stop using the term ‘big data’. In today’s data driven economy, the moniker ‘huge data’ is much more apt. And it’s going exponential.

Read more


The Problems of Permissive Data Access

Thursday 21 September 2017

Matt Lock – Director of Sales Engineers, at Varonis

Despite heightened awareness of cyber threats, and more budget than ever devoted to cyber security, data breaches are occurring all too frequently. The stream of ongoing reports of wide-scale attacks or massive loss of customer records, give credence to the theory that data breaches are inevitable in our digital age. 

Read more


DUO BeyondCorp: Creating Access Policies

Thursday 21 September 2017

In this post, we’ll talk about creating access policies. Your access proxy takes on the role of enforcing access to corporate resources, regardless of whether they’re outside or inside your traditional perimeter. Enforcement strategy is one way we express risk tolerance; rightsizing those policies depends on factors such as sensitivity, threat, user community, regulatory requirements, and any number of other things. And enforcing policies consistently for both sides of the firewall is a key tenet of the BeyondCorp model.

Read more


Malwarebytes Finds 76 Percent of Local Councils in the UK Have Experienced Cyber-Attacks in Last 12 Months

Wednesday 20 September 2017

Legacy software and a lack of confidence in how to deal with zero-day attacks leaving local councils dangerously exposed to cyber-crime

Read more


How prepared are you for the GDPR?

Tuesday 19 September 2017

GDPR

Read more


Brits Still Failing to Protect Online Accounts from Hackers with Complex Passwords, Creating What Could be an Expensive Vulnerability for Businesses

Monday 18 September 2017

Shocking new survey results from Cyber Security Europe,  show that nearly a quarter of people (23%) routinely use either their name or date of birth as their online passwords. The alarming findings uncover just how exposed people’s data is to hackers.     

Secure your systems

Read more


Top