RESOURCES
Cyber Security
Cyber Security
Harnessing Layer 7: Enhanced Network Security and Performance Monitoring
In today’s increasingly complex digital landscape, the need for robust network visibility, threat detection, and perform...
Cyber Security
What is Network Visibility and Why is It Essential for Cyber Security?
In today's hyper-connected world, network visibility has become a cornerstone for maintaining robust security and optima...
Cyber Security
This Week in Cyber 14th June 2024
Latest news and views from our Cyber Analysts
Cyber Security
The Rising Cyber Threat to Critical National Infrastructure
Critical national infrastructure (CNI) from energy to health to financial networks are all facing the growing threat of ...
Cyber Security
Securing Identity Access Management (IAM) Platforms
Identity Access Management (IAM) platforms are a highly adopted security solution, growing in popularity, and rightly so...
Cyber Security
What are the Implications of Quantum Computing for Cyber Security?
In recent years, the technology sector has been alive with discussions around quantum computing and how it promises to r...
Cyber Security
The Growing Threat of AI-Powered Cyber Attacks
The use of artificial intelligence (AI) within the cyber threat landscape is a growing concern for organisations across ...
Cyber Security
What Cyber Security Practices Should SMEs Prioritise Amidst Resource Limitations?
Tightening budgets and a shortfall in cyber security professionals are barriers to SMEs having the cyber security standa...
Cyber Security
Guardians of the Network: The Rise Of Ethical Hackers
Cyber Security
What goes on in the Shadows: Addressing the Looming Threat of Shadow IT
This article explores what shadow IT is, why employees use it and how it can be effectively addressed.
Cyber Security
The Most Important Cyber Security Trends in 2023 and Beyond | Advances in Threats and Tech
In today's fast-paced digital world, cyber security is more important than ever before. As technology continues to advan...
Cyber Security
Understanding the Risks of Supply Chain Cyber Attacks
As businesses become increasingly reliant on technology, the potential for cyber attacks on supply chains continues to r...
Cyber Security
Artificial Intelligence: A Friend or Foe for Cyber Security?
As the use of AI and the speed of its development rapidly increases, we investigate its impact on cyber security.
Cyber Security
Cyber Security Challenges in Education
The education sector has always been highly targeted by cyber criminals, we take a look at some of the challenges faced ...
Cyber Security
Vulnerability Assessments & Threat Hunting – Why you should be combining the two
Combining vulnerability assessments and pro-active threat hunting can help to identify weaknesses and deep dive into you...
Cyber Security
Insecure Enterprise Networks: The cost of data breaches vs the cost of network security for businesses
In July 2020, CWT global paid out $4.5 million as a consequence of one of the most expensive ransomware attacks of all t...
Cyber Security
IoT New Regulations
International Data Corporation (IDC) estimates that by 2025, there will be 41.6 billion connected IoT devices. However, ...
Cyber Security
What does the lack of IoT security mean for 5G?
The Internet of Things (IoT) has surged in popularity in recent years, with consumers embracing interconnected technolog...
Cyber Security
Updating Core Cyber Security Infrastructure: Intrusion Detection Systems (IDS)
Any business of any size is reliant on their ability to protect and secure their technology, data and networks from the ...
Cyber Security
Cyber Threat Visibility: Which threats should defenders be looking for?
A network security team can only fight what they can see, an organisation’s network security depends on their ability to...
Cyber Security
Cyber Intelligence for Shipping assets
ENISA produced its first EU-report on Maritime Cyber Security back in 2011, warning of the low cyber security awareness ...
Cyber Security
Breaking Down DDoS UDP Flood Attacks
A UDP flood is a type of volume-based DDoS (Distributed Denial of Service) attack, where large numbers of UDP (User Data...
Cyber Security
Protecting a Content Delivery Network (CDN) from Cyber Attacks
A Content Delivery Network or CDN is a system of distributed servers and nodes that delivers web content to a user, base...
Cyber Security
Securing Mobile Networks
Legacy telecommunications protocols have stood the test of time, underpinning the foundations of our day-to-day communic...
Cyber Security
Infographic: The cyber security visibility puzzle
APT groups are constantly seeking new targets and evaluating opportunities for data espionage, sabotage, and theft. One ...
Cyber Security
Spotting rogue TLS connections with JA3 fingerprinting
It’s impossible to imagine modern networks without the security and privacy provided by Transport Layer Security (TLS) e...
Cyber Security
JA3 Fingerprinting: Encrypted Threat Detection
As our dependence on interconnected technologies grows so does the risk of our personal data getting into the hands of m...
Cyber Security
Preparing for Cyber Warfare: Strengthen your NetSecOps with nation-scale attack simulation
The cyber landscape continues to be a challenging place for public and private organisations alike. Both are often on th...
Cyber Security
FaceApp – a big data security threat or just smoke?
FaceApp has officially gone viral and while many people are enjoying seeing how they would look when they are older, man...
Cyber Security
Data generation is increasing, so too should data storage
Big data security threats are nothing new. We continue to see conversations and articles surrounding IoT, Edge computing...
Cyber Security
The Evolution of NFV Network Visibility and Security at Scale
NFV (Network Function Virtualisation) migration continues on our large scale, country-wide national network infrastructu...
Cyber Security
What do you mean we are flying blind?
The drive towards the use of cloud computing, cloud platforms and cloud data storage within most industries has been pro...
Cyber Security
Part 2 : What is driving the growth of Edge technology and where is it heading?
Whilst the Cloud will continue to remain a cornerstone of virtual computing power, with Fog computing looking to ease so...
Cyber Security
The APT Series Part 2 ‘APT33’
Seeing an attacker enables you to defend against them, a way to effect this is to lay over the physical network and its ...
Resources Hub
The latest industry news, threats, advice and information from our network and cyber security specialists.