RESOURCES
Cyber Security
Cyber Security
Cyber Security Challenges in Education
The education sector has always been highly targeted by cyber criminals, we take a look at some of the challenges faced ...
Cyber Security
Vulnerability Assessments & Threat Hunting – Why you should be combining the two
Combining vulnerability assessments and pro-active threat hunting can help to identify weaknesses and deep dive into you...
Cyber Security
Insecure Enterprise Networks: The cost of data breaches vs the cost of network security for businesses
In July 2020, CWT global paid out $4.5 million as a consequence of one of the most expensive ransomware attacks of all t...
Cyber Security
IoT New Regulations
International Data Corporation (IDC) estimates that by 2025, there will be 41.6 billion connected IoT devices. However, ...
Cyber Security
What does the lack of IoT security mean for 5G?
The Internet of Things (IoT) has surged in popularity in recent years, with consumers embracing interconnected technolog...
Cyber Security
Updating Core Cyber Security Infrastructure: Intrusion Detection Systems (IDS)
Any business of any size is reliant on their ability to protect and secure their technology, data and networks from the ...
Cyber Security
Cyber Threat Visibility: Which threats should defenders be looking for?
A network security team can only fight what they can see, an organisation’s network security depends on their ability to...
Cyber Security
Cyber Intelligence for Shipping assets
ENISA produced its first EU-report on Maritime Cyber Security back in 2011, warning of the low cyber security awareness ...
Cyber Security
Breaking Down DDoS UDP Flood Attacks
A UDP flood is a type of volume-based DDoS (Distributed Denial of Service) attack, where large numbers of UDP (User Data...
Cyber Security
Protecting a Content Delivery Network (CDN) from cyber attacks
A Content Delivery Network or CDN is a system of distributed servers and nodes that delivers web content to a user, base...
Cyber Security
Securing Mobile Networks
Legacy telecommunications protocols have stood the test of time, underpinning the foundations of our day-to-day communic...
Cyber Security
Infographic: The cyber security visibility puzzle
APT groups are constantly seeking new targets and evaluating opportunities for data espionage, sabotage, and theft. One ...
Cyber Security
FaceApp – a big data security threat or just smoke?
FaceApp has officially gone viral and while many people are enjoying seeing how they would look when they are older, man...
Cyber Security
Data generation is increasing, so too should data storage
Big data security threats are nothing new. We continue to see conversations and articles surrounding IoT, Edge computing...
Cyber Security
The Evolution of NFV Network Visibility and Security at Scale
NFV (Network Function Virtualisation) migration continues on our large scale, country-wide national network infrastructu...
Cyber Security
What do you mean we are flying blind?
The drive towards the use of cloud computing, cloud platforms and cloud data storage within most industries has been pro...
Cyber Security
Part 2 : What is driving the growth of Edge technology and where is it heading?
Whilst the Cloud will continue to remain a cornerstone of virtual computing power, with Fog computing looking to ease so...
Cyber Security
The APT Series Part 2 ‘APT33’
Seeing an attacker enables you to defend against them, a way to effect this is to lay over the physical network and its ...
Resources Hub
The latest industry news, threats, advice and information from our network and cyber security specialists.