Published 5 September 2018

Bug Hunting: A Penetration Test Finds Security Flaws Before the Bad Guys Do

As digitalisation continues to sweep through established industries, companies are increasingly operating massive IT systems, which may consist of thousands of connected devices and thousands more dependencies on third-party software and applications. This leaves medium and large corporations with an extremely complex array of vulnerabilities to cyberattacks. Gone are the days when corporations could just…

Read more

Published 2 August 2018

SIEM: Importance and Evolution Interview with Simon Howe

Security Information and Events Management (SIEM) services are a key part of any modern business. Computer systems are talkative things, with various apps and devices exchanging thousands of bits of information every day, and most of them storing logs detailing their activities. Most of this information is routine and doesn’t need any oversight, but when…

Read more

Published 25 July 2018

The Biggest Cyber Threats to Logistics and How to Remedy Them

Over the past decade, the state of near unlimited connectivity characteristic of modern digital technology has produced sweeping changes in the business world, including now in industries such as logistics and utilities, which have traditionally been cautious in their adoption of new technologies. In 2018, however, the benefits of connectivity have become undeniable, and corporations…

Read more

Published 17 July 2018

Learning from the Devastating 2017 Ransomware Attacks

For many companies, particularly those in the logistics and utilities sectors, 2017 was a year of reckoning with a new era of cyber threats. In a year that began with allegations that state-sponsored hacking was used to influence the US Presidential Election, followed hotly by two of history’s most devastating ransomware cyberattacks, WannaCry and NotPetya,…

Read more
across borders cover autumn 2018

Published 10 July 2018

Bespoke Ransomware, Targeted Attacks. Hackers Have A New Arsenal

Cyber security is a hot topic in board meetings. Management wants, and needs, to know how cyber security is being controlled and monitored. If you are the person responsible it is essential that you can demonstrate effective management against attacks from hackers. Although it may appear to be good news that a competitor is receiving…

Read more