Sail the digital transformation seas more securely with Zero Trust Access

By Tim Boivin, PortSys (pictured) Security has long been the boat anchor that drags down innovation – a deadweight that prevents digital transformation efforts from sailing to success. With the pandemic, digital transformation efforts accelerated far beyond the horizon of what was thought possible. Those changing tides also gave cyber pirates the opportunity to hack […]
The four biggest mistakes in IT security governance

By Atech Intelligent IT security and endpoint protection tools are critical components of security governance, and the stakes within today’s threat landscape have never been higher. A lapse in identity protection or zero trust networks could spell financial disaster for a company. We know that attacks are increasing in sophistication and frequency, and in cost […]
What vulnerability management should deliver

By Eleanor Barlow, SecurityHQ The purpose of Vulnerability Management is to ensure that organisations can accurately detect, as well as classify and contextualise vulnerabilities, within their organisation, and act on them to reduce the chances of a successful attack by exploiting the vulnerability. With Vulnerability Management, once vulnerabilities are detected and prioritised, remediation programmes are […]
Just one crack – That’s all a hacker needs…

By Michael Oldham, CEO of PortSys, Inc. Just one crack. That’s all a hacker needs to find to cripple your organization. Here are three essential steps to take to stop that crack from blowing your infrastructure wide open for bad actors: Multi-factor authentication (MFA) that includes device validation, certificate checks, Geo IP intelligence and other […]
CIISec CyberEPQ qualification will kick-start cyber security careers

The Chartered Institute of Information Security (CIISec) is now managing the UK’s first and only Extended Project Qualification (EPQ) in cyber security. The Level 3 CyberEPQ will give anyone from 14 years old the best possible opportunity to kick-start their cyber security career and will integrate with CIISec’s broader development programmes to provide a clear […]
The fastest growing threat

By Atech Did you hear about the hackers who got away from the scene of the crime? They just ransomware. There are countless evolved versions of this joke out there. Just as the jokes are evolving, ransomware attacks are evolving, too, and they are not funny. The true cost of an attack consists of both […]
‘Simplicity is the ultimate sophistication’ for Access Control

By Tim Boivin (pictured), Marketing Director, PortSys Leonardo DaVinci’s philosophy in the headline has never rung so true as it does today in IT – especially when we’re talking about providing users secure access in our perimeterless world. If your access approach is wrong, your risk of being hacked ramps up exponentially. Counterintuitively, installing more security […]
How hackers get caught

Cyber criminals are intelligent, elusive individuals, making it difficult for law enforcement to track them down. Not all hackers manage to escape retribution, however. Here, Joanne Newton, deputy head of the school of computing at Arden University, explores the traps they fall in to, and how they get caught… Cyber criminals go to many lengths […]
Five top tips for improving your cyber security visibility and control

By Leyton Jefferies, Head of Security Services, CSI With an increasing number of high-profile security breaches splashed across the media, companies are now looking to improve their cyber security. As the world has become more digitally connected and working from home continues to be part of the way we work, there has become more opportunity […]
ContiLeaks: Ransomware gang suffers data breach

By Varonis Conti, one of the most infamous, prolific and successful big game ransomware threats, has suffered yet another embarrassing leak with a treasure trove of both internal chat transcripts and source code being shared by a reported Ukrainian member. Having previously had their internal manuals and tools exposed by a disgruntled affiliate in August […]