Securing business data

Blog

View some of the latest blog posts from our Cyber Security experts...

  • 10
    September
    Monday

    British Airways Suffers Huge Data Breach at Hands of Organised Cyber Criminals

    by Giulia Foss
    British Airways, what to do in an emergency!
  • 04
    September
    Tuesday

    Who do you trust? Networks...

    by Giulia Foss
    Exactly what is a trusted network? For many it is the supposedly secure haven in which network operations can happen without fear of compromise. Typically, it is segmented and access is limited through devices such as firewalls and role-based access control. In the PCI DSS world, the Cardholder Data Environment (CDE) is the classic example of such a design. The wider internal network is protected by the normal username / password combination that we’re all familiar with. As a concept, it has worked well and provided a reasonable level of protection for corporate environments. At its heart is the view that all devices connected to the network ensure some form of trust
  • 13
    July
    Friday

    SIEM – the real truth

    by Giulia Foss
    When I think about it. Which compliance and operational frameworks actually require me to run a SIEM? When you look at the fine print there is no direct requirement to have a SIEM installed, although the output a SIEM solution does meet a number of the compliance controls.
  • 18
    June
    Monday

    Router and DNS Hijacking Malware- What you need to know..

    by Giulia Foss
    After a number of emergency responses in the last couple of months coupled with the recent news of variants of malware targeting DNS settings within home/business routers, it is perhaps a good time to reflect on the impacts of such attacks and explain briefly how they are working.
  • 18
    April
    Wednesday

    It's about time!

    by Giulia Foss
    I have the privilege of meeting and discussing cyber security to a large number of people across a plethora of industries and markets. They all take Cyber security very seriously, all have representation at different degrees at board level, all use a blend of technical and operational controls to protect themselves, all are at varying levels of cyber maturity and all have challenges around, resources, education and budget when dealing with a very dynamic cyber security landscape.

Join our mailing list to ensure you keep up with all of the latest in Cyber Security.

call us

Get in touch

Talk to our experts today +44 (0) 20 7592 8800

Send us a message

We'll get back to you Send us a message

Connect with us

See what we're saying elsewhere