Securing business data

Blog

View some of the latest blog posts from our Cyber Security experts...

  • 08
    December
    Monday

    Fool me once, shame on you, fool me twice, shame on SONY?

    by User Not Found
    Well it appears history is repeating itself again for cyber security poor, global giant SONY. The corporation is once again making the news due to hacking breaches which have compromised vast pools of sensitive data from passwords to financial figures.
  • 26
    September
    Friday

    ShellShock FAQ

    by User Not Found
    A new vulnerability has been found, and has been unofficially named "ShellShock" by a number of security researchers.
  • 14
    April
    Monday

    Bugs in Heartbleed detection scripts.

    by Shannon Simpson
    Nessus, Metasploit, Nmap, and others have released methods for detecting whether your systems are affected by the heartbleed OpenSSL vulnerability. The problem is, most of them have bugs themselves which lead to false negatives results, that is, a result which says a system is not vulnerable when in reality it is.
  • 27
    March
    Thursday

    SSL / TLS - Ugly Truth

    by Shannon Simpson
    The ugly truth about SSL/TLS is that even with lots of clever cryptography being used, the current system we have for validating trust is based on often unknown third parties, with a single point of failure.
  • 10
    February
    Monday

    5 Tips for effective Risk Management implementation

    by Shannon Simpson
    Alex Radford takes a pragmatic look at the requirements of risk assessment for information security. Here are 5 tips for making it work for you.

Join our mailing list to ensure you keep up with all of the latest in Cyber Security.

call us

Get in touch

Talk to our experts today +44 (0) 20 7592 8800

Send us a message

We'll get back to you Send us a message

Connect with us

See what we're saying elsewhere