SecureData becomes the highest accredited Palo Alto Networks Service Partner in Western Europe

SecureData, the leading independent cybersecurity services provider, is delighted to announce receiving two prestigious awards at the Palo Alto NextWave Channel Partner Annual Awards UK ceremony on Th …
view article
  • Share

Debunking popular cybersecurity myths at UK CyberSecurity Summit 2018

One of the most commonly accepted cybersecurity myths is the presumption that iOS exploits are automatically patched by Apple. Further research into an iOS exploit we were tracking recently revealed t …
view article
  • Share

Law firms need to evolve proactive cyber security – but industry FUD is holding them back

Law firms will be acutely aware of the pervasive new EU data protection law known as the GDPR. The legislation itself is reflective of the world we live in: a world of data breaches, cybercrime and na …
view article
  • Share

Does new Kronos ‘Osiris’ Trojan expose banking sector security impotence? – Our Security Researcher Wicus Ross spoke to SC Magazine

Proofpoint researchers have discovered a new version of the Kronos Trojan is out in the wild, with exploit campaigns already active in Germany, Japan and Poland. Kronos gained more than a little infa …
view article
  • Share

SecureData CTO & Founder, Etienne Greeff, speaks to The Daily Swig on the Dixons Carphone data breach

Dixons Carphone, a European electronics and telecommunications retailer, has launched an investigation into a data breach involving 5.9 million customer card details and 1.2 million customer data reco …
view article
  • Share

What we learned from Meltdown/Spectre – Part Four

We come to the final of a four-part blog series looking at the mysterious Meltdown and Spectre exploits. We’ve driven down vulnerability management road, and stopped off at the supply chain for a qu …
view article
  • Share

Taking Endpoint Security to the Next Level

The endpoint is the new frontline. In the battle against online attackers, who have an ever-expanding toolkit of techniques to monetise cybercrime, new attacks to exploit legitimate features, proto …
view article
  • Share

What we learned from Meltdown/Spectre – Part Three

In part one of our Meltdown/Spectre series, we looked at the concept of vulnerability management as a means to more thoroughly map out an organisations systems, detect and evaluate cyber threats and r …
view article
  • Share

What we learned from Meltdown/Spectre – Part Two

In part one of our four-part blog series on Meltdown and Spectre, we posited that there are a number of key learnings that the business can take away from quite a significant cyber security incident. …
view article
  • Share

Forget Security FUD: It’s Time to Get Proactive as We Run with the Bulls

Fear, uncertainty and doubt (FUD) have long been the watchwords of cybersecurity, but it’s time to take a different approach. Charl van der Walt, chief strategy security officer at SecureData argues …
view article
  • Share