Threat Intelligence – what is it good for?

Threat intelligence has a place in any mature security operation, across any sector. However, not unlike many other good concepts in other industries, its path to being commercialised has involved com …
view article
  • Share

Managing application access to manage risk

Employees, customers, third parties and partners expect to be able to access a business’s applications whenever they need, and wherever they are. Access must be seamless for the user and delivered o …
view article
  • Share

Deal or No Deal, Brexit Poses a Major Threat to Cybersecurity

Whatever your preference on the Brexit decision, there’s no doubting that the United Kingdom’s ongoing exit from the European Union will have a profound effect on businesses all over the world. Fr …
view article
  • Share

Defending against offensive AI – By CTO Etienne Greeff

AI and machine learning have long been touted as one of the ‘hottest trends’ in cybersecurity, not least by vendors enthusiastic to pitch defensive applications of the technology. Now we’re seei …
view article
  • Share

Case study: Analysing the analysts

Enterprise technology is characterised by uncertainty over crucial aspects such as the speed of development, the rate of adoption and the scale of its impact on business. Differing perspectives and ex …
view article
  • Share

Are Threat Intelligence Services Actually Delivering Value for Your Money?

The businessman and author Peter Drucker famously said that trying to predict the future is like ‘driving down a country road at night with no lights while looking out the back window’. As difficu …
view article
  • Share

DNS Search Suffix Wi-Fi Attacks (part two)

In this blog post, we will go into detail on how DNS search suffixes can be used maliciously to gather usernames and NTLM password hashes from unsuspecting victims connecting to a Wi-Fi network. In …
view article
  • Share

Codebreak Hotel (part one)

Last year we were faced with some unusual activity on two employees’ laptops, which ended up being benign, but revealed a strange default configuration on a public Wi-Fi hotspot they had connected t …
view article
  • Share

Detecting advanced threats in an age of sophisticated cybercrime

Businesses face an increasingly challenging task in detecting advanced security threats. In 2017 alone, Cryptojacking attacks exploded by 8,500%, software update supply chain attacks increased by 200% …
view article
  • Share

5 reasons to attend Northern CyberSecurity Summit 2019

A new year brings a new wave of enthusiasm for learning and personal development. There are few better ways to channel that interest than to meet with like-minded peers and explore the most challengin …
view article
  • Share