Threat Intelligence is a sound proposition that has its place in a mature security operation. But like so many good concepts in our industry, its path to commercialization has involved commoditization …
This may seem an unusual thing for a security provider to admit, and it feels a little uncomfortable to us, but we recently uncovered a flaw in our own defences when we staged a security attack agains …
As security professionals, it’s our job to understand the threat landscape and keep a careful watch on the latest tactics cybercriminals are employing. What’s becoming clearer, however, is that th …
SecureData, the leading independent cybersecurity services provider, is delighted to announce receiving two prestigious awards at the Palo Alto NextWave Channel Partner Annual Awards UK ceremony on Th …
One of the most commonly accepted cybersecurity myths is the presumption that iOS exploits are automatically patched by Apple. Further research into an iOS exploit we were tracking recently revealed t …
Law firms will be acutely aware of the pervasive new EU data protection law known as the GDPR. The legislation itself is reflective of the world we live in: a world of data breaches, cybercrime and na …
Proofpoint researchers have discovered a new version of the Kronos Trojan is out in the wild, with exploit campaigns already active in Germany, Japan and Poland.
Kronos gained more than a little infa …
Dixons Carphone, a European electronics and telecommunications retailer, has launched an investigation into a data breach involving 5.9 million customer card details and 1.2 million customer data reco …
We come to the final of a four-part blog series looking at the mysterious Meltdown and Spectre exploits. We’ve driven down vulnerability management road, and stopped off at the supply chain for a qu …
The endpoint is the new frontline.
In the battle against online attackers, who have an ever-expanding toolkit of techniques to monetise cybercrime, new attacks to exploit legitimate features, proto …