+44 (0)203 88 020 88

Menu

Search

Articles

What is Cyber Supply Chain Risk Management?

Recent high-profile security incidents, such as the compromises at SolarWinds and CodeCov and the vulnerabilities in Microsoft Exchange Server, have drawn attention to the risks posed by the software we invite into the heart of our networks and often trust implicitly. The processes and procedures for identifying and mitigating the risks posed by these third-party […]

What is Cyber Supply Chain Risk Management? Read More »

Lessons from 2020 Payment Security Report

In their tenth annual Payment Security Report, Verizon reveals the security trends affecting businesses that seek PCI-DSS compliance and cybersecurity lessons applicable to all organisations. This year’s 140 page Payment Security Report from Verizon focuses on the role and challenges of the CISO and how this relates to the performance and security of businesses in

Lessons from 2020 Payment Security Report Read More »

SolarWinds and Solarigate Hacks Explained

Described as the most sophisticated hack ever – what is the SolarWinds hack and how might it affect your business? SolarWinds provides network monitoring software to thousands of large enterprises and government departments.  One of the SolarWinds products, called Orion, was compromised in a supply chain attack, and was then used to deliver Solarigate malware

SolarWinds and Solarigate Hacks Explained Read More »

What is file integrity monitoring?

File Integrity Monitoring systems generate alerts when intruders make unexpected changes to the files on your servers – either by changing existing files or creating new ones. Robust cybersecurity can be most effectively achieved by adopting a ‘defence in depth’ approach.  This means deploying several layers of protection, using different technologies so that the overlapping

What is file integrity monitoring? Read More »

0

No products in the basket.

No products in the basket.