Blog
PCI Compliance: How to Automatically Redact Credit Card Information from Inbound Email
Wednesday, July 29, 2020 - 11:56An often-overlooked challenge when it comes to PCI compliance are the occasions where customers ‘helpfully’ email their credit card details in an attempt to expedite an order or refund, or when they...
Read MoreDebunking Cybersecurity Jargon Part Four – What is Optical Character Recognition?
Monday, July 6, 2020 - 11:01As part of our on-going blog series explaining some of the many acronyms and pieces of jargon that bedevil the cybersecurity industry, we turn our attention to optical character recognition...
Read MoreDebunking cybersecurity jargon part two – what is a deep content inspection engine?
Thursday, May 14, 2020 - 14:46Given the prevalence of jargon and technical terms within the cybersecurity sector, we have launched a series of blog posts that look to debunk some of those terms and explain what they are in more...
Read MoreDebunking cybersecurity jargon part one – what is adaptive redaction?
Friday, April 24, 2020 - 15:25Like many industries and areas of technology, the cybersecurity sector is prone to using jargon, technical terms, and acronyms that can confuse even the most seasoned industry insider. We work with...
Read MoreThe top 3 emerging technologies posing a cyber-threat to our Critical National Infrastructure
Wednesday, July 17, 2019 - 15:57In the last few years, we’ve seen digital transformation take over the mindset of businesses and there has been a huge push to ensure that organizations in all sectors are adopting technology that is...
Read MoreNext Generation Cyber Threats: Images
Friday, May 31, 2019 - 14:29Cybersecurity is probably the most rapidly changing area of IT, and cyber-criminals are becoming increasingly more sophisticated in their bid to breach an organization's security and steal their...
Read MoreThe Top 5 Cyber Threats that Brexit Brings
Tuesday, May 14, 2019 - 09:12Regardless of your thoughts on Brexit, it can’t be denied that the drawn-out process has created mass confusion as firms rush to prepare for an unpredictable future. Because of this, we decided...
Read MoreAuthenticating with Authority: Can Multi-Factor Authentication Provide Total Protection?
Monday, March 4, 2019 - 14:02The need for a stronger defense against security threats is greater than ever, as the threat of data-driven crimes such as identity theft and corporate espionage grow each year. The recent data...
Read More