Keeping your cyber defense strategies ahead of the game today is no easy task, especially when organizations face a daily proliferation of increasingly evasive cyber-attacks. Advanced persistent...Read More
It’s been three years since the WannaCry ransomware cryptoworm first appeared, causing untold damage to organizations all over the world. One of the worst hit was the NHS, with the attack causing 200...Read More
Given the prevalence of jargon and technical terms within the cybersecurity sector, we have launched a series of blog posts that look to debunk some of those terms and explain what they are in more...Read More
Understanding your enemy is the first step to defeating them; a sentiment often touted by generals and commanders on the battlefield, but just as applicable to cybersecurity.
The media landscape today continues to share stories of the increased cyber vulnerabilities in mobile applications. While banks have had many years to develop and tailor their apps to respond to...Read More
Guy Bunker, SVP Products & Marketing
We all know about the much publicised 2014 Yahoo hack that saw 500 million accounts compromised, wiping $350 million off the value of the company. In fact,...