Skip to content

Blogs

Posts by Ed Bentley:

Minimizing the cost of a data breaches in 2023

2022 was a big year for high profile data breaches around the world - At the start of the year a breach at FlexBooker prevented 3.7 million from accessing their scheduling tool accounts. In February, a data leak at the world’s largest semiconductor chip company, Nvidia, took...

Proactive network security approach

Every network security strategy aims to maintain a careful equilibrium between reactive response and recovery, and proactively preventing attacks and identifying vulnerabilities. The proactive approach has now come more into focus as organizations embrace cybersecurity...

OpenSSL Vulnerability Downgraded - a Sigh of Relief

Yesterday, the OpenSSL Project fully disclosed and provided a patch for CVE-2022-3602, which had initially been deemed Critical, due to it being believed to allow Remote Code Execution (RCE). At the time it was also believed to only affect version 3+ of the library, which would...

Network segmentation is key to improving data security

Network segmentation is a robust security measure that is often underutilized by organizations’ network security teams. In the current threat landscape with increasingly sophisticated attacks, the successful prevention of network breaches cannot be guaranteed. However, when...

Compliance Certifications