Skip to content

Blogs

DoD Supply Chain Cyber Security – Trust, and Now Verify

DoD officials frequently cite the enormous cost of cyber breaches on the US economy and the national security implications of IP theft from the US defense industrial base (DIB). Cyber hacks have resulted in the loss of DoD data related to high-grade weapon systems and...

Why Vulnerability Assessments are more important than ever…

With organizations across the globe adjusting to the coronavirus lockdown, managing a remote workforce has become the new normal. In the US, VPN usage was up by 53% in the first week of lockdown, while in Europe, Vodafone has reported a 50% surge in internet usage since mass...

Maintaining PCI Compliance remotely

With the number of businesses working remotely during the coronavirus outbreak continuing to rise amid government social distancing and isolation guidance, it is predicted that over half of U.S (75 million) and UK employees will be working from home before the COVID-19 crisis...

How can SOCs achieve Configuration Confidence?

The modern SOC has evolved from a simple alarm monitoring capability to a sophisticated analytics and visualisation platform enabling analysts to detect attacks and instigate threat hunting activity. However, the SOC still needs to ensure that the foundational cyber hygiene is...

Compliance Certifications