How to build a crisis communication plan for cyber threats 

Crisis communication plan for cyber threats

In today’s digital age, cyber threats are a potential crisis that hovers over every organisation – regardless of industry, size, or prominence.  A crisis caused by a cyber attack can be especially debilitating: it’s not simply a case of your computer systems being compromised; they can infiltrate every part of your organisation. Such crises affect your ability to deliver your … Read More

Utility Sector Cybersecurity Risks — And What Can Be Done About Them 

Utilities cybersecurity

An increasingly dangerous cyber threat landscape poses a risk to critical national infrastructure, particularly in the utility sector. Any kind of large-scale disruptive attack will cause a massive impact on government and corporate systems. Just last year, a double-extortion ransomware attack on Colonial Pipeline, a private fuel provider servicing the East Coast, caused a shutdown of its pipeline operation and IT systems. … Read More

Log4j zero day vulnerability: How to protect yourself

Log4j zero day vulnerability

The Log4j zero day vulnerability (CVE-2021-44228) is a remote code execution (RCE) vulnerability that allows malicious actors to take complete control of vulnerable devices and execute arbitrary code.  The Log4j 0-day vulnerability has to date, been detected in more than 3 million vulnerable instances. Researchers also found that nearly 68,000 vulnerabilities were present in cloud workloads and containers within the … Read More

Simple strategies for risk remediation in cyber security

Risk remediation in cyber security

Why remediation in cyber security is key to limiting the damage a breach can cause Remediation in cyber security refers to limiting the damage a breach can cause to your organisation. If you fail to notice and act upon a breach in a timely manner, it can move rapidly and becomes almost impossible to contain. As organisations worldwide expand, they … Read More

Open source security software risks

Open source security

What is open source security? Open source software security is the measure of assurance in the freedom from the risk inherent to an open source software system. Open source security refers to the processes and tools used to manage and secure compliance and OSS from development to production. These tools can automatically discover open source dependencies within applications, provide valuable … Read More

What are the cloud security challenges in 2022?

Cloud computing cloud security challenges

Taking a closer look at the main cloud security challenges, issues and threats found in 2022 As organisations right around the world switch their operations over to cloud computing, the security implications that come with it intensify. IT teams are now locked in a race to come up with the latest and best cloud security solutions to ensure that their organisations … Read More

What are the 5 steps in operational security? 

5 steps in operational security

Operational security (OPSEC), or procedural security as it’s also known, is a risk management process that managers use to view operations from an adversary perspective to protect sensitive and private information from falling into the hands of hackers.  OPSEC, originally created by the military to ensure a sufficient level of security surrounds their systems, is now becoming a useful staple … Read More

Who is targeted by ransomware? 

Who is targeted by ransomware

Ransomware is now commonplace within many industries around the world. Over the past three years, especially during the pandemic, ransomware attacks have increased in many different sectors including government, healthcare, education, professional services, and manufacturing.  According to the FBI’s Internet Crime Report 2021, America experienced an unprecedented increase in cyber-attacks and malicious cyber activity during 2021. These cyber-attacks compromised businesses … Read More

Importance of continuous control monitoring (CCM)

Importance of continuous control monitoring (CCM)

What is continuous control monitoring? Continuous control monitoring (CCM) is defined as using a set of technologies to reduce company losses through continuous monitoring. It also reduces the cost of audits via the continuous auditing of controls in financial applications and other types of applications.  In the overall business ecosystem, CCM sits above your existing security tooling, ensuring that all assets … Read More