Similar Posts
Microsoft Netlogon Vulnerability CVE-2020-1472
In September 2020 details of a critical vulnerability known as ‘ZeroLogon’ were published. This vulnerability affects Windows NetLogon processes and referenced as CVE-2020-1472. The publication coincided with the August 2020 Windows Security Update release, which…
An Interview with Vernon Poole on Cyber Security Culture
It’s an exciting concept and one that many people don’t grasp. All organisations today can potentially fall victim to a cyber-attack or cyber security outage, which can cause severe damage to its ability to operate and its infrastructure. It’s more than just cyber security awareness; it requires the whole workforce to know what the risk is and the processes that need to be followed to avoid this risk.
The Hard Truth in Promoting Inclusion and Diversity in Today’s Society
Have you ever considered the profound impact of inclusion and diversity in our society? Recently, there has been a growing emphasis on inclusion and diversity in various sectors, including corporate, educational, and social settings. This trend shows…
Sapphire achieves SOC Accreditation by CREST- one of the cyber industry’s most highly regarded industry bodies
We’re thrilled to announce that we’ve successfully added the Security Operations Centre (SOC) discipline to our CREST membership, earning an additional accreditation and demonstrating our commitment to defending clients through our people, technology and processes….
The Future of Cybersecurity in the Age of Generative AI: Insights and Projections from a recent ESG research
Main Highlights: As the digital landscape evolves, so does the domain of cyber security, now standing on the brink of a transformative era powered by generative AI. In A research recently conducted by TechTarget’s Enterprise Strategy…
How do Endpoint Security Solutions Secure Data?
When a device connects to business networks, cybercriminals may use this connection to compromise corporate data and put the network at risk. This means that these endpoint devices need to be fully secured to prevent any potential incidents from happening. To do this, organisations must ensure that they are utilising appropriate solutions to protect the front line of their cybersecurity