Similar Posts
Critical Vulnerabilities Cisco SD-WAN
Cisco has publicly disclosed several critical vulnerabilities affecting their Software Defined WAN (SD-WAN) products. A total of eight vulnerabilities were revealed. Each were identified with a CVSS rating of 9.6 or more, indicating a critical…
What is the SOC (Security Operations Centre) Visibility Triad?
IT environments are becoming increasingly complex and sophisticated, and security teams are faced with the daunting task of keeping potential attackers from accessing their organisation’s environments. As a result, organisations are adopting increasingly complex cybersecurity solutions to combat this growing concern. One way to do this is by using the SOC visibility triad.
What is Business Email Compromise and How to Prevent it
Business Email Compromise attacks target organizations of all sizes and are becoming increasingly prevalent, complex, and costly. They exploit the fact that many organizations rely on emails to conduct business. In the BEC scam, a…
The importance of Incident Response
While many threat and risk management solutions help organisations deal with low-level security events with automated responses, having an incident response plan, delivered by an experienced team will determine your success in responding to an attack.
Challenges Securing The Endpoint
The IDC has reported that 70% of successful breaches begin at the endpoint, which must be a concern to many businesses and organisations in the changing world of 2020. A McAfee Threat Report published in…
How To Secure Your Web Browser (Aka. Browser Hardening)
What is it?‘Browser hardening’ refers to ways in which we can tweak our web browser’s settings, with the goal of enhancing its security and privacy. What does it involve?A great starting point is exploring your…