Contact us
Request demo →
Contact us
search
close

Editorial: Why your Brand DNA is the foundation of your security posture

The internet is huge and is expanding every day. While this has many positives for businesses, managing the potential risks in this environment can be daunting.

Read editorial

Editorial: Automated Hacking

Automated hacking is not a new problem, it has been around for some time. However, with companies’ attack surfaces becoming increasingly sprawling and complex, and with hacks getting more advanced, it is becoming a much more pressing problem for organisations.

Read editorial

6 steps to achieving zero Shadow IT

Shadow IT has long been a problem for organisations. Formal IT is routed through the IT department, where it’s approved, purchased, set up, and, importantly, supported and maintained. Shadow IT falls outside this process.

Read editorial

Editorial: WHY API SECURITY MIGHT BE THE NEXT BIG THING

API security is one of those essential elements, as it’s rooted in so many processes. Yet, it’s still easily overlooked. API security needs a second component to be effective. In this insight, I will outline what that is and why you need it.

Read editorial

EXCHANGE CVES: THE RESPONSE PLAN GAP

It’s been two weeks since Microsoft released a patch for the Exchange vulnerabilities. For many, the dust has settled. Others are still fighting fires. Today, I’d like to look back at some of the problems we saw. Some were expected, other surprised us.

Read editorial

Supply Chain Attacks

Eward shares his personal insights on the 3 types of supply chains, the potential threats of each one to your organisation, and how to minimise these risks. 

Read editorial

Do you have a question?

Our experts have the answers

Contact us