The internet is huge and is expanding every day. While this has many positives for businesses, managing the potential risks in this environment can be daunting.
Editorial: Automated Hacking
Automated hacking is not a new problem, it has been around for some time. However, with companies’ attack surfaces becoming increasingly sprawling and complex, and with hacks getting more advanced, it is becoming a much more pressing problem for organisations.
6 steps to achieving zero Shadow IT
Shadow IT has long been a problem for organisations. Formal IT is routed through the IT department, where it’s approved, purchased, set up, and, importantly, supported and maintained. Shadow IT falls outside this process.
Editorial: WHY API SECURITY MIGHT BE THE NEXT BIG THING
API security is one of those essential elements, as it’s rooted in so many processes. Yet, it’s still easily overlooked. API security needs a second component to be effective. In this insight, I will outline what that is and why you need it.
EXCHANGE CVES: THE RESPONSE PLAN GAP
It’s been two weeks since Microsoft released a patch for the Exchange vulnerabilities. For many, the dust has settled. Others are still fighting fires. Today, I’d like to look back at some of the problems we saw. Some were expected, other surprised us.