Insights

What is Pass-The-Cookie Website Exploitation?

Written By Hannah Golding What is a Website Vulnerability? An attacker will first discover a vulnerability, then attempt to exploit it to gain a foothold within the host. Most commonly,

Read More +

Incidentally In The News – Discussing Roles in Cybersecurity

In this episode, we teamed up with Larry Whiteside Jr, Chief Technology Officer and Jay Jay Davey, Tier II SOC Analyst, to discuss the different roles available in cyber and

Read More +

Why You Should Invest In Your Users

For the last 22 years, Frank Siepmann – Global Director of Risk Management Services at CyberClan, has witnessed the evolution of cybersecurity within businesses and the changes this has meant

Read More +

More Fragmented US Data Privacy Law for Insurers to Ponder

Written by Mark Bowers On March 2, 2021, the Virginia Consumer Data Protection Act (“VCDPA”) was signed into law effective from 1 January 2023. The privacy regime created by the

Read More +

Why are Managed Security Services the Future of Cybersecurity?

Most organisations believe the subsequent stage of improving their security posture means adopting a Next-Generation Anti-Virus (AV) or Endpoint Detection Response (EDR) tool. AV and EDR technologies are used to

Read More +

Microsoft Zero-Day Exploits

Written by -Jay Jay Davey At the start of March 2021, Microsoft released information about Zero-Day exploits targeting on-premises exchange servers. Since then, there has been a flurry of attacks

Read More +

Incidentally In the News: FireEye and SolarWinds

The last week has been one of speculation, revelation, and a lot of reporting on the cyber breach discovered at FireEye and subsequently SolarWinds.  If you aren’t in cybersecurity, some

Read More +

Is There a Shortage of Cybersecurity Talent, or are Companies Setting Unrealistic Expectations, Limiting Whom They View as Qualified?

The Information System Security Certification Consortium (ISC2) recently released a report which said that there is a void of cybersecurity talent worldwide, with approximately 3.1 million professionals needed within the

Read More +

How Should We Think About the Internet of Medical Things

The term, Internet of Things (IoT), was first coined in 1999 by an executive at Procter & Gamble who was trying to gain momentum for new RFID technology.  It wasn’t

Read More +

Why is Healthcare Particularly Vulnerable to Cyber Attacks?

While it’s widely reported that healthcare isn’t necessarily targeted any more than other industries, the complications for the industry are compounded by many things including the COVID-19 crisis, the increase

Read More +

Election Day: The Cyber Threat Few are Talking About

The Department of Homeland Security (DHS) via the Cybersecurity Infrastructure and Security Agency (CISA) has set up a virtual war room to remain alert and on the lookout for suspicious

Read More +

Ransomware Advisories: Is Your Cybersecurity Firm Ready?

Uptake and Update on Ransomware Ransom demands continue to grow at an increasing rate in 2020 with data exfiltration employed more and more in the number of incidents that we

Read More +
icon-dark icon-light icon logo-light