Keeping your Network Healthy with AI Anomaly Reporting

Cybersecurity is an ongoing task, as we often say in our blogs and seminars. With the ever-expanding threat surface due to IoT adoptions and other Industry 4.0 technologies, all businesses and other organisations must stay ahead of the security curve. Especially now in the era of GDPR and the ever-increasing sanctions that are being levied […]

The Evolution of Penetration Testing

Penetration Testing, or Pen Testing, is an essential component in any comprehensive network and application security strategy. Each security component is important, but there has been a tendency to see Pen Testing as an afterthought or as a box-ticking exercise for regulatory reasons. Indeed, organisations that gather credit card information need to comply with the […]

The Role of IAM in IOT

“Do you have valid ID?” We are all used to being asked for valid ID to prove who we say we are. From picking up a parcel at the post office, voting in elections or buying wine (if we are lucky enough to look that young), and in many other situations, proving your identity is […]

The Thing is! (How to secure the IoT – Internet of Things)

Definition; Thing (noun) plural noun: things an object that one need not, cannot, or does not wish to give a specific name to. synonyms:   object, article, item, artefact, commodity; an inanimate material object as distinct from a living sentient being.   We are all familiar with the word “thing” it’s our go to word when […]