What is a WAF and do I need one?

If you’re reading this then you are probably asking yourself, what is a Web Application Firewall (WAF)?

Does my company need one, and how much is this going to cost me?

You’re not alone

Like many others, we’ve found that a lot of cyber security companies are quite happy to give you all the technical information, which is great.

But for someone who is not so tech-savvy or clued up on web application firewalls, this can be quite overwhelming.

With so much information being thrown around no one really addresses the elephant in the room.

Read more

Increasing cyber security in wind farms and other renewables

Both domestically and globally, offshore wind production has grown exponentially over the past decade. With this record-breaking growth comes an increasing level of reliance on wind farms as critical infrastructure for keeping the lights on. This reliance is making offshore wind an even more attractive target for cyber-attacks and hackers, whether politically or criminally motivated.

Read more
hacker’s motive

Understanding a hacker’s motive

Understanding a hacker’s motive to plan for the future. Questions to ask your IT and security managers. In the wake of a cyberattack, police investigators will always try to identify the motive of a cyber-criminal. This helps them both detect and prevent cyber crimes in the future.Understanding the hacker’s motive behind your adversary’s action will…

Read more
Who are hackers?

Who are the cyber attackers?

Who are the cyber attackers? 30th September 2019 Wondering who the cyber attackers are? With the global growth of cyber-crime continuing throughout the year, high-profile cyber-attacks continue to be reported daily. But who are the cyber attackers and what motivates them to perform illegal and such potentially damaging activities? With a few exceptions, the cyber…

Read more
Endpoint Detection and Response

What is Endpoint Detection and Response and why is EDR important?

What is Endpoint Detection and Response and why is EDR important? 19th August 2019 Reading Time: 3 minutes Endpoint Detection and Response (EDR) 101 What is Endpoint Detection and Response? Gartner’s Anton Chuvakin first coined the term Endpoint Threat Detection and Response (ETDR) in July 2013 to define “the tools primarily focused on detecting and investigating suspicious…

Read more