Passwordless Authentication

If you’re reading this then you are probably asking yourself, what is a Web Application Firewall (WAF)?

Does my company need one, and how much is this going to cost me?

You’re not alone

Like many others, we’ve found that a lot of cyber security companies are quite happy to give you all the technical information, which is great.

But for someone who is not so tech-savvy or clued up on web application firewalls, this can be quite overwhelming.

With so much information being thrown around no one really addresses the elephant in the room.

Read more
web-application-firewall-security

What is a WAF and do I need one?

If you’re reading this then you are probably asking yourself, what is a Web Application Firewall (WAF)?

Does my company need one, and how much is this going to cost me?

You’re not alone

Like many others, we’ve found that a lot of cyber security companies are quite happy to give you all the technical information, which is great.

But for someone who is not so tech-savvy or clued up on web application firewalls, this can be quite overwhelming.

With so much information being thrown around no one really addresses the elephant in the room.

Read more
hacker’s motive

Understanding a hacker’s motive

Understanding a hacker’s motive to plan for the future. Questions to ask your IT and security managers. In the wake of a cyberattack, police investigators will always try to identify the motive of a cyber-criminal. This helps them both detect and prevent cyber crimes in the future.Understanding the hacker’s motive behind your adversary’s action will…

Read more
Who are hackers?

Who are the cyber attackers?

Who are the cyber attackers? 30th September 2019 Wondering who the cyber attackers are? With the global growth of cyber-crime continuing throughout the year, high-profile cyber-attacks continue to be reported daily. But who are the cyber attackers and what motivates them to perform illegal and such potentially damaging activities? With a few exceptions, the cyber…

Read more

Phishing: How to recognise an email scam

  How to recognise a phishing email scamThe Global Information Security Survey 2018-2019 has reported that scammers send out 6,4 billion fake emails every day. With the risk of phishing scams becoming increasingly more common, how can you recognise what’s a scam and what’s not? Check the sender addressWho has the email come from? Phishing…

Read more
Endpoint Detection and Response

What is Endpoint Detection and Response and why is EDR important?

What is Endpoint Detection and Response and why is EDR important? 19th August 2019 Reading Time: 3 minutes Endpoint Detection and Response (EDR) 101 What is Endpoint Detection and Response? Gartner’s Anton Chuvakin first coined the term Endpoint Threat Detection and Response (ETDR) in July 2013 to define “the tools primarily focused on detecting and investigating suspicious…

Read more