The key to effective Attack Surface Management

The key to effective Attack Surface Management

Effective Attack Surface Management (ASM) is essential for understanding and mitigating cyber risks to your organisation. It can be broken down into four key parts: discovery, assessment and prioritisation, risk prevention, and integration. Discovery is the foundation...
The problem with passwords

The problem with passwords

This year, as cyber incidents continued to be one the rise, one of the key topics of consideration was the role of strong authentication in protecting organisations against the risk of cyber threats. And despite the widespread use of passwords for authentication, they...
Curbing Shadow IT in your organisation

Curbing Shadow IT in your organisation

“Shadow IT refers to (the use of) IT devices, software and services outside the ownership (approval) or control of IT organisations.” – Gartner The above definition gives the idea that Shadow IT can only be carried out by malicious actors when it is actually more...
Understanding the mechanics of a data breach

Understanding the mechanics of a data breach

Definition: A data breach is a cyber-attack in which sensitive or confidential data has been accessed or disclosed to an unauthorised individual or software system. Data breaches normally come in the form of exposed customer credit card numbers, corporate data, source...