Skip to main content

Blog

26.Feb.2019
Davey Winder, security journalist
Thanks mainly to an ever evolving threat landscape and regulators sharpening their teeth, cybersecurity has become a firm fixture on the agenda in boardrooms and in headlines of media reports alike. This has led, by and large, to a welcome increase in awareness of what 'good' cybersecurity is. With, perhaps, one important exception: mention penetration testing and brows furrow soon followed by the inevitable what's that and why is it relevant to my business question. Which is ironic, when you think about it, as testing the security of your applications, systems and processes is vital when the threats themselves are ever-changing.
19.Feb.2019
Sergio Loureiro, Cloud Security Director
Enterprises are moving faster to Cloud but legacy infrastructure will not disappear altogether. CISOs are often worried that hybrid infrastructures will double their work through having to support Cloud and legacy at the same time with a different set of skills and tools. However, it doesn’t have to be this way; get our list of 7 things to get right in hybrid Cloud security now!
06.Feb.2019
Nikos Danopoulos, Ghost Labs
Ghost Labs performs hundreds of success tests for its customers ranging from global enterprises to SMEs. Our team consists of highly skilled ethical hackers, covering a wide range of advanced testing services to help companies keep up with evolving threats and new technologies.
07.Jan.2019
Davey Winder, security journalist
You don't have to be a rocket scientist to appreciate the disruptive IT benefits that serverless architectures can bring to your business. These cloud-based Function-as-a-Service (FaaS) platforms are truly transforming the way that they allow the development, execution and management of applications without having to worry so much about the usual infrastructure constraints and complexities. Until, that is, someone goes and mentions security.
17.Dec.2018
Outpost24
There can be no disputing that 2018 has been a big year for cybercrime. Between the huge data breaches affecting some of the world’s leading airlines, and the global cost of ransomware exceeding $8 billion, cybercriminals did not show any signs of slowing down. So what does 2019 have in store for us?
05.Dec.2018
John Stock, Network Security Product Manager
Power BI is a business analytics service that delivers insights to enable fast, informed decisions. Discover how can Microsoft Power BI add clarity to your vulnerability data
03.Dec.2018
Outpost24
The number of cyber attacks has grown steadily during the last few years. In 2016, 758 million malicious attacks occurred according to KasperskyLab, (an attack launched every 40 seconds) and there is no doubt that 2019 will break the record.
19.Nov.2018
Davey Winder, security journalist
The recent Cathay Pacific airline data breach, the biggest to hit the airline industry to date, should come as a wakeup call to businesses of all sizes and across all sectors.
23.Oct.2018
Sergio Loureiro, Director Cloud solutions
Among the many applications of AI ​​in cybersecurity, the arrival of intelligent assistants (Bots) to improve the speed and accuracy of security data analysis is particularly welcomed. As cloud computing, and now serverless architectures, continue to disrupt IT, the availability of powerful algorithms and machine learning capabilities seem to be a silver bullet for the shortage of security expertise. Nevertheless, data and architecture security of such solutions bring unique challenges. In this article, we will review the potentials and challenges to master security with AI tools.
16.Oct.2018
Davey Winder, Security Journalist
Davey Winder, our guest blogger and an award-winning security journalist, explains the role of Shifting Left for Secure Application Development

Looking for anything in particular?

Type your search word here