Secrutiny and Acora join forces
We are delighted to announce that Secrutiny is joining forces with Acora, one of the UK’s leading managed IT services and technology providers. Acora’s operational [ ... More Here > ]
Cyber Threat Intel [18/05/2022]
Our selection of key intelligence reports this week illustrate the continued use of cyber capabilities by both sides in the Russia-Ukraine conflict. This is showcased [ ... More Here > ]
Cyber Threat Intel [11/05/2022]
Our selection of key intelligence reports this week illustrate the continued threat of ransomware groups, as both Conti and Hive targeted the Attica group. We [ ... More Here > ]
How SaaS security became one of the most overlooked threats in the enterprise – and what you can do about it
The evolution of Software as a Service (SaaS) SaaS applications have undergone an evolution in the past 10 years. What used to be simple web applications [ ... More Here > ]
Reduce your attack surface for ransomware with Zero Standing Privilege
If you look back on the majority of ransomware attacks, certainly in the last five years, the cause has been either a compromise of privilege [ ... More Here > ]
Will the Russian invasion trigger a full-scale cyberwar?
There is a mood of nervous expectation among the cybersecurity communities. Whether the hats are white or black, we are in a period of jumpy [ ... More Here > ]
Taming major security risks in the wake of Log4j
Organisations worldwide are still reeling from the discovery of a major security vulnerability in Apache Log4j, an open-source logging utility embedded in countless internal and commercial [ ... More Here > ]
What’s Next in Cyber?
For decades, we’ve watched the same narrative play itself out. A better network solution here and a smarter data protection tool there… we’re building solid, [ ... More Here > ]
Using Cyber Risk Analyser to Combat 3 Common Security Mistakes
These days, there is no such thing as a genuinely secure system, breaches will happen, but resistance is not futile. The focus should be to [ ... More Here > ]
How to Keep Ransomware at Bay? A Continuous Security Assurance Process!
Concern about ransomware attacks is felt by all. With no easy remedy in sight, the continually evolving ransomware threat requires cybersecurity leaders to strengthen defences [ ... More Here > ]
Multi-factor authentication: low-cost high-reward cybersecurity control
With the rise in sophistication of credential-related threats such as social engineering and brute force attacks, passwords on their own just aren’t secure enough. The [ ... More Here > ]
Consistency of controls: The death of the firewall
The dissolving network perimeter is forcing IT leaders to accelerate their network and security transformation. To better manage risk, security programs should be refocused for [ ... More Here > ]