Magnify Cybersecurity Blog
Cybersecurity intelligence under the magnifying glass.
Are your security controls optimised for success? Verizon estimates that 82% of enterprise breaches should have been stopped by existing security controls but weren’t. Why? Security controls fail repeatedly and silently.
VMWare releases urgent security advisory recommending that users update VMware ESXI and VCenter servers to patch new security vulnerabilities.
Phishing is the leading cause of data breaches and has no signs of slowing down. Take advantage of anti-phishing domain name search engine, dnstwister now.
We all get that warm feeling when we are told that our security controls have handled something, but how do you really go and validate that? How do you check something else didn’t happen when that quarantine or kill event took place that we weren’t alerted to? The answer is in your telemetry.
When it comes to cybersecurity, a ‘one size fits all’ package just won’t cut it. So, we’ve created a six-stage risk-based approach that guides organisations from cybersecurity to cyber maturity. Read it now.
Spending on cyber defence lowers the risk of a breach but investing in recovery means a quicker return to business. Getting the balance right minimises the impact of a cyberattack.