Secrutiny’s
Magnify Cybersecurity Blog
Cybersecurity intelligence under the magnifying glass.
SUBSCRIBE TO OUR NEWSLETTER |
Security Control Assurance 101: Does It Do What It Says on the Tin?
Are your security controls optimised for success? Verizon estimates that 82% of enterprise breaches should have been stopped by existing security controls but weren’t. Why? Security controls fail repeatedly and silently.
6,700+ VMWare Servers Exposed Online and Vulnerable to Major New Bug
VMWare releases urgent security advisory recommending that users update VMware ESXI and VCenter servers to patch new security vulnerabilities.
Is Your Domain Name Being Exploited? Find Out With DNStwister
Phishing is the leading cause of data breaches and has no signs of slowing down. Take advantage of anti-phishing domain name search engine, dnstwister now.
Illuminating Risk Indicators with Readily Available Telemetry Data from Standard Admin Tools
We all get that warm feeling when we are told that our security controls have handled something, but how do you really go and validate that? How do you check something else didn’t happen when that quarantine or kill event took place that we weren’t alerted to? The answer is in your telemetry.
From Cybersecurity to Cyber Maturity
When it comes to cybersecurity, a ‘one size fits all’ package just won’t cut it. So, we’ve created a six-stage risk-based approach that guides organisations from cybersecurity to cyber maturity. Read it now.
Cyber Prevention Versus Recovery?
Spending on cyber defence lowers the risk of a breach but investing in recovery means a quicker return to business. Getting the balance right minimises the impact of a cyberattack.