Blogs

The 5 most common router attacks on a network

Unfortunately, router attacks cannot be 100 percent prevented, but there are a few things that you can be doing to prevent one of the most common router attacks from occurring on your system and network. Large...

Equifax breach: The impact for enterprises and consumers

Article by: Rick Holland, VP Strategy at Digital Shadows WHAT WE KNOW ABOUT THE EQUIFAX BREACH On September 7th, credit reporting agency Equifax announced “a cybersecurity incident potentially impacting approximately 1...

Preventing and mitigating ransomware with cyber situational awareness

Article by: Alastair Paterson, CEO and Co-Founder of Digital Shadows If you’re familiar with mafia movies then you’re familiar with extortion – the practice of obtaining something, especially money, through force or threats. Extor...

Fortinet offers cyber-safety tips amidst escalating cyber-attacks

Individual devices and user data becoming prime targets for cyber-criminals; 1 in 20 attacks target smart phones and tablets. Fortinet, the global leader in high-performance cyber security solutions, warns businesses...

Ransomware: An action plan – by Steven Malone of Mimecast

Steven Malone, Director of Security Product Management at Mimecast, talks us through an action plan to improve your cyber resilience. The global reach and considerable impact of the WannaCrypt (WannaCry/Wcry)...

WannaCry attacks qualify as virus disaster many times over

Over a dozen years ago, malware pioneer Dr Peter Tippett coined the expression virus disaster, which describes the point at which more than 25 machines are infected on a single network as the tipping point for...

Browse our latest issue

Intelligent CISO

View Magazine Archive