close
Petya, Medoc and the delivery of malicious software

Petya, Medoc and the delivery of malicious software

When our Cyber Threat Intelligence team run passive threat assessments on behalf of organisations, we clearly define issues mapped to the cyber kill chain to demonstrate the view of an attacker. One example of this is providing information on the presence with...

Biometric security for established infrastructures – increased security and greater ease-of-use

Biometric security for established infrastructures – increased security and greater ease-of-use

Passwords get forgotten, are lost or stolen which causes serious threats for any businesses. Replacing password-based login with highly secure palm vein-based biometric authentication reduces the risk of misuse from stolen or unsecured passwords, including wor...

“C-Suite, Engage” - 10 of the greatest cybersecurity risks and what boards must do to stop them

“C-Suite, Engage” – 10 of the greatest cybersecurity risks and what boards must do to stop them

Digital technology has brought incredible opportunities to the business world – but it has also cr...

IoT Security Takes Center Stage at the Munich Cybersecurity Conference

IoT Security Takes Center Stage at the Munich Cybersecurity Conference

Cybersecurity is fast becoming a strategic, board-level issue for all organizations, as they transfo...

Cybersecurity is a Business Problem – not an IT one

Cybersecurity is a Business Problem – not an IT one

Sooner or later, your digital business will be hacked. This is not a case of “if” but simply “...