Around the clock protection from cyber threats
A cyber-attack won’t announce itself or happen when it’s more convenient for you. In fact it’s far more likely that you’ll be unaware of it until a supplier or customer notices a problem and raises...
View ArticleJust say no to just saying no
By Martin Stemplinger, Senior BT consultant at BT Germany. Last week, I learned about a new kind of Denial-of-Service attack vector that uses a feature of WordPress. Hijackers utilised over 162,000...
View ArticleGRC strategies and… Risk Management
By Roman Levda, Senior Security Consultant, BT. In our series so far, we have outlined Governance, Risk and Compliance (GRC) strategies, as well as having a more detailed look into Policy Management...
View ArticleGRC strategies and… Compliance Management
By Roman Levda, Senior Security Consultant, BT. Compliance, like risk, forms an integral part of any GRC strategy. Rules and regulations are put in place in order to help all organisations work to the...
View ArticleLaunching a charm offensive: automatic and immediate defence against DDoS
by Rob Thatcher, BT Global Partner Account Manager, Juniper Networks. Nothing in the world of hacking stands still and Distributed Denial of Service (DDoS) attacks are no exception. Once aimed solely...
View ArticleData leaks — new public enemy number one
Gone are the days when public enemy number one was an unshaven face with shifty eyes on a wanted poster; today the biggest threats out there are usually unseen menaces, often springing from innocent...
View ArticleThe danger of the latest NTP attacks
By Ben Fischer, Arbor Networks. Who would have imagined that Network Time Protocol (NTP) — such an innocuous protocol designed to synchronise the clock on your laptop, smartphone, tablet, and network...
View ArticleGRC solutions and…bringing it all together
By Roman Levda, Senior Security Consultant, BT. Here we are, at the final post in our series on GRC solutions, aiming to bring order out of chaos. We’ve taken a closer look at the function of GRC for...
View ArticleAround the clock protection from cyber threats
A cyber-attack won’t announce itself or happen when it’s more convenient for you. In fact it’s far more likely that you’ll be unaware of it until a supplier or customer notices a problem and raises...
View ArticleJust say no to just saying no
By Martin Stemplinger, Senior BT consultant at BT Germany. Last week, I learned about a new kind of Denial-of-Service attack vector that uses a feature of WordPress. Hijackers utilised over 162,000...
View ArticleGRC strategies and… Risk Management
By Roman Levda, Senior Security Consultant, BT. In our series so far, we have outlined Governance, Risk and Compliance (GRC) strategies, as well as having a more detailed look into Policy Management...
View ArticleGRC strategies and… Compliance Management
By Roman Levda, Senior Security Consultant, BT. Compliance, like risk, forms an integral part of any GRC strategy. Rules and regulations are put in place in order to help all organisations work to the...
View ArticleLaunching a charm offensive: automatic and immediate defence against DDoS
by Rob Thatcher, BT Global Partner Account Manager, Juniper Networks. Nothing in the world of hacking stands still and Distributed Denial of Service (DDoS) attacks are no exception. Once aimed solely...
View ArticleData leaks — new public enemy number one
Gone are the days when public enemy number one was an unshaven face with shifty eyes on a wanted poster; today the biggest threats out there are usually unseen menaces, often springing from innocent...
View ArticleThe danger of the latest NTP attacks
By Ben Fischer, Arbor Networks. Who would have imagined that Network Time Protocol (NTP) — such an innocuous protocol designed to synchronise the clock on your laptop, smartphone, tablet, and network...
View ArticleGRC solutions and…bringing it all together
By Roman Levda, Senior Security Consultant, BT. Here we are, at the final post in our series on GRC solutions, aiming to bring order out of chaos. We’ve taken a closer look at the function of GRC for...
View ArticleWhat are you trying to protect, and why?
By Guus Van Es, General Manager, BT Security Consulting Europe. Do you believe the hype? Protecting what’s valuable to you is as old as mankind. Knowing what’s valuable and how to protect it has always...
View ArticleHow old cyber vulnerabilities threaten your organisation.
As we enter a new digital era, organisations need to re-evaluate their cyber security and focus on keeping their data and IT safe. In the early days of digital, cyber security was about protection,...
View Article
More Pages to Explore .....