top of page
Search
Aug 11, 20231 min read
New critical authentication bypass bug in Ivanti MobileIron Core
Invanti have recently disclosed a new critical vulnerability in their MobileIron Core mobile device management software. CVE-2023-35082...
16 views
Jul 14, 20233 min read
Introduction to Active Cyber Defence
In an increasingly interconnected world, the threat landscape for cyber-attacks continues to evolve. As technology advances, so do the...
15 views
Apr 19, 20232 min read
DNS data shows one in ten organisations have malware traffic on their networks
Research has been conducted by Akamai around Command and control (C2) traffic to understand prevalent threats in corporate and home...
27 views
Apr 19, 20232 min read
Legacy Email Security Risk! – Do you have a legacy email account or one that has not been secured?
There are many email security challenges caused by legacy email account providers, but we are here to help you determine the best...
73 views
Jul 21, 20222 min read
‘Cyber Essentials’ What is it and who is it for?
Cyber Essentials is a simple but effective government-backed scheme that will help protect organisations, whatever the size, against a...
20 views
Jul 7, 20221 min read
Are you prepared for the long haul on Russia-Ukraine?
The NCSC assesses the cyber threat to the UK as a result of the conflict remains heightened and organisations are urged to not let their...
16 views
bottom of page