“We needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.”
Expert Intel
Discovering CVE-2023-40017
A CVE (Common Vulnerabilities and Exposures) is a standardised identifier for a specific security vulnerability in a software application, hardware device, or system. Our pen tester Toby takes you through this latest discovery - CVE-2023-40017.
Read MoreDiscovering CVE-2023-40017Cybercrime is world’s third-largest economy
According to the World Economic Forum (WEF), cybercrime has emerged as the world's third-largest economy, trailing only the United States and China.
Read MoreCybercrime is world’s third-largest economyDemystifying Defender for Cloud
Defender for Cloud (DfC) is a cloud-native platform designed to protect multiple workloads, across several environments, by utilising a plethora of capabilities. Defender for Cloud isn’t new, it’s been available to the public since 2019, so why make a blog post on it now?
Read MoreDemystifying Defender for CloudLet Autopilot and Intune do the work.
Making the transition to Intune is a big challenge, especially if the way you’ve always provisioned computers has been to image them with MDT or Config Manager. Read Lewis' latest insight to learn more about the importance of managing user requirements.
Read MoreLet Autopilot and Intune do the work.Types of cyber crime witnessed in the wild
Over the past year, the cybercrime landscape has undergone a significant transformation in activities and tactics, surpassing anything we have previously witnessed. Traditional types of cyber crime and cyber criminals driven by financial motives, who typically gain initial access through email have abandoned the use of static and predictable attack chains.
Read MoreTypes of cyber crime witnessed in the wildDEV-0538 | Hackers Targeting Recruiters
Are you a recruiter or hiring for a vacancy within your business? Do you receive CV’s on a regular basis from potential candidates for the job roles you are promoting? If you answered ‘yes’ to either of those, then you may want to pay attention to this article...
Read MoreDEV-0538 | Hackers Targeting RecruitersOneNote Supply Chain Phishing
OneNote supply chain attacks are on the increase. Our senior analyst Joe, takes a deep dive into this growing vulnerability, to help you understand what's happening in the wild, and crucially, what you can do to stay one step ahead.
Read MoreOneNote Supply Chain PhishingThe Crucial Shift In Ransomware Tactics
The latest reports are showing threat actors favouring malware-free extortion, Andrea shares her thoughts on why this shift has occurred and how organisations can combat it.
Read MoreThe Crucial Shift In Ransomware TacticsWhy Microsoft Edge is the best browser for business
It's a strong statement, but according to our expert Lewis Barry, Microsoft Edge is the best browser for business... Not only because it wins in performance and security tests, but also because it simplifies life for both users and admins.
Read MoreWhy Microsoft Edge is the best browser for businessSign up for the latest news and Podcasts
Keep Up with the experts,