Airport operator MAG boosts threat visibility with hybrid SOC

With planes grounded and its core business disrupted by the pandemic, Manchester Airports Group (MAG) carried on regardless, enacting a brand new cyber security strategy and ditching a long-standing... Read more »

A Guide to DevSecOps: What is it and Why is it Required?

DevOps has transformed the way enterprises function. Companies are going to market faster with innovative products and achieving greater savings along the way. However, with cyberattacks on the rise,... Read more »

Best Backup Software for Securing Your Data 2021

Data is a key resource in running businesses today. It powers business intelligence and helps unearth trends in the market, areas worth improving internally as well as new opportunities... Read more »

AIOps Platforms: Datadog vs. New Relic

Artificial Intelligence for IT Operations (AIOps) refers to multi-layered technology that leverages big data, machine learning (ML), and analytics to automate and enhance IT operations management. The quantity of... Read more »

Object Storage vs. Block Storage: Which is Right for Your Enterprise?

The total volume of our stored data continues to explode as the type of data we store diversifies. Object storage and block storage are two methodologies for handling data,... Read more »

US intelligence agencies issue advisory on BlackMatter gang

The BlackMatter ransomware gang has targeted US-based critical infrastructure entities, including two food and agriculture sector organisations, according to a joint cyber security advisory issued by US intelligence agencies.... Read more »

LightBasin hackers breach 13 telcos in two years

A “highly sophisticated” hacking group called LightBasin has harvested mobile network data from at least 13 telecoms companies in the past two years, according to CrowdStrike researchers. The group,... Read more »

Back on the office network: What are the risks for mobile users?

Millions of people have begun heading back to the office after nearly two years of working from home. While the return of some office-based working is a positive sign... Read more »

How Samlesbury, Lancashire became the home of the National Cyber Force

The battle to win the headquarters of the UK’s National Cyber Force (NCF) has been quietly fought out of the public eye for the past 12 months. Samlesbury, in... Read more »

No easy fix for vulnerability exploitation, so be prepared

The issue of vulnerability management puts responsibility of varying natures and degrees across the organisation, including how, when and what to disclose (if anything) if the occasion arises. But... Read more »
Subscribe to our Newsletter