
Protect Your Organisation After a Ransomware Attack
So, here is the scenario: you’re sitting at your desk working away and suddenly realise [...]
Best Antivirus Software. Are You Sure?
If only it were as simple as the popular ‘XYZ’ Antivirus (AV) software solution is [...]
A File Manager Plugin in WordPress Contains Multiple Critical Vulnerabilities
Several vulnerabilities have been discovered in the Frontend File manager plugin in WordPress, which allows [...]
Comparing a Virtual CISO vs. a Full-Time CISO
Most of us are aware that there is a huge gap of qualified cyber security [...]
Linux Variant of REvil Ransomware Targets VMware’s ESXi, NAS Devices
REvil ransomware producers have ported their malware over to Linux to expand their campaigns. The [...]
12 Essential Policies for Achieving SOC 2 Compliance
If you are considering getting your organisation SOC 2 compliant, this blog should be an [...]
How Long Does SOC 2 Compliance Take and How Can You Get Certified?
It seems like a long project to reach SOC compliance, right? Well, not if you [...]
Why Cyber Essentials is Not Just a Tick Box – Interview with Dr Emma Philpott
As the question ‘why do I need a Cyber Essentials certification?’ continues to arise, Dr [...]
“Kite in a Storm” Web Administrator to Remote Code Execution
Researchers at ZX Security discovered a chain of vulnerabilities that ends with Remote Code Execution [...]
Join Us At The Big CISO 360 Event
Don’t leave without reading about this invigorating event hosted by Pulse Conferences celebrating the 5th [...]