We are investigating the possible attack vectors that could have led to the compromise of Domino’s Breach and the Nucleus ransomware attack: Is it More than just isolated incidents?
How do modern underground marketplaces operate? What are digital goods and how have they played a major part in the proliferation of dark web marketplaces?
Hackers target large organizations to trick their employees and steal sensitive data. What are phishing attacks and how to prevent them?
In the event of full scale cyberattack the pharmaceutical sector could incur huge loss. We review the attacks that hit major pharmaceuticals.
Summary of the recommendations of AWS’ Well-Architected Framework, with respect to design, delivery, and maintenance of secure AWS workloads.
Executive summary for the Cost of a Data Breach Report 2020, highlighting factors that strengthen an organization’s cyber security posture.
Companies that have experienced a breach, underperform the market by > 15%, even years later. Here are ways to prevent data leaks.
Senior executives are 12 times more likely to be targets of social incidents, and 9 times more likely to be targets of social breaches.