Preparation Is Key: IoT and Cyber Attacks

Over the last few decades, the Internet of Things has made some major strides IoT devices come in a variety of forms and sizes, with different features and levels of vulnerability. Most of the cyber security protecting networks today cannot protect IoT devices and cannot provide basic visibility into these devices. This article provides you [...]

2018-03-20T06:48:29+00:0020th March, 2018|Blog, Thought Leadership|

How Continuous Vulnerabilities Assessment and Penetration Testing Protect You Against Cyber Attacks

Cyber-attacks hit the headlines daily and they are not only a threat to large corporations, but also to small businesses and individuals. A vulnerabilities assessment typically involves using automated testing tools such as security scanners to generate reports on website or network weaknesses. Penetration testing is more goal-oriented and involves an authorised attempt by registered testers to exploit [...]

2018-02-22T08:09:56+00:0022nd February, 2018|Blog, Thought Leadership|

The Cybersecurity Concerns of Driverless Cars

An autonomous vehicle is what’s known as a cyber-physical system because it has elements in both the physical and virtual worlds. This makes security particularly challenging. Not only are they at risk from traditional cyber-attacks to the information and running of the vehicle, but also to a new breed of attacks around things such as [...]

2018-02-21T03:46:04+00:0021st February, 2018|Blog, Thought Leadership|

The Internet of Things Will Be Even More Vulnerable to Cyber Attacks

As the number of internet-connected devices rises, the IoT has become a greater presence across in every industry. However, in the rush to get involved in the trend, most of the device manufacturers have released products with poor security, which in turn have been breached for malicious purposes including ransomware and cyber-attacks. This article explains how IoT devices [...]

2017-06-19T05:21:28+00:0019th June, 2017|Blog, Thought Leadership|