Defences News, Articles and Updates

The phishing lifecycle - before, during and after an attack

Just as phishing has evolved, the way organisations detect and deflect these malicious messages must also change, looking at each distinct stages to a phishing attack - before, during and after.

How to make yourself harder to hack

Layered security isn't new. What is important today is choosing the correct layers. Your layered security approach should be constructed of multiple layers across the length and breadth of your complete IT environment.

What you can do to defend against the onslaught of zero-day attacks

Implementing the best defences, tools, process and technology can help mitigate an attack and quicken time to remediation. It's important to think about not only the tools, but the process, people, intelligence and technology.

Bug in anti-malware defenses mistakenly blocks users' Google Docs files

Google issued a public apology on Thursday after a bug mistakenly caused its defences against malware, phishing, and spam to block some users' access to Google Docs files on 31 October.

Outdated testing methods will fail to address EU cyber concerns

Chris Dye explores how banks can use testing to prevent disasters and provides practical tips on how the sector can improve cyber-resiliency.

Free honeypot tool launched at RSA 2016 to help network admins

A free honeypot chock full of fake domain credentials has been created to educate administrators on trapping and blocking attackers.

Are firewalls still relevant to security?

With many in the IT security industry predicting the imminent demise of the firewall, Nimmy Reichenberg argues that it remains integral to protecting an organisation's networks.

Cyber-security analytics: how to make the numbers meaningful

John Smith, looks at the wealth of data churned up by cyber-security analytics and how vendors have a responsibility to make the numbers actionable.