Threat Intelligence Report: WinRAR Zero Day Threat

Date: 29 March 2019 Summary: A Zero-Day Vulnerability has recently been discovered in WinRAR. The vulnerability, which was assigned as CVE-2018-20250, allows attackers to set arbitrary destinations during file extraction … Continue reading Threat Intelligence Report: WinRAR Zero Day Threat

Threat Intelligence Report: Phish Point

Threat intelligence is an elusive concept. Cyber-security vendors have developed numerous definitions for it based upon different procedural viewpoints. As a result, the key concept and principle of threat intelligence is explaining the role it plays within cyber-security and network defence, while offering advice and best practice. This will equip the reader with a basic understanding of the benefits of threat intelligence and the importance of investing effort and resources into responding to it.

Why Volume Licensing is Bad for Protective Monitoring

Volume licensing is essentially a consumption-based pricing model: you pay for what you use. Traditional, on-premises SIEM (Security Information & Event Management) solutions usually operate on this basis, which has a number of key drawbacks for businesses:

Looking Forward: IT Security Trends for 2019

Protecting an organisation from cyber crime is a relentless task, as both security solutions and means to attack continue to evolve. The repercussions of a security ‘incident’ can be costly, in terms of financial loss, data recovery and damage to reputation.

Top 5 Cyber Threats in Higher Education

The threat landscape in the education sector comprises two distinct types of breach: deliberate and accidental. While it is not possible to remove these risks entirely, taking preventative steps and having a robust response system in place will help protect your organisation.