Author: Brooke Ashman
Jisc publishes cyber security posture survey results 2019
Friday 15th November, 2019
Following the success of the 2017 and 2018 Jisc Cyber Security Posture survey, a similar survey was run by Jisc in 2019 to gain an understanding of the current cyber security landscape and the cyber [...]
A Guide to Defining a Zero Vulnerability Infrastructure
Wednesday 31st July, 2019
KHIPU Networks ‘Defining a Zero Vulnerability Infrastructure’ guide provides an overview of some of the most common types of cyberattack, as well as providing guidance on how to define your cyber security strategy, and how [...]
Conclusion to Defining a Zero Vulnerability Infrastructure
Wednesday 24th July, 2019
PART SIX: Conclusion to Defining a Zero Vulnerability Infrastructure With new agile ways of working, a rise in the gig economy and contracting, increasing use of new technologies in the workplace, and ever-growing mountains of [...]
Are certain types of Organisations more at Risk?
Wednesday 17th July, 2019
PART FIVE: Are certain types of Organisations more at Risk? Cybercriminals rarely set out to target one type of organisation or user over another. Often their primary motivator is financial gain. Clearly if they can [...]
Dissecting the Network and Your Points of Vulnerability
Wednesday 10th July, 2019
PART FOUR: Dissecting the Network and Your Points of Vulnerability Last week, we discussed network vulnerabilities, the weakest links, and how to get started. Now that we know the questions to ask ourselves and our [...]
Managing Vulnerabilities with Limited Resources & Budget Constraints
Wednesday 3rd July, 2019
PART THREE: Managing Vulnerabilities with Limited Resources & Budget Constraints Last week, we discussed how to know where, exactly, to start when it comes to securing your organisation’s assets and how the priority lies in [...]
Securing Your Assets – Where Do You Start?
Wednesday 26th June, 2019
PART TWO: Securing Your Assets – Where Do You Start? Today’s most sophisticated IT departments are still struggling to prioritise their security defences across ever-growing landscapes – from users and endpoints to perimeters and applications. [...]
An Introduction to Defining a Zero Vulnerability Infrastructure
Wednesday 19th June, 2019
PART ONE: An Introduction to Defining a Zero Vulnerability Infrastructure Cybercrime is on the rise across the globe and presents a very real and serious challenge for businesses year after year. With this increase, the [...]