Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

UK Finance Reports Slight Decrease in FinTech Cyberattacks

The latest report from UK Finance paints a mixed picture of financial fraud in the United Kingdom, with losses exceeding £500 million in the first half of the year. However, amidst these concerning figures, there is a glimmer of hope as cyber fraud rates have shown a slight 2% decrease from the previous year.

The Cybersecurity Skills Gap: You're Looking at the Wrong Gap

How many times have you heard “There is a skills gap in Cybersecurity!” If you go on social media, you’ll likely hear it at least once a day. The government is big on it, and organisations lament how difficult it is to find the ‘right talent’. But here’s some news for you... There is NO SKILLS GAP.

Why There's No Such Thing As a Low-Cost SIEM

Staff time, log processing, and legacy issues can turn free, open-source or low-cost SIEMs into one of your organisation’s most expensive investments. You’re not alone if you’re baulking at the idea of paying upwards of tens of thousands of pounds for a new or renewed SIEM licence. Many security decision-makers feel the same way. One survey showed that almost half (40%) of existing SIEM users feel like they are overpaying for their SIEM.

Safeguarding Digital Identities - Understanding ITDR

An interview with David Morimanno (DJ), Sr. Advisory Manager at Integral Partners and Steve Tucker, Commercial Director at Xalient. A couple weeks ago Xalient sponsored Europe’s premier Identity and Access Management Conference, IDM. I attended with my colleague DJ from Integral Partners to network with C-level IAM leaders and to hear from peers and subject matter experts in the Identity space.

Calico eBPF is now IPv6 capable!

Kubernetes offers excellent scalability and flexibility to your infrastructure. Yet, in the midst of this transformation, we’ve all grappled with the difficulties of local IPv4 addressing which usually leads to the implementation of Network Address Translation (NAT) and unfolds complexities that we’d instead like to avoid. As if that weren’t enough, the scarcity of public IPv4 addresses and their expensive rental costs loom over our digital ambitions.

Deliver fair, bot-free hype drops with Netacea + Queue-it

It's 8.58am, the tickets to your favorite band's latest tour are about to go on sale and you're poised, credit card in hand, ready to secure the hottest tickets in town. Only, once you make it to the front of the virtual queue, the tickets have all been snapped up by scalpers. Or you're faced with the dreaded message, "server busy, try again later". If you think this is unfair, you’re not alone.

Thanksgiving Cyber feast: Safeguarding against seasonal scams

As the Thanksgiving season rapidly approaches, many look forward to the warmth of family gatherings, the aroma of roasted turkey, and the joy of gratitude. Yet, just as we prepare our homes and hearts for this festive season, cybercriminals are gearing up to unleash a different kind of feast—a cyber feast—rife with sophisticated scams targeting unsuspecting individuals and businesses alike.

How to strengthen cybersecurity in logistics companies

The demand for logistics services has risen sharply in recent years, especially in the wake of the e-commerce boom. Digitization of the sector has been a driving factor behind the development of the supply chain as it makes data processing more efficient and shipments faster. Sector growth, the mass of company and consumer data handled, and the decentralization inherent to the chain, means these services have become a target of interest for cybercriminals.

File encryption in Python: An in-depth exploration of symmetric and asymmetric techniques

In our modern world, we constantly share private, confidential, and sensitive information over digital channels. A fundamental component of this communication is file encryption — transforming data into an unreadable format using encryption algorithms.