Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Publications

Top 3 Cyberattacks in 2021

A recent study reveals that cybercrime costs the world economy more than $1 trillion a year - a 50% increase since 2018. Damage to companies also includes downtime, ruined reputation, and reduced efficiency. To help you mitigate the information security risk, we have put together this short ebook to inform you about the top 3 cyber attacks in 2021, how they work, how to detect and efficiently prevent them.

2021 Gartner Market Guide for Cloud Workload Protection Platforms (CWPP)

Based on our understanding of the Gartner report, security and risk management leaders should develop a strategy for addressing the unique and dynamic requirements for protecting hybrid cloud workloads. Gartner's recommendations for cloud workload security include: Sysdig is listed by Gartner® as a Representative Vendor for Cloud Workload Protection Platforms. Gartner also notes Sysdig in the list of companies building or acquiring CSPM capabilities.

Healthcare organisations and the UK GDPR A four step guide to compliance

People will always make mistakes - and, unfortunately, in busy and stressful workplaces, such as hospitals and medical clinics, the likelihood of this increases. Without the right processes and technologies in place to help avoid mistakes, sensitive patient information remains at risk.

Meeting PCI DSS Merchant Requirements with WatchGuard UTM, Total Security, Multi-Factor Authentication, And Wireless Solutions

If you are in the retail or hospitality industries, it's important to know exactly how your network security solution maps to PCI DSS standards. This white paper presents a straight-forward review of PCI requirements and how the WatchGuard platform delivers the capabilities you need to ensure mandates are met.

Evaluating encryption with the NIST Protect framework

A variety of cyber security frameworks exist to help organisations in different sectors to go about IT security in a rigorous and controlled manner. To name a few, there's ISO IEC 27001/ISO 27002, the US NIST Cyber security Framework and the UK NIS Regulations Cyber Assessment Framework. The frameworks are an excellent way to help formalise the process of implementing and maintaining effective cyber security strategies through defined structures containing processes, practices, and technologies which companies can use to secure network and computer systems from security threats.