Privileged Access Threat Report 2018
The scale and sophistication of cyber-attacks is not slowing down – ranging from phishing scams to cryptocurrency-based cyber-attacks, to state sponsored attacks on industrial control systems.
Every vendor is pushing a threat intelligence feed, program, and/or product. How does a lean organisation separate the hype from the actual value that threat intelligence can bring to a lean security team?
The enforcement of GDPR has undoubtedly been the biggest shake-up in data handling history. Organisations are now required to understand the regulation, develop best practices for success and avoid common pitfalls