Learn why generic tools and solutions don't deliver the specific security outcomes you need.
According to Microsoft, Zero Trust is now ‘the top security priority’ for security decision-makers.
Cyber security is often seen as a bit like the wild west, where it’s difficult to differentiate genuine solutions from snake oil.
The industry consensus today is that the only way to reliably end the threat of ransomware for good is to stop paying ransoms.
SpecterOps recently released an offensive security research paper that details techniques enabling an adversary to abuse insecure functionality in Active Directory Certificate Service.
Ransomware attacks proliferated in 2020, increasing by 435% compared to 2019. The number of ransoms paid has also increased from 39% in 2018 to 58% in 2020
Cloud computing is the vehicle with which modern enterprise organisations drive their digital transformation initiatives.
Cyber threat intelligence (TI), defined as data that offers insight into a threat actor’s motives, targets, and behaviours, has soared in popularity in recent years.
At the time it was first introduced, a penetration test accurately represented how an attacker was likely to target a network.
JUMPSEC recently released a number of advisories relating to vulnerabilities identified affecting Ivanti Unified Endpoint Manager, an endpoint and user profile management software.