The number of small businesses is growing. In fact, at the start of 2017, small businesses accounted for 99.3% of all private sector businesses. Yet, with this growth comes the risk of security breaches: these breaches aren’t limited to the major companies. The UK Government announced earlier this year that more than two in five…Continue Reading: How to build a cybersecurity strategy for your SME
Archives for August 2018
Rust, meet q
At Red Sift, we use our platform to power next-generation data applications for cybersecurity. At a high level, our platform is one of those trendy serverless compute environments except ours allows you to get real work done. Red Sift lets us pipe data around, transform/augment it and finally aggregate it to find insight that helps…Continue Reading: Rust, meet q
Computers not consultants: Say goodbye to the age of cybersecurity consultancy
In days gone by, when an organisation wanted to protect its cyber defences, the norm would be to bring in a cyber consultant or agency. Whether it was a someone-who-knew-someone-who-knew-someone kind of contact or an established name like Capita, they would act as the go-to source of cybersecurity knowledge and execute a strategy to protect…Continue Reading: Computers not consultants: Say goodbye to the age of cybersecurity consultancy
How to be more meerkat about your email security
The DMARC authentication protocol lets you keep a constant watch out for these impersonation attacks, just like a meerkat!…Continue Reading: How to be more meerkat about your email security