Despite attempts to improve the general understanding of IT threats, the education sector is more at risk of attack than ever before…Continue Reading: C+ ‘Must try harder: Cybersecurity in Education
Cybersecurity
eBPF, ingrained in Rust
Today we are releasing RedBPF and ingraind, our eBPF toolkit that integrates with StatsD and S3, to gather feedback, and see where others in the Rust community might take this framework. If you are looking to up your company’s monitoring game, gather more data about your Raspberry Pi cluster at home, or just have a strong academic…Continue Reading: eBPF, ingrained in Rust
Scams can be complex, so let’s stop playing the blame game
As long as there has been the exchange of money, there has always been fraud. From Hegestratos, the first recorded fraudster in 350 BC Ancient Greece, to Charles Ponzi’s infamous scheme of redistributing investments, to the present day, criminals have always tried to find new and more sophisticated ways to dupe people out of their money. …Continue Reading: Scams can be complex, so let’s stop playing the blame game
How to build a cybersecurity strategy for your SME
The number of small businesses is growing. In fact, at the start of 2017, small businesses accounted for 99.3% of all private sector businesses. Yet, with this growth comes the risk of security breaches: these breaches aren’t limited to the major companies. The UK Government announced earlier this year that more than two in five…Continue Reading: How to build a cybersecurity strategy for your SME
Computers not consultants: Say goodbye to the age of cybersecurity consultancy
In days gone by, when an organisation wanted to protect its cyber defences, the norm would be to bring in a cyber consultant or agency. Whether it was a someone-who-knew-someone-who-knew-someone kind of contact or an established name like Capita, they would act as the go-to source of cybersecurity knowledge and execute a strategy to protect…Continue Reading: Computers not consultants: Say goodbye to the age of cybersecurity consultancy
How to be more meerkat about your email security
The DMARC authentication protocol lets you keep a constant watch out for these impersonation attacks, just like a meerkat!…Continue Reading: How to be more meerkat about your email security