How Cache Purge Helps Keep Your Website Content Fresh and Responsive

How Cache Purge Helps Keep Your Website Content Fresh and Responsive

Content Delivery Networks (CDNs) accelerate web traffic across the internet through servers residing in strategic locations (known as points of presence or PoPs) across the globe. Each PoP has a number of ...
Threats, Vulnerabilities, and Risks

Threats, Vulnerabilities, and Risks

As a business owner or employee in the UK, it's important to have a comprehensive understanding of the cyber threats, vulnerabilities, and risks that can impact your organisation. This blog post will ...

Ransomware and the C-I-A Triad

In earlier, more innocent (?) times, cyberattacks seemed to be fairly straightforward. You have the data exfiltration attacks, where copies of sensitive personal information and intellectual property are stolen, often without the ...
Image Source:  Wikimedia

Security Mindset, Indeed

Image Source: Wikimedia via The Grugq, come's an enlightening view focusing on the security mindset of the original architects of the now ubiquitous internet. If you can tear your sequestered, hunkered-down or ...

Key OT Cybersecurity Challenges: Availability, Integrity and Confidentiality

Organisations are still underestimating the risks created by insufficiently secured operational technology (OT). One current example comes from Germany. According to a report by heise.de, external security testers consider it “likely” that ...

How Organizations Can Achieve Security Availability

| | availability, Cloud
We have seen great strides in improving security tooling and processes over the past ten years. Via constantly maturing security models, security teams have become increasingly dependent upon an ever-more complex toolchain ...
There Are No Backups

There Are No Backups

The truth is that a vast number of System Engineers, Systems Administrators, Backup Administrators and Security Engineers habitually fail to test backups of their respective organization's data, resident at off-premises/on-premises cloud infrastructure ...
Simple to Use Link Availability Solutions

Simple to Use Link Availability Solutions

Previously, I discussed how rerouting data center host infrastructure should be part of next-generation DDoS solutions. In this blog, I will discuss how link availability solutions should also play a part. Traditional ...
Forget C-I-A, Availability Is King

Forget C-I-A, Availability Is King

In the traditional parlance of infosec, we've been taught repeatedly that the C-I-A triad (confidentiality, integrity, availability) must be balanced in accordance with the needs of the business. This concept is foundational ...
Destroy your laptop without ramifications!

Destroy your laptop without ramifications!

Don't let the introduction scare you.  This post is actually more appropriate for less technical readers who have had a computer failure and lost data.While on a recent business trip the hard ...

Secure Guardrails