Cloud Consultancy News
National Cyber Security Centre – H > M Glossary
H hacker - In mainstream use as being someone with some computer skills who uses them to break into computers, systems and networks. honeypot (honeynet) - Decoy system or network to attract potential attackers that helps limit access to actual systems by detecting and...
National Cyber Security Centre – D > F Glossary
D data at rest - Describes data in persistent storage such as hard disks, removable media or backups. dictionary attack - A type of brute force attack in which the attacker uses known dictionary words, phrases or common passwords as their guesses. digital footprint -...
National Cyber Security Centre – A > C Glossary
A Antivirus - Software that is designed to detect, stop and remove viruses and other kinds of malicious software. App - Short for Application, typically refers to a software program for a smartphone or tablet. Attacker - Malicious actor who seeks to exploit computer...
GDPR Could Lead to Greater Risk of Breaches
Almost a quarter of UK and German businesses (23%) believe the GDPR may have resulted in a greater risk of data breaches, six months after the legislation was introduced. The findings come from a new survey by Thales eSecurity which polled 1000 combined UK and German...
The Only Counter Strategy Against Data Loss: Reliable Backup Methodology
In the turn of the century 18 years ago, people have embraced Web 2.0, a new dynamic web replacing the static HTML-only Web 1.0 fathered by Tim Berners Lee in the 1990’s. Web 2.0 as a successor hosted content that can never be imagined way back year 2000, streaming...
AWS Now Lets You Bring Your Favourite Language To Serverless Development
Amazon Web Services (AWS) has opened up its serverless language support, allowing "builders" to bring their own language to AWS Lambda. Making the announcement at AWS re:Invent on Wednesday, Amazon CTO Werner Vogels said the offering comes in response to customers...
Microsoft Briefly Took Over Apple As the Most Valuable US Company
Microsoft briefly took over Apple as the most valuable company in the United States. The company’s shares rose by 2.1% on Monday, with Apple’s shares falling by 0.7%. Apple, which was valued at $1 trillion just back in August, has faced a continued decline in its...
Gone Phishing: Everything You Need to Know About the Ever Present Threat to Your Data
Phishing is fast becoming malware’s favourite vector, proving to be incredibly pervasive with 76 percent of businesses having reported to being a victim of a phishing attack in the last year. The scams are all-encompassing. Numerous instances, like the case of the...
Managing Firewalls In The Cloud: Do Companies Know Enough About Security Intent?
How businesses are building firewalls is changing. We’re seeing a continued trend toward smaller firewall boundaries and micro-segmentation to support zero-trust strategies, although it can be very piecemeal. As businesses think less about centralized firewalls, and...
Only 14% have complete organizational Awarenes Of IoT Threats
86 percent of IT and security decision makers across the globe believe their organisation needs to improve its awareness of IoT threats, according to Trend Micro. This significant lack of knowledge accompanies rising threat levels and security challenges related to...