Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Just in Time Privilege Elevation in Active Directory

In my days of AD administration, there was always a need for a select set of sysadmins to be granted high levels of permissions. In AD, this is typically a separate user admin account that is a member of the Domain Admins Active Directory group. There are a few other groups that are highly privileged(i.e. Enterprise Admins and Schema Admins) but the permissions required by these groups are generally more specific and therefore less populated.

Eliminate Information Gaps Between Teams with Procore and Egnyte

Easy and effective collaboration is a critical success factor for today's fast-paced construction projects. However, with multiple stakeholders deployed across various cloud platforms, document versions, and unreliable job site connectivity, finding and sharing project information can be challenging.

Unlock the power of identity governance with cloud-based IGA

In today's interconnected and rapidly evolving digital landscape, managing and securing identities within an organization has become paramount. The traditional approach to identity governance and administration (IGA) often falls short, leading to inefficiencies, security vulnerabilities and compliance challenges. However, with the advent of cloud-based IGA solutions, businesses can now unlock a new level of power, scalability and flexibility.

The Definitive Case for a Managed Firewall: Preserving Your Business in the Information Age

With on average, 30,000 websites being hacked daily the need for stout cybersecurity measures has become more critical than ever. In today’s connected business landscape, as data flows effortlessly between networks and the digital realm, the need for a comprehensive cybersecurity strategy is underscored by the fundamental importance of a managed firewall.

Building Resilience Against Living Off the Land Attacks

Living Off the Land (LOTL) cyber attacks represent a growing and increasingly sophisticated threat within the cybersecurity landscape. The significance of LOTL attacks extends beyond mere technicalities; they pose substantial risks to global security, influencing everything from corporate stability to national defense mechanisms.

Is CREST Certification Worth In 2026? A Complete Guide

CREST certification sits at a fascinating crossroads in 2025 – respected enough to open doors, expensive enough to make your bank account wince, and practical enough to actually prove you know your security testing inside out. After spending 15 years working as a cybersecurity professional, I’m going to break down exactly what you need to know about this certification’s worth today.

5 Reasons Why You Need CREST Penetration Testing For Your Business

CREST Penetration Testing is a comprehensive cybersecurity assessment that evaluates the security of your organisation’s networks, systems, and applications. It uses proven methodologies to identify potential vulnerabilities and assesses the risk associated with them. The testing also provides recommendations for mitigating those risks.

Penetration Testing in AWS: Can You Test Your Cloud?

AWS Security provides organisations with the tools and resources they need to protect their applications, services and data in the cloud. It can help businesses identify areas of vulnerability, detect malicious activity, monitor traffic patterns for suspicious activity and prevent unauthorised access. It includes features like encryption, authentication, risk assessment and compliance monitoring.

Why is API security the next big thing in Cybersecurity?

APIs, formally known as application programming interfaces, occupy a significant position in modern software development. They revolutionized how web applications work by facilitating applications, containers, and microservices to exchange data and information smoothly. Developers can link APIs with multiple software or other internal systems that help businesses to interact with their clients and make informed decisions.

Wi-Fi 6 or 5G? You no longer need to choose between the two to be protected

Fast, low-latency, high-capacity networks are needed in today's environment. However, these advanced networks face a significant challenge: combining speed, reliability, and flexibility with security. Until recently, much debate has been about which technology was better for protection purposes. There seemed to be a constant battle between users who saw more advantages in Wi-Fi 6 and users who preferred 5G networks.