
Maximising Security and Efficiency with CISO-as-a-Service
Many organisations are turning to implementing a CISO-as-a-Service option. The service is not only efficient, [...]
Complimentary ISO 27001 | Discovery Session
Benefits of the ISO 27001 Gap Assessment
How to Outsmart the DarkSide Ransomware Group
The DarkSide Ransomware Group is one of the many gangs that continue to rebrand themselves [...]
“Cryptic Clouds” Hacker’s Compromise Google Cloud Accounts to Mine Cryptocurrency
Threat actors are actively exploiting a misconfigured Google Cloud Platform (GCP) infrastructure to mine cryptocurrency. [...]
Ransomware Threat Actors Turn to Target the Cloud
As expected, in Q2 this year, cyber criminals shifted their focus to cloud-based apps. A [...]