
What is ‘Fast Flux’, and why is the US government warning about it?
The US government has stated that a cyber trick called Fast Flux is a ‘National Security Threat.’

The US government has stated that a cyber trick called Fast Flux is a ‘National Security Threat.’

“It’s not a bug, it’s a feature!” How phishers abuse your browser to steal data.

GitHub tools aimed at boosting security were hacked to steal secrets instead.

If automated tools let more than 1 in 4 fake LinkedIn account registrations through, what can we humans do to help close the security gap?

There’s no getting around it — the cloud is a necessity for modern businesses. These days it’s nearly impossible to run a business without interacting with the cloud in some way. While most businesses rely on cloud-based tools to conduct day-to-day operations, these tools also significantly expand a company’s attack surface. Cloud-related attacks are one of the top threats for businesses, with 80% of companies seeing an increase in the frequency of attacks in their cloud environments. Whether you’re storing […]

In the last decade, cloud technology has become incredibly pervasive and a necessity for most businesses, especially those offering hybrid or remote work environments. According to G2, virtually all companies use at least one public or private cloud, and 85% of organizations will be “cloud first” by 2025. Even more important (from a security standpoint) is the fact that more than 60% of all corporate data is stored in the cloud. This data can be stored on cloud service providers […]

All the cybersecurity experts and vendors in the world failed to stop the SolarWinds attack. It’s often the fluency and completeness of how you respond to the news that really matters…

Our newest writer, Paul Ducklin, tells it as he sees it – that we’re all served better when we treat cybersecurity as a value to be maximised, not as a cost to be minimised.

For many, the metaverse represents an idyllic future. Users can delve into a fully immersive virtual world, where geographic and physical barriers are removed. They can develop a perfectly crafted online identity, in the form of an avatar, which can move through various virtual environments to work, play games, shop, and socialize. Yet, while many are excited by the development of the metaverse, some are concerned about the cybersecurity risks it poses. Cybercrime is already a common occurrence. In fact, […]

As public clouds supersede the datacenter for our customers, it’s not enough to represent just one facet of a general trend toward the dissolution of traditional perimeters. This trend requires a novel and comprehensive suite of controls around identity, configuration management, and endpoints, which represent the new attack surface. Ermetic provides crucial analysis of these modern infrastructure fixtures which is essential to delivering robust managed security to our customers. To launch our partnership with Ermetic, we talk to Arick Goomanovsky, […]

By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.






