logo.png
GET GDPR READY

Foregenix Blog

Jake Dennys

Cryptocurrency Malware Affects 55% Of Businesses Worldwide.

malware, Cybersecurity, Hack

,17/01/18 09:23

Earlier this month we discussed mining malware and how crypto’s popularity might have an effect on it’s usage. Well, a report from Check Point has found that 55% of businesses worldwide are now affected by crypto-miners.

Read More
Andrew McKenna

Your Encryption Checklist

Encryption

,12/01/18 10:14

Based on real and potential weaknesses identified in existing security protocols as well as industry guidance on algorithms, the following are some things to bear in mind when considering your business’ plans for encryption in 2018.

Read More
Zacharias Pigadas

Supply Chain Attacks: A Closer Look

,09/01/18 09:11

We, as Foregenix and as a security community, have seen our fair amount of breaches publicised the last year or so. Many of them are your run-of-the-mill breach where software is out-of-date, which provides an avenue for attackers within your infrastructure; or a phishing email that is sent to a list of potential targets to act upon it. We have also seen an increase in a certain category of attacks called Supply Chain Attack. What is a Supply Chain Attack and why should you care?

Read More
Jake Dennys

Black Friday Sees Website Traffic Increase by 200%

,24/11/17 15:17

Black Friday is upon us and as I’m sure you know, it comes hand in hand with lucrative tech discounts from across the industry. For businesses however, it brings its own set of challenges, and I don’t mean the swathes of angry shoppers fighting over televisions. As consumers flock to websites to snap up a bargain, hackers will be making the most of it by launching large scale attacks.

Read More
Richard Jones

Successfully implementing GDPR: Compliance and Awareness

GDPR, Cybersecurity

,17/11/17 09:39

The General Data Protection Requirement (GDPR) is essentially about privacy. It relies on cyber security controls to ensure that legitimately used Personally Identifiable Information (PII) is adequately protected against the numerousthreats that could serve to defraud or harm us as individual citizens. 

Read More
Jake Dennys

Cryptocurrency Malware Affects 55% Of Businesses Worldwide.

malware, Cybersecurity, Hack

,17/01/18 09:23

Earlier this month we discussed mining malware and how crypto’s popularity might have an effect on it’s usage. Well, a report from Check Point has found that 55% of businesses worldwide are now affected by crypto-miners.

Read More
Andrew McKenna

Your Encryption Checklist

Encryption

,12/01/18 10:14

Based on real and potential weaknesses identified in existing security protocols as well as industry guidance on algorithms, the following are some things to bear in mind when considering your business’ plans for encryption in 2018.

Read More
Zacharias Pigadas

Supply Chain Attacks: A Closer Look

,09/01/18 09:11

We, as Foregenix and as a security community, have seen our fair amount of breaches publicised the last year or so. Many of them are your run-of-the-mill breach where software is out-of-date, which provides an avenue for attackers within your infrastructure; or a phishing email that is sent to a list of potential targets to act upon it. We have also seen an increase in a certain category of attacks called Supply Chain Attack. What is a Supply Chain Attack and why should you care?

Read More
Jake Dennys

Black Friday Sees Website Traffic Increase by 200%

,24/11/17 15:17

Black Friday is upon us and as I’m sure you know, it comes hand in hand with lucrative tech discounts from across the industry. For businesses however, it brings its own set of challenges, and I don’t mean the swathes of angry shoppers fighting over televisions. As consumers flock to websites to snap up a bargain, hackers will be making the most of it by launching large scale attacks.

Read More
Richard Jones

Successfully implementing GDPR: Compliance and Awareness

GDPR, Cybersecurity

,17/11/17 09:39

The General Data Protection Requirement (GDPR) is essentially about privacy. It relies on cyber security controls to ensure that legitimately used Personally Identifiable Information (PII) is adequately protected against the numerousthreats that could serve to defraud or harm us as individual citizens. 

Read More

Cyber Security Insights

Jake Dennys
17/01/18 09:23

Cryptocurrency Malware Affects 55% Of Businesses Worldwide.

Earlier this month we discussed mining malware and how crypto’s popularity might have an effect on it’s usage. Well, a report from Check Point has ...

Read More

Andrew McKenna
12/01/18 10:14

Your Encryption Checklist

Based on real and potential weaknesses identified in existing security protocols as well as industry guidance on algorithms, the following are some ...

Read More

Zacharias Pigadas
09/01/18 09:11

Supply Chain Attacks: A Closer Look

We, as Foregenix and as a security community, have seen our fair amount of breaches publicised the last year or so. Many of them are your ...

Read More

Jake Dennys
24/11/17 15:17

Black Friday Sees Website Traffic Increase by 200%

Black Friday is upon us and as I’m sure you know, it comes hand in hand with lucrative tech discounts from across the industry. For businesses ...

Read More

Richard Jones
17/11/17 09:39

Successfully implementing GDPR: Compliance and Awareness

The General Data Protection Requirement (GDPR) is essentially about privacy. It relies on cyber security controls to ensure that legitimately used ...

Read More