Cybersecurity Insights

Kirsty Trainer

4 Reasons You Need File Integrity Monitoring (FIM) 

07/05/20 10:10

eCommerce environments are under constant threat from attackers; if your website touches cardholder data at any point, you’re a target. It doesn’t matter if you’re a big multinational conglomerate, or a tiny independent merchant; if you’re deploying poor security measures, they probably have you in their sights.

File integrity monitoring (FIM) systems are a critical part of your website's immune system. If you want to find and destroy malicious code, you’ll need to know where it is and where it’s come from. FIM systems will log changes made to your website, where they’ve come from and when they were made. Utilising a FIM log in your security strategy will help provide you with up to date knowledge of the inner workings of your website.

But why is file integrity monitoring important?

Read More
Bruce Bickell

CIA While Working Remotely

29/04/20 11:11

If you're like me and love watching movies, don't be deceived by the title. The CIA does not represent the Central Intelligence Agency who infiltrates the criminal organizations undercover and takes them down once they have enough evidence. The CIA referred to here is the CIA triad that all security fundamentals and frameworks are built upon. It is the Confidentiality, Integrity, and Availability that we take into consideration when architecting solutions for our organizations.

Read More
Joshua Hobson

5 Ways to Prevent Downtime on Your Magento Store

23/04/20 10:18

This blog post was written by Joshua Hobson, Marketing Manager at our partner Fluid Digital.

Downtime on your eCommerce store can be damaging. You will lose sales, your reputation will be damaged and your customers will be frustrated.

Read More
Benjamin Hosack

WebScan eCommerce Industry Report - April

21/04/20 11:18
Our WebScan solution currently monitors nearly 7 million sites and we've recently started sharing a monthly report on the threatscape facing eCommerce businesses.
Read More
Alex Constantinou

Detection Lab for Pentesters

15/04/20 10:00

Detection Lab, designed and maintained by Chris Long, is a collection of Vagrant and Packer scripts. These scripts allow users to quickly spin up a fully configured and monitored Windows Active Directory environment. Once the setup is complete, we will have a fully functional lab designed with defenders and security researchers in mind. Detection Lab can easily be modified to fit most needs or expanded to include additional hosts.  This blog will demonstrate how to install and use Detection Lab with penetration testers in mind.

Read More
Kirsty Trainer

4 Reasons You Need File Integrity Monitoring (FIM) 

07/05/20 10:10

eCommerce environments are under constant threat from attackers; if your website touches cardholder data at any point, you’re a target. It doesn’t matter if you’re a big multinational conglomerate, or a tiny independent merchant; if you’re deploying poor security measures, they probably have you in their sights.

File integrity monitoring (FIM) systems are a critical part of your website's immune system. If you want to find and destroy malicious code, you’ll need to know where it is and where it’s come from. FIM systems will log changes made to your website, where they’ve come from and when they were made. Utilising a FIM log in your security strategy will help provide you with up to date knowledge of the inner workings of your website.

But why is file integrity monitoring important?

Read More
Bruce Bickell

CIA While Working Remotely

29/04/20 11:11

If you're like me and love watching movies, don't be deceived by the title. The CIA does not represent the Central Intelligence Agency who infiltrates the criminal organizations undercover and takes them down once they have enough evidence. The CIA referred to here is the CIA triad that all security fundamentals and frameworks are built upon. It is the Confidentiality, Integrity, and Availability that we take into consideration when architecting solutions for our organizations.

Read More
Joshua Hobson

5 Ways to Prevent Downtime on Your Magento Store

23/04/20 10:18

This blog post was written by Joshua Hobson, Marketing Manager at our partner Fluid Digital.

Downtime on your eCommerce store can be damaging. You will lose sales, your reputation will be damaged and your customers will be frustrated.

Read More
Benjamin Hosack

WebScan eCommerce Industry Report - April

21/04/20 11:18
Our WebScan solution currently monitors nearly 7 million sites and we've recently started sharing a monthly report on the threatscape facing eCommerce businesses.
Read More
Alex Constantinou

Detection Lab for Pentesters

15/04/20 10:00

Detection Lab, designed and maintained by Chris Long, is a collection of Vagrant and Packer scripts. These scripts allow users to quickly spin up a fully configured and monitored Windows Active Directory environment. Once the setup is complete, we will have a fully functional lab designed with defenders and security researchers in mind. Detection Lab can easily be modified to fit most needs or expanded to include additional hosts.  This blog will demonstrate how to install and use Detection Lab with penetration testers in mind.

Read More