Blog

Our experts provide insight into security products and techniques in this cyber security blog

Latest Blog Post

BIG-IQ 7.1 – Top New Features

BIG-IQ 7.1 – Top New Features

We are excited to announce that F5 Networks has just released BIG-IQ version 7.1.0, so we’ve highlighted a few of the top new features in 7.1. Learn how to import existing legacy applications without redeploying from BIG-IQ. This allows you to generate BIG-IQ...

BIG-IQ 7.1 – Top New Features

We are excited to announce that F5 Networks has just released BIG-IQ version 7.1.0, so we’ve highlighted a few of the top new features in 7.1. Learn how to import existing legacy applications without redeploying from BIG-IQ. This allows you to generate BIG-IQ...

Recent Blog Posts

Securely Working at Home During The Covid-19 Pandemic

Securely Working at Home During The Covid-19 Pandemic

As more staff than ever are working from home due to the Covid-19 pandemic lockdowns around the world, it is apparent that many organisations have found their remote working solutions are inadequate. This article looks at remote working security tips for businesses...

More Blog Posts

LDAP Signing

LDAP Signing

In Microsoft’s March update for Windows, administrative options have been added in the Registry to improve security for LDAP. Currently by default, the server accepts unsigned Simple Authentication and Security Layer (SASL) LDAP binds and clear-text simple binds....

Multi-Factor Authentication

Multi-Factor Authentication

Microsoft revealed that 1.2 million Microsoft accounts were compromised in January 2020 from Malicious Attackers. They also said that over 99.9% of these users did not have MFA enabled which could have secured the majority of attacks. Approximately 80% of the...

Defend Against Ransomware

Defend Against Ransomware

In recent years, there have been several high-profile ransomware attacks causing billions worth of damage and downtime. Affecting both public and private organisations, although private organisations have been particularly hard hit by some attacks. However, there are...