Blog

Our experts provide insight into security products and techniques in this cyber security blog

Latest Blog Post

BIG-IQ 7.1 – Top New Features

BIG-IQ 7.1 – Top New Features

We are excited to announce that F5 Networks has just released BIG-IQ version 7.1.0, so we’ve highlighted a few of the top new features in 7.1. Learn how to import existing legacy applications without redeploying from BIG-IQ. This allows you to generate BIG-IQ...

BIG-IQ 7.1 – Top New Features

We are excited to announce that F5 Networks has just released BIG-IQ version 7.1.0, so we’ve highlighted a few of the top new features in 7.1. Learn how to import existing legacy applications without redeploying from BIG-IQ. This allows you to generate BIG-IQ...

Recent Blog Posts

Securely Working at Home During The Covid-19 Pandemic

Securely Working at Home During The Covid-19 Pandemic

As more staff than ever are working from home due to the Covid-19 pandemic lockdowns around the world, it is apparent that many organisations have found their remote working solutions are inadequate. This article looks at remote working security tips for businesses...

More Blog Posts

Defend Against Ransomware

Defend Against Ransomware

In recent years, there have been several high-profile ransomware attacks causing billions worth of damage and downtime. Affecting both public and private organisations, although private organisations have been particularly hard hit by some attacks. However, there are...

Automation – Rest API Security Vulnerabilities

Automation – Rest API Security Vulnerabilities

Reflection attacks A malicious attack can use reflection attack to bypass authentication measures that protect your REST API. Authentication protocols that rely on a challenge-handshake or similar mechanisms are vulnerable to this type of attack. The attack itself is...

Fortinet Secure SD-WAN Assessment Report

Fortinet Secure SD-WAN Assessment Report

To fully realise the benefits of deploying the Fortinet SD-WAN solution, a Secure SD-WAN Assessment Report can be run on your existing WAN Edge infrastructure. Deploying, monitoring and running the report is non-intrusive. The report provides an insight into your...