Insights

Someone asked us recently how we got our name, and we enjoyed answering the question so much we thought we’d share the story - and get full proxies explained at the same time....
Certificate management has become a higher profile challenge recently thanks to Google’s well publicised intention to reduce certificate lifespans, acceptable for use in its popular browser Chrome, to a maximum of 90 days.
Google's announcement to reduce the lifespan of Transport Layer Security (TLS) certificates from 398 days to 90 days continues to be a hot topic of discussion among information security professionals, especially those directly involved in replacing and updating certificates. It’s especially frustrating because – although mooted back in April of 2023 – there’s still no confirmed date for its implementation. Yet Chrome browsers account for just over 50% of all UK web traffic (Statista), so there’s no avoiding the impact that this will have.
As cyber-attacks become more sophisticated, the security framework of Zero Trust should be at the forefront of everyone’s mind, especially when protecting sensitive data.
Businesses depend greatly on their online presence and digital services. The threat of distributed denial-of-service (DDoS) attacks is more significant than ever. These malicious attacks can quickly cripple your website, applications, and network infrastructure, leading to devastating consequences for your business operations, revenue, and reputation. It's crucial for organisations to continually improve their security measures.
Many organisations are still relying on legacy software which can have a major impact on cyber security and can affect the performance and productivity of an infrastructure which can result in significant cyber risks. So, what are the issues an organisation can face with outdated legacy software?
Managing multiple endpoints across a network can be challenging due to the diverse ecosystem of devices used by employees. FortiClient EMS (Endpoint Management Server) helps by streamlining endpoint management and strengthening network security.
Meet Donald, our experienced Technical Manager. In this blog post, he takes us through a quick demonstration of F5's Distributed Cloud, showcasing how effortlessly you can ensure maximum uptime and protection for your web applications. 
FullProxy, Scotland’s leading independent cyber security and web application specialists proudly announces its membership in the Forth & Tay Offshore Cluster, a strategic initiative aimed at fostering collaboration and innovation within the offshore wind sector.
Penetration testing, often referred to as pen testing, is frequently viewed as a trade-off between simplicity and effectiveness. The general perception is that the more often you conduct pen testing, the better. Nowadays, with e-commerce serving as the primary platform for accessing essential services, businesses of all sizes are striving to enhance and automate their online operations. Consequently, it is imperative to prioritise the protection of customer data, safeguard business reputation, and fortify defences against cyber breaches. Read more about the differences in pen testing and why we recommend continuous pen testing.