Attack surface

Factors Contributing to Threat Actor Unification

Introduction In 2022 and 2023, there has been a significant increase in threat actors uniting under singular causes. This focuses their attacks and increases their efficiency. Long-standing multi-group attack campaigns are constantly occurring in the hacktivist environment, and state-sponsored or country-affiliated threat groups act on behalf of and in support of their respective governments. There […]

Factors Contributing to Threat Actor Unification Read More »

Russia’s Digital Authoritarianism Tightens the Screw Over Private Sector Data

Written by: Roman Faithfull and Olivia Betts Since the start of the war, Russia has been introducing new laws and making amendments to existing ones to expand the scope of its digital authoritarianism. These changes assist the state in tracking, repressing, and manipulating domestic and foreign populations. Almost immediately following the outbreak of the so-called “Special

Russia’s Digital Authoritarianism Tightens the Screw Over Private Sector Data Read More »

Cyber Supply Chain Risk Management: Challenges and Best Practices 

Global supply chains have become increasingly complex and vulnerable to cyber risks in recent years, with many ever-evolving threats ranging from ransomware attacks to unauthorised system access. Recognising the importance of implementing management strategies that counter such intentions is easy.  This article will relay valuable information about the challenges within cyber supply chain management and

Cyber Supply Chain Risk Management: Challenges and Best Practices  Read More »

Alert Fatigue in Cybersecurity: What Is It and how do we manage it?

The problem of alert fatigue, also known as alarm fatigue or notification fatigue, is widely spread across various industries, such as healthcare, construction, information technology and cybersecurity. Although this issue affects different sectors similarly, the cybersecurity industry experiences the most severe and complex consequences of the phenomenon.  Cybersecurity teams are becoming overwhelmed by the ever-increasing

Alert Fatigue in Cybersecurity: What Is It and how do we manage it? Read More »

Scroll to Top