Zain

GDPR – Secure Coding – Security by Design for Web Applications With The OWASP TOP 10

The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is a regulation by which the European Parliament, the Council of the European Union and the European Commission intend to strengthen and unify data protection for all individuals within the European Union (EU). It also addresses the export of personal data outside the EU. With this […]

GDPR – Secure Coding – Security by Design for Web Applications With The OWASP TOP 10 Read More »

The Psychology of Security

Talk to any cyber security professional and one of the first things you’ll notice is frustration. Despite all the advice out there on how to avoid phishing attacks, or choose secure authentication methods, and so on, the problems persist—people continue to click suspicious links in emails and use ‘password’ as a password. As a result,

The Psychology of Security Read More »

2018 in Breaches

2018 proved to be an expensive year for a number of firms, both major and minor, around the globe. An IBM report suggested that the average cost of a breach last year reached almost $3.7m, and the nature of averages means that half were above that. Here we will present a brief run-down of some

2018 in Breaches Read More »

Mobile Malware

Europol’s 2018 Internet Organised Crime Threat Assessment reported that ‘[m]obile malware [was] absent in law enforcement reporting, but industry reports [a] growing volume’ of such attacks. The authors suspected that the cause of the low law enforcement figures may have been that ‘[v]ictims of mobile malware are more likely to approach their provider in relation

Mobile Malware Read More »

Breaches and Butterfly Wings: How data loss fuels further phishing

The ‘butterfly effect’ is a popular way of explaining chaotic systems to non-mathematicians—the flapping of a butterfly’s wings in one country contributes, however slightly, to a change in wind patterns that can cause a tornado in another weeks later. It’s important to be aware that our Internet-connected world is just as prone to producing these

Breaches and Butterfly Wings: How data loss fuels further phishing Read More »

What is ‘Gen V Cyber Security’?

You may have talk about the idea that we are now entering a ‘fifth generation’, or ‘Gen V’, of cyber security. You may have wondered what that means, what the previous four generations were and which generation of attacks your organisation’s current security practices are sufficient to defend against. The ‘Gen V’ idea comes from

What is ‘Gen V Cyber Security’? Read More »

Mitigate Listed on UK Cyberslide

Mitigate Cyber Security is proud to announce that it has been listed on the international Cyber Start-Up Observatory’s UK Cyberslide, ‘an initiative to highlight all the cybersecurity startups and innovative established companies with solutions for the financial services, healthcare, e-commerce, education, critical infrastructures, manufacturing and law enforcement & intelligence agencies verticals.’

Mitigate Listed on UK Cyberslide Read More »

Internet Explorer Zero-Day

Microsoft has just released an emergency security update to fix a zero-day vulnerability in Internet Explorer. A zero-day vulnerability means that this is the first time it has come to public attention, but there is always a possibility that cybercriminals may have independently discovered the vulnerability previously, and that they could have used it in

Internet Explorer Zero-Day Read More »

Introducing Mitigate

Mitigate are proud to present Mitigate, an innovative internal risk mitigation solution featuring training certified by the UK’s Government Communications Headquarters (GCHQ). Mitigate calculates and presents your level of internal risk according to a range of metrics, letting you know where to focus your attention in order to reduce your risk and build resilience within

Introducing Mitigate Read More »

Scroll to Top