Latest News


Recent Posts

Cool Tool: Centipetal Networks RuleGate - Threat Intelligence Tool

July 20, 2016 | Admin
Every once in a while I get time to check out what new security technologies are popping up. Last week at Cisco Live I met the Centripetal Networks team and saw a impressive demo of their RuleGate solution. This post will provide a general overview of what I saw with some screenshots of th...
Read More

Five Ways to Optimize Threat Intelligence

June 29, 2016 | Admin
Five Ways to Optimize Threat Intelligence Steven Rogers advises companies on ways for security teams to optimize protection with relevant threat intelligenceBy Steven Rogers, CEO, Centripetal Networks Threat intelligence feeds – like firewalls and virus protection – have become part of the...
Read More

Prioritising threat intelligence

May 30, 2016 | Admin
Steven Rogers advises steps that will allow security teams to prioritise threats based on relevant threat intelligence. Intelligence is available on just about anything, or even anyone, that is trying to gain access to your network, and what may already be in your network – lying in wait f...
Read More

Baiting the Phisherman: When Companies Strike Back at Scammers (Do Not Try This at Home)

May 16, 2016 | Admin
Dangerous computer hackers and internet scams do not always have to be complicated. With a simple ‘typo’ in a domain name, hackers can impersonate senior executives while attempting to trick employees into transferring money. This scam is a type of phishing known as whaling or business e-m...
Read More

Salted Hash Rehashed: The Weekly News Recap for May 14, 2016

May 13, 2016 | Admin
Backups are great, unless we're talking about sewers. Speaking of backups, have you tested yours this month? Welcome to this week's installment of Rehashed, your weekly recap of the news, as well as other topics of interest, for the week ending May 14, 2016. Today, we're talking about Rans...
Read More