How to Build a Comprehensive Identity Security Strategy

With the rise of remote work and cloud-based services, organisations are becoming increasingly reliant on technology to conduct business. The larger the digital footprint, the higher the risk for data breaches and cyber-attacks. To help mitigate this risk, organisations need to invest time and resources in building a comprehensive identity security strategy. Identity security is…

Identity Security – Why It Matters in 2023

In today’s digital age, identity security is more important than ever before. With the increasing reliance on technology and the internet, businesses and individuals alike are vulnerable to identity theft, fraud, and other malicious activities. As a result, identity security has become a growth area for the channel, and it is crucial for companies to…

Taming The Cookie Monster With MFA

With cybercrime on the rise, it’s important for consumers to take measures to protect their data and information from malicious actors. One way to do this is through the use of Multi-Factor Authentication (MFA) and other security measures. International law enforcement agencies from 17 countries have just seized one of the world’s largest dark web…

The Dark Side of Pen Testing

The Brute Ratel C4 (BRc4) red-teaming and adversarial attack simulation tool was released in December 2020. The most recent “Sicilian Defense” version was released in May 2022. Similar to Cobalt Strike, this tool has been embraced by legitimate adversary groups (APT actors and alike). It provides a framework for developing pen testing tools, using a…

Cracking the ransomware conundrum

Cracking the ransomware conundrum The first salvo of shells in the conflict between Ukraine and Russia was launched on the 24th of February 2022. The first weapon deployed however, one familiar to many of us, was weeks before the first Russian soldier stepped onto Ukraine soil. Malware was at the centre of the intelligence war…

Festive Shopping Exposed

Tis The Season To Be On Your Guard – The Threat of the Ho Ho Home Device With a huge increase in shopping online over the festive period the cyber threat is heightened and the criminals are delivering more than just presents.  Phishing , Malicious websites and Malware are just some of things the bad actors…

Putting the X in XDR

Putting the X in XDR MDR or Managed Detection and Response is well understood and has been a considerable growth area of the last few years. This market is quickly morphing into a market segment which is known as XDR or the ability to leverage all relevant technical controls to quickly identify anomalies, attacks or…

Ransomware – The Kick-Off

Ransomware – The Kick-Off Ransomware has come a long way in the last 30 years. Today, despite our greater awareness and more sophisticated cybersecurity, attacks of digital extortion are becoming ever more frequent, dangerous and costly. Ignition Technology has tracked the evolution of ransomware, examined some of its most devious foul-play tactics and introduces some…