Viewing: Cybersecurity Resources

Security Insights – Q2 2021 Updates

Threat Analyst Lead Yaz Johnston dives into our latest security insights, where you can learn about upcoming HTML sanitization for your favorite web browsers, what top 10 malware threats we’ve seen in the past quarter, and how ransomware continues to steal the security spotlight. HTML Sanitization Google, Mozilla, and security firm Cure53 announced they are […]

View More

Gala Technology: Secure and Compliant Payment-Processing Innovation

Gala Technology is the innovative team behind the multi-award-winning, cloud-based, Pay-By-Link payment technology, SOTpay. SOTpay supports merchants, of all shapes and sizes, to enable them to protect themselves against the ever-growing risk of fraud-related chargebacks in ‘Card Not Present’ (CNP) channels, whilst simplifying complex PCI DSS requirements and reducing processing cost. The solution has received […]

View More

Forrester's Total Economic Impact Report of Armor Anywhere

Discover the true ROI of Armor’s cloud security solution Armor Anywhere.

Check it out

Check out the Cloud Migration Checklist

Learn how you can help your company move to the cloud.

Get the Checklist

December 15, 2020

Threat Analysis:  The FireEye + SolarWinds Breach

Cybersecurity firm FireEye announced Tuesday that a sophisticated group of hackers, likely state-sponsored, broke into its network and stole tools the company’s experts developed to simulate real attackers and test the security of its customers. New details continue to emerge daily regarding the FireEye breach. Today we learned that the breach occurred via their supply […]

View More

Securing Compliance in E-commerce: Armor Anywhere and CSPM

We recently discussed the need for UK organisations to consider their security posture in light of rapid technology adoption and the growth of online sales. Retailers must not only protect a customer’s financial data under PCI DSS regulations, they must also adhere to data processing guidelines brought about by GDPR. As volume and complexity increase, finding […]

View More