
Insights


Check Point Upgrade Advisory
Update needed for Check Point Client VPN/Endpoint versions E81.10 or earlier

Highly sophisticated attack on FireEye
Highly sophisticated attack on FireEye

New CFO Appointment in Integrity360
Integrity360 is thrilled to welcome Patrick McHale to our team as Chief Financial Officer.

Why your organisation may need a business information security officer
From chief information officers to chief security officers, organisations now have many different job titles with responsibilities over security.
No longer can companies house all of their security duties under one job title and brief, especially as technology becomes more and more pervasive in the way that businesses operate.

The Twitter Hack: Why Organisations Must Now Address Physical Social Engineering Risks
When we think of cyber-attacks, we often think of a skilled operation that targets an organisation’s network but attacks have become much more multi-layered.

5 key findings from the 2020 Verizon Data Breach Investigations Report
It would take hours to read through the 100+ pages of the Verizon’s Data Breach Investigations Report (DIBR) which takes the pulse of the security landscape for companies and organisations every year.

RCE Vulnerability Advisory in Windows DNS CVE-2020-1350
Microsoft Vulnerability in Windows DNS

F5 TMUI Vulnerability CVE-2020-5902
CVE-2020-5902

A guide to securing your privileged accounts
Privileged Account Management (PAM) has been placed at #1 for last two consecutive years (2018 & 2019) in Gartner’s Top 10 Security Projects. This is due to the fact that nowadays, with an ever-expanding infrastructure like on-premises, cloud, IoT, DevOps, mobile devices and SaaS Business Applications, classical Perimeter Security is not as effective as it used to be due to so many control points and gateways. Furthermore, privileged accounts exist on every asset and system out there, not forgetting about Non-Human Privileged Accounts that are even more difficult to monitor and track (e.g. vulnerability scanners, RPA, or Secrets in Jenkins, etc.)

What will the new normal for information security look like?
Very few of us have experienced times like this in our lifetime. A global invisible threat to our lifestyle, our economics, our health and our very existence in some cases, has filled our daily lives.

Notable Increase in DDoS attacks
Integrity360 is aware of an increased in DDoS attacks globally which we would like to remind our clients to remain vigilant about.