Articles in this category What is Internet of Things (IoT)? The Internet of Things (IoT) comprises a network of physical devices. Essentially, any device that connects to either the Internet or a local network can be considered as part of IoT. Here are some ot... What is a Purple Team Assessment? A purple team assessment is a combination of a red and blue team exercise. A red team exercise is essentially where a penetration tester attempts to circumvent security controls and identify security ... What is NetBIOS Name Service (NBNS)? NBNS is a networking protocol that was made for older systems to allow communication over modern TCP/IP networks. In many cases, NetBIOS is still used in some organizations today, and disabling it cou... What Is a DDoS Heard of DDoS? What risk does it pose to your business or organisation? DDoS stands for Distributed Denial of Service. A DDoS attack is an attempt to make an online service unavailable (either tempo... What Is Ransomware Attacks You log into work first thing in the morning and a message pops up telling you that all your files have been encrypted or locked... ...and whoever did this is demanding a fee to be paid within 72 hour... What is a BYOD Policy? Bring Your Own Device or BYOD is when a staff member brings a device of their choice into the workplace. As a business or organisation BYOD can bring many benefits. It allows staff the freedom to... What is Threat Intelligence? Threat intelligence is more than just threat indicators or data points without context – it is actionable information that can guide security strategy and alert organizations to ongoing and emergin What is Network Security Testing? Network testing is a broad means of testing security controls across a network to identify and demonstrate vulnerabilities and determine risks. While the testing medium can change (wireless, ethern What is Cloud Security? A definition of cloud security begins with defining cloud computing. An industry accepted resource used to define cloud computing derives from the U.S. Department of Commerce – National Institute o What is Risk-Based Vulnerability Management? Conventional vulnerability management has been in the market for nearly two decades, with an initial emphasis on identifying vulnerabilities. Discovery and scanning drove innovation, and the only deli... What is a security.txt file? Summary What is Business Continuity? Business Continuity in CyberSecurity Business continuity is an organization's ability to maintain essential functions during and after a disaster has occurred. Components of a Business Continuity Plan...