Close Window

BREAK FREE

FROM APPLICATIONS

BLOG

RECENT NEWS

13

Aug

2019

The 5 Pillars of Secure Cloud Transformation

Cloud adoption can change not just the way an enterprise works, but the way it's IT leadership manages applications, connectivity and security. Transition to the cloud offers an opportunity for enterprise IT leaders to reeval... Read More

07

Aug

2019

Preventing Complacency putting Enterprise Security at Risk

If you’re having a bad day, know that things could always be worse: This... Read More

26

Jul

2019

Machine Learning & Artificial Intelligence in Cybersecurity: Hype vs Reality

In the last few years, we have witnessed a renaissance in machine learning (ML) and artificial intelligence (AI). AI broadly refers to the ability of machines to "think" like humans and perform tasks considered "smart," witho... Read More

26

Jul

2019

New Ways to Discover, Contextualise, and Prioritise Digital Risks

SearchLight’s Biggest Ever Update: Since founding the company in 2011, we’ve had some memorable milestones - from the first release of SearchLight in 2014, to being named the ... Read More

19

Jul

2019

“ZTNA” technologies: What they are, why now, and how to choose

Gartner predicts that by 2023, 60% of enterprises will phase out most of their remote access Virtual Private Networks (VPNs) in favour of Zero Trust Network... Read More

16

Jul

2019

How SD-WAN will Change your IT Department

We’ve been covering SD-WAN extensively in blogs—this is the fourth in a recent series—and the theme that has run throughout them all is that SD-WAN has the potential to reshape the enterprise network. SD-WAN allows com... Read More

10

Jul

2019

No 1 Security Solution for SD WAN

As thousands of African companies start to investigate and/or deploy SD WAN solutions, one consistent question arises – Security implications. The benefits of SD WAN seem to have resonated with many comp... Read More

08

Jul

2019

4 Ways Your Digital Footprint Enables Attackers

Whether it’s intellectual property, proprietary code, personal data, or financial information, the goal of information security is to protect those assets. However, when we only focus on the network, our visibility is impai... Read More

03

Jul

2019

Will ‘Fake’ Clouds Stall Your Enterprise Cloud Transformation?

“The cloud? Sure, we're in the cloud. We ported our on-prem solution to a virtual machine.” Heard that from your network hardware vendor recently? Don't blame Jane Salesperson. She's been selling appliances ... Read More

25

Jun

2019

The Holistic Approach to a Successful Cloud Transformation

As applications move to the cloud, businesses often complain about skyrocketing WAN costs as well as latency issues when accessing apps. The much-anticipated benefits of a cloud transformation - greater efficiency and agility... Read More

21

Jun

2019

Managing Digital Risk: 4 Steps to Take

Organizations are finding it increasingly difficult to know where their data is stored and shared in today’s technology-forward, connected world. Although these new, digital technologies help organizations advance their bus... Read More

14

Jun

2019

Managing Infosec Burnout: The Hidden Perpetrator

The secret of the burnout epidemic lies in how we feel about our stress, not the things that stress us out. A ... Read More

11

Jun

2019

The New Remote Access VPN, is not a VPN

Aside from some minor architecture and protocol changes over the last decade, remote access VPN solutions have remained largely unchanged in the market since 2000. As the name implies, remote access VPN solutions h... Read More

10

Jun

2019

The Best Route to the Cloud: SD-WAN and Cloud Security

In the modern world, enterprises are entering a place where they have legitimate uses for all types of networks—private line, Ethernet, satellite, DSL, broadband, and so on. As a result, companies have to become more sophis... Read More

06

Jun

2019

Cloud Security Accelerates Disruptive Digital Transformation

Throughout Africa, businesses are embracing cloud computing to accelerate digital transformation and achieve key operational efficiencies, says Stuart Hardy, Director at OneSecure – distributor for Zscaler in Africa. ... Read More

03

Jun

2019

Online File Storage: 2.3 Billion Files Exposed

2.3 billion is a massive number. It’s hard even to wrap your head around; what do I have 2.3 billion of? Video games? No. Books? No. Dollars? …Certainly not. ... Read More

27

May

2019

BlueKeep: Cutting through the Hype

Over the last week, we have all been tuning into our news feeds and listening to the security folks chatting about the next super vulnerability, ... Read More

24

May

2019

Internet of Things Traffic is Rising. And So are the Threats.

Do you know exactly what Internet of Things (IoT) devices are on your network and how active they are? You’d better, because they might be opening the door to cybercrime. IoT devices are, of course, nonstandard ... Read More

21

May

2019

Digital Shadows Partners with SecureLink

On 15 May we announced that SecureLink, one of Europe’s most respected independent cybersecurity and managed service providers, has partnered with Di... Read More

16

May

2019

Disrupting 30 years of Network & Security

The internet is disrupting industries and business models, fundamentally changing the way we live and work in the process. The cloud has also ignited a wave of disruption, which when considered in conjunction with the pro... Read More

14

May

2019

Security will Replace the WAN?

If you haven’t already realised it, the network concepts that we have known for the last 20 years are dying. It’s a slow death, but an equally inevitable one. The question is no longer whether the best option to deliver y... Read More

10

May

2019

Digital Shadows – ISO27001 Certification

I’m pleased to announce that Digital Shadows has recently achieved an important compliance milestone for our customers. After a concerted effort across the organization, we have earned the ISO/IEC 27001:2013 certification. ... Read More

05

May

2019

Modern Authentication: from Password to Zero Trust

The first Thursday of May, is World Password Day, when users are reminded to change their passwords and are implored to refrain from ... Read More

30

Apr

2019

The State of Digital Transformation – EMEA 2019

Digital transformation is fast becoming a priority as enterprises seek to drive efficiency, increase productivity, and become faster, more intelligent, more agile. In a word, more competitive. One of the keys to enabling digi... Read More

23

Apr

2019

No Cloud-First Architecture without the Architect

If you search “cloud transformation” on Google, you’ll get no less than 200 million results. Given the frequency with which the term is bandied about every day on business and technology websites, 200 million sounds abo... Read More

17

Apr

2019

Reducing your attack surface

According to OWASP, an attack surface “describes all of the different points where an attacker could get... Read More

15

Apr

2019

Going cyber nuclear: Is it time for a big red button?

It wouldn’t be an actual button (although that would be cool). It's more likely that it would be a series of actionable software-script “launch codes,” jointly executed from multiple locations by designated officials an... Read More

12

Apr

2019

Brace Yourselves: Ransomware is Resurging

Frequent readers of my blog will know that I adore the cinematic masterpieces produc... Read More

10

Apr

2019

Easing into the extortion game

One of the main ideas which flowed through Photon’s most recent research report, A Tale of Epic Extortions... Read More

01

Apr

2019

Cyber Risks and High-frequency Trading: Conversation with an Insider

Research from the Carnegie Endowment for International Peace published this week focused the attention on how financial systems around the world are at risk from ... Read More

14

Mar

2019

Detecting Exposed Data: The What, Why, & How

What is data loss detection? A fundamental responsibility for any IT security professional is to secure their information assets, be that customer data, financial information, or any other critical info... Read More

10

Mar

2019

Begin Managing Digital Risk in 4 Steps

The emergence of Cyber Threat Intell... Read More

08

Mar

2019

With SDP, the Switchboard is Making a Comeback

Who would have thought that a modern technology—a software-defined perimeter—would harken back to the days of the switchboard? Back in 1876, Alexander Graham Bell was awarded the first U.S. patent for the creation ... Read More

04

Mar

2019

Why Compass-Thinking Bias Can Hinder Your Cloud Migration

Those of us in the IT community often have to explain complex concepts in tangible business terms. We rely heavily on simplifying metaphors: Legacy network connectivity is mapped as “hub and spoke.” Networks are secured w... Read More

22

Feb

2019

Extortion Exposed: Sextortion, thedarkoverlord, and SamSam

In our most recent research, A Tale of Epic Extortions, the Digital Shadows Photon Research Team approac... Read More

20

Feb

2019

Stop Hugging Appliances and Embrace Cloud Security

It’s not an easy decision to replace your existing security infrastructure with cloud security. After all, in the world of cybersecurity, the bad guys only have to succeed once playing offence, whereas you, playing d... Read More

14

Feb

2019

Why Bug Bounty Programs are Going Mainstream

In contemporary culture, hackers have a conflicted and complicated status. The news is filled with stories of Russian hackers corrupting our media and democratic processes, and your garden-variety hackers—those not sponsore... Read More

10

Feb

2019

Understanding Digital Risk Protection

There has been a lot of talk recently about Digital Risk and Digital Risk Protection. Forrester published their 2018 New Wave on Digital Risk Protection (you can ... Read More

04

Feb

2019

Secure Cloud Transformation: A 4-Step Strategy for CIOs

The business IT environment is changing rapidly and, as a result, today’s CIOs have to tackle a number of big challenges. Twenty years ago, applications and data were stored on an individual’s computer. Today, cloud-deliv... Read More

28

Jan

2019

Security Practitioner’s Guide to Email Spoofing & Risk Reduction

In a previous blog, we covered a range of the different techniques attackers ... Read More

25

Jan

2019

Disrupting 30 Years of Network & Security History

The internet is disrupting industries and business models, fundamentally changing the way we live and work in the process. The cloud has also ignited a wave of disruption, which when considered in conjunction with the prolife... Read More

21

Jan

2019

Don’t Just Read Intelligence: Learn From It

Those unfamiliar with the field of computer security, reading the news headlines about how computers are ‘hacked’ and companies are breached, can be forgiven for conjuring up images of elite hacking teams whose (almost ma... Read More

07

Jan

2019

4 New Year Cyber Security Resolutions

Another year is upon us in the world of cyber-security, and few things are certain. Commentators are always prone to hyperbole: I remember in late 2017 reading claims that, “2017 was the year cyber nukes were dropped in the... Read More

04

Jan

2019

Cloud Transformation Predictions 2019

With applications moving to the cloud and employee mobility on the rise, organisations must navigate a myriad of network infrastructure and security challenges on their way to making the internet the new secure corporate netw... Read More

21

Dec

2018

Most Popular Security Blog Topics of 2018

It’s been a busy year for the Digital Shadows blog, with almost 150 blogs published since January 1. We share some of the most popular security blogs and themes for this year. US-CERT Draws on Digital Sha... Read More

20

Dec

2018

Why Darknet is Good for Enterprise and Private Apps

This post was co-authored by Nathan Howe, ZPA Architect at Zscaler, and Tony Fergusson, IT Infrastructure Architect at MAN E... Read More

14

Dec

2018

Bomb Threat Emails: Extortion Gets Physical

We’ve seen yet another change in tactics for the recent spate of extortion campaigns. Whereas ... Read More

14

Dec

2018

2019 Will See Cybercriminals Eye Opportunities in Cryptocurrency and IoT to Launch Their Attacks

Cybercriminals never take vacations. They’re always scanning the horizon to see which new technologies are being adopted by legitimate enterprises and are therefore ripe to be exploited, or how to utilize trusted protocols ... Read More

10

Dec

2018

2019 Security Predictions: Hackers Focus on the Cloud, Defenders Zoom in on Risks

If there’s one thing we can predict for certain for 2019, it’s that cybercriminals will continue to spin up more and more innovative ways to exploit gaps in security. The hackers have IoT devices on their radar, and they'... Read More

09

Dec

2018

2019 Cyber Security Forecasts: Six Things on the Horizon

The new year is upon us! 2018 brought us Spectre and Meltdown, Russian GRU indictments, and the exposure of 500 million Marriott hotel goers. 2019 is sure to throw us a few curveballs as well. For this blog, we looked at tren... Read More

30

Nov

2018

What is a Threat Model, and Why Organisations Should Care

Many organisations are exquisitely aware that they are the target of a wide range of cyber attacks: from targeted intrusions to mere vandalism. Financial services companies, defense contractors, critical infrastructure provid... Read More

23

Nov

2018

What’s the Right Way to Deploy Office 365?

What do you need to deploy Office 365 across hundreds of locations and thousands of users? Before you say “a stiff drink,” let's pause for some advice from someone who’s actually lived through the experience. Starting w... Read More

22

Nov

2018

Sextortion 2.0 – A New Lure

Back in September, we released a blog about the large volume of sextortion email campaigns that were hitting pe... Read More

17

Nov

2018

Non-regulated Data Loss Costs More than you Think

Are you a frequent traveller? If so, you probably participate in at least one rewards program in which you accrue airline miles or earn hotel points. The hospitality industry practically invented these loyalty programs and th... Read More

12

Nov

2018

To Pay or Not to Pay: Large Retailer Responds to DDoS Extortion

Fans of The Sopranos or Goodfellas are well-versed in the world of extortion. Whether it is paying off Tony Soprano or Paulie Cicero, the bad guys get their money. Cyber extortion is the digital version ... Read More

09

Nov

2018

Moving to the cloud? Don’t forget the keys!

Cloud applications were designed to provide a seamless user experience and greater productivity while making businesses more flexible and agile. No wonder ... Read More

07

Nov

2018

81,000 Hacked Facebook Accounts for Sale: 5 Things to Know

The British Broadcasting Corporation (BBC) published an article detailing how online actors had obtained and advertised at least 81... Read More

04

Nov

2018

LIVE WEBINAR: 4 Reasons why Zero Trust is Now Possible

Thursday, November 15th, 2018 | 08:30 AM PDT | 11:30 AM EDT Zero trust security has been all the buzz lately, but did you know that it was conceived almost a decade ago by Forrester Rese... Read More

31

Oct

2018

Once upon a network dreary – the branch firewall’s tale of doom

As Halloween approaches, I can’t help but let my mind wander to the macabre­. I imagine dense fog blanketing a cemetery. I see crumbling tombstones, dank mausoleums, and a spooky boneyard of rusted-out firewalls … lifele... Read More

29

Oct

2018

Bank Discovers Customer Credit Card Numbers Traded Online

Payment card fraud costs banks and merchants nearly $23 billion a year and rising. As consumers spend... Read More

25

Oct

2018

Zscaler Wins Overall Enterprise Cloud Security Solution of the Year

CyberSecurity Breakthrough, an independent organization that recognizes the top companies, technologies and products in the global information... Read More

19

Oct

2018

Suddenly, Everyone’s Focused On Cybersecurity

Cyber breaches and leaks are top of mind for the C-suite across industries from finance, to healthcare, and beyond... and keeping enterprise data secure is one of the biggest challenges corporations now face. ... Read More

15

Oct

2018

Zero Trust Security: 5 Reasons it’s Not Just About Passwords

Identity provider (IDP) services provision users and make it easier to manage passwords and authorize access based on contextual controls. By focusing on identity, they play an integral role in providing all employees, contra... Read More

12

Oct

2018

Phishing Site Impersonates Financial Services Institution

If the infamous bank robber, Willie Sutton, were alive today and honed his cyber skills, he might turn his attention to phishing and domain spoofing. Why? Because, as he once said about banks, “that’s where the money is.... Read More

10

Oct

2018

The Challenges of Digital Transformation

As organisations look at digital transformation, they are faced with a technology landscape that is constantly evolving and driving change across the enterprise. The pillars upon which business IT systems were built 30 years ... Read More

05

Oct

2018

Business Email Compromise: When You Don’t Need to Phish

According to the FBI, Business Email Compromise (BEC) and Email Account Compromise (EAC) have caused $12 billion in losses since October 201... Read More

22

Sep

2018

6 Tips: Mitigate Risk from Malicious and Accidental Insiders

When we hear the term “insider trading” most people think of the illegal practice of trading a public company’s stock based on material, non‐public information. The image of Michael Milken, Ivan Boesky or Martha Stewa... Read More

18

Sep

2018

Exact Data Match: Get rid of the “fake news” in your DLP solution

Any time I turn on the news, check my Facebook feed, watch videos on YouTube, or amuse myself over the latest tweets, I have to wonder about the accuracy of the information I am ingesting. These days, with social media giants... Read More

14

Sep

2018

Cyber threats to ERP Applications [ShadowTalk Podcast]

Listen to the Digital Shadows Podcast - ShadowTalk where JP Perez-Etchegoyen, CTO of Onapsis, talks to Michael Marriott about the exposure of SAP and Oracle applications, the increase in publicly-available exploits, and th... Read More

06

Sep

2018

Sextortion – When Persistent Phishing Pays Off

You may have heard of a recent surge in sextortion-based phishing campaigns. These campaigns seek to extort victims by threatening to publicly embarrass them for engaging in a sexually-explicit act, using previously-exposed p... Read More

27

Aug

2018

New strategies not better weapons may be the key to winning the cyber-security arms race

The cyber-security arms race follows a perpetual cycle – one that’s all-too-familiar to professionals working in the sector. Organisations invest large sums on protection, attackers breach their defences anyway... Read More

24

Aug

2018

Digital Shadows Contributes to Insider Threat Research

On July 30, Forrester published its latest research report on malicious insiders, Defend Your... Read More

20

Aug

2018

The Real Meaning of the Cloud in 2018

Once primarily a development platform, the cloud has become an accelerator of business activity. Organisations that are embracing the cloud are experiencing greater agility and speed across business operations and product de... Read More

08

Aug

2018

Trust Matters

Since the internet has become the primary transport network for most organizations, the world is moving to zero trust security. That’s a good thing. All traffic should be inspected coming into and leaving your network, and ... Read More

03

Aug

2018

Don’t Confuse GDPR Compliance with Security

Overlooking the differences between compliance and security could be perilous, yet for many businesses the distinction may seem obscure under the new regime of the European Union’s General Data Protection Regulation (... Read More

25

Jul

2018

Digital Risk Protection: Avoid Blind Spots with a More Complete Risk Picture

"Digital Shadows leads the pack for digital risk protection providers." Digital Shadows’ customers have been telling us this for years, and now Forrester Research has included us among the vendors who "lead the pack" in the... Read More

17

Jul

2018

Securing Africa’s Cloud

OneSecure readily acknowledges that Africa is a vast area incorporating many distinct cyber security environments.Is the Cyber Security threa... Read More

17

Jul

2018

Digital Risk Management

THE RISING IMPORTANCE OF CLOUD SOLUTIONS Vince Lombardi, one of the greatest coaches of all time said, “The achievements of an organization are the results of the combined effort of each in... Read More

02

May

2018

The Other Side of the Counter: DDoS, Social Engineering, Spambots…

An enduring characteristic of dark web marketplaces is how frequently they’re offline, often through denial of services attacks. While marketplace administrators can stand to make big bucks, they’ve got their own threa... Read More

24

Apr

2018

Pitfalls to avoid while transforming branch office connectivity

Does this scenario sound familiar? The board of directors has declared a cloud-first strategy. You like what you hear about direct-to-cloud as being the right way to access apps like Office 365. And you certainly like the ... Read More

21

Mar

2018

Cyber Security as Public Health

Public health, one of the great 20th century ideas, has many instructive lessons for cyber security in t... Read More

19

Mar

2018

Office 365: nothing will ever be the same

It may sound melodramatic—you’re not likely to see IT teams waxing sentimental about the good old days—but it is fair to say Office 365 is a game changer. If anything, we can agree that the adoption of Off... Read More

01

Mar

2018

CISOs: What you can control – and what you can’t – in GDPR

There’s a lot of confusing rhetoric around GDPR (General Data Protection Regulation). I’d like to help clear up some of it. I’m not a GDPR expert; however, I am a CISO with pretty deep experience in the implementati... Read More