Insights
Latest article
Learning from the ransomware attack on Tietoevry’s data centre
31 January 2024
Reports of a ransomware attack on one of the data centres operated by IT services company Tietoevry surfaced on 20th January this year. Allegedly undertaken by a ransomware gang known as Akira, the attack caused outages for several companies, universities, colleges, government agencies and municipalities across Sweden.
Building cyber resilience in an unpredictable world
20 November 2023|6 minutes reading
In today’s interconnected and digitally dependent world, where technology permeates every aspects of our lives, organisations face an ever-evolving landscape of cyber threats and vulnerabilities. The modern world is characterised by unpredictability. The digital transformation has ushered in unprecedented opportunities for innovation and growth, but it has also exposed us to a new level of unpredictability in the form of cyberattacks. To thrive in this dynamic environment, building cyber resilience has become paramount.
Risks and rewards in automated encryption key lifecycle management
19 September 2023|2 minutes reading
Encryption keys are part of the cryptographic mechanisms that are used by organisations to protect the integrity and confidentiality of data. This includes data that is vulnerable to unauthorised disclosure or undetected modification during transmission or while in storage; that is very sensitive; and that is of high value.
Protecting network centric warfare
29 August 2023|5 minutes reading
Network centric warfare is all about exploiting information superiority to maximize battlespace efficiency and effectiveness by bringing more quality information and warfighting assets to bear. While it is generally accepted that it represents the way forward for successful military operations, leaders need to be aware that it can only deliver results if communications are fully protected.
The drivers behind the rise of network centric warfare
16 June 2023|4 minutes reading
Military forces the world over face a series of ever more complex challenges, including attacks from highly empowered individuals as well as malicious states, which now pose national security threats to the proper functioning of critical IT infrastructure.
How to avoid the risks introduced by side-channel attacks
25 May 2023|2 minutes reading
Government and military organisations the world over are only too aware of the dangers posed by attackers. Protecting confidential data is a key responsibility for security teams and IT security alike, but the threat landscape continues to emerge and become ever more complex.
How military leaders use OODA to build battlespace knowledge
26 April 2023|5 minutes reading
The rise of network-centric warfare has helped to reduce casualties and build the use of secure communications in modern conflicts. Having a solid, secure communications vision and strategy is key to thwarting or limiting gains made by adversaries.
Five Top Tips for Secure Encryption Key Lifecycle Management
21 March 2023|4 minutes reading
Encryption key management is critical for your security systems. It is vital for organisations using encryption keys to pay attention to how they are managed. This article contains insights into securely managing encryption keys.