A Brief History of Zero Trust Security

A Brief History of Zero Trust Security

The Forrester Zero Trust model, which has been around since 2009, argues that organizations should regard all network traffic as untrusted, regardless of where it’s coming from. The idea of a trusted internal perimeter leaves the organization at risk if that perimeter...
A Brief History of Hacking

A Brief History of Hacking

Cybercrime is a blight on the modern world, but you may be surprised to discover that it’s nothing new. In fact, ever since people first invented communications technology there have been those who have found ways to ‘hack’ them. Year: 1903 Type of attack: First...
As breaches become more sophisticated, firms must train for the next war, not the last battle

As breaches become more sophisticated, firms must train for the next war, not the last battle

Businesses hit by a cyber attack must not dwell on the past but should instead fortify their organisation for the future. Cyber-attacks are continuing to increase and evolve at an alarming rate. In just the last few weeks, we’ve seen the personal data stolen from...