The Importance of Vulnerability Scanning with AppCheck

Why Regular Vulnerability Scanning is Important Why Conduct Vulnerability Scans? Every year, Verizon Communications Inc, a multinational telecommunications conglomerate, publishes a report known as the Verizon Data Breach Investigations Report. The report compiles data from over 40,000 security incidents within the last 12 months experienced in a range of public and private sector organisations and uses it to […]

Read More

Authlogic Password Security Management Offer with CyberWhite

Authlogics provide a simple but robust Password Security Management (PSM) solution that complies with NIST, NCSC, CMMC, GDPR, and other digital identity guidelines. It uses a combination of custom blacklists, rules engine, heuristic scanning, and the Password Breach Database to reject weak and known breached passwords. The PSM has the unique feature of detecting and […]

Read More

CyberWhite’s Seven Questions With – Steven Hope, Authlogics

Steven Hope Interview – Authlogics Join us in the first of our ‘7 Questions With…..’ series as we sit down with key people in and around the cybersecurity industry.  We’ll find out what drives them in the pursuit of making people and organisations more secure in the cybershere and what makes them different. First up […]

Read More

ISO 27001 – Webinar

As the internationally recognised standard for information security management, ISO:27001 should be a serious consideration for organisations of any size and in any sector. This webinar is jointly hosted by CyberWhite’s David Horn and Richard Hamilton from Centre for Assessment.  Here they will guide you through the journey towards achieving ISO:27001 certification. With real, demonstrable […]

Read More

Building a successful IT security awareness program

The first step towards creating a successful security awareness program is to recognise that this is not a project with a defined timeline and an expected completion date, but is instead a development of organisational culture. Akin to “safety first” cultures that develop in manufacturing and other heavy industries, there are large economic and regulatory […]

Read More

Do you really take information security seriously?

Do you take information security seriously? Of course, you do. We all do…don’t we? Well, there’s the thing. We all believe we take it seriously but how do we evaluate our success. Let’s just pause for a moment and think about this. In majority of businesses there is a focus on delivering a profit by […]

Read More

NCSAM and Children

At the risk of being a tech bore, you’re probably already aware from the press that October is National Cyber Security Awareness Month. Yes, it is a mouthful, but it is an issue that is critical to your family if you have young children and here’s why.   As parents raising children in these daunting digital times, each day technology, both its benefits […]

Read More

Improve Your Online Safety Practices With These Simple Tips

There’s no denying that the internet is a significant part of our lives, both personally and professionally.  Utilising the internet allows us to work, socialise and shop online. However, it is always prudent to protect ourselves and our organisiation as cybercriminals are also able to enjoy the same ease of access to the internet. Throughout October, CyberWhite are helping […]

Read More

Are palm prints more secure than fingerprints?

With the news that Amazon has launched its own palm scanning technology that allows its customers to buy items with their palm print by way of biometric scanning, we asked our own Chief Technology Officer at CyberWhite, David Horn his thoughts on palm scanning technology. Palm recognition according to Amazon, is designed to be highly […]

Read More