The IT Security Infrastructure Blog

DELT appoint Reliance acsn for Managed Detection and Response (MDR) services

Shared services specialist Delt (www.deltservices.com) delivers a wide range of key services, including IT, Payroll, HR and Print Services, to a rapidly growing portfolio of public sector customers in the South West, including NHS England, the regional Clinical Commissioning Group, Plymouth and Torbay Councils, Plym Academy Trust, and many other vital healthcare, education and community...

Read more

EPISODE 1: When what’s ‘out there’ is already ‘in here’…But your security software doesn’t know about either of them.

A TRUE STORY OF UNDETECTED INITIAL INFECTION BY UNKNOWN THREAT VARIANTS – AND HOW IT HELD A MAJOR U.K. ENTERPRISE TO RANSOM He didn’t spot the threat and neither did the software. Chris’s story* “Funny, I don’t recognise that invoice. Still, I’d better get it out of the way – I’ve got loads to get...

Read more

Introducing the Buyers’ Guide to Managed Security

Buyers of managed security services are faced with global and local companies offering a massive range of capabilities, often with conflicting terminology and claims. That’s why Reliance ACSN was asked to contribute to the Managed Security Forum “Buyers’ Guide to Managed Security”. The report sets out to map services into basic, core, advanced and complementary, and offer...

Read more

Talk governance, get buy-in: selling cyber security to the Board

Working for the last 25 years in infosec and cyber, I’ve seen horror-story failures and heroic successes, as an interim adviser, non-exec, and senior in-house cyber expert.I’ve worked hard to bring awareness that drives the right actions - but I’ll be the first to admit that I have met with varying degrees of success. Why?...

Read more

How are you defending your organisation against the weaponisation of DDoS?

Recently, development platform, gitHub’s code hosting website, experienced potentially the largest-ever distributed denial of service (DDoS) attack, with the attackers using weaponization tactics to amplify the strength of the strike. DDoS attacks, which are considered among the most persistent and destructive forms of cyber-attacks, have been around for nearly 45 years. So, they are not…

Read more

  • PLUS
  • Certified Information Systems Security Professional
  • PCi
  • Information Security Management System - ISO Certified
  • Cisco Certified CCIE
  • Centre for Internet Security
  • TOGAF 9
  • HM Government G-Cloud Supplier
  • crest

Get in touch








captcha