Quantum Readiness: Migration to Post-Quantum Cryptography

The cybersecurity landscape is evolving, and a quantum revolution is upon us. The Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the National Institute of Standards and Technology (NIST) have outlined the impending need for organizations to transition to post-quantum cryptographic (PQC) standards in anticipation of cryptanalytically-relevant quantum computers (CRQC). These […]

Colt x Venari Security – Episode 2: The Findings

Episode two featuring Simon Mullis from Venari Security and Mark Slater from Colt Technology Services. In this episode we look into real-life scenarios based on an anonymised sample of ten Colt Technology Services clients. Mark Slater “This should be the most hygienic, clean traffic a customer should have”. Yet… “90% of the hosts carried vulnerabilities that are of a significant risk to their organisation”“79% of […]

Encrypted Traffic Analysis: A Critical Solution for Enterprise Privacy

Networks are becoming increasingly encrypted, and the need for more visibility creates a significant challenge for security teams. Threat actors routinely use encryption to help hide data exfiltration and control with victim networks, making it extremely difficult for security teams to detect and prevent potential security threats. One of the biggest challenges facing organisations today […]

Why Data Encryption Changes Everything

Today, more than ever, law firms are in possession of large amounts of data. To meet internal and regulatory standards, almost all data is encrypted from end to end. Understanding the presence of risks and the level of compliance becomes impossible to measure in real-time. In effect, the environments of legal firms are more distributed, […]

How Bring Your Own Device Became Bring Your Own Risk Overnight

For security leaders, change is constant. We are constantly having to adapt our security strategies and activities so that they remain relevant to the business and risk environments that we operate within. However, the past year has seen an unprecedented level of change, driven by the global pandemic. We talk about the ‘health’ of a […]

Privacy and Encryption – Acceptable Policies for the Modern Enterprise

The fundamental concept of Privacy is something universally understood by everyone. The right to be left alone, without interference or intrusion is documented in Article 12 of the ‘The United Nations Universal Declaration of Human Rights’ (1948): Put simply, we are constantly under surveillance: constantly tracked, targeted, profiled, and exploited, sometimes willingly (without consciously realising […]

Real Situational Awareness Is More Vital Than Ever Before

I don’t think there has been a day in the last few years where I haven’t been helping a client somewhere with some form of cyber event. Ransomware has become ever more prevalent in 2020/21 but good old data theft, financial credential harvesting, and insiders, malicious or otherwise, are still around. The most frequent organisational […]

Colt x Venari Security – Episode #1: The Problem

The first chapter in a series of conversations between Simon Mullis, CTO here at Venari Security and Mark Slater, Senior Director of Sales Engineering at Colt Technology Services. A partnership that goes from strength to strength. Follow our journey on LinkedIn.

A View from Venari Security: Bryan Littlefair

In our exclusive video series, meet Venari Security CISO and Advisory Board member Bryan Littlefair. Formerly CISO for organisations including Vodafone and Aviva, Bryan explores the ‘Digital Pandemic’ and the challenge it poses for CISOs, why speed is important and what’s fuelling the fire. Missed our series with Andreas Wuchner? Watch it here.

A View from Venari Security: Andreas Wuchner

In this exclusive video series, Venari Security Advisors share their insight into cyber security challenges that organisations face. Watch this exclusive thought leadership video to hear Advisory Board member, Andreas Wuchner, share his thoughts on topics ranging from who’s the target, to digital risk transformation in a post-Covid world, and, of course, how to approach […]