Skip to content
Cynance
Cyber Security
Cynance
  • Services
    • Application Security
      • Penetration Testing
      • Secure Software Development Life Cycle (SSDLC)
    • Infrastructure Security
      • Network Security
      • Cloud Security
    • Offensive Security
      • Ethical Hacking
      • OSINT – Online Discovery
    • Security Risk and Compliance
      • Cybersecurity Risk Management
      • Privacy and Data Protection – GDPR
  • Industries
    • Online Gaming & Gambling
    • Tech Companies
    • Fintech
    • Startups
  • Insights
  • Company
  • Contact Us
  • Services
    • Application Security
      • Penetration Testing
      • Secure Software Development Life Cycle (SSDLC)
    • Infrastructure Security
      • Network Security
      • Cloud Security
    • Offensive Security
      • Ethical Hacking
      • OSINT – Online Discovery
    • Security Risk and Compliance
      • Cybersecurity Risk Management
      • Privacy and Data Protection – GDPR
  • Industries
    • Online Gaming & Gambling
    • Tech Companies
    • Fintech
    • Startups
  • Insights
  • Company
  • Contact Us

Category Archives: News & Opinions

You are here:
  1. Home
  2. Category "News & Opinions"

Up Your Email Security Game With DMARC Email Authentication

Up Your Email Security Game With DMARC Email Authentication

News & OpinionsBy Michal BauernfreundJanuary 26, 2021

The battle against phishing, spam, and malicious emails is never ending. 3.1 billion domain spoofing emails are sent every single day, forcing email provider filters to work extra hard to filter out malicious emails and prevent them from reaching inboxes. In this ongoing, multifaceted battle, DMARC email authentication is one way that every organisation can…

You’re going for ISO 27001 certification. Now what?

You’re going for ISO 27001 certification. Now what?

News & OpinionsBy Michal BauernfreundJanuary 20, 2021

Information security is important to everyone. Many of your current and future clients may add ISO 27001 certification as a condition of doing business with you, putting you in a position where you need to start assessing your policies, processes, and procedures. While ISO 27001 alone won’t guarantee you have effective information security practices in…

Emotet Malware is a Gift That Keeps on Giving

Emotet Malware is a Gift That Keeps on Giving

News & OpinionsBy Michal BauernfreundJanuary 13, 2021

Not all malware are created equally. And of all the malware out there, the Emotet malware is one of the most potent. Throughout its long life, Emotet has been linked to major malware attacks, and has consistently topped the Global Threat Index since September 2020. The only exception was a relatively quiet November, during which…

New WhatsApp Privacy Policy Announces Facebook Data Sharing

New WhatsApp Privacy Policy Publicly Acknowledges Facebook Data Sharing

News & OpinionsBy Michal BauernfreundJanuary 8, 2021

The new WhatsApp privacy policy released this week raised several key questions for data protection experts everywhere (and everyone else really). The new privacy policy sets out the information that WhatsApp shares with Facebook, and makes it clear that this policy is non-negotiable – if you don’t like WhatsApp sharing your data with Facebook, your…

Data Breach Brokers - Avoid Data Falling Into the Wrong Hands

Data Breach Brokers – Avoid Data Falling Into the Wrong Hands

News & OpinionsBy Michal BauernfreundJanuary 4, 2021

What happens after a data breach?  Discovery of a data breach is only the tip of the iceberg. Even as companies complete their initial incident response and begin their recovery, trying to minimise the leak and reduce the damage, the chances are that the stolen data has already been passed onto the next stage of…

What Cellebrite's Signal Hack Claims Teach Us About Cybersecurity

What Cellebrite’s Signal Hack Claims Teach Us About Cybersecurity

News & OpinionsBy Michal BauernfreundDecember 23, 2020

You may have seen the interesting tale of Cellebrite’s Signal hack claims that they cracked Signal’s at rest encryption, giving them access to encrypted messages on the app when they are physically on the device. This claim was quickly ridiculed, Cellebrite had to roll back their blog giving away their secrets, and Signal’s creator, Moxie…

Under Attack: The Cyber Attacks 2020 Landscape

Under Attack: The Cyber Attacks 2020 Landscape

News & OpinionsBy Michal BauernfreundDecember 17, 2020

2020 has been a busy year for cybersecurity around the world with hacks, ransomware attacks, and data breaches making the news on a regular basis. According to analysts there were double the number of cyber attacks in 2020 than in 2019. Some of this increase follows trends from previous years, but it also appears as…

US Treasury Cyber Attack Puts Suppliers in the Spotlight

US Treasury Cyber Attack Puts Suppliers in the Spotlight

News & OpinionsBy Michal BauernfreundDecember 15, 2020

The US Treasury cyber attack is yet another example that absolutely anyone can be the victim of a cyber attack, and another warning that cyber attackers are becoming ever more sophisticated. This time, it was a sophisticated supply chain attack that allowed the US Treasury, and at least one other US government department or agency…

FireEye Cyber Attack: It Takes a Nation State Actor to Get a Good Cybersecurity Company Down

FireEye Cyber Attack: It Takes a Nation State Actor to Get a Good Cybersecurity Company Down

News & OpinionsBy Michal BauernfreundDecember 10, 2020

As cyber security professionals, we constantly remind the people around us that it’s not if a cyber attack will happen, it’s when a cyber attack will take place. No organisation is exempt from at least an attempt to hack them, and the FireEye cyber attack, on one of the world’s leading cybersecurity firms is no…

The Top 10 Cyber Security Mistakes Your CISO Wants You To Avoid

The Top 10 Cyber Security Mistakes Your CISO Wants You To Avoid

News & OpinionsBy Michal BauernfreundNovember 30, 2020

Cyber security mistakes made by individuals are the most common cause of cybersecurity breaches. Learn how to avoid making these mistakes and protect your networks

←123456…
7
8→

Cynance is a division of Transputec Ltd, with over 30 years of experience in IT consulting and services.

© 2022 Cynance. All rights reserved.

Services

  • Application Security
  • Infrastructure Security
  • Offensive Security
  • Security Risk and Compliance
  • Application Security
  • Infrastructure Security
  • Offensive Security
  • Security Risk and Compliance

Location & Contact Details

  • UK Head Office:
    Eton Ave, London NW3 3EU
  • contact@cynance.co
  • Privacy Policy
  • Cookie Policy

Stay Connected

Twitter Linkedin-in
Crest
Go to Top
By clicking ACCEPT ALL below you give us your consent for all cookies, ensuring you always experience the best website personalisation. Click ACCEPT NECESSARY COOKIES ONLY below to reject all cookies except Necessary Cookies. You can always modify your preference by clicking the COOKIE SETTINGS button and for more information please view our Cookie Policy.
ACCEPT ALL ACCEPT NECESSARY COOKIES ONLY COOKIE SETTINGS
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.

Grey sliders indicate cookies are inactive, Green sliders indicate cookies are active.

We value your privacy! You can provide consent of how your personal data is used by us through the cookie preference settings below, which can be changed at any time by visiting our "Cookie Settings".

Read more about our Cookie Policy and Privacy Policy.
Necessary Cookies
Always Enabled
These cookies are absolutely essential to provide proper functionality for our site and can’t be deactivated here. They will normally be set based on your use of our site for specific actions including: Setting your privacy preferences, login, form completion, adding products to a basket etc. Alternatively, they may be set as part of our fraud prevention and/or website security measures. These cookies can only be disabled by changing your browser preferences to warn you about or block these cookies, but in this case our site, or parts of it will not work.
Cookie Duration Description
_GRECAPTCHA 5 months 27 days This cookie is set by Google. In addition to certain standard Google cookies, reCAPTCHA sets a necessary cookie (_GRECAPTCHA) when executed for the purpose of providing its risk analysis.
cookielawinfo-checkbox-advertisement 1 year The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Advertisement".
cookielawinfo-checkbox-analytics 11 months This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional 11 months The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary 11 months This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others 11 months This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance 11 months This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
elementor never This cookie is used by the website's WordPress theme. It allows the website owner to implement or change the website's content in real-time.
viewed_cookie_policy 11 months The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Analytics Cookies
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Cookie Duration Description
_ga 2 years This cookie is installed by Google Analytics. The cookie is used to calculate visitor, session, campaign data and keep track of site usage for the site's analytics report. The cookies store information anonymously and assign a randomly generated number to identify unique visitors.
_gat_UA-176747747-1 1 minute This is a pattern type cookie set by Google Analytics, where the pattern element on the name contains the unique identity number of the account or website it relates to. It appears to be a variation of the _gat cookie which is used to limit the amount of data recorded by Google on high traffic volume websites.
_gid 1 day This cookie is installed by Google Analytics. The cookie is used to store information of how visitors use a website and helps in creating an analytics report of how the website is doing. The data collected including the number visitors, the source where they have come from, and the pages visted in an anonymous form.
CONSENT 16 years 5 months These cookies are set via embedded youtube-videos. They register anonymous statistical data on for example how many times the video is displayed and what settings are used for playback.No sensitive data is collected unless you log in to your google account, in that case your choices are linked with your account, for example if you click “like” on a video.
Advertisement Cookies
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customised ads.
Cookie Duration Description
IDE 1 year 24 days Used by Google DoubleClick and stores information about how the user uses the website and any other advertisement before visiting the website. This is used to present users with ads that are relevant to them according to the user profile.
test_cookie 15 minutes This cookie is set by doubleclick.net. The purpose of the cookie is to determine if the user's browser supports cookies.
VISITOR_INFO1_LIVE 5 months 27 days This cookie is set by Youtube. Used to track the information of the embedded YouTube videos on a website.
YSC session This cookies is set by Youtube and is used to track the views of embedded videos.
Save & Accept
Powered by CookieYes Logo