+44 (0)20 7877 0060 contact@2-sec.com
Select Page

Archive

On March 7th, WikiLeaks published a catalogue of documents containing details of secret hacking tools used by the CIA. They called this information “Vault 7” and have promised the leak is just a small part of a much bigger cache of data, which they will release shortly. The documents date from 2013 to 2016 and […]

Stage 4: Detect

Stage 4: Detect

HOW DO I DETECT ATTACKS ON MY BUSINESS? Organisations need to have confidence that on a day-to-day basis, their business is well protected. Detecting a breach as soon as it happens is key to minimising the impact of an attack and recovering in optimal time. However,...