Incident
The Incident Command Framework – Why effective incident response requires leadership, not just tooling
Security incidents no longer unfold neatly, but sprawl across identity platforms, cloud infrastructure, endpoints, SaaS applications, legal obligations and executive decision making often at the same time. The Singularity observes…
Read moreJapan Airlines Recovers from Cyberattack-Induced Holiday Flight Disruptions
For any airline, peak travel periods present both operational challenges and high stakes. In a sudden turn of events, Japan Airlines (JAL) recently fell victim to a cyberattack that affected…
Read moreFAQ – What Is The Lifecycle Of A Ransomware Incident?
It is important to understand the various stages of a ransomware attack. This is key to knowing how one can defend against them. In this Netsurion video it shows us…
Read moreFAQ – What Is An Effective Defence Against Ransomware Attacks?
Sadly there is no one size fits all solution that will protect you against ransomware attacks. Using a proactive and layered approach to security will limit the chance of a…
Read moreFAQ – Who Carries Out Ransomware Attacks?
Ransomware attacks are carried out by threat actors. They used to be classified into two types of threat actors - Criminal Gang - State Sponsored Group There is now a…
Read moreFAQ – What Policies Are Used When Responding To Ransomware?
There are various frames of thought when it comes to responding to a ransomware attack. One approach is to refuse to pay the ransom, whereas others might be up for…
Read moreFAQ – How Is Ransomware Categorized?
There are a plethora of ransomware packages available for those that have malicious intent as well as those that want to search for them. Ransomware can be mainly broken down…
Read more





