How RedShield helps you manage vulnerabilities and comply with the California Consumer Privacy Act (CCPA), 2018

How RedShield helps you manage vulnerabilities and comply with the California Consumer Privacy Act (CCPA), 2018The California Consumer Privacy Act (CCPA) came into effect in January 2020, and as of 1 July 2020, enforcement has begun against businesses that violate the...

Urgent Action Needed to Protect E-Commerce Sites From E-Skimming Attacks Targeting Magento Vulnerabilities

Urgent Action Needed to Protect E-Commerce Sites From E-Skimming Attacks Targeting Magento VulnerabilitiesAs at 30 June 2020, Magento is no longer providing support for security software updates and security patches for its popular Commerce 1 and Open Source CMS...

Shielding the Remote Execution of Code on NetWeaver (RECON) Vulnerability

Shielding the Remote Execution of Code On NetWeaver (RECON) VulnerabilityOrganisations with unpatched SAP systems are currently at high risk for attacks exploiting the Remote Execution of Code On NetWeaver (RECON) Vulnerability.RedShield has developed custom shield...

Recent Australia Cyber Attacks | RedShield’s Unique Solution

Following recent warnings from the Australian Prime Minister about sophisticated cyber attacks being targeted at Australia by 'state actors', we wanted to share information on RedShield's unique capabilities as a solution to the current threats. The Australian Cyber...

RedShield appoints Senior Verizon Cyber Security VP as Chief Revenue Officer in U.S. Push

RedShield, specialists in web application shielding, has announced the appointment of global cyber security leader, James Carrigan Jr. as Chief Revenue Officer (CRO), responsible for sales globally.

Your AI WAF is leaving you 100% vulnerable…

Your AI WAF is leaving you 100% vulnerable...I love technology. I’m the biggest sucker for buying new gadgets with flashing lights. So, as you can imagine (and despite the obvious privacy concerns) I absolutely love my AI driven (well, somewhat AI driven) Google Home...

Cryptojacking – Browser cryptocurrency mining

Cryptojacking – Browser cryptocurrency miningI’m going to start by saying I really should have one of those T-shirts; “Yes I work in IT, but NO I won’t fix your computer”. I’m sure you can all relate to being at a family function until someone can’t help but ask “I’ve...

Into the cyber-way fray: RedShield

Into the cyber-way fray: RedShieldSAAS with a twist helps RedShield stand out in a tough global market niche. Concentrate talked to Founder and CEO Andy Prow of RedShield, the company that won both the best product and best service categories at the 2017 New Zealand...

WannaPatch?

WannaPatch?WannaCry, the biggest cybersecurity news story so far in 2017, raised a number of interesting questions in respect of industry ethics and security best practices specifically relating to: Whether governments should attempt to stockpile vulnerabilities for...

Why you need Human Penetration Testers

Why you need Human Penetration TestersI’ve spent 15 years performing penetration testing for governments and corporates around the world. It’s an essential tool for determining your exposure, allowing you to get as close as possible to simulating a real-life attack,...

Our blog