Blog — Awen by Sapphire

We're delighted to announce the acquisition of Awen by Sapphire

Click here to see the full press release on the Sapphire website & stay tuned for more exciting announcements!

Guest User

AICS 2022 - Bahrain

After receiving an unexpected invite from the Bahraini Government to attend this prestigious event, we at Awen were honoured to accept, and we attended alongside other notable cyber security companies within the UK community in collaboration with the UK Department of International Trade. 

OT in Your Food and Drink? It's More Likely Than You Think

Annually the American Centre for Disease Control and Prevention (CDC) reports a sixth of Americans suffer from food borne illnesses, causing 3000 deaths a year. To reduce the number of incidents, the US established legislation to limit risk by setting standard methodology in production. The legislation requires the provision of well maintained records throughout the manufacturing process, allowing traceability of a product’s manufacture from farm to table, identifying areas of concern and informing decisions when mitigating problem areas. Similarly, the EU produced the General Food Law Regulation in 2002, requiring standards met with upkeeping records of food they supplied and received. Digitalisation aids these obligations by recording product data and increases productivity by automating processes of highly specialised manufacturing.

NIS2 - What it is and Why You Should Care

In May, the European Council and Parliament agreed upon a new Network & Information Systems (NIS) Directive establishing measures to create a high and unified level of cybersecurity across the EU. The initial proposal by the Commission came in December 2020 as a response to the growing rate of digitalisation and cyberattacks on critical infrastructure. However, flaws began emerging with the original 2016 NIS Directive. Many newly digitised sectors are now susceptible to cyber attacks, so require coverage in the directive’s scope. Also, the quality in governance and incident responding vary across EU industries, with many standards not being met.

Petya or NotPetya, That is the Question

On the 27th June 2017 a wide scale cyber attack Occurred. Encrypting devices throughout 80 companies to a point beyond repair, the White House estimated the attack resulted in $10 billion worth of damages worldwide. 80% of computers infected belonged to Ukrainian organisations, their partnering companies or organisations with offices networked there.The malware spread through M.E.Doc, accounting software used heavily across Ukraine. Cyber experts noted that although being more severe and widespread, the attacks shared code with previously identified piece of malware Petya, prompting them to name this new piece “NotPetya”

Wannacry - 5 Years Later

On the 12th of May 2017 a global malware attack was identified. Targeting Windows computers all over the world, it would encrypt a user’s data and demand a ransom payment in Bitcoin. Wannacry, as the malware became known, was one of the worst recorded cyber attacks on record. Within a day the ransomware was reported to have infected over 230 thousand computers in over 150 countries…