Our Services

Managed Services

Performanta Services is characterised by a history of demonstrable successful implementations and optimised solutions across 5 Continents with a reach of over 1.2 million users.

Technologies

Performanta Technologies invests in cutting-edge IT security technology to give our customers the edge in understanding the threats encountered across their security landscape.

Consulting

Today’s Information Security Officer is required to simultaneously address a multitude of requirements, from regulatory compliance to risk operations, with everything in between.

Our Partners

crytstal-ball

Five Security Predictions for 2015: Bolder Threats Leading to Bolder Security Teams

Tags : 

No one is safe from getting hacked. This has been no more evident than in 2014 where we have seen some of the biggest high-end data breaches of large companies ever seen to date. Data, personal records and financial information has been stolen and sold on the black market in a matter of days. eBay, Target and more recently Sony … Read the rest

Read More
Break the Chain

Threat Level ‘DNA Immunity’: Mapping and Prioritising Controls through Threat Modelling

Tags : 

Everyone is at risk of being hacked, in fact, the last few years have seen some of the biggest high-end data breaches of large companies to date. The trend signifies a large increase in attacks from ‘trusted insiders’ or threat actors, aided by the increased availability of underground offensive security technology. Malicious actors can now utilise attack toolkits of sorts … Read the rest

Read More
Brexit

The cyber-security industry in the UK post Brexit

Tags : 

Today’s cyber-security landscape

The cyber-security challenge within the UK is dual-faceted – not only are the amount of attacks increasing, we are also facing a cyber skills shortage where the time to hire new employees is regularly upwards of 6 months and in many cases a potential employee with the required skills doesn’t exist to hire. The 2015 Global Cybersecurity Read the rest

Read More
games_of_chess

Blind defence – why we’re losing the cyber security war

Tags : 

Whether you’re the chief information security office (CISO) of a major corporation managing security technologies or leading a security team, you’re most likely very familiar with the objectives of your role. Protecting the company’s assets and ensuring its productivity. You are the wall that stands between the organisation and the adversary, whether it’s protecting from an external attacker that attempts … Read the rest

Read More
Volatility

Worm outbreak case study: Incident response in the business with Volatility

Tags : 

A few days ago, our team had to respond to a worm outbreak in one of our customer sites. The threat name was Sality which is a well known worm that started propagating back in 2003. The Sality worm spreads by infecting legitimate executable files and copying itself to a different location on the local system and on network shares. … Read the rest

Read More
EU Cyber Security

The current wave of data protection regulations and how it will affect the infosec industry

Tags : 

Originally posted by Help Net Security

In 2016, the EU is set to review the next draft of The Network and Information Security (NIS) ‘cybersecurity’ directive which will bring new compliance requirements into place, not just for EU companies but all companies who deal with EU consumer data. This is echoed in the UK, where the government has rated cyber … Read the rest

Read More
cyber security skills

The urgent need for cyber security talent in the UK

Tags : 

Last year, the Government’s Security Breaches Survey found that 81 per cent of large companies had reported some form of security breach, costing each organisation on average between £600,000 and £1.5 million.

The reality is that the number of cyber security threats is continuously on the rise. The increase in basic and complex attacks on businesses is driven, in part, … Read the rest

Read More