Infosecurity Blogs
Betrayed By Your Biggest Fan
Fansmitter malware is designed to acoustically exfiltrate sensitive information across air-gapped system.
Millennials and Their Impact on Security
While it's brilliant that millennials are digital natives and as such insanely clever about technology, this is juxtaposed with a blatant disregard for the security of that technology.
Inside Threats, Compound Solutions
Organizations must update and enforce technological policies that include usage logging and tightly controlling those who have elevated “admin rights”. In many cases, this is all easier said than done, so outsourcing to specialists is often the smarter path to take. Even if you are Jack Bauer.
Breaches Mean Fraud Spikes - So Be Aware
The last few years have been particularly eventful, and 2015 will be remembered for many momentous milestones. For those of us involved in security and fighting fraud online, we will remember it as a big year for major data breaches.
A Day in the Life of an IT Pro: Back to basics
With the basics in place we can at the very least start the war with the right security strategy.
Why EU Data Protection Will Still Apply to Post-Brexit UK
For commercial, legal and moral reasons the EU GDPR, or something that mimics it, will apply in the UK following Brexit.
Come Spy with Me: Drones and Info-Sec
As drone use increases, new challenges are emerging with regard to privacy and information security.
Repetition is (The) Key
Education and awareness will go a long way in protecting your business against many types of cybercrime. But creating a risk-conscious workplace is easier said than done. Of course, the first step in making your staff aware of possible threats is training. But how much of this training do you remember months or even years later?
Working With Giants – 25 Years of IT Security
Symantec's June 2016 announcement that it intends to buy Blue Coat mirrors Trend Micro's acquisition of Tipping Point in 2015. Both moves underline that there is an appetite for integrated offerings from the broad play security giants.
Getting Serious About Thwarting Cyber-Criminals
The theory behind protecting company sensitive information from attackers has not changed much in close to two decades, yet a shocking number of organizations still deploy inadequate defences.
Why Sharing, Not Secrecy, Can be Better for Security
GDPR requires organizations to document publicly the fact that they have experienced a breach and the extent of it, at the time it occurred.
UK's Most Innovative Small Cyber Security Company Named at #Infosec16
It is great to see new companies entering the industry and after covering the Innovation Sandbox at RSA Conference earlier this year, I was very interested to see Infosecurity Europe follow suit with a session “UK's Most Innovative Small Cyber Security Company of the Year: Competition Final”.
Fixing the UK’s Ransomware Problem
Prevention is always better than cure, but the state of the UK’s businesses when it comes to shoring up user security is shockingly poor, which is extremely worrying when the threat is growing.
Ten Compelling Reasons to Improve Security when Harnessing the Power of Desktop Virtualization
10 tips to help you assert control over enterprise mobility while ensuring compliance and security.
Nine Steps to The GDPR
Here are some the steps organizations can take to stay ahead of the reforms taking effect in 2018.
Persuading Employees They Are Your Organization’s First Line of Defence
What is less well known is how to turn employees into a company’s strongest line of defense.
Traditional Security Tools Fail Against Modern-Day Threats
What can companies do to implement a holistic security infrastructure that defends against evolving, modern-day threats?
The Nature of Camouflage
PowerShell is an example of a native tool that can be utilized to infiltrate a company.
First the IP Bill, Then What?
It seems that with regrettable flippancy, the Investigatory Powers Bill will be passed later this year.
Threat Intelligence - The Answer to Threats or Another Fad?
The threat landscape has been dynamic and ever changing, and the growth and rapid advancement in cyber-attacks against enterprises and individuals have rendered traditional cyber-security measures virtually obsolete.