Infosecurity Opinions
Changing the Rules of the Game
Maybe the common defensive approach is not good enough; maybe it is time for more defenders to step-up their game and introduce “game” changing rules?
The Exponential Growth of DDoS Attacks
What we are seeing here is a trend in which the power of DDoS attacks is going in a general upwards direction.
Blocking Slings, Arrows & Rogue IPs: Securing Networks the Medieval Way
When it comes to protecting critical assets, not much has changed since medieval times: keep out the known bad guys, be suspicious of those you don’t know, and make it easy to identify those you do trust.
Defence in Breadth
Exploring the security imperative for today’s complex networks and the need to look at breadth, as well as depth.
How Do You Really Know if Your Software Security Measures Up?
Organisations are trying to determine where to start, how to construct a viable initiative, and what resources they will require.
How Can You Fend Off a Nation?
While many cyber-attacks are crude in their design and sloppy in their deployment, state sponsored attacks can sometimes exude sophistication.
Liability Can Change Attitudes to Corporate Cybersecurity
As Britain marks 50 years since the first seatbelt law was introduced this month, we celebrate how driver liability changed norms and saved thousands of lives.
‘Dark DDoS’ – a growing cyber security threat for 2016
A ‘Dark DDoS’ acts as a smokescreen to distract IT teams from the real breach that’s taking place.
Let’s Get Physical: Securing Data in Connected Homes, Cars & Everywhere Else
When you look at connected household products like smart refrigerators and thermostats, they have a much longer lifecycle than the average period of time a person stays in one residence. That’s why protecting the enormous amounts of data transmitted through digital devices to these gadgets is vital.
The Burst of the EMV Bubble
Despite stronger measures coming in, there are still breaches, skimming and fraud, and in fact, they are just as bad as they have ever been.
Passivity may risk Security and Reliability of your Active Directory
Top tips on turning an Active Directory implementation into a dream scenario.
Protecting Corporate Data without Compromising on Experience
The biggest challenge in this new age of data flow is to ensure corporate data remains secure, without restricting access to the hardware and software that employees want to use.
Changing the Security Team’s Focus from Malware to the Credentials that Enable It
Once an attacker has access to a good set of credentials, its game, set and match.
Victims or Villains: Intelligent Incident Response Can Save the Day
Data breaches are happening with greater frequency, and are compromising larger volumes of data, than ever before and response is now key.
Longest Serving Member of the Team? Your Work Email Account
When an employee leaves, their work email survives. What measures are you putting into place to make sure that filtering is done.
2016 – The Year of the Cyber Exploit
After breaches in 2015, 2016 will be considered the ‘year of the exploit’ as we will see a shift to higher impact cybercrime.
The Cybersecurity Domino Effect
The interlinked economy could be the biggest problem in security, and provide the weakest link.
Shedding Light on the Dark Web
The Government is to set up a task force to police the dark web.
Is the Cyber Security Skills Gap Putting You in Danger?
Cyber attacks have the potential to disrupt governments, destroy businesses, and put our personal safety in jeopardy. Yet this critical sector of the technology world suffers from a severe deficit of skilled workers to fill its jobs.
At Heart, We Are All Hacktivists
Do ethics exist online, and whose determination is it on what is good and bad?