Standard

The infosec blindspot

A recent report by Forrester spotlighted a growing trend in infosec point solution purchasing: the majority of respondents dealt with the challenge of point-tool sprawl. Cyber-Security: Not just a  bolt-on In fact, 60% of survey respondents said that their tools come from five or more vendors, which creates an integration and accessibility bottleneck. What’s worse, the complexity of the threats that SecOps must deal with have also intensified. A recent survey conducted by McAfee shows that in 2005, “enterprises typically saw 25 new threats […]

Continue reading
Vulnerability Assessment

Hacked off by BA

Here’s everything you need to have a whale of a time at someone else’s expense: name, address, credit card number, card expiration date, three letter security code. The sophisticated and malicious hackers that targeted British Airways were able to get their hands on all those details, intercepting 380,000 transactions in total. They also picked up customers’ email addresses. Bonus! The BA Security Breach: What are the facts? They did not get their passport details or itinerary information. But that’s really not going to come as […]

Continue reading

IOT: The Internet of Things

Take the time to learn about your assets. You’ll be able to layer in multiple prevention and detection solutions and have a highly effective security architecture. Security Architecture: Building a line of defence The Internet is constantly growing, giving birth to an age of network interconnection unlike anything we have ever known. Devices such as refrigerators, security cameras, and baby dolls have joined the ranks of Internet of Things (IOT) devices. These devices are made to be cheap and indispensable, […]

Continue reading

University of cyber-attacks

A security analysis of cyber-attacks against universities and colleges in the UK has discovered staff or students could often be responsible, rather than organised crime or hacking groups. A government-funded agency that provides cyber-security has examined the timing of 850 attacks in 2017-18. Organised crime or bored students? Jisc found a “clear pattern” of attacks being concentrated during term times and during the working day. When the holidays begin, “the number of attacks decreases dramatically”. The analysis of cyber-attacks on […]

Continue reading