Articles
-
Security
Mind the gap
This readiness gap is a source of alarm. Clearly, there are organisations aware of the danger, yet without the defences to protect themselves. However, the gap will include a spectrum
Read More -
Security
Lost & Fined: Lost data is fuelling more ICO fines than ransomware
Since the pandemic our use of computers has changed radically. Hybrid working practices are here to stay. Employees are now working from the office, from home and everywhere in between.
Read More -
Security
Rapid Development Requires Trust in the Supply Chain
Preventing supply chain attacks is difficult. In this blog Martin Lee shares how Cisco Talos can make the challenge easier:
Read More -
Security
Ransomware spreading like a Bad Rabbit
Bad guys do not get any dumber. Criminals take notice and learn from the successes and failures of cyber attacks. The lessons learnt from previous cyber attacks are integrated into
Read More -
Security
Spoofed Emails and DNS Messenger: Details on the cyber attack
Attackers are constantly seeking to develop new techniques to deliver malware to their intended victims and persist undetected within networks. Cisco Talos has recently uncovered an attack spoofing the US
Read More -
Security
Protecting Against Supply Chain Attacks.
Supply chain attacks present a tempting opportunity for threat actors to introduce malicious software into organisations. Compromising the software update mechanisms of otherwise legitimate software packages allows threat actors to
Read More -
Digital Transformation
Building a future-proof IoT
The Internet of Things (IoT) is one of the most exciting things happening in technology. The convergence of improvements in chip production and the provision of mobile internet connectivity mean
Read More -
Security
Living in an Insecure World
The discovery of the Shellshock bug (CVE-2014-6271) in the commonly deployed Bash shell means that attackers can potentially execute code on an affected machine. This comes…
Read More -
Security
Plugging the leaks – photos and data breaches
The recent unauthorized release of private celebrity photos should serve as a wake-up call to every executive. Not because attackers are likely to release personal photos, but because every individual
Read More -
Security
Summary: Three rising threats
Breaching defences to steal assets is as old as humanity. Whether it’s climbing a wall, delivering a wooden horse full of soldiers, or sending sophisticated malware, any attacker’s goal is
Read More