Security
- Security
Business-Driven Information Security – part 2
Why Security Architecture requires a holistic approach As I said last time, when considering security architecture, many people make the mistake of believing that building security into information systems…
Read More
- Security
Business-Driven Information Security – Part 1
Why you should consider the overall risk – and every permutation of that risk – when developing your security architecture Imagine the following conversation. Customer: “We are launching a new…
Read More
- Security
Is end-of-life infrastructure leaving you vulnerable to security breaches?
A recent report by the UK’s Financial Conduct Authority (FCA) paints a damning picture of financial services firms’ security and availability. In particular, the FCA calls out the risk…
Read More
- Security
Black Friday and Cyber Monday 2018: tips to stay safe as cyber criminals look to cash-in
The amount of people prepared to brave the antics of the fellow general public by going into an actual shop over the Black Friday weekend, is getting less and less…
Read More
- Security
Why is Cyber Security Everyone’s Responsibility?
This week marks the launch of European Cyber Security Awareness Month (ECSAM), a campaign we’re incredibly supportive of, since it helps to raise awareness of cyber security…
Read More
- Security
Three technologies that are set to change the cyber security industry
3 technologies that once sounded more at home in a fictional sci fi setting than in everyday business: Artificial Intelligence, Machine Learning and Automation. And yet according to a recent…
Read More
- Security
How cyber criminals are targeting your staff
We often hear that ‘humans’ are the weakest link when it comes to Security. Whilst that may be true, it can be a little harsh to label us as such, when…
Read More
- Security
Seeing is safeguarding: why network visibility is crucial to protecting yourself from cyber-attack
There’s a famous phrase that out of sight is out of mind. When it comes to cybersecurity, this has never been more true. If you can’t see a malware or…
Read More
- Security
Demystifying SD-WAN Security
Cisco’s distinguished Engineers, Dave Carrel and Brian Weis, recently released an IETF draft RFC titled ‘IPsec Key Exchange using a Controller‘. Here’s my attempt at translating the high level…
Read More
- Security
Podcast: We hit Infosec 2018!
In this episode of the @CiscoUKI #podcast Mark Jackson @m_jacks76, Joachim Mason @yoksmason and I are reviewing Info Sec. We had a roving reporter who interviewed Bret Hartman VP &…
Read More