Cyber Security

Cyber-Security Predictions for 2018

My 2017 in cyber; 12 months in detection and response, and predictions for 2018. Supply Chain Attacks The big trend of 2017 was supply chain attacks. Your attack surface extends out beyond your firewall, and compromising your key suppliers, partners, even customers represents a trusted route straight into your organisation and we saw exponential growth …

Cyber Security

APT1 – What Happened Next?

This is a story of global geopolitics, economics, and of nation-state sponsored cyber-attacks where the targets – then world leading firms – went out of business faster than the average tenure of a CEO. This is the story of APT1, three years on. Who were APT1? For those unfamiliar, APT1 (Advanced Persistent Threat) were a …

Cyber Security

Why the Security Industry Needs to Let Go of GDPR

The cyber security industry has always been a hotbed of misinformation and falsehoods and it’s time to lift the lid on another of these – the incoming GDPR data protection legislation, coming into force in May 2018. As an industry we have been selective to the point of deceit with referencing GDPR, clamouring ‘if you …

Cyber Security

Cyber Security in Plain English

It’s no secret that the infosecurity industry has a love affair with acronyms. EDR, MSSP, IDS, SIEM, AV – these are our ‘solution’ acronyms, with CNA and CNE our advanced attack ‘problem to be solved.’ But what exactly do they all mean? Is it time to decipher the acronyms and eliminate Geek Speak so everyone …

Cyber Security

Cyber skills, threat and compliance issues for UK post-Brexit

However hard you try to hide from it, someone with their own set of agendas is already trying to influence your vote ahead of the June 23 polling day. The Prime Minister and the Leader of the Opposition are both in the Remain camp, but are adamant that they profoundly disagree with each other, as …

Cyber Security

How to Find a Super Hacker

It doesn’t matter how careful they are, ‘Super Hackers’ will leave a trace of their activities. Windows event logs, DNS logs and DHCP logs – sources not normally analysed from an attack detection perspective, all hold clues to the clandestine presence of these invaders. This is a view confirmed by Anton Chuvakin, vice president at …