Monday , 23 April 2018


With less than 50 days to the General Data Protection Regulation (GDPR) deadline, are you ready for the change?

Mike McEwan, UK CEO,

It is virtually impossible to open a magazine or newspaper recently without reading something about GDPR but with little over a month until the introduction of the regulation on 25th May 2018, it seems few British people and businesses are prepared for its implications. Despite the new regulations being announced two years ago, there still appears to be a great ... Read More »

Six Steps to Secure Cryptographic Keys

Corey O'Connor, Product Manager,

Cryptocurrency seems to bring out the best effort from cyber criminals. From nation states to traditional attackers, the rise in crypto-related attacks is staggering. The motivation is obvious: it’s financially driven. Despite the recent drop, cryptocurrency values have skyrocketed over the past couple of years incentivising attackers to create malicious code and sophisticated hacking tools to harvest cryptocurrency coins. One ... Read More »

Please Do Not Feed the Phish

Adam Vincent, CEO,

Adam Vincent, CEO, ThreatConnect We’ve all heard the phishing attack stories that start with someone receiving an email that requests an urgent invoice review or password change and ends with a data breach where personal information is compromised, and money is lost. Although many of us may roll our eyes at the possibility of falling for such an obvious scam, ... Read More »

The Flu and DDoS, From an Epidemic to a Solution

Michael Schachter, Senior Product Manager,
Allot Communications

While the mobile industry was busy celebrating telecom innovation at MWC18, another kind of innovation was making headlines: a record 1.35 Tbps DDoS attack. It caused some disruption and highlighted the potential for much worse. In this instance, the attack was detected and mitigated relatively quickly—but it required manual intervention and rerouting of traffic. Fortunately, service was only disrupted for ... Read More »

Mining for Trouble: Cryptocurrency and Cyber Security

Suid Adeyanju, Managing Director,

Cryptocurrency is not a new presence in the world of cyber security. For years cryptocurrencies have been the ransom of choice for hackers looking to make money from cyber attacks. However, over the last six months, we have seen a new strategy from hackers: crypto mining malware. This new motive for hackers has risen in prominence significantly with a 27% ... Read More »

RAT Gone Rogue: Meet ARS VBS Loader

Paul Burbage Researcher,

Malicious VBScript has long been a fixture of spam and phishing campaigns, but until recently its functionality has been limited to downloading malware from an attacker-controlled server and executing it on a compromised computer.   Researchers at Flashpoint have seen and analysed a unique departure from this norm in ARS VBS Loader, a spin-off of a popular downloader called SafeLoader ... Read More »

Data visibility: the antidote to Snake-bites

Matthias Maier,

By Matthias Maier, Security Evangelist, Splunk It’s usually wrong to judge people by their names, but an organisation that calls itself “Snake” probably isn’t up to much good. Citing unidentified security sources, DPA reported that Snake is the group suspected of carrying out a sophisticated and successful attack on the government’s computer network. As always, it’s difficult to be completely certain who ... Read More »

CISO Chat – David Damato, Chief Security Officer at Tanium

David Damato, Chief Security Officer,

Ever wondered what the role of a Chief Information Security Officer (CISO) encompasses? To put it simply, they are the guardians and protectors of everything information security related to a business. However, the tasks are far from simple as their teams work around the clock to respond to incidences that directly affect the safety of the company and its data. ... Read More »

Suppressing the Adversary via Threat Hunt Teams

Tom Kellermann, Chief Cybersecurity Officer,
Carbon Black

As the Chief Cybersecurity Officer for Carbon Black, I am witnessing a brave new world in cyberspace. Global cyber insurgencies continue unabated with reports of wide-scale data breaches and politico-hacking happening quickly and often. Personal data and financial information is regularly being hijacked. The energy sector is increasingly vulnerable to risk, with the recent cyberattack on the Energy Services Group ... Read More »

Indecent exposure: could Wi-Fi be your weakest link?

Greig Schofield, Technical Manager,

Imagine you’d spent a fortune making your home physically secure, only to discover you’d been quietly robbed by thieves who never set foot on your property. You thought you’d built a fortress, but didn’t notice the gap in the fence that left you wide open to intruders. It’s every homeowner’s worst nightmare. But it’s also a real-world metaphor for many ... Read More »