DTX Manchester DTX Manchester

Insight

Why test data does not need to be protected

The title of this article might seem contradictory, but it is not as conflicting as you might think. Sure, we all know that the General Data Protection Regulation (GDPR) prescribes us to protect personal data, wherever it may be. Production, development, testing, QA, training environments – data is stored everywhere. Most people assume that all of this data needs protection at all times, but actually that is not the case. Test data, for example, doesn’t...

Read more
Internet freedom in Asian countries: an analysis

Asia is a controversial region when it comes to civil liberties, in general, and Internet freedom, in particular. Even in countries like Japan and Singapore, which boast a high level of technological progress and mind-boggling Internet penetration rates, the web is an increasingly regulated environment. Residents of some Asian countries can be subject to severe penalties, including criminal prosecution, for expressing their views on social media and personal blogs. The same goes for news sites....

Read more
code

New research by Zscaler, analyzing 6.6 billion security threats, has discovered a 260% increase in attacks during the first nine months of 2020. Among the encrypted attacks was an increase of the amount of ransomware by 500%, with the most prominent variants being FileCrypt/FileCoder, followed by Sodinokibi, Maze and Ryuk. Here's what security experts had to say about these findings: Oleg Kolesnikov, VP of Threat Research at Securonix "Having more visibility into the SSL/TLS traffic definitely...

Read more
cybereason logo

One of the greatest truths in cybersecurity is that defenders need to be right all the time, while cybercriminals only need to be right once. Attacks are increasingly sophisticated and ramified, simultaneously targeting a range of potential entry points with multiple tactics, techniques and procedures. One the other hand, security professionals are faced with a widening attack surface to monitor, each asset with its own specific tool, generating its own stream of alerts and notifications....

Read more
AI, ML, or just automation?

We all experience artificial intelligence (AI) and machine learning (ML) every day, whether through search engines, voice-controlled devices or simply taking a photograph on a smartphone. For certain areas of industry that rely on big data analysis, both are already proving their value, identifying patterns in data, or relationships between seemingly unrelated information and then defining algorithms that can automate decision making processes. In cybersecurity too, there are clearly some solutions that meet the accepted...

Read more
Magecart and the Inter Skimmer threat

As the global pandemic has shifted life into the online space, cybercriminal groups have keenly exploited the digitisation of society’s interactions over the lockdown period. One particularly notorious group that security teams should be aware of is Magecart, a shadowy criminal syndicate responsible for many of the recent high-profile credit card skimming attacks. Who is Magecart? Magecart – whose name is derived from a portmanteau of Magento and shopping cart – is an online criminal...

Read more
Positive action in cybersecurity: altruism, transparency and community

Working with the largest organisations in government, finance and critical national infrastructure, we see good and bad every day. In a confusing hybrid war where APT groups launch attacks that could potentially turn out the lights, it is hard to remain impartial. The fact that a political act of devastation manifests as an innocuous looking line of code viewed over a cup of tea does nothing to detract from its destructive and vicious intent. For...

Read more
SMEs can be the weak link in the cyber-security  chain – and we should help them

Small businesses are now on the front line in the fight against cyber crime. The vital position many SMEs have in supply chains means cybersecurity professionals should be doing everything to support small business leaders - for the benefit of everyone.   The number of UK businesses succumbing to cyber attacks has doubled in the last five years.   Around 1.5 million (or a quarter of all UK businesses) fell victim in 2019. This was...

Read more
Learn to Combat These Three Cybersecurity Monsters This Halloween and Beyond

It’s that time of year again. The air feels a bit crisper; the days are a bit shorter; and children around the world prepare to go trick or treating. Even as an adult, Halloween is probably my favourite holiday. I love seeing and thinking about monsters and things that lurk in the shadows… maybe – just maybe – that’s what drew me to a career in cybersecurity. As we ponder the horrors of the night,...

Read more
Alex Mosher

It seemed like such a good idea at the time, but Masahiro Hara has regrets. He's the engineer responsible for the quick response (QR) code - that square block of pixels that now adorns everything from restaurant tables to subway posters. The problem? They're just not secure enough. "Now that it's used for payments, I feel a sense of responsibility to make it more secure," said Hara last year. Like many technologies, the QR code expanded beyond...

Read more
Page 1 of 5 1 2 5