Opinions & Analysis

AppSec

Patrick Carey, Director of Product Marketing at Synopsys In the 2020 Verizon Data Breach Investigations Report (DBIR), it was found that 43% of data breaches are linked to application vulnerabilities; a number that has more than doubled in comparison to the year prior. Considering recent events, including the COVID-19 outbreak and the Black Lives Matter movement, this situation will likely deteriorate as cybercriminals are quick to take advantage of heightened emotions to further their own...

Read more
Tweet chat

In our first-ever IT Security Guru Tweet Chat, we were joined by Javvad Malik, Dr. Jessica Barker, Mo Amin, Ed Tucker and Lisa Forte as they debated the human factor in security. These leading figures from within the cybersecurity community, whom have a wealth of experience and are best placed to talk about the importance of the human element, are deeply passionate about this widely discussed topic. Too much technology? We began with a question...

Read more
Qualys

IT Security solution providers know how hard it is to get customers to talk on the record about the solutions they use. Case studies and customer feedback, however, are the only way in which cybersecurity solution providers can tailor their product to the needs of their buyers. They are also a valuable source of insight for other organisations, who can look at which tool can solve which problem and make an informed decision on the...

Read more
Securing Docker with CIS Controls

Containers, along with orchestrators such as Kubernetes, have ushered in a new era of application development methodology, enabling microservices architectures as well as continuous development and delivery. Docker is by far the most dominant container runtime engine, with a 91% penetration according to the State of the Container and Kubernetes Security Report. Containerization has many benefits and as a result has seen wide adoption. Gartner predicts that by 2023, 70% of organizations will be running...

Read more
Verizon Logo

Verizon published today its yearly Data Breach Investigation Report, based on real-world data from 41,686 security incidents and 2,013 data breaches provided by 73 data sources, both public and private entities, spanning 86 countries worldwide. The report provides a most useful snapshot of the current state of the fight against cybercrime, and highlights not only the weaknesses in organisations' approach to security, but also the areas where cybercriminals seem to be focussing their efforts. IT...

Read more
mental health

by Corin Imai, senior security advisor at DomainTools Cybercrime and mental health issues are both rampant. This article will look at how mental health issues can leave organisations more at risk to cybercrime, and how combatting cybercrime can affect mental health.  Professional burnout is defined as a work-related condition of stress causing exhaustion, a sense of reduced accomplishment and loss of personal identity. Extensive literature exists about this phenomenon in relations to healthcare professionals, who need...

Read more
Computer with encryption

From: Thomas, Kevin Sent: 24 August 2019 10:43 To: Malik, Javvad Subject: Encryption Jav I’m updating the presentation pack for this months management meeting. Can you send me a short description of encryption so the SLT can better understand the solution. Kev From: Malik, Javvad Sent: 24 August 2019 11:03 To: Thomas, Kevin Subject: Encryption Hi Kevin, Encryption is the process of transforming information using an algorithm to make it unreadable to anyone except those...

Read more
Home

By Kevin Bailey, Managing Director & Principal - Security Research at Omnisperience  When I look back at the cybersecurity industry, in the early 2000s it involved a few hundred vendors battling for their share of a ~$750 million market. The hacker was motivated by the chase and notoriety rather than monetary rewards. Fast forward to 2020 and sophisticated hackers have now established a matrix structure comparable to multinational corporations with the discipline, skills, diversity of...

Read more
WFH

By Prof. John Walker To say we live in unprecedented times must be the understatement of the century – in fact, what we have seen in recent years does amount to gross disbelief. Terrorist attacks finding their way to the streets of the UK, active Russian agents seemingly acting with murderous impunity, whilst looking wondrously up at Church Spires, not to mention the murder of a US based journalist within the walls of a Egyptian...

Read more
wfh

In the span of a couple months, the world as we knew it was turned upside-down. As scientists across the globe conduct experiments in search of the COVID-19 vaccine, the labour market has found itself within its own experiment. That is, the experiment of remote working on a massive scale.   In an effort to slow down the spread of the virus, millions of employees around the world are being told to write their emails, compile their spreadsheets, and hold their meetings from the confines of their dining room...

Read more
Page 1 of 41 1 2 41