This Week's Gurus

Cryptocurrency is not a new presence in the world of cyber security. For years cryptocurrencies have been the ransom of choice for hackers looking to make money from cyber attacks. However, over the last six months, we have seen a new strategy from hackers: crypto mining malware. This new motive for hackers has risen in prominence significantly with a 27% increase in use in the first quarter of 2018 and it is on the fast-track...

Read more

Malicious VBScript has long been a fixture of spam and phishing campaigns, but until recently its functionality has been limited to downloading malware from an attacker-controlled server and executing it on a compromised computer.   Researchers at Flashpoint have seen and analysed a unique departure from this norm in ARS VBS Loader, a spin-off of a popular downloader called SafeLoader VBS that was sold and eventually leaked in 2015 on Russian crimeware forums.   ARS...

Read more

By Matthias Maier, Security Evangelist, Splunk It’s usually wrong to judge people by their names, but an organisation that calls itself “Snake” probably isn’t up to much good. Citing unidentified security sources, DPA reported that Snake is the group suspected of carrying out a sophisticated and successful attack on the government’s computer network. As always, it’s difficult to be completely certain who exactly is behind a well-executed cyberattack, but this is believed to be connected with Russian...

Read more

Ever wondered what the role of a Chief Information Security Officer (CISO) encompasses? To put it simply, they are the guardians and protectors of everything information security related to a business. However, the tasks are far from simple as their teams work around the clock to respond to incidences that directly affect the safety of the company and its data. As the issues in cyber have evolved, so too has the role of the CISO,...

Read more

As the Chief Cybersecurity Officer for Carbon Black, I am witnessing a brave new world in cyberspace. Global cyber insurgencies continue unabated with reports of wide-scale data breaches and politico-hacking happening quickly and often. Personal data and financial information is regularly being hijacked. The energy sector is increasingly vulnerable to risk, with the recent cyberattack on the Energy Services Group (ESG) knocking systems offline. Here at Carbon Black we firmly believe that decreasing dwell time...

Read more

Imagine you’d spent a fortune making your home physically secure, only to discover you’d been quietly robbed by thieves who never set foot on your property. You thought you’d built a fortress, but didn’t notice the gap in the fence that left you wide open to intruders. It’s every homeowner’s worst nightmare. But it’s also a real-world metaphor for many UK businesses who, despite being increasingly vulnerable, have left the door to cybercrime unwittingly ajar....

Read more

Ever wondered what the role of a Chief Information Security Officer (CISO) encompasses? To put it simply, they are the guardians and protectors of everything information security related to a business. However, the tasks are far from simple as their teams work around the clock to respond to incidences that directly affect the safety of the company and its data. As the issues in cyber have evolved, so too has the role of the CISO,...

Read more

A recent survey shows 64 percent of organisations have deployed some level of IoT technology, and another 20 percent plan to do so within the next 12 months. This means that by the end of 2018, five out of six organisations will be using at least a minimal level of IoT technology within their businesses. This is an astonishing fact when you consider the lack of basic security on these devices, or any established security...

Read more

IT and security conversations are moving away from the confines of remote IT departments and are finding their way to the top of boardroom agendas. As they do so, CIOs need to carefully consider the way they communicate with other senior executives if critical IT initiatives are to receive that all important buy-in from the Board.  In this article, I will offer guidance to CIOs who are required to obtain Board-level approval before implementing strategic...

Read more

By Keiron Shepherd, Senior Security Specialist, F5 Networks  With automated tools and hackers for hire, cybercrime has turned into a game for profit. Recent research from F5 Labs shows that out of 429 reported breaches studied between 2005 and 2017, hackers gained $2.75 billion on the black market. The digital world has opened the door to unprecedented levels of malicious attacks putting applications, corporate data, operational infrastructure, and reputations at risk. The consequence is that...

Read more
Page 10 of 67 1 9 10 11 67