This Week's Gurus

It’s become a fact of life that hackers might lock down your computer, blocking access to your most valuable data, and vowing to free it only if you pay up. Ransomware is nothing new, but it’s profitable, and hackers are deploying it left and right. Mitigating ransomware is actually fairly straightforward. If you have backups, if your network is segmented, really all you have to do is wipe the infected computers, and reimage them from...

Read more

By Linus Chang, CEO, Scram Software (https://scramsoft.com/) Data breaches have quickly morphed into an alarming epidemic. This is evidenced by the fact that they have become so commonplace, they’re seen as a given now rather than as shocking news. Recent history offers countless examples of breaches that can be instructive as to what’s going wrong, but here are just a few: In June of 2017, the Republican National Committee leaked data on 198 million Americans,...

Read more

Matt Ellard, EMEA Managing Director, Tanium Consumers trust and expect businesses to keep their personal data safe. They take it for granted that organisations, especially large ones, have the resources to deliver business resilience; with the right protection and safety measures in place to stop their data from being stolen. However, government data released in 2017 showed that almost half of UK firms had been a victim of  a cyber breach or attack in the previous year....

Read more

By Amina Bashir and Mike Mimoso, Flashpoint Chatbots are becoming a useful customer interaction and support tool for businesses. These bots are powered by an artificial intelligence that allows customers to ask simple questions, pay bills, or resolve conflicts over transactions; they’re cheaper than hiring more call centre personnel, and they’re popping up everywhere. As with most other innovations, threat actors have found a use for them too. A number of recent security incidents have...

Read more

The character of Mad-Eye Moody in “Harry Potter and the Goblet of Fire” preached “constant vigilance” against dark wizards, even as he was a villain in disguise. The real Mad-Eye Moody had been kidnapped and locked in a trunk for an entire year, while an imposter assumed his form and took on his role as the defence against the dark arts teacher at Hogwarts School of Witchcraft and Wizardry. Not only was he an imposter...

Read more

By Tom Kellermann, Chief Cybersecurity Officer, Carbon Black When the Die Hard movie franchise got a reboot in 2007 the plot revolved around an attack on New York’s infrastructure, with our hero John McClane up against a gang of cybercriminals intent on gaining access to critical energy, water and transport control systems to wreak chaos and (naturally) make off with a load of cash. Fast forward less than a decade and the situation went from...

Read more

The cloud has brought about many benefits for organisations and adoption is understandably increasing. Gartner earlier this year projected that the worldwide public cloud services market would grow 21.4 percent in 2018 whilst Forrester has found that global cloud services revenues totaled £112.5 billion in 2017, and is predicted to grow up to £137.2 billion by the end of 2018. With this huge growth in cloud adoption, effective security is paramount. Recent cyber-attacks have highlighted...

Read more

In the last few years we have seen the frequency and severity of third-party cyberattacks against global financial institutions continue to increase. One of the biggest reported attacks against financial organisations occurred in early 2016, when $81 million was taken from accounts at Bangladesh Bank. Unknown hackers used SWIFT credentials of Bangladesh Central Bank employees to send more than three dozen fraudulent money transfer requests to the Federal Reserve Bank of New York asking the...

Read more

The use and adoption of IoT devices is continuing to grow at break-neck speed. In fact, IHS Markit recently predicted that the number of IoT devices will balloon to 125 billion by 2030. Clearly, the advantages of IoT devices are well-understood: they are more capable, more efficient, and more reliable than their predecessors. But as IoT devices flood the office environment, businesses are failing to understand the dangers they pose.   Connected devices can be...

Read more

“A fool pulls the leaves. A brute chops the trunk. A sage digs the roots.” – Pierce Brown   The western world is currently grappling with a cyber insurgency.  The widespread adoption of the “kill-chain” coupled with the use of memory resident malware has fueled the cyber-attack wild fire.  The security architectures mandated by regulators and standard bodies are collapsing. History does repeat itself. One should study the evolution of insurgencies to better grasp the nature of...

Read more
Page 3 of 68 1 2 3 4 68