DROWN Attack

DROWN Attack

The news that millions of OpenSSL secured websites that are now at risk due to the new DROWN attack, Security experts from Rapid7 and Black Duck have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Tod Beardsley, Security Engineering Manager, at Rapid7 : The work behind today’s DROWN attack announcement represents the very best of open, collaborative, international […]

Five Tips for the Future Federal CISO

Five Tips for the Future Federal CISO

The White House is looking to hire its first-ever chief information security officer (CISO). There’s little doubt that appointing a Federal CISO is a long overdue response to a recurring problem: the inability to properly secure government systems and sensitive data. The list of government agencies experiencing security failures is lengthy, from the Office of […]

Malware becoming Overwhelmingly Polymorphic

Malware becoming Overwhelmingly Polymorphic

Malware and potentially unwanted applications (PUAs) have become overwhelmingly polymorphic, with 97 percent of malware morphing to become unique to a specific endpoint device, according to a report from security specialist Webroot. Travis Smith, senior security researcher at Tripwire have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Travis Smith, Senior Security Research Engineer for Tripwire […]

Rnegotiate on Export of Cybersecurity Products

Rnegotiate on Export of Cybersecurity Products

Obama administration’s decision to renegotiate an international pact that limits the export of cybersecurity products. The reversal follows months of pressure from the technology community and lawmakers who warned the vague definitions within the agreement would restrict companies’ ability to use legitimate tools to test and fortify their own defences. Harley Geiger, director of public policy […]

Hospitals are being Extorted by Cyber Criminals

Hospitals are being Extorted by Cyber Criminals

Two German hospitals are being extorted by cyber criminals through ransomware. This follows the payment of the $17,000 ransom by an LA Hospital in February. Travis Smith, senior security researcher at Tripwire explains this growing trend of attacks. [su_note note_color=”#ffffcc” text_color=”#00000″]Travis Smith, Senior Security Research Engineer for Tripwire : “It’s not surprising that we are […]

Malware Authors – How to Fight Back

Malware Authors - How to Fight Back

Researchers at Forcepoint Security Labs are helping businesses fight back against malware authors by reverse engineering the algorithms used by the Locky ransomware. Ransom demands are now getting into the tens of thousands of dollars, making this a key issue for businesses. But Forcepoint has analysed the Locky ransomware and published one month’s worth of […]

UK’s Best Cyber Security Talent

UK’s Best Cyber Security Talent

This weekend saw Cyber Security Challenge UK team up with Protection Group International (PGI) to create the ultimate insight into a cyber criminals mind – a life-size recreation of a hacker’s bedroom. This event formed the first in a series of competitions for Cyber Security Challenge UK, which aims to find the UK’s best cyber […]

Data… The New Asset Class

Data... The New Asset Class

Our increasing reliance on data is causing it to evolve into a progressively valuable asset that needs effective protection. Unfortunately we are seeing a few stories in the news about data being hacked, or worse, stolen, meaning the need for exceptional protection is on the rise. To protect data assets you need to provide robust […]