Avoiding Cybersecurity Solution Fatigue

For every problem, there is a solution. In the world of cyber security, however, if each and every problem is solved by a different solution, solution fatigue can quickly become a new problem. Recent attendance at any major security conference is an excellent barometer of the state of the cybersecurity market. As Gartner analyst Anton […]

Dealing With Cyber Threats In 2017

Mandiant and Verizon Threats

No one can predict when the next cyber breach will happen – so it’s all about pre-emptive strategy. But you can only build defences if you understand the threat. And, even on this initial front, most UK organisations are vastly outmatched. The resources cyber criminals can deploy are totally disproportionate to those that companies can utilise. […]

Experts Comments: WhatsApp Backdoor

whatsapp end-to-end encryption

A serious vulnerability is discovered in Whatsapp’s end-to-end encryption that allows allow Facebook and others to intercept and read encrypted messages. The reason for the flaw is improper encryption key management and there are further details on the story here. Here to comments on this story is security experts from ZoneFox, RES, Venafi, ZoneFox, RES, […]

Netskope Report Reveals Half Of All Users Of Sanctioned Cloud Storage Services Have A Personal Instance Of The Same Service

Quarterly report on enterprise services sees organisations use an average of four IaaS services LONDON, UK. Netskope, the leader in cloud security, today announced the release of the January 2017 Netskope Cloud Report™ on enterprise cloud service usage and trends. According to the report, enterprise cloud service usage continues to rise, and despite the best efforts of IT, […]

In 2016, These Are The Four Ways How Bots Altered History

2016 was the biggest year by far for all sorts of bots. From Chatbots to bad bots, the past year was eventful to say the least. With more than 980+ cyber security breaches across all online businesses and 35 million accounts exposed. Yahoo! In a 2016 report, disclosed that more than 1 billion accounts have […]

50,000 MongoDB Databases Vulnerable To Attack

targeted-attacks

The widespread attack on MongoDB databases is gathering speed, with reports that close to 50,000 databases are vulnerable. MongoDB does offer security protections, but they are not enforced and many customers decline to use them. Wieland Alge, VP & GM EMEA at Barracuda Networks commented below.  Wieland Alge, VP & GM EMEA at Barracuda Networks: “MongoDB does offer security […]

HID Global Predicts Top Trends For 2017 In The Identity Technology Industry

Shift in the Use of Trusted Identities Fuels Broader Adoption of Mobile and Advanced Smart Card Technology, a Greater Emphasis on the Cloud and Emerging IoT Use Cases LONDON, UK. HID Global®, a worldwide leader in trusted identity solutions, forecasts a shift in the use of identity technology that will lead to increased adoption of mobile devices […]

Ukraine Power Grid Hacked Again

A cyber attack against a Ukrainian power grid left customers without electricity for an hour last month. Ukrainian security researchers involved in the investigation say they believe the attack was conducted by the same hackers who cut power in Ukraine a year ago. Tim Erlin, Sr. Director, Product Management at Tripwire: “While this second attack on […]

The Ability To Steal Fingerprints From A Photo

Following the news that a professor at the Digital Content and Media Sciences Research Division of the National Institute of Informatics has demonstrated how fingerprints can be stolen from a photo. Robert Capps, VP of Business Development at NuData Security commented below. Robert Capps, VP of Business Development at NuData Security: “While physical biometrics will […]