GDPR Compliance: Time to Face Mission Impossible?
The subject of GDPR compliance continues to be on the lips of many in the information security industry, and rightly so as the regulation promises to revolutionize the way we work and store data
The Rise of the Threat Hunter
Being proactive, sniffing out threats, and improving detection and response times is vital in the ongoing fight against cyber-attacks. A mix of prevention and response is the ideal strategy.
#SecuriTay 2017 & the Future of An Industry
Held in Dundee’s Abertay University, and now in its sixth year, SecuriTay is organized by the Ethical Hacking Society and “aimed at anyone with an interest in hacking and information security”
#RSAC: Wendy Nather: Why AV Should Never Have Been Invented and Why We've Brought the Skills Gap on Ourselves
Wendy Nather talks AV, skills gap, CISO decisions and why passwords should be written down
How The Industry Responds to the Cybersecurity Skills Shortage
To hear that the Government is setting aside significant investment to teach teenagers vital cybersecurity skills is welcome news, especially at a time when there is a serious lack of digital skills and an increased threat to companies’ digital infrastructures.
Digesting the Diversity of Data Breaches
The diverse nature of cyber-threats can make one quite unique from another, affecting every department within an organization and no longer confined to the IT department
Eagles Take the #Superbowl of Passwords
Based on the release of ten million passwords, the data crunching revealed that the most popular gridiron team for a password was the Philadelphia Eagles, followed by the Dallas Cowboys, Pittsburgh Steelers and Oakland Raiders
Come Fly with Me: Securing the Drone
New report seeks to aid the safe and secure creation and operation of unmanned aircraft systems
Ultrasonic Cross-Device Tracking
The Risk Avengers take a look at the issue of ultrasonic cross-device tracking
(ISC)2 - Top Trends to Watch in 2017
As we enter 2017, this will be the year in which the potential cracks in the pillars of the knowledge economy start to show.
IoT Denial of Service Botnets and SCADA Attacks to Plague 2017
With 2016 now behind us, it’s time to reflect on the security incidents that troubled our year and look to the challenges ahead
RIG EK Dropping TrickBot Trojan & Madness/Quant Loader DoS Bot
As the exploit market begins to diversify, it has seen the introduction of new threats, the most recent being the inclusion of a relative new comer in TrickLoader and an older threat known as TrickBot