Checklist or your memory, is one better?
No matter how much expert knowledge you have, how good you think your memory is, using a checklist is simply good security practice.
No matter how much expert knowledge you have, how good you think your memory is, using a checklist is simply good security practice.
Lots of articles, blog posts and webcasts talk about threat hunting. Despite this few, if any, organisations do it. This is a mistake. Security hit the headlines again recently, when…
Metrics, Dashboards and Security Like them or not, metrics are a fundamental part of every organisation. Security doesn't get to a free pass. It is a rare CISO who doesn't demand…
Incident response is one of those things you really hope you'll never have to use, but know you will. Or at least you should know! Even with the best security, there…
The North Wales Cyber Security Cluster is meeting on 21 April at Solvings Ltd, in Mold, Flintshire. Solvings provide a great location and the cluster is a wonderful opportunity to learn…
Since Cryptolocker appeared in late 2013, it seems hardly a day can go by without some ransomware attack hitting the news. The variations all have entertaining names like Teslacrypt, Locky,…
As the news often shows, Information Security (infosec) is a big part of any organisation. From the small business with just a couple of computers to the global enterprise, infosec…
Incident response is a vital component of every organisations security. It provides the safety net for when the inevitable happens and other controls fail. A good incident response team will…
Antivirus (AV) has been around for decades now and this is both a good and bad thing. On one hand, AV is so well known most people already understand that…
Supplier security is something most organisations are at least aware of, and lots actually realise they need to do something about it. However, most of the time, "doing something" about…
FinPhishing - or financial spear phishing - is a form of social engineering attack which is becoming massively profitable for the criminal enterprises involved. Unfortunately for the victims it is…
One sad fact about security is that no matter what controls you put in place, you will suffer breaches and if you are on the internet it is likely to…
Reported on the Register today, security researchers have demonstrated how malicious code can be run on graphics processors (GPUs) rather than the central processing unit (CPUs) at the heart of…
For lots of enterprises, security patches are a pain to test, a pain to deploy and frequently frustrating when they require downtime for the inevitable system reboots. However, security patches…
As most internet users know, phishing attacks are very common. The term itself dates back to 1995 (e.g. AOHell) and social engineering (which is basically what phishing is) goes back…