The dizzying speeds of development in today’s technologies create more opportunities for cybercriminals than ever before. Each year we are seeing more and more challenges in the fight against cybercrime. With so many potential targets in the IT environment: on-premise networks, cloud, mobile, and IoT devices, there are many areas that could provide a vulnerability for a cybercriminal to take advantage of.more →
The Domain Name System (DNS) has gone through many changes over the years since its birth around 1985. But even before this, in the very early days of computer networking, it became a necessity to map the computerised machine addresses of computer and network entities to more human friendly names.more →
A recent article on Dark Reading by VP of Intelligence Adam Meyers at our partner Crowdstrike is titled “The Big E-Crime Pivot.” It puts forth the argument that cybercriminals “have begun to recognize that enterprise ransomware offers tremendous financial advantage over the more traditional tactics of wire fraud and account takeover.”
For those that don’t have time to read the full article, we have collated some of the highlights:
What is the Pivot?more →
Do You Really Need A Cyber Incident Playbook?
As part of business continuity planning most organisations have a disaster recovery plan in place in case of a fire, flood or other business impacting incidents, so why should planning for a Cyber Security incident be any different? Building a strong Cyber Incident Playbook is vital and works together with in tandem with other procedures should issues arise.more →
Almost every single computing device, laptop, desktop, router, firewall, keeps a record of things that have changed over time. Borrowing from maritime parlance, we call these “logs”. Logs are ledgers of changes in state, recorded and stored in sequence, and can tell you a lot about what that computing device has been doing, why it has been doing it, and when.more →
A breach detection system (BDS) is a defensive tool designed to detect the activity of malware inside a network after a breach has occurred. A BDS can be either a hardware or software solution designed to look out for signs of threats and alert the organization to the potentially dangerous activity.more →
Ever wondered what it’s like to experience a cyber-attack? Want to know what the warning signs are? This article recreates a typical ransomware attack scenario of what a business may go through in the first 24 hours when experiencing a data breach.
Fictional high street shoe retailer Shoes-4-U, with branches in every town nationwide, has recently received an email from a supplier.more →