Home Depot breach builds a case for a Defense-in-Depth approach

This week, Home Depot announced its payment systems had fallen victim to hackers, in what some in the security industry are predicting to be the biggest data breach in history.

The attack, which targeted credit and debit card details of Home Depot customers, originated from malware infected cash registers and could date as far back as April this year. Continue reading

Posted in Cyber Threats, Databreach, Uncategorized | Tagged , , , , | Leave a comment

Take an in-depth look at your IT security

Over the past few months we’ve seen a spate of IT security breaches in the US. Retailers, Supervalu, Albertsons and the courier, UBS recently revealed they’d suffered significant data attacks, with customers debit and credit card details compromised. Meanwhile in the healthcare sector, Community Health Systems, which operates 206 hospitals across the United States, announced that hackers recently broke into its computers and stole data on 4.5 million patients. Continue reading

Posted in Cyber Threats | Tagged , , , | Comments Off

Security Controls: Securing the perfect balance between usage and effectiveness

Growing instances of cyber threats have dawned a new era in IT security, as protecting the endpoint becomes a major concern for organizations everywhere. We know that improving security is a goal that most organizations strive for, but many struggle when it comes to developing effective strategies. Continue reading

Posted in Cyber Security | Tagged , , , , | Comments Off

Lessons learned from 25 years of the Web

With 2014 marking the 25th anniversary of the internet, how do modern cyber security challenges compare to those of the early days of the World Wide Web? Continue reading

Posted in Cyber Security, Cyber Threats | Tagged , , , | Comments Off

Key takeaways from London Tech Week

London Tech Week debuted in the capital last week, featuring over 200 independently run events packed into five days. With 30,000 attendees the event is designed to showcase the UK’s role as the digital heart of Europe. Continue reading

Posted in Cyber Security | Tagged , , , , | Comments Off

UK Cyber Essentials Scheme Launched

Last week the UK Government launched the Cyber Essentials Scheme (CES) allowing businesses to demonstrate best practice in defending against common cyber threats.
The scheme, launched 5th June 2014, is a key objective in the government’s £860 million National Cyber Security Programme. The main objective is to ensure the UK is a safer place to conduct business online. Until now, there hasn’t been a single recognizable award in cybersecurity assurance suitable for all businesses. Developed in close consultation with industry and insurers, many incentives are being offered to businesses who join the scheme. Continue reading

Posted in Desktop Security | Tagged , , , | Comments Off

Is antivirus software dead?

Last month, Symantec’s senior VP for information security described antivirus as “dead”, estimating that antivirus now catches just 45% of cyber attacks. Continue reading

Posted in Cyber Threats, Desktop Security | Tagged , , , , , | Comments Off

Caught between a rock and a hard place

At the recent InfoSec event in London, I talked about why removing admin rights is the one big thing you can do to immediately improve your security posture. But instead of being at the top of the agenda, it’s often neglected. Why? Continue reading

Posted in Cyber Threats, Desktop Security | Tagged , , , , | Comments Off

Endpoint security is eluding many businesses – but why?

There’s a general consensus that people are now more aware of security threats than ever before. Therefore, when we commissioned the ‘Cyber Strategies for Endpoint Defense 2014‘ report from Ponemon, we expected to find a greater level of knowledge and cyber security competency. What we got was a different picture! Continue reading

Posted in Desktop Security, Privilege Management | Tagged , , , | Comments Off

The 3 Biggest Surprises of Cyber Strategies for Endpoint Defense

The latest research report from renowned research institute Ponemon has revealed a few big surprises about the priorities of IT and security professionals in 2014 and their plans to deal with today’s cyber threats.

Continue reading

Posted in Cyber Threats, Desktop Security, Insider Threat | Tagged , , , , | Comments Off