Featured

Contributor:
DJ Long
September 16th, 2016

Building bridges to a more connected security environment

For a long time, the threat intelligence landscape could be likened to an archipelago; a collection of islands. There were a few bridges here and there but the various islands remained largely inaccessible. It became clear, however, that in this era of rapidly evolving and advanced threats, we needed to find a way to build those bridges, to join the dots and ensure each part of the ‘security archipelago’ is not only connected, but integrated, with open channels of communication.

Continue Reading

Your chair exists within a room

Lola Oyelayo was formerly Director of Strategy & User Experience at Head, and a few weeks ago I was lucky enough to see her excellent talk on Wicked Problems at NUX5. I was even luckier to have the opportunity to chat to her the evening before about how designers can tackle complex problems in digital projects.

Continue Reading


2017 – The year of social engineering-as-a-service?

Social engineering is the use of psychological tools such as deceit, misdirection, manipulation and flattery to elicit unauthorised information or access to systems. Social engineering is an increasingly common way for criminals to attack organisations as it does not always rely on cyber vulnerabilities but rather takes advantage of the weakest element in an organisation, human beings. People are susceptible to social engineering because these attacks exploit social norms and human nature, including reciprocity, curiosity, and pride. As we become increasingly connected – at work, at home and intertwining the two – the opportunities and impacts of social engineering are increasing.

Continue Reading


Buy now – breached later

Once again retailers are ramping up operations in time for the infamous Black Friday and Cyber Monday sales. Given the recent huge scale DDoS attacks powered by IOT devices under the control of the Mirai botnet retailers are taking many precautions to keep transactions flowing during the sales. Unfortunately, just as the retailers are getting prepared so are the attackers, ready to seize any opportunity to steal user’s data or hold retailers to ransom.

Continue Reading


Arabian Bytes

Recently, the Avecto team travelled to the Middle East for a four-country roadshow, hopping from KSA to UAE, Jordan and finally Lebanon. We travelled with the esteemed Microsoft MVP, Sami Laiho and our partners in the region Crestan, in a bid to spread the message of the importance of back to basics security and for Sami to showcase the simplicity of breaking Windows without the right security foundations in place. ­

Continue Reading


What is customer success?

You may have come across the term Customer Success, and perhaps you thought it was a new concept, or a rehashing of an old concept, or just the latest business fad? In the following the post, I will debunk two of the most common misconceptions about what Customer Success is and then give you my opinion of what Customer Success should, and could be.

Continue Reading