Celebrating the North West tech scene

Last Friday, the North West’s tech community converged on Manchester to celebrate the entrepreneurial spirit and technological innovation of the region.

The Insider Business of Digital and Technology Conference, held at the UKFast Campus, saw over 100 business leaders, technology entrepreneurs and digital devotees come together to discuss how technology underpins business success. In addition to this, we also touched on the latest trends in the technology sector and what we, as a region can do to ensure the North West remains a hotbed of technology talent. Continue reading

Posted in Technology | Tagged , , , , | Leave a comment

Keeping cyber security front of mind this October

Since the mid 90′s, the internet has had a profound impact on our personal and business lives. It’s transformed how we communicate, how we shop, even how we heat our homes. In an enterprise setting, the internet is the lifeblood of the organization, the engine which keeps everything moving. And yet the World Wide Web, on which we’ve come to depend, can also pose a significant threat if we don’t take the appropriate steps to mitigate its risks. Continue reading

Posted in Cyber Security | Tagged , , , | Leave a comment

SANS Critical Controls: Simple steps to securing the enterprise

In an ever-changing threat landscape, knowing how to mitigate attacks, or even where to start, can be a challenge. To help ease that burden, a number of organizations and government bodies have provided recommendations on defending common real-world attacks. Continue reading

Posted in Cyber Security, SANS | Tagged , , , | Leave a comment

Shellshock: What You Need to Know

The InfoSec community has gone into overdrive in the last few days dealing with the ‘Shellshock’ bug. There is good reason for this, millions of systems around the globe are vulnerable to this bug which lets attackers run code on that system. Continue reading

Posted in Cyber Threats | Tagged , , , | Comments Off

Restoring user freedom in the security-first enterprise

It’s been a busy year in the cyber security arena so far, and it doesn’t look like the pace will be slowing down. From hacking schemes like Heartbleed to significant data breaches at Home Depot, P.F. Chang’s and the Montana Health Department, criminals are stepping up their game. But as organizations adapt their security strategies in kind, there is one key stakeholder who often goes unnoticed: the end user. Continue reading

Posted in Cyber Security, Least Privilege, Privilege Management | Tagged , , , | Comments Off

Controlling the Breach

Once again we are witnessing the aftermath of another major data breach. Although the name of the retailer has changed from Target to Home Depot, the rest of the story remains the same. A large scale exfiltration of customer card data that went undetected for several months. Continue reading

Posted in Cyber Security, Databreach | Tagged , , , , | Comments Off

Home Depot breach builds a case for a Defense-in-Depth approach

This week, Home Depot announced its payment systems had fallen victim to hackers, in what some in the security industry are predicting to be the biggest data breach in history.

The attack, which targeted credit and debit card details of Home Depot customers, originated from malware infected cash registers and could date as far back as April this year. Continue reading

Posted in Cyber Threats, Databreach | Tagged , , , , | Comments Off

Take an in-depth look at your IT security

Over the past few months we’ve seen a spate of IT security breaches in the US. Retailers, Supervalu, Albertsons and the courier, UBS recently revealed they’d suffered significant data attacks, with customers debit and credit card details compromised. Meanwhile in the healthcare sector, Community Health Systems, which operates 206 hospitals across the United States, announced that hackers recently broke into its computers and stole data on 4.5 million patients. Continue reading

Posted in Cyber Threats | Tagged , , , | Comments Off

Security Controls: Securing the perfect balance between usage and effectiveness

Growing instances of cyber threats have dawned a new era in IT security, as protecting the endpoint becomes a major concern for organizations everywhere. We know that improving security is a goal that most organizations strive for, but many struggle when it comes to developing effective strategies. Continue reading

Posted in Cyber Security | Tagged , , , , | Comments Off

Lessons learned from 25 years of the Web

With 2014 marking the 25th anniversary of the internet, how do modern cyber security challenges compare to those of the early days of the World Wide Web? Continue reading

Posted in Cyber Security, Cyber Threats | Tagged , , , | Comments Off