Restoring user freedom in the security-first enterprise

It’s been a busy year in the cyber security arena so far, and it doesn’t look like the pace will be slowing down. From hacking schemes like Heartbleed to significant data breaches at Home Depot, P.F. Chang’s and the Montana Health Department, criminals are stepping up their game. But as organizations adapt their security strategies in kind, there is one key stakeholder who often goes unnoticed: the end user. Continue reading

Posted in Cyber Security, Least Privilege, Privilege Management | Tagged , , , | Leave a comment

Controlling the Breach

Once again we are witnessing the aftermath of another major data breach. Although the name of the retailer has changed from Target to Home Depot, the rest of the story remains the same. A large scale exfiltration of customer card data that went undetected for several months. Continue reading

Posted in Cyber Security, Databreach | Tagged , , , , | Leave a comment

Home Depot breach builds a case for a Defense-in-Depth approach

This week, Home Depot announced its payment systems had fallen victim to hackers, in what some in the security industry are predicting to be the biggest data breach in history.

The attack, which targeted credit and debit card details of Home Depot customers, originated from malware infected cash registers and could date as far back as April this year. Continue reading

Posted in Cyber Threats, Databreach | Tagged , , , , | Comments Off

Take an in-depth look at your IT security

Over the past few months we’ve seen a spate of IT security breaches in the US. Retailers, Supervalu, Albertsons and the courier, UBS recently revealed they’d suffered significant data attacks, with customers debit and credit card details compromised. Meanwhile in the healthcare sector, Community Health Systems, which operates 206 hospitals across the United States, announced that hackers recently broke into its computers and stole data on 4.5 million patients. Continue reading

Posted in Cyber Threats | Tagged , , , | Comments Off

Security Controls: Securing the perfect balance between usage and effectiveness

Growing instances of cyber threats have dawned a new era in IT security, as protecting the endpoint becomes a major concern for organizations everywhere. We know that improving security is a goal that most organizations strive for, but many struggle when it comes to developing effective strategies. Continue reading

Posted in Cyber Security | Tagged , , , , | Comments Off

Lessons learned from 25 years of the Web

With 2014 marking the 25th anniversary of the internet, how do modern cyber security challenges compare to those of the early days of the World Wide Web? Continue reading

Posted in Cyber Security, Cyber Threats | Tagged , , , | Comments Off

Key takeaways from London Tech Week

London Tech Week debuted in the capital last week, featuring over 200 independently run events packed into five days. With 30,000 attendees the event is designed to showcase the UK’s role as the digital heart of Europe. Continue reading

Posted in Cyber Security | Tagged , , , , | Comments Off

UK Cyber Essentials Scheme Launched

Last week the UK Government launched the Cyber Essentials Scheme (CES) allowing businesses to demonstrate best practice in defending against common cyber threats.
The scheme, launched 5th June 2014, is a key objective in the government’s £860 million National Cyber Security Programme. The main objective is to ensure the UK is a safer place to conduct business online. Until now, there hasn’t been a single recognizable award in cybersecurity assurance suitable for all businesses. Developed in close consultation with industry and insurers, many incentives are being offered to businesses who join the scheme. Continue reading

Posted in Desktop Security | Tagged , , , | Comments Off

Is antivirus software dead?

Last month, Symantec’s senior VP for information security described antivirus as “dead”, estimating that antivirus now catches just 45% of cyber attacks. Continue reading

Posted in Cyber Threats, Desktop Security | Tagged , , , , , | Comments Off

Caught between a rock and a hard place

At the recent InfoSec event in London, I talked about why removing admin rights is the one big thing you can do to immediately improve your security posture. But instead of being at the top of the agenda, it’s often neglected. Why? Continue reading

Posted in Cyber Threats, Desktop Security | Tagged , , , , | Comments Off