Our thoughts, industry views and technology trends

Controlling the breach

Once again we are witnessing the aftermath of another major data breach. Although the name of the retailer has changed from Target to Home Depot, the rest of the story remains the same. A large scale exfiltration of customer card data that went undetected for several months.

Continue Reading


SANS Critical Controls: Simple steps to securing the enterprise

In an ever-changing threat landscape, knowing how to mitigate attacks, or even where to start, can be a challenge. To help ease that burden, a number of organizations and government bodies have provided recommendations on defending common real-world attacks.

Continue Reading


Home Depot breach builds a case for a Defense-in-Depth approach

This week, Home Depot announced its payment systems had fallen victim to hackers, in what some in the security industry are predicting to be the biggest data breach in history.

The attack, which targeted credit and debit card details of Home Depot customers, originated from malware infected cash registers and could date as far back as April this year.

Continue Reading


Take an in-depth look at your IT security

Over the past few months we’ve seen a spate of IT security breaches in the US. Retailers, Supervalu, Albertsons and the courier, UBS recently revealed they’d suffered significant data attacks, with customers debit and credit card details compromised. Meanwhile in the healthcare sector, Community Health Systems, which operates 206 hospitals across the United States, announced that hackers recently broke into its computers and stole data on 4.5 million patients.

Continue Reading


Security Controls: Securing the perfect balance between usage and effectiveness

Growing instances of cyber threats have dawned a new era in IT security, as protecting the endpoint becomes a major concern for organizations everywhere. We know that improving security is a goal that most organizations strive for, but many struggle when it comes to developing effective strategies.

Continue Reading