Featured

Contributor:
DJ Long
September 16th, 2016

Building bridges to a more connected security environment

For a long time, the threat intelligence landscape could be likened to an archipelago; a collection of islands. There were a few bridges here and there but the various islands remained largely inaccessible. It became clear, however, that in this era of rapidly evolving and advanced threats, we needed to find a way to build those bridges, to join the dots and ensure each part of the ‘security archipelago’ is not only connected, but integrated, with open channels of communication.

Continue Reading

2017 predictions: Looking forward to a new year in cyber security

As another busy year in cyber security draws to an end, our team shares their thoughts on the trends and issues we should keep an eye out for in 2017.  How can we stay protected against the latest threats? I asked our experts for their views and we’d be interested to hear your predictions too…

Continue Reading


The candidate driven market: Why companies should embrace it

Talent. It’s not necessarily hard to find, but to tempt that talent away from their current employer, well that’s another matter. The most successful team members in any organization are exactly that; successful. Their W2s are off the charts, colleagues, both former and current rave about their skills, and customers welcome them with open arms. So, if your market is booming and anyone who’s anyone is hiring, why would a talented person leave their current role? And more importantly, why would they join your company?

Continue Reading


Your chair exists within a room

Lola Oyelayo was formerly Director of Strategy & User Experience at Head, and a few weeks ago I was lucky enough to see her excellent talk on Wicked Problems at NUX5. I was even luckier to have the opportunity to chat to her the evening before about how designers can tackle complex problems in digital projects.

Continue Reading


2017 – The year of social engineering-as-a-service?

Social engineering is the use of psychological tools such as deceit, misdirection, manipulation and flattery to elicit unauthorised information or access to systems. Social engineering is an increasingly common way for criminals to attack organisations as it does not always rely on cyber vulnerabilities but rather takes advantage of the weakest element in an organisation, human beings. People are susceptible to social engineering because these attacks exploit social norms and human nature, including reciprocity, curiosity, and pride. As we become increasingly connected – at work, at home and intertwining the two – the opportunities and impacts of social engineering are increasing.

Continue Reading


Buy now – breached later

Once again retailers are ramping up operations in time for the infamous Black Friday and Cyber Monday sales. Given the recent huge scale DDoS attacks powered by IOT devices under the control of the Mirai botnet retailers are taking many precautions to keep transactions flowing during the sales. Unfortunately, just as the retailers are getting prepared so are the attackers, ready to seize any opportunity to steal user’s data or hold retailers to ransom.

Continue Reading