It’s a very exciting time at Avecto. Not only are we celebrating our 10-year anniversary this year, but we’re also announcing that Bomgar, a leader in identity and access management solutions, is to acquire the company.
The National Cyber Security Centre (NCSC) this week marked its first year of operation by revealing a snapshot of its findings from the past 12 months.
The U.S. Securities and Exchange Commission (SEC) has revealed that it’s fallen victim to a hack. In its recent “Statement on Cybersecurity, published by its Chairman, Jay Clayton, it was revealed that its controversial Electronic Data Gathering, Analysis, and Retrieval (EDGAR) system had been compromised last year and "may have provided the basis for illicit gain through trading".
One of England’s biggest police forces has revealed that more than one in five of its computers runs on Windows XP.
The popular PC cleanup tool, CCleaner has been hijacked by hackers in the latest widespread malware attack. The hack, identified by security researchers at Cisco Talos, found that anyone who downloaded or updated the CCleaner app between mid-August to mid-September also potentially downloaded malware without realising.
The credit monitoring company Equifax has revealed a breach exposed the personal details of up to 143 million Americans.
CeX, the second-hand electronics, and video games retailer has reportedly had the details of two million customers compromised by hackers. The information stolen included names, addresses, email addresses and some phone numbers, as well as a small number of encrypted credit card details.
So many times, I have seen security become an afterthought, rather than being an integral part of a design from the outset. Good security design is not always visible and therefore often not very well understood by the c-suite, who pile on the pressure to release systems or improve user freedom.
Last November I attended Pulse Europe: The EMEA Customer Success Conference. I was actually a speaker at the event, but I’ll save a wrap up of my topic “Code Red why your at risk meetings aren’t resulting in an epic save” for another blog.
As an industry, people who develop software and online services have taken great leaps over recent years in developing attractive, usable products. But there can still be a reluctance to test things early and often with users – especially if you’re developing for internal or enterprise users.
Last week marked the 50th anniversary of the ATM, a device that changed the face of personal monetary transactions forever. According to the ATM Industry Association (ATMIA) there are now close to three million of them worldwide, with over 70,000 in the UK alone where it all began. On 27th June 1967, the world's first "hole in the wall" was revealed at Barclays Bank in Enfield, London. Celebrations aside, I’d like to look at exactly what’s going on under the hood from a software perspective. Is securing them through industry best practice is realistic and practical?