December 21st, 2016
Over the course of 2016, McAfee has been progressing a story and supporting a technical strategy that addresses the challenges of a rapidly changing risk landscape. In recent years at McAfee’s annual security conference, FOCUS, we’ve seen Chris Young, Brian Dye and others mature a narrative that started with more integrated products, and then an integration framework with the Data Exchange Layer (DXL) and now a DXL that’s going to be released as open source.
- November 20th, 2015
A potential privilege escalation around unquoted service paths has been around for over fifteen years now, but it still continues to catch people out.
- November 13th, 2015
Twenty-eight percent of security spending is wasted on shelfware, according to CSO’s news article earlier this year.
Shelfware, in case you don’t have any of your own, and aren’t familiar with the term, is a word coined by the technology industry to refer to something that is purchased but is never put in to production.
- November 9th, 2015
In light of the recent data breach at TalkTalk I started to think about why breaches are becoming so common and why there appears to be such a gap between corporate priorities and cyber security. Then something dawned on me, I spend a lot of time speaking with members of the C-suite and articulating the benefits of key security foundations and defense in depth. At lot of the time the members of the C-suite lack the requisite skills to really grasp the importance of cyber security. Through no fault of their own, they do not come from technology backgrounds, but from sales, finance and marketing. In addition, many corporates have not appointed a Chief Security Offer.
- October 26th, 2015
With the fallout around the TalkTalk data breach still happening, many people are left with one primary question: Why do data breaches continue to happen?
- September 28th, 2015
Organizations, security professionals and vendors are in a constant battle to keep up with an evolving environment of advanced threats and malware strains. It seems as soon as we catch up with the cyber criminals, they shift up a gear. At the recent Gartner Security and Risk Management Summit in London, Avecto grabbed a coffee with the renowned security blogger and independent analyst, Graham Cluley, to take a pulse check of enterprise security.