Featured

Contributor:
Brian Hanrahan
December 21st, 2016

Moving the DXL story forward

Over the course of 2016, McAfee has been progressing a story and supporting a technical strategy that addresses the challenges of a rapidly changing risk landscape.  In recent years at McAfee’s annual security conference, FOCUS, we’ve seen Chris Young, Brian Dye and others mature a narrative that started with more integrated products, and then an integration framework with the Data Exchange Layer (DXL) and now a DXL that’s going to be released as open source.

Continue Reading

Path of enlightenment part 1

A potential privilege escalation around unquoted service paths has been around for over fifteen years now, but it still continues to catch people out.

Continue Reading


Take a long hard look at your shelfware

Twenty-eight percent of security spending is wasted on shelfware, according to CSO’s news article earlier this year.

Shelfware, in case you don’t have any of your own, and aren’t familiar with the term, is a word coined by the technology industry to refer to something that is purchased but is never put in to production.

Continue Reading


Boards fall short on cyber security and technological knowledge

In light of the recent data breach at TalkTalk I started to think about why breaches are becoming so common and why there appears to be such a gap between corporate priorities and cyber security. Then something dawned on me, I spend a lot of time speaking with members of the C-suite and articulating the benefits of key security foundations and defense in depth. At lot of the time the members of the C-suite lack the requisite skills to really grasp the importance of cyber security. Through no fault of their own, they do not come from technology backgrounds, but from sales, finance and marketing. In addition, many corporates have not appointed a Chief Security Offer.

Continue Reading


Let’s TalkTalk about data breaches. It’s not so simple

With the fallout around the TalkTalk data breach still happening, many people are left with one primary question: Why do data breaches continue to happen?

Securing an environment against data breach is not a simple affair and involves many layers of security working together to prevent, detect and respond to threats.

Continue Reading


A coffee with Graham Cluley

Organizations, security professionals and vendors are in a constant battle to keep up with an evolving environment of advanced threats and malware strains. It seems as soon as we catch up with the cyber criminals, they shift up a gear. At the recent Gartner Security and Risk Management Summit in London, Avecto grabbed a coffee with the renowned security blogger and independent analyst, Graham Cluley, to take a pulse check of enterprise security.

Continue Reading