Targeted Attacks Plague the EU Driving Data Protection Changes
Posted on: 02 Feb 2016
U.S. companies that operate in the European Union (EU) need to understand what drives European organizations when it comes to data protection. This applies to both commercial organizations that want…
Is Your Identity and Access Management Fit for Purpose?
Posted on: 25 Jun 2015
In the old days, identity and access management (IAM) was a mainly internal affair; employees accessing applications, all safely behind a firewall. OK, perhaps the odd remote user, but they…
The Rise and Rise of Bad Bots – Part 2 – Beyond Web-Scraping
Posted on: 16 Apr 2015
Anyone who listened to Aleks Krotoski’s 5 short programs on Radio 4 in the UK titled Codes that Changed the World will have been reminded that applications written in COBOL, despite…
The Rise and Rise of Bad Bots – Part 1 – Little DDoS
Posted on: 15 Apr 2015
Many will be familiar with the term bot, short for web-robot. Bots are essential for effective operation of the web: web-crawlers are a type of bot, automatically trawling sites looking…
Insurance Companies Need to Eat Their Own Dog Food
Posted on: 26 Mar 2015
Many insurance companies aspire to sell policies to their customers that will provide financial mitigation against cyber-attacks. That is all well and good, but they need to make sure their…
Is Your Online Security Fit for the Online Consumer?
Posted on: 02 Dec 2014
There are few businesses that are not dependent to some extent on their online presence. Websites are no longer simply a source of information, but a place to transact with…
The Problem of Buggy Software Components
Posted on: 03 Nov 2014
What do Heartbleed, Shellshock and Poodle all have in common? Well apart from being software vulnerabilities discovered in 2014, they were all found in pre-built software components, used by developers…
Web Security 3.0 – Is Your Business Ready?
Posted on: 03 Sep 2014
Security products have evolved with the use of the Internet. When web sites were largely static it was enough to tell users which URLs to avoid because the content was…
The Security and Visibility of Critical National Infrastructure: ViaSat’s Mega-SIEM
Posted on: 17 Jul 2014
There has been plenty of talk about the threat of cyber-attacks on critical national infrastructure (CNI). So what’s the risk, what’s involved in protecting CNI and why, to date, do…
Do Increasing Worries About Insider Threats Mean it is Time to Take Another Look at DRM?
Posted on: 03 Jul 2014
The encryption vendor SafeNet publishes a Breach Level Index that records actual reported incidents of data loss. Whilst the number of losses attributed to malicious outsiders (58%) exceeds those attributed…