Friday, November 20, 2015
Battling Cyber Threats Using Lessons Learned 165 Years Ago
›
When it comes to protecting the end user, the information security community is awash with technologies and options. Yet, despite the near ...
Wednesday, November 18, 2015
Exploiting Video Console Chat for Cybecrime or Terrorism
›
A couple of days ago there was a lot of interest in how terrorists may have been using chat features of popular video console platforms (e.g...
Tuesday, November 17, 2015
Panel Selection of Penetration Testing Vendors
›
Most large companies have settled into a repeatable model in the way they undertake penetration testing and engage with their penetration t...
Monday, November 9, 2015
The Incredible Value of Passive DNS Data
›
If a scholar was to look back upon the history of the Internet in 50 years’ time, they’d likely be able to construct an evolutionary timeli...
Wednesday, October 28, 2015
Breaking out of the consulting wave
›
There are certain thresholds in the life of a company that must be crossed and, in so doing, fundamentally alter the business. In the world...
Friday, October 23, 2015
Hacker Hat-trick at TalkTalk
›
For the third time this year the UK broadband provider TalkTalk have seen their online defenses fall to cyber attackers. While the comp...
Tuesday, October 20, 2015
Ambulance Chasing vs Neighborly Support
›
The evolving world of Internet Security has a tendency to be a complex and bemusing arena for the professionals that make their living from...
Saturday, October 3, 2015
Experian Breached; T-Mobile Customer's Loss
›
The last couple of days has seen yet another breach disclosure - this time it's Experian , and the primary victims are 15m T-Mobile cust...
‹
›
Home
View web version