Expert analysis
Infosec shouldn’t eat their own, we’re better than this
Security teams the world around are putting in hours every day to keep their company’s most prized assets secure. These are professionals that have spent considerable time …
Another KRACK in the network perimeter
When a high profile vulnerability surfaces that is as far reaching as KRACK, a WPA2 encryption attack to hijack Wi-Fi networks, it’s common to respond impulsively. “Why are …
Using a robust platform for cyber threat analysis training
We have recognised threats coming more regularly from varied origins such as nation-states, hacktivist and cybercriminal actors. Coupled with many new public policies aimed at …
Why wait to be breached? Three reasons to secure your data now
“I’m working on it.” “We don’t have room in this year’s budget.” “Something else more important came up.” “Well, we’ve not been …
In wake of recent attacks, it’s time to revisit your patch policy
Hurricanes hammered the United States last month and cyber attacks continue to rain down throughout the world. The EternalBlue v1SMB vulnerability continues to be a focus of …
Protecting networks from DNS exfiltration
Everyone around the globe has heard about the colossal Equifax breach last month. Its implications haven’t yet been fully calculated except now that the CEO has resigned from …
Is this the year SIEM goes over the cliff?
While this may not be the year that Security Information and Event Management (SIEM) solutions fall off of the cliff of relevancy into obsolete software land, they are slowly …
Sophisticated threats? It’s usually the basic ones that get you
To listen to the headlines, the threats we face today are so sophisticated and intense, they can only be evaded with the help of artificial intelligence and machine learning. …
Cyber threat analysis in complex adaptive systems
The use of wartime analogies in cybersecurity is common in our industry. Sun Tzu is often quoted in presentations and papers to emphasize an author’s key point. I will spare …
Three things to know about the dark web
One of the more curious aspects about the dark web is that it didn’t start out as such a dark place: it began with bulletin boards in the 80s and 90s – the markets of …
AI will change the face of security, but is it still the stuff of sci-fi?
The technology industry has always had a big problem with hype, with marketing teams, analysts and the media alike tending to fixate on the next big thing that will …
iPhone X gets facial authentication, is the enterprise next?
This week, Apple debuted the iPhone X which kills the Touch ID fingerprint scanner in favor of a 3D facial scanning technology called FaceID. Soon, iPhone users will depend on …
Featured news
Resources
Don't miss
- GitHub CISO on security strategy and collaborating with the open-source community
- Chainsaw: Open-source tool for hunting through Windows forensic artefacts
- Time for a change: Elevating developers’ security skills
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance