Research

How to Condense Your Cyber Security Training Scope

The range of IT securities capabilities you can train for is limitless, and some domain areas are more valuable than others. Therefore, the right question is not "What training do you want", but "What training is good for you".

Read Story

On Drones and Physical Security

On Drones and Physical Security

As commercial and non-commercial drones become more commonplace, so do their dubious applications. We profile several crimes enabled by drones, and how security professionals must now consider the physical implications of defending against such an attack.

Read Story

A Warning Tale on IT Security Reporting

Well-intentioned media organisations push hard to break stories in real-time, but at what cost? Inaccurate reporting, insufficient context, and no quality control often lead to misinformation and outright confusion.

Read Story

The Fifth Third Bank Breach - Banks and Insider Threats

We’re starting to see a pattern emerge in the reporting that financial institutions use when they’re breached. Fifth Third Bank, one of the top 20 banks in the US, is yet another high-profile organisation to have suffered a major security incident. First Published 25th February 2020 | …

Read Story

Stop 3rd Party Security Vendor Backdoor Leaks Before They Bite

Several major networking equipment providers were found to have backdoors in their firmware that exposed private keys and even allowed remote code execution. If you’re not yet worried, then you’re not paying attention.

Read Story

The Black Market for Accounts

While black markets have existed since the early days of the internet, recent technological changes have made them a much more lucrative and popular option than before. The value of credentials for services like Disney+, Netflix and AWS will continue trending upward as long as there’s …

Read Story

InterContinental Hotels Group Card Data Hack

InterContinental Hotels Group Card Data Hack

If reports were correct, this was one of the hospitality industry's largest data breaches to date. With nearly 1,200 hotels affected, the breach was large enough to reach out and touch a significant portion of the 61 million IHG stays per year. First Published 20th April 2017 | Latest …

Read Story

Cybercrime in an Interconnected World

Cybercrime in an Interconnected World

Cybercriminals are not confined to one region or culture, but operate throughout the interconnected world to capitalise on evolving opportunities to steal customer data and transfer funds. Published 25th May 2016 | Latest Refresh 13th September 2022 A web that reaches from a pocket in …

Read Story

Proof of Attack vs Proof of Attacker

Proof of Attack vs Proof of Attacker

When a system is said to be under attack, compromised or a breach is suspected and/or detected, given the physical and technical challenges, is it even possible to prove who did it? First Published 15th December 2016 | Latest Refresh 13th September 2022 Sufficient due process to separ …

Read Story

The FriendFinder Hack and the Value of Customer Data

The FriendFinder Hack and the Value of Customer Data

FriendFinder was the victim of a cyber attack leading to a data leak, including usernames and passwords for 412 million accounts. The hack is one thing, but the blackmail! Oh, the blackmail. First Published 16th November 2016 | Latest Refresh 13th September 2022 Stephen, 31, persists …

Read Story

Subscribe by email