Research / Normal People and Infosec

Data Recovery Plans Matter

Data recovery plans are essential in times of natural disasters, as they ensure that critical data is protected and can be recovered quickly in the event of loss or damage. However, it is startling how few organisations have meaningful plans in place.

Read Story

The Pros and Cons of Password Managers

The Pros and Cons of Password Managers

Some people feel uncomfortable with the idea of entrusting all their passwords to a third-party software program. Simultaneously, others feel the convenience of generating, storing, and encrypting strong passwords, reduces the risk of their credentials being stolen. But regardless of …

Read Story

On Drones and Physical Security

On Drones and Physical Security

As commercial and non-commercial drones become more commonplace, so do their dubious applications. We profile several crimes enabled by drones, and how security professionals must now consider the physical implications of defending against such an attack.

Read Story

A Warning Tale on IT Security Reporting

Well-intentioned media organisations push hard to break stories in real-time, but at what cost? Inaccurate reporting, insufficient context, and no quality control often lead to misinformation and outright confusion.

Read Story

The FriendFinder Hack and the Value of Customer Data

The FriendFinder Hack and the Value of Customer Data

FriendFinder was the victim of a cyber attack leading to a data leak, including usernames and passwords for 412 million accounts. The hack is one thing, but the blackmail! Oh, the blackmail. First Published 16th November 2016 | Latest Refresh 13th September 2022 Stephen, 31, persists …

Read Story

The Rise of Cybersecurity as a Political Hammer

The Rise of Cybersecurity as a Political Hammer

To this day, governments have many reasons to try limiting the use of strong cryptography. However, when did this trend move into the mainstream consciousness and become an issue directly engaging wider society? Prior to the 2016 U.S. election cycle, a controversial bill was tabled wi …

Read Story

The Future of Passwords

Companies are entirely aware of the challenges posed by passwords as an authentication mechanism, and continue to find a way to replace them with something better. But are they good enough? And more importantly, are users ready to change?

Read Story

Yesterday’s Security Challenges Haven’t Gone Anywhere

Cyber threats are always evolving, and so we’re forced to rethink our security strategies. Whether it’s new malware or an old threat that resurfaces, history shows us we need to stay vigilant to make sure our defences are up to par.

Read Story

Human Nature and Strong Adversary Fiction

Human Nature and Strong Adversary Fiction

“The bad guys entered through an old blog post from 2012 and hit us hard. It was a State Actor, and our network is now under the control of Chinese Hackers who are wiping us out.” Yeah... okaay. First Published 23rd October 2019 | Latest Refresh 3rd February 2022 Those who are breache …

Read Story

The Privacy and Security of COVID-19 Tracking Apps

COVID-19 tracking apps are now commonplace, despite numerous security concerns from public advocacy groups and segments of wider society. First Published 12th May 2020 | Latest Refresh 30th November 2021 The race to launch Covid apps might have overlooked some basics. 3 min read | Ref …

Read Story

Subscribe by email