Cyber Threat

  • Security threats to watch have become real

    Being right so soon can be bittersweet! For those of you who missed my January webinar, I highlighted 5 security threats to watch out for in 2011 - malware, advance persistent threats (APT), fraud and insiders, mobile devices and...

  • The top 5 security threats to watch

    With the RSA Conference just behind us and the Infosecurity Europe conference in London coming up, it is worth taking a look at the top five cyber security threats that will be on the minds of the event attendees and other security professionals...

  • Time to tear down cyber walls

    In a blog post back in November, I commented about dealing with cyber threats and the progress we are seeing at the national level, especially here in the UK. The UK government elevated cyber to a Tier One threat, promised an additional £650...

  • A suitable response to cybersecurity

    With the recent publication of the strategic defence review, “Securing Britain in an Age of Uncertainty: The Strategic Defence and Security Review,” the UK in many ways is taking the lead in Europe when it comes to cybersecurity by...

  • Steps in the right direction

    In my last blog, “Working Together? Not Yet,” I commented on the need for more transparency in the reporting of compromised customer data. The catalyst for that blog was the cybertheft of funds from 3000 UK online bank accounts. The...

  • Working together? Not yet.

    Reading recent reports a couple of weeks ago on the compromise and illegal funds transfer from 3000 UK bank accounts, my first reaction I’m afraid was “so what”; after all, this is nothing new. Whether here or abroad, it seems...

  • Counting the cost of insider crime

    The recent high-profile coverage of data loss, such as the publication of classified army documents on the WikiLeaks site, has highlighted the issue of the insider threat once again. And a survey conducted by the Ponemon Institute on behalf of...

  • Military Intelligence and IT security

    I served in the US Army – specifically, in the Military Intelligence branch. When I share that fact with new acquaintances, some are impressed, some remind me that “Military Intelligence” is an oxymoron, but most believe that...

  • €œLeast privilege€ € time for a security rethink?

    The Ponemon Institute recently released a very interesting report (registration required), commissioned by our partners at Aveksa. Using data from interviews with over 700 IT pros, the report shows that access control problems are getting worse,...

  • No correlation without normalisation

    The SANS Institute recently released a whitepaper entitled SANS Log Management Survey: Mid-Sized Business Respond based on their annual log management survey but sliced to focus on businesses with fewer than 2000 employees. In the early...

  • A Formula for CyberSecurity Success

    I just spent a week in the Europe visiting customers, partners, and several mediaorganisations, andI was fortunate to host a group on a tour of the McClaren Formula 1 racing team factory, just outside of London. This tour was fantastic...

  • Small business still falling prey to cybercrime

    Dimension Data, the global IT solutions and services provider, published its Network Barometer Report 2010 last month. Interestingly enough, over one-third of all network devices surveyed had security or configuration vulnerabilities. The...

  • NATO, cyberdefence and death by a thousand cuts

    This past week, I joined three colleagues from the ArcSight UK team to attend the 13th NATO Cyber Defense Workshop. The venue was especially interesting, as it was held in Tallinn, Estonia. Recent history tells us that Estonia was the...

  • Rethinking our security defences

    UK businesses have seen a sharp rise in IT security breaches in the past two years, according to a recent report by PricewaterhouseCoopers entitled The Information Security Breaches Survey. In fact, despite increased spending on security...

  • Reflections on cloud, compliance and changing threats

    Infosecurity Europe Reflections: Cloud, Compliance and Changing Threats By Hugh Njemanze, Chief Technology Officer and Executive Vice President of Research and Development As the dust settles on the Infosecurity show, three topics,...

Latest UK