Shining a light on the security and governance issues facing enterprise IT
Too much emphasis is placed on external threats and not enough attention is paid to internal ones.
by Steve Girdler,managing director EMEA at HireRight
While cyber attacks and hacking make for good headlines, Steve Girdler, managing director EMEA at HireRight, argues that, for technology companies, too much emphasis is placed on external threats and not enough attention is paid to internal ones.
August 07, 2015 2:58:00 PM Read Full Post
A look at how cyberwar affects your organisation
Cyberwar has been 24/7 for a while already: teams of cyber mercenaries, governmental units, hacktivists, and individuals are breaking into various systems every second. Each cybercriminal has different objectives and goals of hacking, however their methods are similar.
May 19, 2015 4:44:00 PM Read Full Post
It's time for organisations to secure potential threats from Citrix and Terminal Servers
Citrix and Terminal Servers bring great benefits but they are also an attractive target for hackers. Cryptzone explains how best to protect your corporate data from attacks.
May 18, 2015 3:47:00 PM Read Full Post
Combine regular testing of physical disaster recovery procedures and automated data protection testing
When Hurricane Sandy struck New York, images of the storm-battered city soon eclipsed other pictures from its destructive course across the Caribbean and Atlantic. It also made clear nature’s effect on business. The New York Stock Exchange...
July 17, 2014 4:54:32 PM Read Full Post
If the attack happened in February or March, it€™s long past the point where a reset will stop possible secondary compromises
Megabrand eBay has fallen to the hackers - do the world’s most powerful brands know what they’re doing? Yesterday eBay set in motion what must be the largest password reset in Internet history after asking its entire user base of 230...
May 22, 2014 12:17:42 PM Read Full Post
Targeted cyberattacks are not random so risk assessment is complex
It is the calm before the cyber storm. Over the past several years, critical infrastructure cybersecurity has become a top-of-mind concern for utility managers and for governments alike. Ever since the Stuxnet malware damaged Iranian uranium...
May 13, 2014 11:47:37 AM Read Full Post
The great debate
One of the most interesting debates in IT/infosec circles is around the use of and reliance upon open source security software. Open source security software has its share of fans as well as detractors. As one of its avid fans, I started fiddling...
December 19, 2013 6:34:13 AM Read Full Post
Risky business outsourcing....
You can’t move much these days for news of PRISM whistle-blower Edward Snowden, the information security engineer who walked out of his job at US defence contractor Booz Allen Hamilton last month with “thousands” of top secret...
June 14, 2013 3:11:18 PM Read Full Post
Don't relax, but don't believe all the security hype
There’s no doubt that “Cyber Pearl Harbour” is a great headline, evoking memories of the devastating surprise attack by Japanese fighters on a US military base that forced the States into World War 2. Information security...
April 16, 2013 2:55:44 PM Read Full Post
Caesar, infrastructure, outsourcing and offshoring
I never wanted to spend my life in IT. I passed a programming exam at high school because I promised the teacher I would never return. It was the hardest 50% I ever had to work for! My passions were history and literature, and especially Latin,...
April 03, 2013 3:26:05 PM Read Full Post