Security Spotlight

Shining a light on the security and governance issues facing enterprise IT.

  • When the collateral damage of cyberwar knocks on your door

    Cyberwar has been 24/7 for a while already: teams of cyber mercenaries, governmental units, hacktivists, and individuals are breaking into various systems every second. Each cybercriminal has different objectives and goals of hacking, however their methods are similar.

  • Putting the 'Cover' into Disaster Recovery

    When Hurricane Sandy struck New York, images of the storm-battered city soon eclipsed other pictures from its destructive course across the Caribbean and Atlantic. It also made clear nature’s effect on business. The New York Stock Exchange...

  • Open source security software

    One of the most interesting debates in IT/infosec circles is around the use of and reliance upon open source security software. Open source security software has its share of fans as well as detractors. As one of its avid fans, I started fiddling...

  • Why the UK shouldn't fear a Cyber Pearl Harbour

    There’s no doubt that “Cyber Pearl Harbour” is a great headline, evoking memories of the devastating surprise attack by Japanese fighters on a US military base that forced the States into World War 2. Information security...

  • The architects of our own destruction

    I never wanted to spend my life in IT. I passed a programming exam at high school because I promised the teacher I would never return. It was the hardest 50% I ever had to work for! My passions were history and literature, and especially Latin,...

  • The world's first cyberwar has started

    We can now say with some certainty that the world’s first cyberwar is upon us, unfolding behind the scenes with a rising level of intensity, so far pretty much ignored by all but the need-to-knows.On one side are the US and its European and...

  • How to secure everything, everywhere

    The typical business cannot afford to keep up with the short upgrade cycle that drives consumer purchases, but can increase efficiency and cut operational costs by allowing employees to use their own devices in the working environment, allowing...

  • Nobody is perfect - including certificate authorities

    According to Access, an international NGO that helps advocate for digital rights, “if a single one of the 650 public certificate authorities (CAs) that your systems support, by default, is compromised the entire system is compromised - so...

  • Digital forensics: proactive or reactive?

    Avecto examines the difference between proactive and reactive digital forensics and explains their contribution in the fight against malware and malicious activity For a number of years digital forensics has referred to ‘the application...

  • Court decision on bank malware is boost for customers

    Thefts from a construction company in Sanford, Maine might be the catalyst for much-needed improvements to banking security. The US First Circuit Court of Appeals reversed a decision that said that a bank was not at fault in a theft. Even better,...

  • There Weren't Really Chinese Backdoors in Military Chips

    In March, Cambridge researcher Sergei Skorobogatov and Quo Vadis Labs researcher Christopher Woods put up a draft paper on a cool new technique they used to ‘disable all the security’a security-enabled chip. It sat there until...

Latest UK