-
#InfosecurityEurope: Angoka Named UK’s Most Innovative Cyber SME of 2023
PRIVACY PRIVACY The DSIT jury awarded the prize to the Belfast-based smart city security provider with a unanimous decision Read More
-
Hybrid Microsoft network/cloud legacy settings may impact your future security posture
PRIVACY PRIVACY Once upon a time, the boundary that I worried about and considered that I was responsible for stopped at my Active Directory domain and at the firewall that protected it. Then the boundary of my network moved from the computers under my control to the internet and the connected devices and cloud applications…
-
#InfosecurityEurope: Internet of Things Continues to Pose Security Risk
PRIVACY PRIVACY The growth of IoT and connected devices is contributing to an expanding attack surface, despite upcoming legal controls Read More
-
Smashing Security podcast #327: Mark’s metaverse for minors, and getting down to business
PRIVACY PRIVACY There’s some funny business going on on Google, and Zuckerberg’s $14 billion bet on the metaverse is beginning to look a little childish… All this and more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault. Read More
-
Why you should review the security of your MSSQL servers
PRIVACY PRIVACY Brute-force credential guessing attacks against database servers are ramping up with MSSQL being at the top of the target list. That’s because attackers can leverage the many extensibility features that Microsoft’s database server provides to integrate with other Windows components and features to elevate their privileges and gain full control of the underlying…
-
Why Malware Crypting Services Deserve More Scrutiny
PRIVACY PRIVACY If you operate a cybercrime business that relies on disseminating malicious software, you probably also spend a good deal of time trying to disguise or “crypt” your malware so that it appears benign to antivirus and security products. In fact, the process of “crypting” malware is sufficiently complex and time-consuming that most serious…
-
Ransomware attacks pose communications dilemmas for local governments
PRIVACY PRIVACY In the early morning of May 3, the City of Dallas, Texas, was hit by a ransomware attack, for which the Royal ransomware gang later took credit. The city’s police, fire rescue, water service payment, and development systems, among others, were significantly hampered by the incident, forcing many departments to revert to handwritten…
-
#InfosecurityEurope Hall of Fame: Becky Pinkard, Managing Director of Global Cyber Operations, Barclays
PRIVACY PRIVACY Infosecurity Europe inducts Becky Pinkard, Managing Director of Global Cyber Operations at Barclays, into the Hall of Fame Read More
-
#InfosecurityEurope: From Passion to Profession, Becky Pinkard’s Dedication to Cybersecurity
PRIVACY PRIVACY Infosecurity Europe inducts Becky Pinkard, Managing Director of Global Cyber Operations at Barclays, into the Hall of Fame Read More
-
Ethical Problems in Computer Security
PRIVACY PRIVACY Tadayoshi Kohno, Yasemin Acar, and Wulf Loh wrote excellent paper on ethical thinking within the computer security community: “Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversation“: Abstract: The computer security research community regularly tackles ethical questions. The field of ethics / moral philosophy has for centuries considered what it means to…