<img height="1" width="1" src="https://www.facebook.com/tr?id=1046809342117480&amp;ev=PageView &amp;noscript=1">

VSEC Blog: IT Security Channel News brought to you by Infinigate UK

Passwords are not Dead but Complex Ones are

Posted: 21 June 2017

In a world of ever faster computing power, the thought that passwords should become simpler appears to be going against the grain. Yet, in May of 2017, the highly regarded American agency, NIST (National Institute of Standards and Technology), ended its consultative period for a new report into password guidelines. Contained within were some surprises about what we have come to believe about the security of complex passwords.

Read Article

Eight Steps to Prepare for a Summer of Ransomware

Posted: 14 June 2017

After the events of May 2017, cyber security teams may finally be able to eat from the adults table of respect at organisations worldwide. What had been predicted, yet often ignored for more than a decade, had materialised in the form of the WannaCry cyber attack; a service-extinction level event which rendered some of the world’s most famous brands and the UK's health service crippled and ultimately red-faced.

Read Article

WannaCry: The Worlds Cybercrime Wake-Up Call

Posted: 15 May 2017

If there was a person in the world who didn’t know what ransomware was, they probably do now. On Friday the 12th of May 2017, what was initially dismissed as an issue on NHS (National Health Service) England’s IT system quickly developed into a global incident involving computers, laptops and servers in 150 (and still counting) countries.

Read Article

According to the GDPR, it is In Force Already

Posted: 04 April 2017

We have all been conditioned to fear the arrival of May 2018. Hell-fire, brimstone and a newly powerful Information Commissioners Office (ICO) will rain administrative fines from the skies. Yet, for those who have summoned the ability to stay awake long enough to brave the final pages of the regulation, article 99 suggests its implementation date is less clear than originally thought.

Read Article

GDPR Myths and Monsters

Posted: 23 March 2017

Everybody has heard of fake news. Any politician worthy of their claim to modernity has dispensed the term as a battle cry against challenging forces. Bias, misunderstanding, spin, bending the truth are just some of the linguistic aliases which sit on a sliding scale of innocent mistake to concocted falseness.

Read Article

GDPR and the DPO: Five Things to Know About Your Next Job Vacancy

Posted: 24 February 2017

If the GDPR (General Data Protection Regulation), the EUs data protection harmonisation project, was to become a Hollywood movie, its genre would most likely be horror. Focus on the regulation over the past twelve months has been mostly aimed toward its penalties, with scare stories in no short supply.

Read Article

Could Cybercrime be the most Profitable Industry in the World?

Posted: 23 February 2017

2016 will be written in the history books as a turbulent twelve months. One which saw large fluctuations in currency values, a fall in the price of oil, the political fallout of Brexit, India’s savage attempt to reduce corrupt payments, the tussling of the election of the President of the United States, endless record busting data breaches and denial of service attacks affecting entire geographical regions.

Read Article

The Great GDPR Sale

Posted: 23 January 2017

If I had earned £1 for every time I was asked “which IT security solutions help with the incoming GDPR (General Data Protection Regulation)?” I would be able to purchase every possible solution myself. Only that would still fail to answer the question because it’s just not that simple. Nothing ever is.

Read Article

How Secure Is Google Drive?

Posted: 12 January 2017

Exfiltration is a decidedly unpleasant word, and it’s rarely connected with Google’s benign application suite used freely by millions all over the world — Google Apps. Specifically, how secure is Google Drive?

Read Article

How To Secure Data In Motion

Posted: 13 December 2016

While it’s important to secure data no matter where it lives, data in motion is at its most vulnerable for hackers and needs to be a focus point for your security and compliance efforts.

Read Article

When Keywords Become Buzzwords We All Lose Out

Posted: 08 December 2016

The pen is mightier than the sword is a phrase that can never be truer than in cyberspace, a place where words define your very ability to be noticed in a crowd.

Read Article

The GDPR and it's Perpetual Time Stress Torture

Posted: 07 December 2016

Ever since the invention of the sundial, nothing has haunted humanity more than a lack of time. Mans curse to bear forever since is to periodically mutter the phrase "there's not enough hours in the day" in the hope the planet may spin a little slower and grant us our wish. It hasn't worked yet.

Read Article

Free Public Transport Fares, Courtesy of Ransomware

Posted: 05 December 2016

The IT security industry is a noisy one of late, with endless corporations being breached and new regulations promising to hit them on unhealed wounds as a response. It's easy to be distracted from some of the quieter risks often which can be found recharging at the benefit of lesser scrutiny.

Read Article

Low Risk, High Yield: Why Bank Heists Have Gone Cyber

Posted: 01 December 2016

Contrary to the teachings of The Italian Job movies, bank robberies were generally reserved for the more desperate of criminal-kind. Fraught with risk and danger, they weren't well known for having a positive outcome for the perpetrator.

Read Article

Could Technology Have Helped Prevent the Tesco Bank Breach?

Posted: 30 November 2016

Big network breaches are becoming the norm with little resistance seemingly being placed in the attackers path. Is this the world we must become accustomed to living in? or can technology be part of the solution rather than just the problem?

Read Article

Artificial Intelligence Will Save Encryption from Irrelevance

Posted: 25 November 2016

Some time ago I read an article which suggested that humankind was fast reaching "peak knowledge". It explained that the depth of discovered knowledge meant the time required to specialise in a field had exceeded the lifetime of a human itself.

Read Article

GDPR is Supposed to Make Business Easier... No Kidding

Posted: 10 November 2016

IT security loves fear, it's the very foundation upon which it is built. Much like the physical security world, without the fear of the possible, there would be no risk and no purpose to reduce it.

Read Article

Shadow IT and Why There's a Hillary Clinton Lurking in All of Us

Posted: 01 November 2016

From the very beginning of her bid to become the Democratic Party nominee through to her race for the US presidency, Hillary Clinton has been tormented by earlier revelations about her mistaken use of a private email server.

Read Article

Red Tape at the Ready, EU Eyes IoT for Regulation

Posted: 28 October 2016

There are a lot of things people dislike about the EU (European Union), but we can all agree that it scores top marks when it comes to creating swathes of regulation.

Read Article

Hear from cybersecurity expert Amar Singh as he leads VSEC Conference 2016

Posted: 26 October 2016

Infinigate UK’s annual VSEC Conference is an event that ought to take priority in your calendar this November. Following on from last year’s success, delegates can expect to hear from an exclusive selection of high profile and recognised keynote speakers 

Read Article

Googles Quest to Shame You into Being More Secure

Posted: 12 October 2016

It is the stuff of legend that at the advent of the internet, there were no IT security advocates present to argue the case against a future such as ours and the character S was deemed an unnecessary inclusion to protocols such as HTTP (Hyper Text Transfer Protocol).

Read Article

The GDPR Has Been Invited to Dinner and it's Hungry for First Victims

Posted: 10 October 2016

Whether you were aware or not, the UK Data Protection Act has been protecting your digital identity and personal data since 1998 – a relative dinosaur in the fast-changing world of IT. However, as of April 2016, this piece of legislation has been given a two year expiration date. 

Read Article

Have We Become Our Own Worst Cyber-Threat?

Posted: 05 October 2016

The old anecdote of the frog placed in slowly heated water, unaware of the gradually escalating danger until it is too late is a poignant one, for more than just the gruesome ending, and can be applied to every day cyber security practise. 

Read Article

DDoS gets Super-Charged with a Dose of IoT

Posted: 30 September 2016

If you thought the DDoS (Distributed Denial of Service) hype had faded, think again. A record busting attack of 1Tbps has been measured this week originating from a botnet comprised primarily of IoT (Internet of Things) devices.

Read Article

Fancy Bears Hack Team Earns Second Gold Medal

Posted: 14 September 2016

The Fancy Bears Hack Team have earned their second gold medal of 2016 by breaching the World Anti-Doping Agency...again.

Read Article


Share via:


Subscribe to VSEC Blog Updates

Popular Posts