• We've been hacked! Okay, I'll deal with it next week

    That was the message I got from a CEO when we presented evidence that their organization had been compromised and the attackers had been free to roam for months, resulting in the theft of terabytes worth of data. Actually, the exact words were ďSo weíve been hacked, eh? Well, itís Friday afternoon now so I will get my IT guy to look into it on Monday.Ē

  • Top 3 trends in today's threat landscape

    Every day there seems to be a new malware threat that we hear about, from remotely controlling cars and medical equipment, to attacks on well-known security vendors such as Kaspersky Lab and Bitdefender. Each threat seems to be bigger and more dangerous than the last.

  • The countdown to the EU Data Protection Regulation

    The scope of the changes under the proposed shift to a single EU Data Protection Regulation, means that organisations should be doing the groundwork now to ensure theyíre not playing catch-up with compliance when the Regulation comes into force. The new Regulation is designed to improve the protection and privacy of Personally Identifiable Information (PII) for every European citizen and will mean that the onus is firmly on businesses handling this information when it comes to data controls: from the location of sensitive data across the network, to governing access, storage and security.

  • Internet of Things: Connecting the security dots from application design to post-sale

    The age of Internet of Things is upon us. While itís still early days, Gartner predicts that by 2020, the Internet of Things will be made up of 26 billion connected devices and IDC estimates that $7.3 trillion in revenue will be generated by IoT components by 2017. Both of these statistics, understandably, have generated great interest from entrepreneurs and enterprise owners alike, leading to a flurry of new innovations to hit the market.

  • Don't sink your network

    Too many of todayís networks are easy to sink. One attack pierces the perimeter, and all of the organisationís most sensitive data comes rushing out. Soon after, their logo is slapped across the evening news as the pundits start circling the water.

    Modern ships are not built under the assumption that their hull is too strong to breach. In fact, they are designed to contain a breach as quickly as possible to keep the entire vessel from going under. Organsations can adopt this philosophy to make sure that one intrusion doesnít compromise all of their data.

  • Do attribution and motives matter?

    Whenever people think of APTs and targeted attacks, people ask: who did it? What did they want? While those questions may well be of some interest, we think it is much more important to ask: what information about the attacker can help organizations protect themselves better?

  • The price of the Internet of Things will be a vague dread of a malicious world

    Volkswagen didnít make a faulty car: they programmed it to cheat intelligently. The difference isnít semantics, itís game-theoretical (and it borders on applied demonology).

    Regulatory practices assume untrustworthy humans living in a reliable universe. People will be tempted to lie if they think the benefits outweigh the risks, but objects wonít. Ask a person if they promise to always wear their seat belt, and the answer will be at best suspect. Test the energy efficiency of a lamp, and youíll get an honest response from it. Objects fail, and sometimes behave unpredictably, but they arenít strategic, they donít choose their behavior dynamically in order to fool you. Matter isnít evil.

  • Applying machine learning techniques on contextual data for threat detection

    The momentum behind cloud computing couldnít be stronger as companies, governments and other organizations move to the cloud to lower costs and improve agility. However, you need look no further than headlines about the latest data breach to know how extremely important security architectures are amid this rapid cloud adoption.

  • Top 5 Android Marshmallow enterprise security benefits

    Googleís new Android Marshmallow operating system offers important new security and ease-of-use features that improve its functionality for both enterprise and individual consumers.

  • The evolution of the CISO in today's digital economy

    As the digital economy becomes ever more connected and encompasses all industries, weíre reaching a point where every company today is a technology company. Along with this transformation we have seen a commensurate explosion in the number of cyber attacks in recent years that only seems to increase in criminalsí strength, frequency and severity.

Videos      Podcasts


Credential manager system used by Cisco, IBM, F5 has been breached

Pearson VUE is part of Pearson, the world's largest learning company. Over 450 credential owners (including IT organizations such as IBM, Adobe, etc.) across the globe use the company's solutions to develop, manage, deliver and grow their testing programs.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Wed, Nov 25th