Contrarisk Security Podcast #0033: DDoS and information security

» Listen or download on the podcasts page » For a long time, the trends in DDoS have been towards a higher frequency of attacks and larger aggregate attacks. But more recently, there has been a significant trend towards the use of DDoS as part of multi-vector attacks, as a masking agent or enabling vector, where the intent has not been… Read more »

Contrarisk Security Podcast #0032: Smart buildings

» Listen or download on the podcasts page » The Internet of Things is truly upon us and all manner of devices are being Internet-enabled. Among these developments is the appearance of the so-called ‘smart building’, with web-based interfaces being used to control heating, lighting, safety and security systems and more. Adding Internet interfaces allows for remote management and reporting, and… Read more »

Review: Success Strategies from Women in STEM

Edited by Peggy A Pritchard and Christine Grant. Second edition, published by Academic Press. ISBN: 9780123971814. Price: €31.95, 518pgs, paperback. Ada Lovelace Day seems an appropriate time to publish this review. The domains of science, technology, engineering and mathematics (STEM) have often been difficult environments for women. And while great strides have been made in realising the previously untapped potential… Read more »

Contrarisk Security Podcast #0031: smarter alerts

» Listen or download now on the podcasts page » Attacks keep coming, and the number  of data breach stories we read in the media shows how often they are successful. We have to assume that any organisation of a reasonable size has monitoring and defence systems, in place so what’s going wrong? Of course, organisations invariably claim that the attack… Read more »

A note about this ‘cyber’ thing…

I know quite a few people – hackers mostly – who get quite snarky and condescending over what they see as the media’s overuse of the ‘cyber’ prefix. In fact, I’ve just had an email exchange with a friend on this very topic. The media, the thinking goes, always get their panties in a bunch whenever anything ‘cyber’ is involved,… Read more »

Clueless about the Internet

      1 Comment on Clueless about the Internet

UK Prime Minister David Cameron is in the US trying to get President Barack Obama to help him stop people being beastly on the Internet. And he’s also using the opportunity to prove to the world, once and for all, that he hasn’t even the faintest idea how the Internet works. Cameron wants to ban messaging apps that use end-to-end… Read more »

Contrarisk Security Podcast #0030: Identity and privacy

» Listen or download now on the podcasts page » With the Internet now playing such as intrinsic part of our lives, identity management (IM) has entered a new world. As Daniel Raskin, VP of marketing at ForgeRock, explains in this interview, what was once a simple matter of allowing employees to authenticate themselves on a local network has moved out… Read more »

Contrarisk Security Podcast #0029: Vulnerability monitoring

» Listen or download now on the podcasts page » Is the real threat to our security APTs or apathy? We all know that the software on our systems contains vulnerabilities and needs constant patching. And malware generally attacks well-known vulnerabilities that we have the ability to fix. So why isn’t it done? “If you can implement a good vulnerability management programme,… Read more »