The-C2 Threat Intelligence Conference

The-C2 Threat Intelligence Conference

A Guide to Fortifying Cyber Defence Following cyber security best practices is not enough. Excellence in the face of ever-evolving adversaries requires a proactive and strategic approach combined with a solid understanding ...

First Quarter 2024 Cybersecurity Statistics

It’s only January, but already some interesting 2024 cybersecurity statistics are starting to emerge  Adding solid statistics to funding requisitions and internal documentation is fundamental to the work of any CISO in ...

The Urgency for Robust Utility Cybersecurity

The need for improved utility cybersecurity has never been more  critical   The utility industry, encompassing everything from water treatment facilities to nuclear power stations, represents the backbone of modern civilization. As ...
best anti-virus

Beware fake anti-virus reviews

You need anti-virus and there is a load of advice online about which to buy. Who can you trust? Some anti-virus reviewers know what they are talking about. Others don’t. Some are ...
🥇

Cyber Security DE:CODED – Cloud security

“As long as anything is online, it’s open for strangers to try to break protection” Show notes for series 2, episode 4 The ‘cloud’ is integrating with our lives at ever more ...
Cyber Security DE:CODED podcast

DE:CODED – Can Microsoft solve security?

“I have a PC… I like their delete key, which doesn’t exist on the Mac.” Show notes for series 2, episode 1 Can Microsoft solve security? Do you need anti-virus on your ...
Security planning for normal people

Security planning for normal people

The first security technique you should master! Security planning can make your life easier to manage. It’s easy to become paralysed when you consider all of the threats that exist and all ...
Cyber Security DE:CODED podcast

DE:CODED Series Two Episodes

All episodes of DE:CODED, Series Two New episodes on the last Wednesday of the month. Find all of the episodes from the award-winning DE:CODED Series Two in one handy place. Find all ...
Misconfigured Kafdrop Puts Companies’ Apache Kafka Completely Exposed

Misconfigured Kafdrop Puts Companies’ Apache Kafka Completely Exposed

This research refers to exposed data of organizations or individuals as a result of misconfigured infrastructure, not caused by the Kafdrop project itself. Highly committed to the The post Misconfigured Kafdrop Puts Companies’ ...
Why the recent Twitch breach means much more than “just” leaked source code

Why the recent Twitch breach means much more than “just” leaked source code

Amazon-owned Twitch, a massively popular video streaming service, was recently breached by hackers who leaked a massive pile of source code, data, unreleased products, payout reports, The post Why the recent Twitch ...