Threats, Vulnerabilities, and Risks

Threats, Vulnerabilities, and Risks

As a business owner or employee in the UK, it's important to have a comprehensive understanding of the cyber threats, vulnerabilities, and risks that can impact your organisation. This blog post will ...

Ransomware and the C-I-A Triad

In earlier, more innocent (?) times, cyberattacks seemed to be fairly straightforward. You have the data exfiltration attacks, where copies of sensitive personal information and intellectual property are stolen, often without the ...

Key OT Cybersecurity Challenges: Availability, Integrity and Confidentiality

Organisations are still underestimating the risks created by insufficiently secured operational technology (OT). One current example comes from Germany. According to a report by heise.de, external security testers consider it “likely” that ...
Professionally Evil Fundamentals - Encryption

Encryption – CISSP Domain 3

We’re circling back to some more CISSP-related materials. Today’s topic will be encryption, which can be found in CISSP Domain 3. By its very nature, encryption is meant to hide the meaning ...
Image via  VPNPro

Nearly Thirty Percent Of Most Popular VPNs Worldwide Owned By Hidden Chinese Organizations

Image via VPNPro Jan Youngren, writing at VPNPro has developed ownership intelligence (PDF) pointing to ninety-seven VPN properties that are owned by twenty-three organizations based in Communist China. H/T, further Via. Read ...
Making Sense of Security, Privacy and Confidentiality in Texting

Making Sense of Security, Privacy and Confidentiality in Texting

Today, pretty much everyone is texting. It’s made life so much easier – send a message on your own time and preferred device, usually without having to stop what you’re doing, and ...

Data is the New Currency – Own Your Data or Someone Else Will

National Data Privacy Day reminds us how important it is to be empowered to take ownership to protect our privacy, control our digital footprints and advocate for the protection of privacy and ...
Controlling the Narrative: The Role of the Board of Directors

Controlling the Narrative: The Role of the Board of Directors

In an era where data breaches or leaks seem inevitable, business disruptions too frequent and the press all too prone to run away with a salacious story, what can the board of ...

Secure Payments of the Future

Protecting the safety and integrity of the U.S. payment system is a top priority and the responsibility of all stakeholders in the payments industry. Learn more about how the Secure Payments Task ...
Forget C-I-A, Availability Is King

Forget C-I-A, Availability Is King

In the traditional parlance of infosec, we've been taught repeatedly that the C-I-A triad (confidentiality, integrity, availability) must be balanced in accordance with the needs of the business. This concept is foundational ...