threat intelligence

Decoding zero trust in endpoint security: A practical guide for CISOs

The rapid pace of digital transformation has increased operational efficiency and enhanced the customer experience – but it has also created a nightmare for CISOs. From mobile devices scattered across the globe, laptops accessing sensitive data from coffee shop Wi-Fi, to a myriad of IoT devices, the exponential increase in endpoints has greatly expanded the attack…

Decoding zero trust in endpoint security: A practical guide for CISOs Read More »

The Security Interviews: Talking identity with Microsoft’s Joy Chik

After so long spent doing virtual calls with customers during Covid, Microsoft’s president of identity and network access, Joy Chik, is happy to be on the road again, so much so that since flying into the UK a couple of days before our meeting in London, she has filled her diary with customer meetings despite…

The Security Interviews: Talking identity with Microsoft’s Joy Chik Read More »

Suspected ransomware attack hits Scottish council

Public services across the Na h-Eileanan Siar – the Outer Hebrides – in Scotland continue to be disrupted following a suspected ransomware attack on the IT systems of the local council, Comhairle nan Eilean Siar. Writing on X, the website formerly known as Twitter, a spokesperson for Comhairle nan Eilean Siar said: “Access to Comhairle…

Suspected ransomware attack hits Scottish council Read More »

Revealed: How Russia’s Sandworm ramped up attacks on Ukraine’s critical infrastructure

Google Cloud-backed threat intelligence specialist Mandiant has shared details of a disruptive incident late last year, in which the Sandworm advanced persistent threat (APT) group, backed by Russian’s GRU intelligence and special forces agency, deployed novel techniques in a cyber attack on Ukraine’s power infrastructure. Sandworm is well known for its interest in Ukraine’s critical…

Revealed: How Russia’s Sandworm ramped up attacks on Ukraine’s critical infrastructure Read More »

Ransomware dwell times now measured in hours, says Secureworks

The cyber security industry has done so well at detecting suspicious activity that may be a precursor to a ransomware attack, that when cyber criminals succeed in breaking into a victim’s network, they are deploying and executing their lockers quicker than ever before, according to data contained in Secureworks’ annual State of the Threat report.…

Ransomware dwell times now measured in hours, says Secureworks Read More »

Red Cross issues rules of engagement for hackers in conflicts

The International Committee of the Red Cross (ICRC) has created the first ever “rules of engagement” for civilian hackers operating in conflict zones. The ICRC said that while civilian hackers operating in armed conflicts is nothing new, the outbreak of war between Russia and Ukraine has pushed their involvement to “unprecedented proportions”. It warned in…

Red Cross issues rules of engagement for hackers in conflicts Read More »

Shopping Cart
Scroll to Top