On the 17th January we will be at Paddington Academy in London to participate and exhibit in the annual year 9 and sixth form Career Day.
“Many cyber actions that seem routine at first glance can actually decrease the stability of security programs and processes often unintentionally.”
One of the problems with technology is the fact that there are way too many acronyms. They always used to be three-letters (think RAM, ROM, HDD etc.) but more recently they’ve expanded to become four. The last year or so has been dominated by GDPR but prior to that there had been a lot of talk about CASB but few people know what it is or what it’s for.
It’s customary at this time of year to look back at the previous 12 months and try and predict what may be on the cards for the coming year. However this time we felt we should just focus on what may be coming, what to budget for and how to deal with it.
There have been recent reports stating that there is a remote possibility of a security vulnerability affecting computer processors manufactured by the AMD, ARM and Intel. There are two separate vulnerabilities, known as Meltdown (CVE-2017-5754) and Spectre (CVE-2017-5753 and CVE-2017-5715). Meltdown affects Intel chips only whilst Spectre affects all 3 manufacturers. As yet there has been no evidence of this in the wild and customers are being advised to follow patching procedures they have in place for the processor hardware and operating systems running on them.
Our partner Check Point Technologies earned the highest security effectiveness score on NSS Labs’ Breach Prevention System test as well as a 100% block rate and lowest TCO scores – with their single 15600 Next Generation Threat Prevention and SandBlast (NGTX) security gateway. This is NSS Labs’ first test of advanced threat prevention products, where the ability to prevent attacks – rather than detect – was tested, providing independent validation of the assertion that done correctly, cyberattacks can be prevented.
David King, technical director of Secon Cyber Security recently had the following published in British Computer Society Magazine.
INCIDENTS and BREACHES. These are the two words a CISO, CIO, CFO or CEO don’t want to hear. They can mean a myriad of things to each person. The CEO will be worried about Sales and reputation; the CFO worries about fines and operational impact; the CIO probably anxious about keeping his or her job and the CISO will be trying to understand what went wrong.
News about Kaspersky has hit the headlines again this month after first surfacing in September 2017 with regard the US. That followed further intervention after the software manufacturer was originally removed from a list of approved vendors in July. Back then, there was a concern that the Russian administration could use the software to gain entry in to U.S. networks or U.S. government agencies.
Gartner® has again positioned Forcepoint as a leader in the Enterprise DLP market, based on their ability to execute and their completeness of vision. Leaders in the Gartner Magic Quadrant have products that work well for clients with midsize and large deployments. Forcepoint, a specialist in protecting the human point and cyber security insider threat detection has been a leader for nine consecutive years.
What is “Bad Rabbit” Ransomware?
Cyber attacks using malware called “Bad Rabbit” were reported in Ukraine and Russia beginning Tuesday, October 24th, causing disruptions to Ukraine’s transportation infrastructure, Russian media outlets, and several other organizations.
London, 2nd October, 2017 – Secon Cyber Security are pleased to announce a new strategic partnership with CheckRecipient, a leading provider of next generation email security technology.
Secon Cyber Security, who specialise in next generation cyber security solutions including a bespoke Managed Detection and Response service, will be acting as an approved CheckRecipient reseller for the UK market.
On September 5th 2017, CLOUDSEC is back at the Park Plaza Westminster Bridge Hotel.
Cloudsec gathers some of the finest security and IT experts from around the world to discuss relevant cyberattack cases, ransomware, the latest cybercrime tactics and trends, corporate IT structure and strategies and best practices for overcoming hurdles in cybersecurity.