Digital transformation: Visibility compliance in a transitional world

In this podcast, Darron Gibbard, Chief Technical Security Officer EMEA at Qualys, discusses digital transformation challenges, and illustrates what an organization has to do in order to stay compliant in this ever-changing world. Here’s a transcript of… Continue reading Digital transformation: Visibility compliance in a transitional world

Inferring Internet security posture by country through port scanning

In this podcast, Tod Beardsley, Director of Research at Rapid7, talks about the recently released National Exposure Index, which aims to better understand the nature of Internet exposure – services that either do not offer modern cryptographic pr… Continue reading Inferring Internet security posture by country through port scanning

Early detection of compromised credentials can greatly reduce impact of attacks

According to Blueliv’s credential detection data, since the start of 2018 there has been a 39% increase in the number of compromised credentials detected from Europe and Russia, compared to the same period in 2017 (January-May). In fact, Europe and Rus… Continue reading Early detection of compromised credentials can greatly reduce impact of attacks

The challenges of securing mobile workers and keeping data secure

Recently, Apricorn announced new research highlighting that 95 percent of surveyed organisations in the UK recognise problems with mobile and remote working, and nearly one in five (18%) suggest their mobile workers don’t care about security. In this p… Continue reading The challenges of securing mobile workers and keeping data secure

How third-party risk affects your GDPR compliance

In this podcast, Darron Gibbard, Chief Technical Security Officer EMEA at Qualys, discusses third-party risk and how it affects the GDPR compliance of your organization. Here’s a transcript of the podcast for your convenience. Hello. My name is Darron … Continue reading How third-party risk affects your GDPR compliance

Vulnerable ship systems: Many left exposed to hacking

Pen Test Partners’ Ken Munro and his colleagues – some of which are former ship crew members who really understand bridge and propulsion systems – have been probing the security of ships’ IT systems for a while now and the resul… Continue reading Vulnerable ship systems: Many left exposed to hacking

Would you delete your account if a social media provider misused your data?

With the Facebook scandal involving Cambridge Analytica still fresh in people’s minds, two-thirds of professionals admit they would delete their account if a social media provider misused their personal data. This is according to a snapshot poll of 220… Continue reading Would you delete your account if a social media provider misused your data?

Photo gallery: Infosecurity Europe 2018 Expo, part 2

Infosecurity Europe 2018 is underway at Olympia, London. Here are a few photos from the expo floor. Featured companies: Bomgar, Qualys, Fidelis Cybersecurity, Cisco, Nuvias Group.
The post Photo gallery: Infosecurity Europe 2018 Expo, part 2 appeared f… Continue reading Photo gallery: Infosecurity Europe 2018 Expo, part 2

Key challenges and frustrations of SOC workers

Technology challenges, hiring and staffing issues, processes and pain points, as well as finance and funding difficulties have the potential to limit the ability of SOCs to tackle ever increasing volumes of security alerts and potential cyber attacks, … Continue reading Key challenges and frustrations of SOC workers