How tech trends and risks shape organizations’ data protection strategy

Trustwave released a report which depicts how technology trends, compromise risks and regulations are shaping how organizations’ data is stored and protected. Data protection strategy The report is based on a recent survey of 966 full-time IT professio… Continue reading How tech trends and risks shape organizations’ data protection strategy

Major gaps in virtual appliance security plague organizations

As evolution to the cloud is accelerated by digital transformation across industries, virtual appliance security has fallen behind, Orca Security reveals. Virtual appliance security The report illuminated major gaps in virtual appliance security, findi… Continue reading Major gaps in virtual appliance security plague organizations

Cyber Security Roundup for October 2020

A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, October 2020.
COVID-19 wasn’t the only virus seriously disrupting the start of the new UK academic year, … Continue reading Cyber Security Roundup for October 2020

Patching in the Time of Remote Work

It’s imperative that employers implement a patch cadence, regardless of whether employees agree with it This may sound controversial, but unfortunately, my experience shows it to be true: When humans are prompted to do something without risk or reward… Continue reading Patching in the Time of Remote Work

Best Practices / Standards / Tools for an OEM Vulnerability CERT? [closed]

For OEM selling high volume global connected consumer electronics products, I am reviewing best practices for setting up a dedicated corporate network security community emergency response team (CERT) for identifying security vulnerabiliti… Continue reading Best Practices / Standards / Tools for an OEM Vulnerability CERT? [closed]

New Bluetooth Vulnerability

There’s a new unpatched Bluetooth vulnerability:

The issue is with a protocol called Cross-Transport Key Derivation (or CTKD, for short). When, say, an iPhone is getting ready to pair up with Bluetooth-powered device, CTKD’s role is to set up two sepa… Continue reading New Bluetooth Vulnerability

Cyber Security Roundup for September 2020

A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, August 2020.Taking security training courses and passing certification exams are common ingredients in th… Continue reading Cyber Security Roundup for September 2020

Researchers aim to improve code patching in embedded systems

Three Purdue University researchers and their teammates at the University of California, Santa Barbara and Swiss Federal Institute of Technology Lausanne have received a DARPA grant to fund research that will improve the process of patching code in vul… Continue reading Researchers aim to improve code patching in embedded systems