The Cyber Security Expert | Cyber Security Expert Blog
445
blog,ajax_fade,page_not_loaded,,qode-title-hidden,qode-theme-ver-12.1,qode-theme-bridge,wpb-js-composer js-comp-ver-5.4.2,vc_responsive

All devices directly connected to the public Internet are regularly probed.  The source is commonly an automated script of some type – depending on its purpose it could be described as a scanner, crawler, scraper, spider, bot or more. It’s important to remember that not all...

As 2016 closed, the US took the unusual step of releasing an report attributing a series of hacks, and subsequent leaks of stolen information, to Russian intelligence services (RIS in the vernacular of spooks). The report consisted of some technical analysis and indicators of compromise...

If you're at all interested in all things cyber security, then you will know this has been an interesting summer. Most notably, I think, have been the allegations (reasonably substantiated in my opinion) of Russian state backed hacking of, and subsequent leaking of material from,...

In this post I'm going to talk about the dark web. Even the name makes it sound scary - and a quick Google will confirm that impression. Lots of news stories about the horrors and bad things that lurk on the 'dark web'. But what...

If you read cyber security related stories in the news, or receive any kind of sales or marketing brochures from cyber security companies, you will doubtless hear that cyber attacks are becoming more 'sophisticated'. Additionally any company that ever has to publicly admit to being hacked...

If you follow cyber security in the news, or twitter or LinkedIn, you'll often hear debates about attribution - usually taking the form of Attack X is the work of Country Y. Most recently the attacks on the Swift network have been associated with the...

A couple of weeks ago I wrote a post giving some advice on what you should do first if you find yourself in charge of cyber security at your organisation. You can read it here. I thought I'd follow up on that post, with some...

Data breaches have been in the news a lot recently. We've had the Panama Papers, which have caused so many unflattering headlines for many of our clearly above board and honest guv'nor world leaders. A large amount of data apparently from Qatar National Bank turned...

I do a fair bit of training, and often I find people have come along on a intro to cyber security course because they have suddenly found themselves responsible for security in their organisation. So regardless of whether you are new to security, or an...

The idea of disruptive hacking has long been a favourite of the media and certain talking heads. The idea that a dedicated team with laptops could take out the power and other critical services across a whole country is one that captures the imagination, and...