Monthly Archives: June 2018
End users are one of the key battlegrounds between organisational security initiatives and hackers. Phishing, malware-laden email, and fileless attacks are some of the most widespread attack vectors, making end-users the first line of defence. The SANS Ouch! Newsletter is … Continue reading
A reminder of our BCS event at Ringwood Brewery on Thursday 28th of June. We have a couple of spaces left. Please see my earlier post for further information. Our events at BCS Dorset are also open to non-members!
http://blog.trendmicro.co.uk/global-bec-disruption-is-welcome-but-dont-forget-email-security A good summary of the issues industry faces, with a rising tide of BEC compromise attacks.
https://azure.microsoft.com/en-gb/blog/cray-supercomputers-are-coming-to-azure/ Cloud computing is a well understood concept, and the industry has adopted it extensively. But one topic that I’d not given much thought to despite following this trend for some time, is high performance and high end computing (HPC … Continue reading
https://www.darkreading.com/operations/artificial-intelligence-and-the-security-market-/d/d-id/1332116 An interesting take on the difference between Machine Learning (ML) and AI, at the foot of this article, caught my eye.
Wed 4th Jul, 7:00 for 7:30pm Bournemouth University, Talbot Campus (Poole), KG03 Lecture Theatre (Kimmeridge House) (Map)
Voice control and security is not the best combination. https://thehackernews.com/2018/06/cortana-hack-windows-password.html
A read across to your corporate mobile device security policy is the order of the day! https://securityweekly.com/2017/07/12/securecon/
Sophos have been offering this for a while on a free licence for home users, and it’s certainly worth a look. https://www.sophos.com/en-us/products/free-tools/sophos-xg-firewall-home-edition.aspx
A concerning development that really underlines the importance of not making assumptions about the trustworthiness of code. Even better, assume zero trust in every context. https://nakedsecurity.sophos.com/2018/06/18/apple-code-signing-flaw-could-have-made-mac-malware-look-legit/