Category: Best Practice

Best Practice

To open source or not to open source

This is one of the most controversial topics in technology – if free open source software is “better” than paid and maintained software. This is a big topic for discussion, but I only want to focus on the security element between Windows/Linux/OS X and iOS/Android.

Read More »
Best Practice

MicroHard

As usual, there have been a number of announcements regarding Microsoft vulnerabilities and risks over the last few weeks. This episode however is different than the usual list of critical patched or patchable issues and brings some serious underlying issues to light.

In this blog we will endeavour to put the pieces together in order to illustrate the potential risk and identify prioritised mitigation strategies to Prevent, Detect and React.

Read More »
Best Practice

Not so secret source……

In the third week of September (this year), it was announced that a very, very serious vulnerability had been lurking in the Microsoft Netlogon Remote Protocol which enables an attacker to provide a password of all zeros and gain Administrator privileges.

Read More »
Best Practice

Cyber Attackers: Are they are coming for the SME’s?

When exactly did cyber-attacks become part of normal everyday life? I don’t think that there is an exact answer to that question. The main stream media only focus on attacks involving large household brands and they don’t really ever report on smaller companies

Read More »
Best Practice

Best Practise Crypto Guide

Recent research from an SC Media survey of information security professionals provides some insight here, with 43 percent of respondents expecting threat intelligence to offer an “early warning of new threats and tactics” immediately and with minimal effort.

Read More »
Best Practice

Unencrypted protocol usage – call to action!

Recent research from an SC Media survey of information security professionals provides some insight here, with 43 percent of respondents expecting threat intelligence to offer an “early warning of new threats and tactics” immediately and with minimal effort.

Read More »