Wednesday, May 12, 2021
isBuzz

Time To Take The Guesswork Out Of Cyber And Quantify Risk

For too many organisations, the early approach to cyber risk quantification (CRQ) has been too manual of a process, takes too long, produces questionable results, and has failed to gain… The ISBuzz Post: This Post Time To Take The Guesswork...
isBuzz

COVID-19 A Year Later: Cybersecurity Best Practices At Home Haven’t Improved

After more than a year of working from home, research shows not much has changed when it comes to addressing the remote work cybersecurity challenge. According to the COVID-19 Cybersecurity… The ISBuzz Post: This Post COVID-19 A Year Later: Cybersecurity...
isBuzz

Line Of Duty And Criminal Education

Without doubt the BBC TV Drama Line of Duty kept us all on the edge of our seats as we tuned into every episode, seeking to unmask the corrupt officer… The ISBuzz Post: This Post Line Of Duty And Criminal...
isBuzz

The Babuk Gang ARE Back IN Town

It was back in Q4/20 when the UK based Outsourcing company serco were warned they were running with digital insecurities – something which was leveraged by the Babuk Gang when… The ISBuzz Post: This Post The Babuk Gang ARE Back...
isBuzz

Defence In Depth – Time To Start Thinking Outside The Box

Spam Prevention, Anti-Virus, Intrusion Prevention – these are just a few solutions you may already be using as part of your cyber security strategy. Whilst these are all effective in… The ISBuzz Post: This Post Defence In Depth – Time...
isBuzz

Ready, Set, Go! Rapid Cloud Adoption Risks Leaving Businesses In A Post-whirlwind Slump

The rapid acceleration in cloud adoption underpins a significant shift in the way we work, and this has only intensified since the pandemic. Many organisations fast-tracked their cloud migration or… The ISBuzz Post: This Post Ready, Set, Go! Rapid Cloud...
isBuzz

The Digital Road To Perdition

Travelling back to the early days of the Computer Virus entering the world of low cost, COTS (Commercial Off the Shelf) available computing, we may reflect on a few home… The ISBuzz Post: This Post The Digital Road To Perdition...
isBuzz

Debunking Three Cyber Insurance Myths For SMEs

“What, me worry?” While this disposition worked for Mad magazine’s Alfred E. Neuman for decades, it’s not advisable for small and medium-sized enterprises (SMEs) in considering cyber insurance. Large companies,… The ISBuzz Post: This Post Debunking Three Cyber Insurance Myths...
isBuzz

How To Protect Your Enterprise When You Can’t See Your Employees

The lines between our professional and personal lives are blurring and that includes our online behaviours. Businesses can protect their networks by mitigating those behaviours, but meanwhile, cybercriminals are launching… The ISBuzz Post: This Post How To Protect Your Enterprise...
isBuzz

Understanding The Psyche Of A Modern-day Hacker

The common image of a hacker is a hooded figure in a basement, perhaps with the infamous anonymous mask on. However, cyber attacks are actually carried out by sophisticated cyber… The ISBuzz Post: This Post Understanding The Psyche Of A...
isBuzz

The (Cyber)Education Of Man

We have all seen the Evolution of Man image, where the ape develops slowly from a hunched figure on all fours to an upright, conscious human being. Recently, I was… The ISBuzz Post: This Post The (Cyber)Education Of Man appeared...
isBuzz

In-house Versus Externally Managed Security Services

A Security Operations Centre (SOC) is a centralised unit that deals specifically with security issues on behalf of companies, at both an organisational and technical level. Most SOCs comprise of three building blocks: people,… The ISBuzz Post: This Post In-house Versus Externally Managed Security...
isBuzz

Women’s History Month- The Challenges And Opportunities For Women In Cybersecurity

March is Women’s History Month with this year’s theme being “choose to challenge.” From a cybersecurity perspective, the number of women in this sector is increasing rapidly and it’s an… The ISBuzz Post: This Post Women’s History Month- The Challenges...
isBuzz

Cybersecurity Threats To The COVID-19 Vaccine

We’ve already seen our fair share of pandemic-driven fraud and cybercrime, but what can we expect as vaccine rollouts pick up pace worldwide? Cyber Espionage to Steal Vaccine Data A viable… The ISBuzz Post: This Post Cybersecurity Threats To The COVID-19...
isBuzz

Defending Your Business From The Changing DDoS Attack Landscape

Cyber-crimes are changing and businesses need to understand how to protect themselves from falling victim to online attacks. Cyber-criminals are operating on an increasingly sophisticated level. One trend that particularly… The ISBuzz Post: This Post Defending Your Business From The...

Half of Government Security Incidents Caused by Missing Patches

Half of Government Security Incidents Caused by Missing PatchesCybersecurity is both a driver and a major barrier to public sector IT modernization, according to new research from BAE Systems Applied Intelligence. The cyber consultancy polled 250 managers with IT responsibility...
SecurityWeek

Germany Halts Facebook Sharing WhatsApp Data

A German regulator on Tuesday slapped a three-month ban on Facebook collecting user data from WhatsApp accounts and referred the case to an EU watchdog, citing concerns about election integrity. read more
The Register

Blessed are the cryptographers, labelling them criminal enablers is just foolish

Preserving privacy is hard. I know because when I tried, I quickly learned not to play with weapons Column  Nearly a decade ago I decided to try my hand as a cryptographer. It went about as well as you...
The Hacker News

Ransomware Gang Leaks Metropolitan Police Data After Failed Negotiations

The cybercrime syndicate behind Babuk ransomware has leaked more personal files belonging to the Metropolitan Police Department (MPD) after negotiations with the DC Police broke down, warning that they intend to publish all data ransom demands are not met. "The...
Security Affairs

NSA and ODNI analyze potential risks to 5G networks

U.S. Intelligence agencies warn of weaknesses in 5G networks that could be exploited by crooks and nation-state actors for intelligence gathering. The U.S. National Security Agency (NSA), along with the DHS Cybersecurity and Infrastructure Security Agency (CISA), and the Office...