Cyber Security

Codename TAO – The NSA’s Mass Surveillance and Tailored Access Operations

In this era of digital connectivity, privacy is a concept that is on the one hand prized, and on the other, severely compromised. The National Security Agency (NSA), known for being one of the largest intelligence gathering agencies in the world, has continuously found itself under intense scrutiny regarding its mass surveillance operations. Its mandate [...]

Codename TAO – The NSA’s Mass Surveillance and Tailored Access Operations Read More »

The subtle traps of sophisticated social engineering

Social engineering is on the rise. Increasingly sophisticated attacks are testing our ability to recognise scams and challenging businesses’ cybersecurity protocols. Orchestrators of such schemes exploit psychological vulnerabilities, targeting the human element of security systems rather than relying on conventional technological tactics. Their methods involve manipulating individuals so that they inadvertently reveal confidential information that

The subtle traps of sophisticated social engineering Read More »

The power of outsourced intelligence analysis

In today’s fast-paced business landscape, corporations face the formidable challenge of assessing unprecedented volumes of information. Increasingly, businesses are turning to outsourced intelligence gathering professionals to collect and make sense of vital open-source intelligence on their behalf. What are OSINT and HUMINT? While governments have a long-standing history with open-source intelligence (OSINT), the commercial world

The power of outsourced intelligence analysis Read More »

Chinese infiltration: espionage on the increase

The threat from within is being ignored. The intelligence community has been issuing warnings for companies doing business with China for some years. However, the situation in recent months has become far more serious, with the theft of intellectual property reaching unprecedented levels. The National Counter-intelligence and Security Centre (NCSC) recently warned of an update

Chinese infiltration: espionage on the increase Read More »

Corporate security: the ticking time bomb of in-house provision

In-house intelligence teams are no longer fit for purpose in safeguarding their business’ reputation and activities. Most of them lack the in-country experience and access to quality intelligence that is necessary for avoiding costly and embarrassing mistakes. Law firms, accountants and other businesses that rely solely on internal intelligence departments are playing a dangerous game

Corporate security: the ticking time bomb of in-house provision Read More »

The need for proactive investment in Cyber Security

In March 2023, Capita, a consulting digital services business, was hit by a cybersecurity breach. Compromised data from the organisation, which works with business and government, reportedly included individuals’ home addresses and passport images. Hackers were able to gain unauthorised access to Capita’s internal systems using a ransomware breach, through which less than 0.1% of

The need for proactive investment in Cyber Security Read More »

Cyber Security in the Workplace

IT vs Cybersecurity: Not where the battle lies Information technology (IT) is concerned with the storage and transmission of digital information. Cyber-security is the protection of the same: both the information, and the means by which it is stored or transmitted. It is crucial that the two are never seen as ‘at odds’ with each

Cyber Security in the Workplace Read More »

Mustang Panda, Hidden Dragon

‘Bronze President’ is not just another nickname for Donald Trump. It is a Chinese state-sponsored hacking group that has historically operated in the South Asian region, working across Hong Kong, Vietnam, and Burma (Myanmar), to gather sensitive information of interest to Beijing in its own backyard. But there are signs that the group’s targets are

Mustang Panda, Hidden Dragon Read More »

Business Risk Update

Welcome to the latest edition of ‘Business Risk Update’ – specifically for our clients and partners to provide a snapshot of latest news and articles from the business. The war in Ukraine has been raging for over two months and, despite heroic Ukrainian resistance, there is no end in sight. The grimmest predictions for the

Business Risk Update Read More »

Public enemies 123 article

Public Enemies No. 1, 2, 3…

Is the threat picture irrevocably changing? That’s the question posed by Director of MI5, Ken McCallum, in his second yearly annual threat update recently. Tellingly, ‘disruptive threats’ from states – defined by McCallum as ‘less visible’ when compared to the typical terrorist atrocities – are now put on a par with the latter – and

Public Enemies No. 1, 2, 3… Read More »

Scroll to Top