Cyber Security

Cyber Security in the Workplace

IT vs Cybersecurity: Not where the battle lies Information technology (IT) is concerned with the storage and transmission of digital information. Cyber-security is the protection of the same: both the information, and the means by which it is stored or transmitted. It is crucial that the two are never seen as ‘at odds’ with each …

Cyber Security in the Workplace Read More »

Mustang Panda, Hidden Dragon

‘Bronze President’ is not just another nickname for Donald Trump. It is a Chinese state-sponsored hacking group that has historically operated in the South Asian region, working across Hong Kong, Vietnam, and Burma (Myanmar), to gather sensitive information of interest to Beijing in its own backyard. But there are signs that the group’s targets are …

Mustang Panda, Hidden Dragon Read More »

Business Risk Update

Welcome to the latest edition of ‘Business Risk Update’ – specifically for our clients and partners to provide a snapshot of latest news and articles from the business. The war in Ukraine has been raging for over two months and, despite heroic Ukrainian resistance, there is no end in sight. The grimmest predictions for the …

Business Risk Update Read More »

Public enemies 123 article

Public Enemies No. 1, 2, 3…

Is the threat picture irrevocably changing? That’s the question posed by Director of MI5, Ken McCallum, in his second yearly annual threat update recently. Tellingly, ‘disruptive threats’ from states – defined by McCallum as ‘less visible’ when compared to the typical terrorist atrocities – are now put on a par with the latter – and …

Public Enemies No. 1, 2, 3… Read More »

Honeypots

Russia: a difficult bear to lure

The laziness of hackers is making them smarter. Technological advance is offering new techniques to malign actors and honeypots provide the opportunity to observe how hackers operate. In new types of attack the “dirty work” is carried out by the machine drastically cutting human involvement and time. What it is worrying is not only that …

Russia: a difficult bear to lure Read More »

Cybersecurity with Donald Rumsfeld: where are your unknown unknowns?

News comes that in recent days, the UK launched a large-scale cyber-attack on Islamic State designed to “hinder and suppress” the group’s ability to co-ordinate and spread their words. While one might find it strange for a sovereign government to openly admit to this kind of provocation, the specific dynamics surrounding IS at least make …

Cybersecurity with Donald Rumsfeld: where are your unknown unknowns? Read More »

Scroll to Top