News

How EDR is moving beyond the endpoint

More alphabet soup from security technology vendors. I read this as: "Current SIEM can't actually cope so we'll invent something new"...: [...] Traditional EDR technology collects telemetry data about events related to endpoints, such as application processes that connect to spe

Hackers can work out your online passwords just from the sound of your keystrokes, study finds

Public spaces are definitely not the best places to use passwords or deal with sensitive information. To add to the risks of shoulder surfing, CCTV and dodgy wifi, we now have keyboard eavesdropping. Your Acceptable Use Policy should include a section on "Where you can access com...

Opinion

Why risk management is vital for digital transformation

This from an interview with Sam Olyaei, senior principal analyst, Gartner. Do you have a threat model for your digital transformation program? I don't just mean the technology platform, but all the business risks associated with taking your business digital. If you were operating...

Technology

How EDR is moving beyond the endpoint

More alphabet soup from security technology vendors. I read this as: "Current SIEM can't actually cope so we'll invent something new"...: [...] Traditional EDR technology collects telemetry data about events related to endpoints, such as application processes that connect to spe

Encryption has created an uncrackable puzzle for the real world

Useful debate on encryption. One point it doesn't cover is the relatively simple countermeasure of fooling a targeted end user into installing a version of the client (WhatsApp, Signal, Telegram...) that enables surveillance. This already happens (take a look at dodgy VPN clients

Top