Following on from last week’s blog post on the Verizon Data Breach Investigations Report (DBIR), here are some thoughts on the latest report from Trustwave. The eight Trustwave Global Security Report analyzes hundreds of data compromise investigations done by the firm across 17 countries. The key takeaways? Alarmingly, 97% of the applications tested by Trustwave…Read More
If there has ever been a universal law that impacts network security it’s the saying: communication is not what’s said but rather what’s heard. IT and security professionals are often so busy putting out fires that so many things are said in passing often goes in one ear and out the other. Exacerbating the challenge, IT and security are known to have some strong personalities (I was once part of that club!).
In the infosecurity sector, spring is the season of reports, with several leading vendors (AlgoSec included) releasing detailed reports on industry trends and incidents. One of the most established is the Verizon Data Breach Investigations Report (DBIR), which analyzes the types and frequencies of security incidents globally over the previous year and provides security and networking teams with useful information on how to improve their organization’s security posture.
Evaluating new security products in today’s world can be tough. Many CISOs and security professionals are seduced by the hype and promises of the shiny new security toys that are popping up like mushrooms. Yet more often than not, you don’t need to invest in these new tools. Just by getting back to basics and…Read More
Men Are from Mars, Women Are from Venus by John Gray was one of the best-selling nonfiction books of the 1990s. It asserts that men and women essentially come from different ‘planets’, and need to seek out greater understanding of each other’s wants, needs and ways of thinking in order to cooperate better in relationships….Read More
Passwords. They’ve been an integral part of information security since the dawn of computers – and they have been the bane of users’ lives for almost as long. We’ve all experienced the difficulties of trying to remember a dozen or more different passwords for different applications and devices, only to have to change them as…Read More
We’re proud to announce the launch of our new website! Our aim is to provide you with new and insightful content to help you make your enterprises more agile, more secure and more compliant. The website also reveals our new corporate identity as well as support for a mobile-optimized experience. To help you navigate the…Read More
Geo-IP blocking, or denying internet traffic from or to a certain geographical location based off of an IP address can be a very useful tool for preventing cyber attacks, malware, phishing, or spam. One thing to look for when blocking by country is the ability to block by country code – it allows for more…Read More
“The firewall is dead”, “Data is the new perimeter”, “Cloud will make the firewall obsolete” – these are just some of the quotes you hear now and again within the information security community. But I would like to counter them with a quote adapted from (renowned cybersecurity expert) Mark Twain – “The reports of the…Read More
A few weeks ago we released the findings of our latest survey, examining the State of Automation in Security. It showed that many companies are struggling. Struggling to rollout new business applications, struggling to migrate to the cloud or enter the software defined data era, struggling with outages, struggling to comply with regulatory requirements, and…Read More
This year we have already seen multiple security breaches making headline news, such as the Panama Papers breach we wrote about earlier this week and the Bangladesh heist we are about to cover below. Let’s hope there aren’t any more breaches, but in the meantime learn how you can help protect your organization against cyber-attacks…Read More
There has, unsurprisingly, been a vast amount of speculation as to the origins of the Panama Papers data leak. Initially it was thought to be an insider job, however a partner at Mossack Fonseca has now claimed they were the victim of hack, specifically a ‘spear phishing’ email attack. So far, so ordinary. Spear phishing…Read More