Of course in reality we don’t but at times it can be difficult to get the relevant committees or c-suite members to listen when the recent incidents or risk perception are low. We regularly read figures which demonstrate the attempted…
Of course in reality we don’t but at times it can be difficult to get the relevant committees or c-suite members to listen when the recent incidents or risk perception are low. We regularly read figures which demonstrate the attempted…
SCE Week is the global meeting place for security leaders active in the world’s most complex operating environments. Over four days in October, three separate forums will bring a wealth of experience and expertise in one place to demonstrate what success…
By Prof Alan Woodward Department of Computing, University of Surrey. Originally posted on BBC. Cybercriminals are more than willing to exploit instincts which make users vulnerable The phenomenon of “social engineering” is behind the vast majority of successful hacking. This…
We previously posted this article a while ago but it’s still just as relevant today….. But what exactly is the insider threat? What, or rather who, is an insider? Security professionals and government agencies all have their own definitions and…
> This report is worth a read it highlights how organisations may or apparently do use publicly available information on the internet to make decisions about current staff and potentially new members of staff. Media searches have been around for sometime…
> Rajib Karim, 31, from Newcastle (originally from Bangladesh) a former British Airways software engineer has been jailed for 30 years for plotting to blow up a plane. I think this is an excellent example of the insider threat (albeit…