Quantcast
Channel: cyber risk – Let's Talk Security
Browsing all 18 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Around the clock protection from cyber threats

A cyber-attack won’t announce itself or happen when it’s more convenient for you.  In fact it’s far more likely that you’ll be unaware of it until a supplier or customer notices a problem and raises...

View Article



Image may be NSFW.
Clik here to view.

Just say no to just saying no

By Martin Stemplinger, Senior BT consultant at BT Germany. Last week, I learned about a new kind of Denial-of-Service attack vector that uses a feature of WordPress. Hijackers utilised over 162,000...

View Article

Image may be NSFW.
Clik here to view.

GRC strategies and… Risk Management

By Roman Levda, Senior Security Consultant, BT. In our series so far, we have outlined Governance, Risk and Compliance (GRC) strategies, as well as having a more detailed look into Policy Management...

View Article

Image may be NSFW.
Clik here to view.

GRC strategies and… Compliance Management

By Roman Levda, Senior Security Consultant, BT. Compliance, like risk, forms an integral part of any GRC strategy. Rules and regulations are put in place in order to help all organisations work to the...

View Article

Image may be NSFW.
Clik here to view.

Launching a charm offensive: automatic and immediate defence against DDoS

by Rob Thatcher, BT Global Partner Account Manager, Juniper Networks. Nothing in the world of hacking stands still and Distributed Denial of Service (DDoS) attacks are no exception. Once aimed solely...

View Article


Image may be NSFW.
Clik here to view.

Data leaks — new public enemy number one

Gone are the days when public enemy number one was an unshaven face with shifty eyes on a wanted poster; today the biggest threats out there are usually unseen menaces, often springing from innocent...

View Article

Image may be NSFW.
Clik here to view.

The danger of the latest NTP attacks

By Ben Fischer, Arbor Networks. Who would have imagined that Network Time Protocol (NTP) — such an innocuous protocol designed to synchronise the clock on your laptop, smartphone, tablet, and network...

View Article

Image may be NSFW.
Clik here to view.

GRC solutions and…bringing it all together

By Roman Levda, Senior Security Consultant, BT. Here we are, at the final post in our series on GRC solutions, aiming to bring order out of chaos. We’ve taken a closer look at the function of GRC for...

View Article


Image may be NSFW.
Clik here to view.

Around the clock protection from cyber threats

A cyber-attack won’t announce itself or happen when it’s more convenient for you.  In fact it’s far more likely that you’ll be unaware of it until a supplier or customer notices a problem and raises...

View Article


Image may be NSFW.
Clik here to view.

Just say no to just saying no

By Martin Stemplinger, Senior BT consultant at BT Germany. Last week, I learned about a new kind of Denial-of-Service attack vector that uses a feature of WordPress. Hijackers utilised over 162,000...

View Article

Image may be NSFW.
Clik here to view.

GRC strategies and… Risk Management

By Roman Levda, Senior Security Consultant, BT. In our series so far, we have outlined Governance, Risk and Compliance (GRC) strategies, as well as having a more detailed look into Policy Management...

View Article

Image may be NSFW.
Clik here to view.

GRC strategies and… Compliance Management

By Roman Levda, Senior Security Consultant, BT. Compliance, like risk, forms an integral part of any GRC strategy. Rules and regulations are put in place in order to help all organisations work to the...

View Article

Image may be NSFW.
Clik here to view.

Launching a charm offensive: automatic and immediate defence against DDoS

by Rob Thatcher, BT Global Partner Account Manager, Juniper Networks. Nothing in the world of hacking stands still and Distributed Denial of Service (DDoS) attacks are no exception. Once aimed solely...

View Article


Image may be NSFW.
Clik here to view.

Data leaks — new public enemy number one

Gone are the days when public enemy number one was an unshaven face with shifty eyes on a wanted poster; today the biggest threats out there are usually unseen menaces, often springing from innocent...

View Article

Image may be NSFW.
Clik here to view.

The danger of the latest NTP attacks

By Ben Fischer, Arbor Networks. Who would have imagined that Network Time Protocol (NTP) — such an innocuous protocol designed to synchronise the clock on your laptop, smartphone, tablet, and network...

View Article


Image may be NSFW.
Clik here to view.

GRC solutions and…bringing it all together

By Roman Levda, Senior Security Consultant, BT. Here we are, at the final post in our series on GRC solutions, aiming to bring order out of chaos. We’ve taken a closer look at the function of GRC for...

View Article

Image may be NSFW.
Clik here to view.

What are you trying to protect, and why?

By Guus Van Es, General Manager, BT Security Consulting Europe. Do you believe the hype? Protecting what’s valuable to you is as old as mankind. Knowing what’s valuable and how to protect it has always...

View Article


Image may be NSFW.
Clik here to view.

How old cyber vulnerabilities threaten your organisation.

As we enter a new digital era, organisations need to re-evaluate their cyber security and focus on keeping their data and IT safe. In the early days of digital, cyber security was about protection,...

View Article
Browsing all 18 articles
Browse latest View live




Latest Images