Secure IoT Platform


Internet connectivity is a two-way street. With these devices becoming a gateway to our homes, workplaces, and sensitive data, they also become targets for attacks. Look around a typical household and consider what could happen when even the most mundane devices are compromised: a weaponized stove, baby monitors that spy, the contents of your refrigerator being held for ransom. We also need to consider that … Continue reading Secure IoT Platform

Malware to steal data from POS systems is widely available


On December 22, 2017, Jason’s Deli was notified by payment processors that credit card security personnel had informed it that a large quantity of payment card information had appeared for sale on the “dark web,” and that an analysis of the data indicated that at least a portion of the data may have come from various Jason’s Deli locations. From initial investigation findings, criminals deployed … Continue reading Malware to steal data from POS systems is widely available

Cyber Security Defense in Depth Strategies


There is no silver bullet cyber security solution. According to Network Computing, defense in depth is: “The practice of layering defenses to provide added protection. Defense in depth increases security by raising the cost of an attack. This system places multiple barriers between an attacker and your business-critical information resources: The deeper an attacker tries to go, the harder it gets. These multiple layers prevent direct … Continue reading Cyber Security Defense in Depth Strategies

The untold story about ‘bitcoin’ – #cyberattack


Bitcoin is no stranger to controversy. It has weathered various storms over its security. But that is no guarantee that bitcoin will cope well in the future. One of Japan’s largest cryptocurrency exchanges has revealed that it’s lost nearly $400 million in a security breach. Coincheck says that it has restricted deposits and withdrawals for a cryptocurrency called NEM. Marko Kobal, co-founder of NiceHash, the Slovenian startup … Continue reading The untold story about ‘bitcoin’ – #cyberattack

The digital world needs an “immune system.”


Chronicle was born in 2016 as a project within X, Alphabet’s moonshot factory. They see a future where enterprise security teams can find and stop cyberattacks before they cause harm. By applying planet-scale computing and analytics to security operations, Chronicle provide the tools teams need to secure their networks and their customers’ data. Stephen Gillett is the CEO​ and Co-Founder​ of Chronicle. Stephen joined Chronicle from Google​, … Continue reading The digital world needs an “immune system.”

Marketing Blockchain Solutions – Jeremy Epstein


Jeremy Epstein (@jer979) is an expert marketer helping companies make sense of solutions built on blockchain technology. In this episode, Jeremy and I discuss and define blockchain and what are some of the most common issues when marketing the idea to new customers. Join is and listen to how inefficiencies in the healthcare, mortgage, insurance and other industries can use blockchain technology to create value … Continue reading Marketing Blockchain Solutions – Jeremy Epstein

Transform your ‘Security Operations Center’


CIOs can take control to secure from the data breaches. Over a decade the cyber security landscape has evolved rapidly and the magnitude of cyber-attacks increased ever before. The future of information security threats will continue to accelerate massively, endangering the integrity and reputation of trusted organisations. This week, the industry experts at Davos WEF 2018 witnessed several cyber security trends and developments including the … Continue reading Transform your ‘Security Operations Center’