2|SEC Cyber Security Blog

The Cyber Sentinel

Stay on top of the latest news and updates to stay ahead of the latest threats

News

“Select collaboration tools carefully to keep data secure” by Tim Holman, writing in Computer Weekly

How can businesses of all sizes ensure that employees are able to collaborate effectively without the risk of compromise to the company IT network or systems? Secure collaboration between internal and external teams is essential for project success, but using free or cheap tools can lead to security failings. For example, the popular collaboration tool

“Select collaboration tools carefully to keep data secure” by Tim Holman, writing in Computer Weekly Read More »

Carbanak requires people, process and tech, but mostly people

The Carbanak malware was injected into the bank targets using sophisticated spear phishing emails. When employees clicked on the email attachments, they downloaded malware onto their computers. The malware used was completely undetectable by anti-malware programs. The malware took advantage of a zero-day exploit to install itself on users’ machines. It lurked for a long

Carbanak requires people, process and tech, but mostly people Read More »

We are proud to be leading sponsors of ISSA-UK in 2015

As you probably all know, I’ve always been extremely appreciative of my close professional connection with ISSA-UK. (Information Security Systems Association) This year, we are very proud to be leading sponsors of the UK Chapter of ISSA-UK.  ISSA is the largest international, not-for-profit association specifically for information security professionals, and the ISSA-UK Chapter is the world’s most successful

We are proud to be leading sponsors of ISSA-UK in 2015 Read More »

Use the Sony breach to plan for the worst – Tim Holman in ComputerWeekly.com

On hearing about the Sony hacking attack back in 2014, one of our 2-sec penetration testers speculated it would probably be an inside job  – a recently fired ex-employee that knew all about the vulnerabilities in the Sony system, or maybe sensitive data being leaked and distributed from contract software developers. These types of breaches and

Use the Sony breach to plan for the worst – Tim Holman in ComputerWeekly.com Read More »

Cybersecurity spending: How to know when enough is enough – Tim Holman in ZD-Net

Such is the cybersecurity threat that it would, in theory, be possible for CIOs to dedicate most of their IT budget to building impregnable defences. Consultant PWC reports that the average large business spent about $10.8m on information security during 2014. Analyst Gartner, meanwhile, estimates that the average company allocates about five per cent of

Cybersecurity spending: How to know when enough is enough – Tim Holman in ZD-Net Read More »

The CISO, the CIO, the CEO, or you: Who is really responsible for cybersecurity? Tim Holman speaking to ZDNet

The security threat continues to grow and IT leaders struggle to deal with an ever-increasing danger. Yet the cyber threat, however significant, only forms one element of corporate security. So who should be responsible for security and how can businesses adopt a more proactive stance to the threats they face? Five IT experts give their views.

The CISO, the CIO, the CEO, or you: Who is really responsible for cybersecurity? Tim Holman speaking to ZDNet Read More »

How cyber-vigilantes catch paedophiles and terrorists lurking in the dark web – Tim Holman in the International Business Times

Buying cocaine or heroin has never been easier. Neither has finding a contract killer, joining an extremist group or viewing extreme pornography. The Deep Web – the dark underbelly of the internet – is growing and allowing users to surf beneath the ordinary surface web with almost complete anonymity. The GCHQ and FBI are constantly

How cyber-vigilantes catch paedophiles and terrorists lurking in the dark web – Tim Holman in the International Business Times Read More »

Scroll to Top