Every year around this time all the security businesses and analysts leap for their crystal ball and attempt to predict what
Alastair has worked for over a decade advising secure government and FTSE 100 clients on large-scale data analytics for risk and intelligence. Before founding Digital Shadows in 2011, Alastair was International Propositions Manager at BAE Systems Detica working with clients in the Gulf, Europe and Australasia. He holds a first class MEng in Computer Science from the University of Bristol.
Disinformation campaigns can take many forms; however, they generally follow three distinct stages
17/11/2017 11:21 GMT
In today's connected world securing your own network is simply not enough. Today your digital risk extends not only to your own servers, PCs and other devices in your offices and other locations; it also extends to your mobile workers and other staff working from home, customer sites and other remote locations. But the third, and often ignored, area of digital risk is your supply chain; companies that have access to your employee and customer information.
24/04/2017 17:15 BST
Malicious actors have a range of motivations, including geopolitical, ideological and espionage purposes. However, it is the financially-motivated cybercriminals we commonly see targeting the organizations we work with. These actors will go wherever the money is. Pure and simple.
27/03/2017 16:07 BST
We live in a world dominated by smartphones and tablets, and by the applications that run on these mobile devices. These applications help us with everything, including expenses, mobile banking, the weather and access to your corporate and personal email
16/03/2017 15:03 GMT
We need more people to realize cybersecurity is an interesting and exciting career so we can have the skills and expertise for the future that we need to protect people, governments and organisations from the menace of professional cybercriminality.
15/02/2017 15:55 GMT
09/02/2017 14:22 GMT
If I had been writing this blog even three years ago, it is probable I would have talked about needing to recognise the cyber risk and not bury our heads in the sand to the industrialised threat caused by professional cybercrime.
10/01/2017 15:07 GMT
In many ways, 2016 was very much the 'Year of the Ransomware Threat', and it is very hard to see that changing much next year. After all most cybercrime is driven by hard cash and the fact remains that most ransomware and extortion attacks are successful.
08/12/2016 14:25 GMT
The truth is that exposed credentials from adult dating sites hold particular value for cyber criminals given their potential to extort victims. Most subscribers to these services want to remain anonymous and don't want their employers or families to know. Users are likely to be prepared to pay large amounts of money to prevent their details being exposed online where others can see them.
23/11/2016 13:46 GMT
Clearly cyber attackers have their sights firmly set on everything we do online these days and that requires us, as citizens, business people and government representatives to take a different view of cybersecurity.
07/11/2016 16:07 GMT
Clearly companies, both large and small, need to act now and start putting in place robust standards and procedures to counter the cyber security threat, or face the prospect of paying drastically increased costs in regulatory fines, as well as the reputational harm to their brand.
24/10/2016 14:12 BST
Criminals have known for years that people are the weakest link in any organizations' defenses, and that by cracking one person's account, they can effectively crack the multi-million dollar software and hardware investments.
26/09/2016 10:04 BST
But news last week that car manufacturer Volkswagen has set up a special cybersecurity firm to protect smart connected vehicles from attack by hackers and other undesirables, would tend to suggest smart device security is getting "real" and is now part of business consciousness.
19/09/2016 12:03 BST
Of course, just because an app asks for these sorts of permissions does not mean there is necessarily anything underhand going on, but it seems the more convenience driven we become with our technology, the more casual we become with our digital profiles.
30/08/2016 14:06 BST
Our data is at risk and increasingly professional hackers target the connected devices we all rely on at home and in business, as they are often the weak spot in our cyber defenses extending our digital footprint even further into the web.
24/08/2016 13:10 BST
SUBSCRIBE AND FOLLOW
Get top stories and blog posts emailed to me each day. Newsletters may offer personalized content or advertisements. Learn more