The other day, a colleague asked how I host my website, danbrown.co, which sparked an idea – why not share the details for anyone curious? Let’s dive into the setup that keeps my website running smoothly (mostly) and securely (for now). While many security professionals might gasp at detailing my website’s topology online, I’ve convinced…
As the threat landscape evolves and compliance requirements on organisations grow, senior management often finds itself with an ever-increasing cybersecurity spend that fails to mitigate threats effectively. The necessity for a proactive and cost-efficient defence strategy thus becomes more pressing than ever. Operationalising threat informed defence can bridge the gap between strategic intent and operational…
In the age of ever-evolving cyber threats, having an effective endpoint detection and response (EDR) strategy is critical to protecting your business’s sensitive data and operations. One key question that businesses face when considering an EDR solution is whether to utilise one or multiple EDR platforms. In this article, we’ll explore the debate and argue…
As IT professionals and decision-makers grapple with the challenges of effective cybersecurity, the need for a proactive and cost-efficient defence strategy is more pressing than ever. That’s where maximising cybersecurity ROI with threat informed defence comes into play. In this article, we’ll examine how implementing a threat-informed defence strategy can optimise your cybersecurity budget by…
Cloud adoption has continued to grow as more organisations implement a cloud-first strategy in support of digital transformations, mobility and IT agility. Organisations are at very different stages in their adoption, with a small percentage of organisations having more than half of their workloads in the public cloud. Despite the relatively low percentage of workloads…
On Monday, 13th July 2015 the Italian company ‘Hacking Team’, who design and develop surveillance software specifically to aid governments around the globe in hacking their own citizen’s devices, was itself the victim of a devastating hack. The company has been shrouded in controversy since Paris-based Reporters Without Borders listed it as a ‘Corporate Enemy’…
Windows 10 is finally here and the reviews are fantastic; everyone loves it. 24 hours after its release 14 million people had already downloaded and installed it. Yes, anything could have been better than the unbearable Metro menu of Windows 8, but it seems Microsoft have finally been able to built a multi-platform operating system…
The Onion Router – more commonly known as Tor – is a network that provides a high degree of anonymity by encrypting a user’s data multiple times on multiple levels. The data is routed through volunteer relays on Tor’s network. Each time the data reaches a relay a layer is removed and the next location…
Lenovo used a Rootkit like technique to reload bloatware into clean installs of Windows operating systems, leaving customers open to attack. Not long after Lenovo were caught selling computers with SSL hijacking malware pre-installed on them, another breach of their customers trust has been unveiled. Lenovo have been selling computers with an altered BIOS firmware…