Preventing a Global Security Crisis: Why we need industry self-policing before the bubble bursts

“Our investment-strategy was simple. People hate to think about bad things happening so they always underestimate their likelihood - Charlie Geller, The Big Short. The above quote was one of man …
view article
  • Share

The TrickBot and MikroTik connection

In my professional capacity I perform several tasks. One task involves tracking and collecting indicators of compromise (IoC) used to identify malware campaigns. Another aspect of my work involves tra …
view article
  • Share

Can exposing vulnerabilities in your IT environment actually makes you less attractive to attackers?

Cyber threats are like monsters under the bed. You can’t say for sure whether they’re really there or what they even look like, yet they still give you an uncomfortable feeling that they’ll cree …
view article
  • Share

Staying strong in the evolving threat landscape

In an age of ever-increasing technological complexity amid an evolving security threat landscape, it’s almost inevitable that more and more household names become the victims of cybercrime. As or …
view article
  • Share

How easy is it to hack corporate passwords?

Businesses, by their very nature, are attracted to standards. Predictable practices bring scale and efficiency to everyday work. While there are many areas of corporate work where predictability is a …
view article
  • Share

Discover why password practices pose a threat to thousands of UK businesses at UK CyberSecurity Summit 2018

Password security is a major cause of concern for businesses, as the combination of loose and predictable practices with increasingly complex IT networks creates a potentially lucrative opportunity fo …
view article
  • Share

Is threat intelligence really intelligent?

Threat Intelligence is a sound proposition that has its place in a mature security operation. But like so many good concepts in our industry, its path to commercialization has involved commoditization …
view article
  • Share

The scary lessons we learned from hacking ourselves

This may seem an unusual thing for a security provider to admit, and it feels a little uncomfortable to us, but we recently uncovered a flaw in our own defences when we staged a security attack agains …
view article
  • Share

Uncomfortable Truths, Black Swans and Unknown Unknowns: Getting to the real facts about cybersecurity

As security professionals, it’s our job to understand the threat landscape and keep a careful watch on the latest tactics cybercriminals are employing. What’s becoming clearer, however, is that th …
view article
  • Share

SecureData becomes the highest accredited Palo Alto Networks Service Partner in Western Europe

SecureData, the leading independent cybersecurity services provider, is delighted to announce receiving two prestigious awards at the Palo Alto NextWave Channel Partner Annual Awards UK ceremony on Th …
view article
  • Share