The enemy is (largely) within, when it comes to the security of information and information systems. Knowing how and why insider threats materialise is a big step towards dealing with them.
While cyber security may have you thinking in zeros and ones, and wondering which next generation firewall you should buy next, the human element is alive and well in cyber crime.
So, it’s that time of the year again, when we look back over the last 12 months in business continuity to see… nothing?
Does Father Christmas know just how exposed his operation is? With one of the largest address books ever conceived (names, addresses, gift preferences of billions of people) and a seasonal workforce of elves that may or may not have been vetted before hiring, Santa’s gift selection, preparation and delivery system may be hugely at risk.
The idea behind threat hunting is that some attackers are getting too smart for current IT security technology.
First, there was the virtual machine. Then came the container. Now, welcome to the unikernel, the latest initiative for atomising computing.