Cloud security policy: The questions you need to ask

What would your reaction be to someone who told you that “The Cloud” is so secure you don’t need to do anything else to protect your data? I would hope that your reaction would be somewhere between the RCA Dog head tilt and Dramatic Chipmunk. But from anecdotes I’ve been hearing, this gem of very questionable advice is … More Cloud security policy: The questions you need to ask

Firefighting, security and compliance

FireMon conducted a survey at Infosec Europe this year and apparently discovered that cybersecurity professionals manage to be both overworked and underutilized. That’s a feeling which I’ve been quite familiar with myself from time to time over the years, but I was a little surprised that the article cited above was entitled ‘Tired of fighting fires … More Firefighting, security and compliance

Hi, I’m the enemy: Different perspectives on a pentest

Today we are starting a series of articles showing the different angles that can be taken when tackling a pentest. “A PENTEST RECREATES THE ACTIONS CARRIED OUT BY AN ATTACKER IN ORDER TO IDENTIFY ANY VULNERABILITIES” Let’s start by defining what that is. A pentest is an audit process that involves carrying out controlled attacks … More Hi, I’m the enemy: Different perspectives on a pentest

Authentication 101

Authentication may sound like a very complicated concept, but it’s quite simple: a way of showing that you are who you say you are. In the offline world this process is simple and universal. Most countries have well-documented procedures by which you can get a passport that demonstrates your identity wherever you go in the … More Authentication 101