technology

Cyber Security: Awareness Programmes: Are They Really Working? And What to Do About it? By JC Gaillard

When some people say they don’t know what to do around cyber, you may want to ask them where they have been for the last 10 years…

For a number of years, I have been puzzled by the high idea some cyber security professionals seem to have that their job is about convincing other people: Convincing users that they need to do certain things to protect themselves and their data; Convincing the Board that they need to invest more to protect the business, etc…

Indicators of Attack – A Proactive Approach to Cyber Defence

In an era where attacks are increasingly more sophisticated, it is critical that the defensive capabilities you employ can collect, assemble, and interpret the data flowing through your network.

These data fragments are the building blocks of intelligence that form early warning signs that your network may be under attack and being able to identify these vital warning signs can dramatically decrease the Mean-Time-To-Mitigation (MTTM).

The New Talent Code Unlocking Talent Potential

People are the focal point for all successful organisations and skills are looking to be the new currency as we navigate into the new world of work. How do we understand skills at the same basic level that we would understand our emails? How can you understand the current state of your talent infrastructure and comprehend where we need to get to?

The Cyber Security Pyramid of Pain – Defending Against Attacks

Written by Marten Cureton and Tom Sadler


The Pyramid of Pain was created by security professional, David J Bianco, in 2013, while he was threat hunting and working on incident response. The Pyramid ranks, in ascending order, the list of indicators used to detect an attacker’s activities and how much “pain” it will cause the attacker by denying these different indicators, as well as the effort and difficulty to find each indicator for the security analyst.