Folder Information security

Documents

default Seven things you need to know about the ‘GHOST’ vulnerability Popular

By 2264 downloads

Another vulnerability shocked the Linux world on 27th January 2015. The Qualys security research team found a critical vulnerability in the Linux GNU C Library (glibc) that allows attackers to remotely take control of an entire system without having any prior knowledge of system credentials. What does it mean for Linux system administrators? Was it really a shocking event? Here's everything you need to know.

default Six steps to a robust cyber security strategy Popular

By 803 downloads

This October marks the 16th annual Cybersecurity Awareness Month, and this should serve as a reminder that businesses of all sizes need to implement strong cyber security. Graham Marcroft highlights six areas that combine to help create a holistic cyber security strategy.

default Solving the bulk password theft puzzle Popular

By 2277 downloads

Nick Lowe explores how current security measures against bulk data theft from organizations are broken: and how they can be fixed.

default Something stealthy lurking? Why you need to inspect SSL traffic Popular

By 2094 downloads

Jeff Harris explores the security blind spot created by growing volumes of SSL-encrypted data, and how to approach SSL inspection to get complete visibility of threats without compromising performance.

default Stuck on zero trust? DNS might have an answer

By 77 downloads

Organizations taking an ‘all or nothing’ zero trust often find that they struggle to implement it effectively, especially when it comes to application access control. Chris Buijs explains why integrating DNS into the zero trust framework can help.

default Taking the guesswork out of cyber security Popular

By 135 downloads

Saket Modi, CEO at Safe Security, explains why he thinks the current way of doing cyber security in many organizations is broken as far too much of the risk analysis and associated decisions are based on estimates and guesswork, instead of using a knowledge-based approach.

default Ten IT security predictions for 2018 Popular

By 1351 downloads

Ian Kilpatrick gives his thoughts about the security year ahead. Emerging issues include the IoT security time-bomb, GDPR blackmail, and rising DDoS attacks. More encouragingly, 2018 may see increased boardroom commitment to information security.

default Ten lessons from a cyber attack response exercise Popular

By 2442 downloads

Business continuity consultant, Charlie Maclean-Bristol FBCI, recently conducted a response exercise using cyber attack as the scenario. In this article he captures ten lessons learnt from conducting the exercise.

default The evolution of the penetration test for the Internet of Things era Popular

By 2221 downloads

Toby Scott-Jackson explores how penetration testing has changed: and how it must continue changing in the future to remain a crucial tool in helping manage cyber risks as organizations move into the epoch of the Internet of Things.

default The missing link in cyber resilience? Popular

By 595 downloads

Organizations need to embrace a mindset of continuously identifying - and closing - gaps in their cyber security posture to ensure the organization is as secure as it can be. To achieve this a person, or team, needs to be appointed to this role says Matt Cable.

default The right way to IaaS: achieving secure flexibility and scalability Popular

By 764 downloads

Infrastructure as a service (IaaS) offerings allow enterprises to focus on business growth, gain flexibility and scalability, as well as achieve significant cost savings. However, IaaS also raises some unique data leakage concerns that must be addressed. Anurag Kahol looks at three cornerstones of security when considering IaaS platforms...

default The security and compliance issues related to instant messaging use Popular

By 1607 downloads

Most organizations now allow employees to use IM in some capacity; or their employees use it anyway! And with IT teams under a lot of pressure, the risks of data leakage that come with IM are often forgotten about. Thomas Fischer thinks that IM threats are worth talking about…

default The security risk of fragmented identities: dealing with the dangers of identity sprawl Popular

By 312 downloads

Kamel Heus explores the concept of identity sprawl, the risks associated with it, and suggests five best practices which organizations can implement to help ensure a robust identity consolidation strategy.

default The seven deadly sins of incident response Popular

By 2260 downloads

Security success is no longer just about keeping threats out of your network, but instead about how quickly you can respond and thwart an attack when it happens. This article highlights ‘seven deadly sins’ that organizations often commit when attempting to build an incident response function.

default Tips for choosing the best encryption solution for your organization Popular

By 2179 downloads

Encryption can be a response to many data security requirements – but only if you choose the proper solution, implement it thoroughly and don’t overestimate its power.

default Tips for creating a cyber security risk assessment Popular

By 360 downloads

While most organizations have been conducting regular risk assessments in traditional areas for many years, cyber risk assessments are still in their infancy for many. Here Barry O'Donnell offers some tips to ensure that there are no gaps in your cyber risk assessments.

default Trends and developments in ransomware Popular

By 381 downloads

Ransomware has rapidly become the key cyber threat to organizations globally, with the number of bad actors increasing and extortion tactics evolving. Joseph Buckley looks at trends in this area and how the ransomware threat is likely to develop in the future.

default Trust no-one: a quick guide to the zero trust security model Popular

By 834 downloads

First developed in 2010, the zero trust security model has recently grown significantly in popularity. Jan van Vliet explains why zero trust security offers several benefits over and above traditional network-based security approaches; and describes the fundamental aspects required for implementing it.

default Using deception to improve cyber resilience by turning the tables on attackers Popular

By 575 downloads

Throughout history, deception has been a critical component of military activities. Now that most organizations are continuously targets of cyber attacks deception provides a way to stay ahead of cyber attacks instead of feeling like we’re always one step behind. Carolyn Crandall explains further...

default Using the power of machine learning in effective network security Popular

By 1903 downloads

Derek Lin believes that the key to effective security is to take a people-centric approach, understanding each and every user’s normal or baseline behaviour. No easy task, but machine learning makes it possible.

A website you can trust

The entire Continuity Central website is scanned daily by Sucuri to ensure that no malware exists within the site. This means that you can browse with complete confidence.

Business continuity?

Business continuity can be defined as 'the processes, procedures, decisions and activities to ensure that an organization can continue to function through an operational interruption'. Read more about the basics of business continuity here.

Get the latest news and information sent to you by email

Continuity Central provides a number of free newsletters which are distributed by email. To subscribe click here.