Ben, one of the team at Octagon, had a an article out yesterday describing their advanced threat protection solutions: Advanced Threat Protection – Octagon Technology
Time and security
A few weeks ago I was interested in a YouTube video about a highly accurate time card for PCs that would give better performance for the machines and could be used to enhance security. Just in time! – Octagon Technology Very accurate time is important for many security protocols and …
You can take all the defensive steps you can think of then there is a Zero-Day!
A zero-day attack refers to the gap between the “secret” launch of a cyber attack and the subsequent discovery of the attack and mitigation being available. In this gap your defences have not yet been updated because your security vendor is unaware there is problem. Your systems a laid bare …
Continue reading “You can take all the defensive steps you can think of then there is a Zero-Day!”
Fighting ransomware is more complicated than it first seems
Bruce Schneier has highlighted the range of conflicting choices that have to be made when combating organised cyber attacks: FBI Had the REvil Decryption Key
Attachments are a favourite attack vector
It obvious that for businesses to work they will be constantly exchanging email with clients, suppliers and internally and that many of these emails will contain important attachments. If we recognise this then so do the bad actors and they will exploit this business function if they can. Some attachments …
Continue reading “Attachments are a favourite attack vector”