Cyber security investigations often mean carrying out tasks that by the letter of the (US or UK) are illegal – it is the nature of the job. In the United Kingdom we have two critical pieces of legislation that a cyber security consultant could fall foul of: Computer Misuse Act …
Just how much and often is your data shared? UPDATED 19 May 2022
This post was originally published on 17 May 2022 Update 19 May 2022 The numbers just keep getting bigger! This article in The Register, has the Irish Council on Civil Liberties, stating that our data is shared up to 987 times a day, when the Real Time Bidding (RTB) industry …
Continue reading “Just how much and often is your data shared? UPDATED 19 May 2022”
The insider risk
We have a training session that just covers the issue of what happens when a trusted member of your team goes rogue, either by accident or, worse, deliberately. This is the insider threat – an organisation cannot operate without trust and if that trust is abused what can you do. …
Satellite cyber-attacks, WhisperGate, AcidRain and the spread of the Russia Ukraine cyber conflict
Statements have been made this week by the European Union, the United States and other allies relating the WhisperGate cyber attacks that were directed at Ukraine but spilled over into the greater Europe damaging thousands of modems. This damage had the knock on effect of crippling wind turbines and subsequent …
More metrics for cyber crimes in the US
President Biden has signed a bill that will charge various departments of the US Government to create a taxonomy for cyber crimes and to analyse and publish these results. Other measurements for responses and effectiveness of cyber security responses will be collected, published and acted on. If cyber crime, the …