A Conversation With The Invisible Man

A Conversation With The Invisible Man

Not everyone can sit in a meeting with hard-headed senior officials at a major defence contractor and introduce themselves as Freaky Clown. But this guy can. When you’ve broken into thousands of military and government buildings, you get a certain level of self confidence. Freaky Clown, who calls himself FC for short, is a UK-based […]

Read more
When Smart Contracts Aren't So Smart

When Smart Contracts Aren’t So Smart

Sarah Friend and John (J) Maurelian are smart contract security gurus, at a time when most people still don’t really know what a smart contract is. The software experts, from Ethereum development studio Consensys, spend their time rooting out programming flaws that could cost blockchain users hundreds of thousands of dollars, and they’re ready to tell some […]

Read more

Fixing Insecure Code, One Developer At A Time

When she moved from coding into security, Tanya Janca just couldn’t bring herself to leave software development alone. That’s a good thing for the rest of us. When she found cross-site scripting (XSS) problems cropping up in one developer’s code, she asked if it would be ok to come spend some time with him at […]

Read more
when clouds rain data

How A Map of the Cloud Leaked Online

Another day, another treasure trove left publicly available in the cloud by a hapless admin. This time, GoDaddy found the configuration details for its servers in full public view on an Amazon Simple Storage Services (S3) bucket. Security firm UpGuard discovered the data languishing online in June stored on the Amazon service, which enables customers […]

Read more

Can A Standard Framework Make Cyber-Insurance Easier?

Rising data breaches and increasing compliance concerns are increasing interest in insurance against cyberattacks, but taking out cyber-insurance policies can be complex and uncertain. How can companies make it easier? At the 2017 SecTor conference last November, we sat down with Dave Millier, founder and CEO of security services company Uzado, to talk about a […]

Read more

Why Cryptocurrency Is An Easy Target For Thieves

Another day, another cryptocurrency hack. Earlier this month, cryptocurrency conversion platform Bancor lost $23.5m in cryptocurrency after hackers managed to compromise a wallet. Attackers stole $12.5m in Ether, $1m of Pundi X tokens, and $10m of Bancor Network Tokens (BNT), which are smart tokens used to convert other currencies. Bancor managed to freeze the BNT, […]

Read more

How Blockchain Technology Could Secure Your Data

How much data are you giving up just to access financial services, get paid, or simply buy liquor? Recently, this writer did some work for a large company that onboarded suppliers and processed payments through a third party service bureau. Part of the process involved proving that I was qualified to work in Canada. For […]

Read more
Modelling Success in Cybersecurity

Modelling Success in Cybersecurity

Allison Miller knows a lot about risk. The senior vice president of engineering at Bank of America spent most of her career modelling and mitigating it for companies in the financial and gaming sector. When we interviewed her at SecTor 2017 last November, she was product manager for security and privacy at Google. She spent […]

Read more

Time Is Almost Up For GDPR Compliance

Well, it’s finally That Month. On May 25th, the General Data Protection Regulation (GDPR) will come into effect. Guess what? Hardly anyone is ready for it. GDPR is set to be the most stringent privacy regulation ever, and it affects more than just companies in Europe. Anyone handling data on people living in the EU […]

Read more
Security Debt

Paying the Price for Security Debt

You spend time paying down your credit card and mortgage debt at home, but are you up to date on your security debt? Security debt is an offshoot of another term, known as technical debt. The latter isn’t itself a common term in an industry always chasing shiny new features. First coined by agile development […]

Read more
Iain Paterson data breach

Preparing for a Data Breach

It’s 2018, and companies are still fighting governments over how to handle data breaches. Verizon just lost a bid to stop users from suing it over several data breaches at its Yahoo! online property. The state of Pennsylvania sued Uber for waiting over a year to tell customers that their personal information had been compromised, […]

Read more
Subscribe to the Sector Blog
Enter your contact information below to have future blog posts delivered directly to your inbox!
Fields marked with an * are required