Moving Beyond The Password

Passwords aren’t secure. So what’s the alternative? Google is testing its own anti-password login mechanism using mobile phones as two-factor authentication (2FA) devices, following hard on the heels of Yahoo, whichlaunched a password-free login system for its users in October.Companies like these are offering new authentication mechanisms because passwords are a terrible way to authorize […]

Read more

When Insider Threats Come From The Outside

Not all insiders work at a desk in your company. Insider threats don’t always come from your office. Are you prepared to manage those that don’t?We all understand the classic insider threat: a malicious employee, perhaps disgruntled at being passed over for a promotion, may steal valuable data to sell on the open market or […]

Read more

Making Malware That Sticks

How do malware writers create and test their malicious code? They lurk all over the world, from basements to offices, trying to take down your machines from afar. Malware writers have produced some devious code, eluding anti-virus tools to get their programs on your machine. From there, they will send spam, serve up their illegal […]

Read more

IoT Security: It’s Coming To The Office – Are You Prepared

Consumer IoT devices are coming to your company, whether you want them or not. When it comes to technology, what finds its way into the home will eventually worm its way into the office.  We saw it with social media, mobile devices, and cloud file sharing services, all of which the IT department now has […]

Read more

IoT Security: Navigating The IoT’s Data Ocean

Ann Cavoukian has a plan to shore up privacy in a ubiquitously connected world Ann Cavoukian is interested in your privacy, especially in a world where everything is connected to everything else. If you thought you were living in a technology landscape filled with data and analytics, you haven’t seen anything yet, she warned. As […]

Read more

IoT Security: Assessing the Hidden Risks

IoT Security: Assessing the Hidden Risks Imagine a scifi novel, set 50 years into the future. In it, someone is confronted by a forest of Internet-connected devices. Dusty, with faded colours and logos that no one remembers, they continue humming away, their blinking lights dim but still active. And no one knows what they do. […]

Read more

IoT Security: Can You Trust Your Fridge?

Tripwire’s IoT Hack Lab team warn about IoT botnets and homes that might be too smart for their own good. What’s the only real way to render an Internet of Things device safe? Unplug it, says Craig Young. He is a security expert at Tripwire, which ran its first IoT Hack Lab at the SecTor […]

Read more

Cyberthreats: Kevin McNamee on the Evolving Dangers From Mobile Malware

How your phone is becoming the next battleground for attackers The war against malware will increasingly be fought via mobile platforms in the next few years. So says Kevin McNamee, director of motive security at Alcatel-Lucent. McNamee spoke at the SecTor 2015 conference, presenting his view of emerging mobile malware threats. It’s no wonder that […]

Read more

Cyberthreats: Joe Pizzo on the Shadowy Corners of the Darknet

Norse Corp expert explains how darknet sites are being used to sell exploits and exploited machines The Internet is a kind of inverted iceberg. At the top is the visible part – a huge, ever-changing mass of information. But lurking under the surface is a whole other Internet, probably far smaller, and drastically different. This […]

Read more

Cyberthreats: Microsoft’s Tim Rains on Putting Old Wine in New Bottles

The second in our four-part series on cyberthreats explores emerging trends in malware You can’t teach an old dog new tricks, or so the saying goes – but maybe you don’t need to. Malware writers are evolving less dynamically than you might think, explained Tim Rains, chief security advisor for worldwide cybersecurity and data protection […]

Read more

Cyberthreats: R-CISC’s Wendy Nather on Retail Risks

SecTor spoke to the retail security expert in part one of our four-part cyberthreat series When it comes to cyberthreats, retailers are among the most heavily targeted. Companies like Target, Home Depot and TJ Maxx have all made the headlines over the last few years as attackers pilfered credit card records by the millions from […]

Read more
Subscribe to the Sector Blog
Enter your contact information below to have future blog posts delivered directly to your inbox!
Fields marked with an * are required