How Microsoft Watches What Attackers Do

The best form of defence is common sense, says Tim Rains Attackers are working faster, but not necessarily much smarter, Microsoft security guru Tim Rains will reveal at SecTor next month. The chief security advisor for the company’s worldwide cybersecurity and data protection group, has worked closely with Microsoft researchers to find out how exploits […]

Read more

Whodunnit? Why Cyberattack Attribution Is So Tricky

“Was it North Korea, in the drawing room, with the poker?” When a hacking scandal engulfs a company or government, it typically brings two things: newspaper headlines shaming the victim for their incompetence, and public debate about who actually did it. The OPM breach is a good example. Katherine Archuleta resigned after being blasted by […]

Read more

Who Should You Share Your Cybersecurity Data With?

Sharing is caring, but it’s also a tricky business. Last week, Facebook announced that over 90 companies are sharing cybersecurity information with each other through its systems. They’re collaborating via ThreatExchange, the API-accessible community that it launched for that purpose back in February. US government agencies are specifically not invited, though. This shows just how […]

Read more

How To Measure Your Cybersecurity

Jessica Ireland will teach you how to gauge your security capability. “If you cannot measure it, you cannot improve it”. That was the view of Lord Kelvin, who discovered the theory of absolute zero, and came up with the Kelvin scale. But can you measure your organisation’s performance at cybersecurity? And what would that look […]

Read more

How to Win The War Against Blackhats

For many companies, the first step is to get a clue. The MAD magazine cartoon, Spy vs Spy, is 54 years old this year. In it, the blackhat spy and the whitehat spy both tussle, each trying to get the upper hand on the other with simplistic, comical gags. In the cartoon, the spies are […]

Read more

Meet The Man Who Cyberstalks for Good

How Ken Westin jailed at least two dozen people using software, social media, and a few snappy search tools Ken Westin is an online stalker. He follows people through social media sites, Internet community forums, online maps and emails. He digs out secrets locked up in digital photographs, and uses them to build alarmingly complete […]

Read more

Unlocking History

Cybersecurity and lock picking have more in common than mere puzzle solving. This October, Schuyler Towne will once again drive the nine hours north from Massachusetts to Toronto, to attend the SecTor conference. He drives because he’ll be lugging all manner of arcane equipment with him, in his role as the organiser of the Lock […]

Read more

A Village for the Global Internet of Things

SecTor will feature a new IoT Village this year. Here’s what to expect, and why it’s important. The headlines are swimming with stories about the security challenges surrounding the Internet of Things. For many, though, it’s still an amorphous concept, with a bewildering array of device categories, connected in staggering numbers. This October, SecTor and […]

Read more

Starting A Cybersecurity Career

How to get your first foothold in a security role Eager to break into a cybersecurity career? Competition is tough, but demand for skilled professionals is also high. How can you best position yourself for a career as a security pro? Nima Mirpourian, division director for recruitment firm Robert Half Technology, said that we are […]

Read more

Building a More Private Cloud

The Cloud Security Alliance wants to see more privacy in the cloud The Cloud Alliance wants to raise the bar when protecting customer privacy in the cloud. That’s the message from its CEO Jim Reavis, The CSA will once again be hosting a free summit for attendees at the SecTor conference this year, addressing cloud […]

Read more

Building an Adaptive Security Culture

Become like water when learning how to fight off attackers. If you don’t adapt, you don’t survive. It’s just as true in business as it is in nature – and it’s particularly true in cybersecurity, where practitioners are constantly fighting off attacks from a constantly-evolving enemy. The answer to the problem is to build a […]

Read more
Subscribe to the Sector Blog
Enter your contact information below to have future blog posts delivered directly to your inbox!
Fields marked with an * are required