Top five threat hunting myths
The cybersecurity landscape is in a constant state of change and, as many organisations have learned, it’s no longer a matter of an organisation will face a cyber attack, but when.
Rick McElroy | 14 Jan | Read more
The cybersecurity landscape is in a constant state of change and, as many organisations have learned, it’s no longer a matter of an organisation will face a cyber attack, but when.
Rick McElroy | 14 Jan | Read more
Once an organisation establishes a a threat hunting program, its goal is to hunt threats proactively, with a focus on newer, more sophisticated attacks for which reliable signatures or indicators are not yet available.
Rick McElroy | 30 Nov | Read more
As the wheels lift up on my latest flight I am left reflecting on another year in #infosec. We are moving towards 'something' and some days I can't figure out if that something is disaster or safety.
Rick McElroy | 11 Sep | Read more
When working with CEOs, I like to use a safety program within an organisation, running parallel with the cyber security program.
Rick McElroy | 01 Feb | Read more
Targeted attacks are on the rise, and the dark web isn’t helping to curb that trend.
Rick McElroy | 29 Jan | Read more
CEOs have been on the hot seat lately, as they are held accountable for the security of their organisational and customer data.
Rick McElroy | 01 Dec | Read more
The widely publicised KRAK vulnerability might allow cyber criminals to intercept data being transmitted between Wi-Fi access points and endpoints, recent research has uncovered.
Rick McElroy | 25 Oct | Read more
I often reflect on how difficult choices in the IT industry can be. Do we invest more in prevention, detection or response? Do we automate or add more staff? Do we use a managed service or keep it in house?
Rick McElroy | 15 Sep | Read more
When we see a car wreck it’s easy to slow down and gawk. The first thing we think is ‘Wow, that’s awful,’ quickly followed by ‘Whew… glad that wasn’t me,’ and then we drive on.
Rick McElroy | 10 Sep | Read more
An interesting new phishing attack emerged last week, on Google Docs.
Rick McElroy | 12 May | Read more
Mobile devices and smart TVs controlled by cyber criminals make scary headlines.
Rick McElroy | 10 Apr | Read more
Reflecting on the recent media talk about hacking and Russia, my family had lots of questions. It struck me that attribution in the real world is easy for most people to understand, but in the cyber world it becomes much harder.
Rick McElroy | 10 Jan | Read more
A rash of turbulence shaking the IT industry has its epicentre in security, where we are continuing to hit bumps along the way. This won’t change any time soon and the bumps seem to be occurring faster and faster.
Rick McElroy | 17 Nov | Read more