
Can cryptocurrency platforms claim paying attackers is a “White Hat Bounty”?
Today I want to talk about bug bounties. You are probably sitting there thinking you have heard every...

The vitally important role of loggists in a cyber incident
Who? Why? When your crisis management team (CMT) meet they are usually gathered to handle a crisis. They have to operate in high pressure situations […]

AWS/Capital One hacker jailed for massive data theft and illicit crypto mining
“She wanted data, she wanted money and she wanted to brag” This was what Assistant United States Attorney Andrew Friedman said of Paige Thompson in […]

Supply chain security: Renaissance or retrogression?
Overall we have a low level of visibility and understanding of our supply chains. Horizon scanning for threats and vulnerabilities needs to extend into this […]

Behaviour Change in your Organisation (short video)
Getting your staff to change their security behaviour It is often submitted that fear is bad. Actually, from a behavioural science perspective we know fear […]

Hacked! Right Match Singles Suffers a Data Breach..
Cyber Security Awareness Month Special: “Hacked” What would you do if your company was hit by a cyber attack? Do you have a plan? A […]

Get staff engaged for Cybersecurity Awareness Month
October is ECSM, a month-long European event promoting good cyber security practices and safety. This years themes are: 1. Cyber First Aid:What to do in […]

CV19 and Kaspersky Next
At the Kaspersky NEXT event, Cyber Volunteers 19 (CV19) Co-founder and partner at Red Goat Cyber Security, Lisa Forte discussed with Kaspersky’s

pre-election tricks goes deeper than social media.
How pre-election manipulation goes deeper than social media. A critical moment is almost upon us. It will be a test of the protections we’ve tried […]