CV19 and Kaspersky Next

  Hospitals and the wider healthcare ecosystem are being urged to improve their cybersecurity infrastructures, following a year in which they’ve needed the protection of volunteers to save systems, money and even lives across Europe. At the Kaspersky NEXT event,...
Insider Threat $800K Rogue Admin

Insider Threat $800K Rogue Admin

What happened? Disgruntled former IT admin Charles E. Taylor quit his job at an unnamed Atlanta based distribution company before going on a sabotage spree costing the company $800,000 USD to redress. Taylors “multi-stage sabotage campaign” involved...
Lisa Forte on Smashing Security Podcast

Lisa Forte on Smashing Security Podcast

178: Office pranks, meat dresses, and robocop dogs  May 14th, 2020  |   50 mins 42 secs  coronavirus, data breach, email storm, hacking, k2, lady gaga, microsoft, mountaineering, nuclear waste, onkalo, reply all, social distancing, sourdough Graham shares stories of...
Permissions Creep

Permissions Creep

What is Permissions Creep? Permissions Creep, also known as privilege creep, is what happens when we move between roles in an organisation and keep the access or permissions of the previous role.   Privilege Creep example: Let’s imagine you have been hired by a...
Should your company ban Zoom?

Should your company ban Zoom?

As several businesses ditch the popular conferencing tool, Lisa Forte, partner at Red Goat Cyber Security, calls for calm  Zoom, the free to use video conferencing app, has exploded in the last month. It quickly became a household name and more than doubled its share...
Cyber Volunteers 19

Cyber Volunteers 19

Cyber Volunteers 19   Do you work in cyber security? Why not sign up to volunteer to help protect healthcare providers during the Covid-19 pandemic.  Lisa Forte, partner at Red Goat Cyber Security, and Daniel Card set up the Cyber Volunteers 19 programme to help...
Lisa Forte on Random But Memorable Podcast

Lisa Forte on Random But Memorable Podcast

Comically Bad Ultrasonic Berry with Lisa Forte   Description Do we need more positivity in cybersecurity? And are bananas a type of berry? 🍌Join us, as we ask (and attempt to answer) some of life’s big questions on the show this week. We also roll into...
Insider Threats: £4.6m in self-signed invoices

Insider Threats: £4.6m in self-signed invoices

Of the three categories of insider threat; theft, fraud and sabotage, fraud is often the most complex,  inventive and difficult to detect. This case however, has a certain simplicity to it. The case concerns a Mr Kabbaj who worked for an “unnamed global internet...