Red Goat Insider Threat Report

Red Goat Insider Threat Report

Insider Threat Report 2019 finally released! Red Goat Cyber Security are proud to announce the results of their research into insider threat reporting. The research examines reporting observed in intentional insider threat cases and the factors that may influence the...
Red Goat finalists for Computer Security Awards 2019

Red Goat finalists for Computer Security Awards 2019

Red Goat Cyber Security has been recognised as a finalist in the 2019 Computing Security Awards. Partner and Co-founder, Lisa Forte, has been selected as a finalist for the “Contribution to Cyber Security” Award too. Red Goat, one of the leading experts in social...
Teiss Podcast on Insider Threat

Teiss Podcast on Insider Threat

“I really enjoyed making this podcast with Anna Delaney. She always asks hard interesting questions and it was great fun to discuss some of the more alarming cases of insider threats. I hope you enjoy this colourful episode!” Spotting the Insider Threat with Lisa...
Maersk Incident Response

Maersk Incident Response

Fire drills are commonplace. We test the alarms, the evacuation procedures and the fire marshals get to practice their roles. In a cyber attack there can be just as much chaos as with a fire, perhaps even more so. This is why incident response is such an important...
Tales from the road: OSINT in the Washroom

Tales from the road: OSINT in the Washroom

I recently went for a meeting at a company’s office. This company had a few floors in a shared office building. Due to a large amount of black coffee being consumed during the lengthy meeting I needed to find the ladies room before departing. Thankfully there was one...
Online Radicalisation and Social Engineering

Online Radicalisation and Social Engineering

Online radicalisation and social engineering There has been a lot of media coverage here in the UK about a young woman who previously left the UK as a teenager to go to Syria and join Islamic State. She has recently expressed her desire to return to the UK, causing...
Paris riots, Social Proof and Corporate Security

Paris riots, Social Proof and Corporate Security

I was recently hired to speak at an event in Paris. I love the city however this particular visit was during an unfortunate time. Paris is suffering from some of the worst and most violent rioting in many years.  As a social engineer I am interested in human behaviour...
The Hustlers of Naples

The Hustlers of Naples

Social engineering is a fascinating and diverse attack vector because it exploits human nature and people are generally predictable in their responses. We focus on malicious social engineering, especially when it facilitates cyber attacks upon organisations. However...
Simone – A social media investigation

Simone – A social media investigation

Speaking around the world about social engineering one question comes up almost every time. Why is social engineering so successful?   A key success factor in a targeted attack is good research, knowing the target and how to manipulate them. I have been gathering...