Vulnerabilities

November 15, 2018

The value in vulnerability assessments: closing gaps to improve security

Vulnerability assessments usually involve using automated tools such as Nessus or Qualys to carry out a passive scan of an organisation’s systems. The process produces a […]
October 22, 2018

Ireland needs a coherent national approach to cybersecurity

I was interviewed by the Irish Times on why “Ireland (is) Vulnerable to Cybersecurity Attack” During my chat with Charlie Taylor I mentioned a number of […]
September 7, 2018

Red player one: learning the right security lessons from a red team exercise

A red team exercise can be a valuable way of testing how effective your security controls are. Having your internal security team, or an external consultant, […]
July 20, 2018

Pen testing: why do you need it, and five steps to doing it right

Penetration testing can contribute a lot to an organisation’s security by helping to identify potential weaknesses. But for it to be truly valuable, it needs to […]
July 12, 2018
USB storage keys

Is banning USB drives the key to better security behaviour?

Convenience often beats security where users are concerned. Take USB keys, for example. They’re a very handy way to transfer files between computers, but they’re also […]
March 7, 2018
A person looking at a screen showing static, signifying security news

Security newsround: March 2018

We round up reporting and research from across the web about the latest security news. This month: cryptomining attacks increase, data breaches rise in Ireland, the […]
January 5, 2018

Meltdown and Spectre vulnerability guidance

On January 3rd 2018, researchers at Google’s Project Zero team announced vulnerabilities, dubbed Spectre and Meltdown, in modern computer processors (CPUs) which could allow an attacker […]
July 8, 2015

Adobe Set To Tackle Hacking Team Flash Threat

There has been much said about the Hacking Team story over the last few days, ranging from the ethics of the company’s business through to concerned […]