Security Tools

May 28, 2019

Ransomware remains a risk, but here’s how you can avoid infection

It’s been a case of good news/bad news when it comes to ransomware recently. New figures from Microsoft suggest that Ireland had one of the lowest […]
April 2, 2019
Authentication with biometrics in place of passwords

Password-less future moves closer as Google takes FIDO2 for a walk

For years, many organisations – and their users – have struggled with the challenge of password management. The technology industry has toiled on this problem by […]
January 18, 2019

It’s oh so quiet: get ready for stealthy malware in 2019

It’s unlikely we’ll ever look back fondly to a time when ransomware would announce itself noisily. But at least victims knew they were under attack. Now, […]
November 27, 2018
A person looking at a screen showing static, signifying security news

Security newsround: November 2018

We round up interesting research and reporting about security developments from around the web. This month: blaming the user (or not), passwords, protecting data and privacy, […]
November 15, 2018

The value in vulnerability assessments: closing gaps to improve security

Vulnerability assessments usually involve using automated tools such as Nessus or Qualys to carry out a passive scan of an organisation’s systems. The process produces a […]
May 23, 2018

The answer’s in the question: risk assurance that’s ready-made for a regulator

Regulators and auditors expect us to have all kinds of controls in place to manage information security. Standards like ISO 27001 or frameworks like the CIS […]
September 8, 2014

Passwords: Microsoft Likes Them Easy, Google Prefers Them Pronounceable

Back in July Microsoft researchers suggested that simple passwords may be suitable for the majority of user accounts, based around their studies which showed the majority […]
June 9, 2008

Security Checklists

One of the problems many systems administrators face when securing their networks, systems and/or applications is knowing how to make them secure.  Below are two useful resources […]