Tools News, Articles and Updates

Data disaster! What are your IP priorities? Ensuring staff are equipped

It is vital to ensure that employees are aware of and educated about a company's implemented security policy, know the best practice means of transmission and storage of corporate data, and have the tools they need to do their jobs.

IT security for SMEs in 2018 - information overload

SMEs in particular, face a significant challenge to correlate the output from various systems and interfaces. It is therefore important that the right tools are chosen to empower SMEs to meet these challenges says David Feldman.

McAfee CEO calls for rethink on cyber-security talent shortage

It's not a talent shortage problem, more a "talent efficiency opportunity". Also Skyhigh purchase announced.

How threat intelligence can help you best utilise your security budget

SOC analysts are becoming buried in more security data every day and, without the right tools, identifying critical security insights and making the right recommendations in an efficient or effective manner is next to impossible.

How secure are you? And are your current tools up to the job?

Con Mallon advises, conduct a compromise assessment based on the assumption that you've already been compromised, then pick the right tools, processes, technology and intelligence to combat that threat.

The minimum you need to do before GDPR goes live: 4 stages to compliance

GDPR: It's important to put data intelligence tools in place that will allow you not only to conduct an audit of the data you have collected in the past but also address compliance in the future says Rob Perry.

News Feature: Google Security interview "human solutions - the way to go."

Google has launched of a range of personal and corporate security enhancements (below) this month. Google security expert Allison Miller, spoke to SC about the organisation's approach to security and privacy concerns.

Cooperative development speeds Nato cyber-intelligence-sharing

NATO and partner countries are sharing R&D in the development of cyber-security tools to achieve economies of scale, including the CIICS (Cyber Information and Incident Coordination System).

As CISOs look for more clarity in the noise, is the cloud the answer?

Despite its security issues, security vendors appear to be migrating security tools to the cloud to provide the answer to CISOs wanting a clearer approach to quicker threat detection and prevention.

Secret key-finding tool launched

TruffleHog could be used to search for secret keys used to access servers

Second Shadow Brokers dump released

The hacking group named The Shadow Brokers has released more NSA-related files, these are said to show IP addresses linked to the Equation Group, a hacking group believed to be an NSA contractor.