Skip to content

2024

Securing your Digital ShopFront is no different to a Physical one

Physical gate next to a keyboard

In this edition of the Cyber Insights blog, I want to cover the often-overlooked topic of business cybersecurity external posture, written mainly for business executives.

Over the past 12 months, I have had several discussions with business leaders and small startups about the image their organisations are portraying to potential attackers, usually cybercriminals seeking ransom money.

Fix Identity and Access Management

IAM Best Practices

This article also features in the Computer Weekly / TechTarget Cyber Security ThinkTank: https://www.computerweekly.com/opinion/In-the-cloud-effective-IAM-should-align-to-zero-trust-principles

The topic of “best practices in IAM” is complex due to the intricacies of Identity and Access Management (IAM) and the unique policies, processes, and procedures of each organisation. Therefore, a one-size-fits-all approach does not work.

Lessons from bank fraud featuring Revolut

"Innovate fast and fail faster!" is a mantra that many fintech companies are following. Some successfully, some not so much.

Take example of Revolut, who seem to top the UK charts for the most fraud complaints.

(source: https://www.bbc.co.uk/news/articles/cj6epzxdd77o )

alt text

Originally published on: https://www.linkedin.com/pulse/lessons-from-bank-fraud-featuring-revolut-vladimir-jirasek-xakqe/

Win back lost trust by working smarter!

In a typical enterprise, a division of responsibilities is codified: an IT team runs IT systems and a security team operates security systems. There might not be any risk of security systems affecting IT systems until the security tools are running on end-user devices, servers and as active elements in the network (Firewall admins will agree with me, they get lots of unwarranted grief from IT teams that “firewall is slowing things down”).

Today, I received the below text message saying that the payment for my EE bill did not go through which instantly triggered an anxiety emotion: “Why was the payment declined? Do I have enough money in my bank account?”.

Info Security Europe in London 2024 observations

Event-InfoSecEurope-2024

And it is official: Info Security Europe 20241 has drawn to its close. Having attended with low expectations following the 2023 event, I was positively surprised by the quality of the event, vendor stands, and associated event Cyber 100 Club. I already look forward to the InfoSec Europe 2025!

I would like to mention the people I met during the show: Raj Samani, Robert Rodger, Justin Coker, Francesco, Alfonso Eusebio, Stephen Khan, Nick Thomas, Rob Demain, Clive Room, Christiaan Beek, Shakeeb Niazi, John Quinn

The Magic of the DNS deciphered

DNS

To most people, it may seem like a magic trick: open a web browser and type apple.com and the web page opens. If you showed this to someone in the 15th century, you could be accused of witchcraft! Instead of the magic, however, behind all of this is genius engineering by the smart people who designed the Internet protocols over 40 years ago! The DNS protocol plays the key part in the Internet protocols; one could say that without the DNS, the Internet would not exist in its current form.