ACSN Ltd

ACSN Ltd

Category: Content
Type: Blog Article

Generated 3 days ago

New blog articles detected

  • RelianceACSN Cyber Snapshot – Issue 18

    Recent reports and surveys continue to flag the gap between the importance of cyber reporting and Board understanding of this critical issue. A clear understanding of businesses critical information assets is a vital starting point. A Board with a clearly articulated position on what might impact the business in tangible value (disruption, interruption, theft of critical IP as few non-exhaustive e...

  • The technical gap between nation state attacks and bedroom hackers is closing fast

    Have you heard of fileless malware? Thanks to the trickle down of advanced threats leaking from the laboratories of the world’s active cyber warrior states, you might soon. But due to its stealthy nature, it will have heard of you first. Unlike signature based malware that opens an application in the OS, fileless malware attacks and resides in the memory of target devices, making it... The post Th...

ACSN Ltd

Category: Content
Type: Blog Article

Generated 1 week ago

New blog articles detected

  • RelianceACSN attends ministerial launch of GCHQ’s CyberFirst Bursary Initiative

    London, UK, 3 February 2017 – Yesterday global cyber security specialist RelianceACSN attended the ministerial launch of the National Cyber Security Council’s CyberFirst bursary initiative to offer students a comprehensive package of financial assistance and cyber skills. The event saw members of the technology and security industry come together with the UK government to highlight the importance ...

  • RelianceACSN Cyber Snapshot – Issue 17

    Knowing where your data is has never been more important. A combination of the rising rate of cyber attacks on organisations, the changing political climate and the upcoming introduction of the European General Data Protection Regulation means that cybersecurity is a key focus for organisations. Organisations have a duty of care to ensure that the details of customers are stored securely. Part of ...

  • Are some things best left unconnected? Like voting and some of your data maybe

    There is a theory that if you switched on and connected an unprotected device to the internet it would be infected with hundreds of bits of malware within minutes. Maybe even seconds. Like many, a good infosecurity story this one was never really proven in the real world, but the point is well made. Without protection, and perhaps more pointedly even with protection, a device... The post Are some ...

  • Data provenance, just what the doctor ordered

    Knowing where your data is has never been more important. A combination of the rising rate of cyber attacks on organisations, the changing political climate and the upcoming introduction of the European General Data Protection Regulation means that cybersecurity is a key focus for organisations. Last year the discovery of data breaches at Yahoo! highlighted the need to properly secure customer dat...

  • RelianceACSN announces appointment of four new advisory board members

    London, UK, 9 February 2017 – RelianceACSN today announced the appointment of several new members to its advisory board. Professor Nick Jennings, Dominic Raab MP, Tom Ilube and Paul Winstanley will bring expertise from academia, policy, business and defence to finalise the structure of RelianceACSN’s board.  Brian Kingham, Chairman at RelianceACSN commented: “We are delighted to welcome these four...

  • RelianceACSN announces support for schools

    Announcing support for ‘Parents and teachers for excellence’  RelianceACSN, the cyber security specialists, said that the single most important factor in the continued  international leadership of the UK digital industries was improving standards in schools and producing more technology savvy school leavers. RelianceACSN chairman, Brian Kingham, said: “The last Government made excellent progress i...

ACSN Ltd

Category: Content
Type: Blog Article

Generated 2 weeks ago

New blog articles detected

  • RelianceACSN Cyber Snapshot – Issue 16

    We have entered the New Year with a DDOS attack against a high profile organisation, the Lloyds Bank Group. The perpetrators are currently unknown and their motive would assume to be to demand a large ransom to halt the traffic bombardment. The attack lasted 48 hours and service was intermittently affected but Lloyds Bank points out that no accounts were hacked or compromised. They have also... Th...

  • Could a Ransomware attack close your operating theatres?

    You graduated, travelled the world, got your first job, found the love of your life, had a wild 30th, bought a house, married the love of your life, had a baby, had another one, had a wild 40th, 50th… all the best moments captured beautifully through photos and shared with friends and family via the wonders of technology. Then one day you opened an email... The post Could a Ransomware attack close...

  • RelianceACSN Cyber Snapshot – Issue 15

    Our main article this week shows that an accepted level of exposure to cyber threats is becoming the norm for many organisations. There is always more money that can be spent on protection, but the law of diminishing returns applies. Increasingly organisations are looking at cyber as part of their overall corporate risk profile, and optimising the balance between the amount they spend on mitigatio...

  • Glossy security reports are useful but not as good as reporting

    Security conference speakers are a resourceful bunch and they know that stats, facts and graphs are like manna from heaven. Which is why they will often quote from those juicy annual security reports, of which there are now quite a few. You know the sort of thing. Roundups of the state of global security and data loss which generally paint a negative picture for all... The post Glossy security rep...

  • RelianceACSN Cyber Snapshot – Issue 14

    Making a difference in business to your Cyber assurance is all about a deeper understanding of the street-smart criminals, who are the real perpetrators of Cyber Crime. They are attacking different business, through different channels, in different ways, to get at specific assets. The reports are suggesting that IoT is a major threat, that Banking Trojans are evolving, and Retail channels prolifer...

  • Why you should prepare for the wholly expected

    A few years ago in security circles it was fashionable to quote or paraphrase former US Defense Secretary Donald Rumsfeld’s famous speech on ‘known unknowns and unknown unknowns”. Which was very impressive as it showed the speaker was aware that attacks are likely to happen via unexpected and previously unknown routes or methods. They were at the cutting edge of security thinking. This was also......

  • Is Blockchain the security blockbuster we are looking for?

    Expect the word “blockchain” to be bandied about quite a bit in security circles this year. No doubt it will feature heavily in sales conversations and seminars at the upcoming RSA conference in February. Some vendors may even be showcasing their own blockchain-based security technology. But why all the fuss? What is this, until quite recently semi-mythical, technology which has got the likes of I...

  • Are you a cyber ready Eddie?

    A recent survey on cyber security assurance was not very reassuring. Among many and varied statistics one stood out: security professionals across the globe adjudged their state of cyber readiness for 2017 at 70%. For the UK individually, it was even worse at just 59%. One of the reasons given for such pessimism was the “overwhelming cyber threat environment”, which sounds a bit like throwing... T...

  • Cyber thinking out of Africa

    We are so focused on protecting our own back yard, and our organisations that we don’t have time to think about what’s happening elsewhere in the world. Let’s take Nigeria for example. So okay, we all know about the 419 scam but we know little else. That it has a considerable cyber crime problem of its own that mostly attacks the domestic front. Cybercrime bites... The post Cyber thinking out of A...

  • RelianceACSN Cyber Snapshot – Issue 13

    The Cyber Security landscape has proved to be a news worthy candidate, as 2016 saw an unprecedented number of high profile security incidents and next year shows signs of increasing intensity. The worry is that security fatigue has set in as yet another security incident is reported in the press, the danger is this could lead to complacency. Below are three areas that have been high profile... The...

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in