All Posts

Show
33,000 Accounting Inbox Credentials Exposed Online: BEC Made Easy
October 9, 2018 read more

Cybersecurity for the nuclear industry – ‘in service modification’ or more systemic change required?

March 29, 2016

On the March 15, I was lucky enough to be invited to a round table event at Chatham House in …

read more

Online credit card shops – a numbers game

March 21, 2016

You may have recently read headlines about an online shop that was selling millions of stolen credit cards. Questions were …

read more

Antifragile Security: Bouncing Back Stronger

March 21, 2016

Strong, robust, stable, resilience – these are all words associated with a successful security posture. They’re comforting words that serve …

read more

OpIsrael: Looking ahead to April 7 with ABI

March 15, 2016

At any one time, there is a host of hacktivist operations announced, discussed and in action. Some of these are …

read more

Moar Sand!

March 10, 2016

Let’s face it, many organizations have their heads in the sand. In some cases this choice is a deliberate one; …

read more

Uncertainties in the Language of Uncertainty – and why we need to talk about it

February 25, 2016

If you know much about Digital Shadows SearchLight, you would know that one of our strengths in the provision of …

read more

Intelligence vs. Infosec: The 3-letter-guy to the rescue?

February 25, 2016

Whenever Royal Marines deploy on operations, they take with them their own intelligence analysts. These analysts are fully trained and …

read more

Aviate, Navigate, Communicate

February 25, 2016

I’m an aviation enthusiast. Flying is exhilarating; it gives you a sense of freedom, provides breathtaking views and allows you …

read more

From cyber espionage to hacker marketing strategies: an overview of Digital Shadows talks at RSA Conference

February 25, 2016

It’s not long until this year’s RSA Conference, and Digital Shadows will be in full force, with some of us …

read more

WHAT DO YOU MEAN IT WAS AN ACCIDENT?

February 25, 2016

We always want to find someone or something to pin the blame on when a serious data breach occurs.  But is it really that simple?

read more
Start Free 7-Day Test Drive of SearchLight
Start Test Drive