The Elastic band

If you are a regular reader of this blog, you will be more than well aware that we have always been very concerned, if not paranoid about the impact of the misconfiguration of Internet facing services and applications. We have consistently advised that a massive problem with agile development and deployment cycles, alongside a pressure […]

Compla¢

As we have muttered and groaned (ad nauseum) about many times before, news of massive breaches with huge numbers of exposed details may well be giving us all breach fatigue. Even former presidents of the United States can be confused by these big numbers, allegedly (with apologies to our dear Brazilian friends): “Giving Bush his […]

Better the devil you know

[vc_row][vc_column][vc_column_text css=”.vc_custom_1547551600712{margin-bottom: 0px !important;}”] In this article Glenn Fitton, ITC Senior Cyber Consultant, zooms in on ‘Threat Intelligence’, focusing on what it is, and what it isn’t. In the modern age of cyber and with the growing prevalence of large-scale cyber attacks, most of us have come to terms with the fact that it’s not […]

B B C

Not the (impartial) British public service broadcaster aka ‘Aunty’. We only have a page or so, which is nowhere near enough to summarise our thoughts on the corporation! We are talking about the implications of moving a business, via the digitalisation process, from a world in which online activity is predominately Business to Business, to […]

C I A

[vc_row][vc_column][vc_column_text css=”.vc_custom_1546602357288{margin-bottom: 0px !important;}”]That got you interested didn’t it? Alas we are not talking about the Langley Virginia based intelligence service tasked with ‘gathering, processing, and analyzing national security information from around the world, primarily through the use of human intelligence’. What we are talking about is the well-established security model, sometimes called the CIA […]