Sat.Sep 05, 2015 - Fri.Sep 11, 2015

article thumbnail

How the Internet of Things (IoT) is Expanding Your Digital Shadow

Digital Shadows

The Internet of Things (IoT) is a development that is the direct result of objects, technology, people that have been. The post How the Internet of Things (IoT) is Expanding Your Digital Shadow first appeared on Digital Shadows.

IoT 40
article thumbnail

Global Privacy Sweep Finds Privacy Issues in Children’s Apps

Privacy and Cybersecurity Law

Last week, the Global Privacy Enforcement Network (GPEN) released the results from their third annual Privacy Sweep. Twenty-nine privacy enforcement […].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Intelligence Cycle – What Is It Good For?

Digital Shadows

It seems that the concept of ‘intelligence’ is a problem. The definition isn’t agreed, and the industry is peppered with. The post The Intelligence Cycle – What Is It Good For? first appeared on Digital Shadows.

40
article thumbnail

OPSEC and Trust In An Underground Cybercriminal Forum

Digital Shadows

Introduction There are perhaps tens of thousands of forums and sites in the visible and dark webs dedicated to criminal. The post OPSEC and Trust In An Underground Cybercriminal Forum first appeared on Digital Shadows.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Digital Shadows Invited To 10 Downing Street

Digital Shadows

Interest in London’s burgeoning tech industry is growing so rapidly that even David Cameron has taken notice; at Pitch10, an event at 10 Downing Street to be held on Thursday 31st July, ten of the most promising digital companies in Britain will pitch their businesses to an audience that includes Cameron himself. The post Digital Shadows Invited To 10 Downing Street first appeared on Digital Shadows.

40
article thumbnail

Working In Multilingual Sources

Digital Shadows

This post will be about some of the challenges you are likely to face trying to handle data in different languages and how to deal with them. Most of our code is in Java so the examples here will all be written in Java. The post Working In Multilingual Sources first appeared on Digital Shadows.

40

More Trending

article thumbnail

Source Evaluation

Digital Shadows

To organisations, threat intelligence is about understanding the threat landscape – the various actors and campaigns which conduct cyber attacks – so that when they are specifically targeted it can be detected, mitigation put in place, and the risk to their business reduced. Robust source evaluation minimises the chance of crying wolf, or warning of the wrong threat entirely.

article thumbnail

Digital Shadows joins roundtable at 10 Downing Street

Digital Shadows

Alastair Paterson, CEO of Digital Shadows, recently visited 10 Downing Street to participate in a roundtable on cyber security. The session brought together leaders from industry, academia and government and sought to address the challenges surrounding cyber security policy. The post Digital Shadows joins roundtable at 10 Downing Street first appeared on Digital Shadows.

article thumbnail

Remote working at Digital Shadows

Digital Shadows

Here at Digital Shadows we’ve worked hard to assemble the most dedicated and talented development team possible and that has resulted in our team being concentrated here in London, but including members both further afield in the UK and internationally. This means that we’ve had to learn how to work with a distributed team and this post will cover our experiences and some of the utilities we’re making use of to work as efficiently as possible.

40
article thumbnail

Analytical Tradecraft at Digital Shadows

Digital Shadows

This week my colleague and I attended the SANS Cyber Threat Intelligence conference in Washington DC. It was great to hear more from analysts and CTI users from across the community, as well as mingle with the plethora of vendors who were present. This blog explores some of the themes which arose from discussions on analytical tradecraft. The post Analytical Tradecraft at Digital Shadows first appeared on Digital Shadows.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Digital Shadows Works Alongside Bank of England To Develop New Testing Framework To Help Guard UK Financial Sector Against Cyber Attack

Digital Shadows

CBEST aims to improve the understanding of the types of cyber-attack that could undermine financial stability in the UK, and. The post Digital Shadows Works Alongside Bank of England To Develop New Testing Framework To Help Guard UK Financial Sector Against Cyber Attack first appeared on Digital Shadows.

article thumbnail

The Dangers of Groupthink

Digital Shadows

Over the next few blog posts we’ll be looking at various types of cognitive bias and suggest ways of dealing with them. The post The Dangers of Groupthink first appeared on Digital Shadows.

40
article thumbnail

The Dangers of Groupthink: Part 2

Digital Shadows

This post moves on to the second cause of groupthink and tries to understand how organizational structural faults may result in manifestations of groupthink. The post The Dangers of Groupthink: Part 2 first appeared on Digital Shadows.

40
article thumbnail

The Adult Friend Finder Breach: A Recap

Digital Shadows

Last week, news quickly spread about a security breach that impacted the casual dating website Adult Friend Finder. Will Gragido. Head of Threat Intelligence for Digital Shadows in the USA, shares his findings. The post The Adult Friend Finder Breach: A Recap first appeared on Digital Shadows.

40
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Emerging Markets & Services: Ransomware-as-a-Service

Digital Shadows

A look at emerging markets and services, specifically at ransomeware-as-a-service. The post Emerging Markets & Services: Ransomware-as-a-Service first appeared on Digital Shadows.

article thumbnail

Kaspersky Labs Discloses Duqu 2.0 Attack

Digital Shadows

Introduction Today social media channels the world over are a buzz with news of Kaspersky Labs disclosure of the discovery. The post Kaspersky Labs Discloses Duqu 2.0 Attack first appeared on Digital Shadows.

Media 40
article thumbnail

Digital Shadows Integrates With Maltego Through Partnership With Malformity Labs

Digital Shadows

The need for organizations to focus on their risk exposure is growing daily, and their ability to establish a clear. The post Digital Shadows Integrates With Maltego Through Partnership With Malformity Labs first appeared on Digital Shadows.

Risk 40
article thumbnail

What’s In a Name? The Mystery Surrounding the Identity of the Actors Responsible for the Saudi Arabia Breaches

Digital Shadows

Introduction Recently we wrote about the initial breach of the Ministry of Foreign Affairs of the Kingdom of Saudi Arabia. The post What’s In a Name? The Mystery Surrounding the Identity of the Actors Responsible for the Saudi Arabia Breaches first appeared on Digital Shadows.

40
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Online Extortion – Old Ways, New Tricks

Digital Shadows

Extortion is nothing new for organised crime. For centuries, gangs have been operating protection rackets and kidnappings to successfully extract ransom money from their victims. And as with many things in modern life, these old techniques have been successfully brought over to the cyber realm. The post Online Extortion - Old Ways, New Tricks first appeared on Digital Shadows.

article thumbnail

Saudi Arabia MOFA Breach

Digital Shadows

A look at the recent MOFA breach. The post Saudi Arabia MOFA Breach first appeared on Digital Shadows.

40