ATM heist

Go to an ATM at the right place, at the right time, and you could be collecting a whole lot of free money. Over...

Ransomware-as-a-Service (RaaS)

In these years, the Darknet has created new illegal business models. In fact, over the classic illegal contents, like drugs, weapons and killers, other...

A historian’s observations on the worst blockchain problem, the “byzantine fault.”

One of the worst nightmares for the best blockchains, based on decentralized and distributed systems, is to become vulnerable because of a “byzantine fault”,...

Money talks, for the first time in 5 years

In the 2018 BeecherMadden salary survey, obtaining a pay increase was the top reason for moving jobs within cyber security. For the past 5...

How to Avoid Ransomware Jail

It’s 1983, and Ronald Reagan is sitting down to watch the hit film War Games. Five days later, the president asked his secretaries of...

The cyber security awards enter their fourth year in 2018

Founded in 2015 to reward innovation and excellence in cyber security, the awards have a strong people focus. There are awards for CISO of...

Poker and Security

Good poker players are known to perform well under pressure. They play their cards based on rigorous probability analysis and impact assessment. Sounds very...

Protecting Your Digital Assets Against Cyber Attacks. Cyber Criminals Are Probably...

You have been hacked! Those are four words that no organisation wants to hear - ever. The reality is that all organisations are vulnerable...

Data, consumers and trust: the quiet crisis

Building trust-based relationships with clients has always been important for successful business practice.  As the global data pool grows and consumer fears over personal...

A Cyber Security strategy to mitigate risks in complex and critical...

Abstract Airports are critical and complex systems that represent an excellent case study for establishing a flexible and reusable cyber security framework for risk mitigation....