Contrarisk Security Podcast #0031: smarter alerts

Mark Kedgley, New Net Technologies

» Listen or download now on the podcasts page » Attacks keep coming, and the number  of data breach stories we read in the media shows how often they are successful. We have to assume that any organisation of a reasonable size has monitoring and defence systems, in place so what’s going wrong? Of course, organisations invariably claim that the attack… Read more »

Hacking small devices


I’ve become a big fan of very small computers. My desk is currently littered with no fewer than five PCs, but with only a casual glance you could easily miss them. The computers are various models of the Raspberry Pi (RPi) and BeagleBone Black (BBB). The Raspberry Pi has made a lot of waves, selling in its millions and, in… Read more »

A note about this ‘cyber’ thing…

I know quite a few people – hackers mostly – who get quite snarky and condescending over what they see as the media’s overuse of the ‘cyber’ prefix. In fact, I’ve just had an email exchange with a friend on this very topic. The media, the thinking goes, always get their panties in a bunch whenever anything ‘cyber’ is involved,… Read more »

Clueless about the Internet

UK Prime Minister David Cameron is in the US trying to get President Barack Obama to help him stop people being beastly on the Internet. And he’s also using the opportunity to prove to the world, once and for all, that he hasn’t even the faintest idea how the Internet works. Cameron wants to ban messaging apps that use end-to-end… Read more »

Contrarisk Security Podcast #0030: Identity and privacy

Colin Tankard, Digital Pathways

» Listen or download now on the podcasts page » With the Internet now playing such as intrinsic part of our lives, identity management (IM) has entered a new world. As Daniel Raskin, VP of marketing at ForgeRock, explains in this interview, what was once a simple matter of allowing employees to authenticate themselves on a local network has moved out… Read more »

Contrarisk Security Podcast #0029: Vulnerability monitoring

» Listen or download now on the podcasts page » Is the real threat to our security APTs or apathy? We all know that the software on our systems contains vulnerabilities and needs constant patching. And malware generally attacks well-known vulnerabilities that we have the ability to fix. So why isn’t it done? “If you can implement a good vulnerability management programme,… Read more »

Contrarisk Security Podcast #0028: The mobile menace

» Listen or download now on the podcasts page » Judging by the warnings issued by security vendors, you’d be forgiven for thinking that there’s a malware epidemic on the Android platform. The truth, according to Sean Newman, security evangelist at Sourcefire (now part of Cisco), is somewhat more nuanced. In this interview he explains how the number of published vulnerabilities… Read more »

Contrarisk Security Podcast #0027: Masking sensitive data

» Listen or download now on the podcast page » There’s lots of talk about putting security close to the data. One way of doing this is data masking, which obscures or modifies data as it is used according to a set of rules. In this interview, Amit Walia of Informatica explains how data masking means that people see only the data… Read more »

Contrarisk Security Podcast #0026: Evolving DDoS

» Listen or download now on the podcasts page » Distributed Denial of Service (DDoS) attacks have been with us for a long time. But is the nature of the attacks evolving, and how is this presenting new threats? We’re all too familiar with DDoS being exploited for hacktivism, political purposes and for extortion. But, in this interview, Dave Larson, CTO of… Read more »