EVENT
 
Join us at IP EXPO Nordic 2017 in Stockholm on 20th-21st of September. The conference will feature talks by FortConsult's head of technical security Michael Moltke and senior security consultant Giuseppe Trotta.
THREATS
 
Attack and defence has always been in a weapons race, where attackers find new ways of compromising systems, while defence comes up with new ways of defending against these attacks. How do we get ahead of the bad guys, and detect and mitigate new types of attacks?
OPINIONS
 
We are increasingly interconnecting our infrastructures (for good reasons), but are we paying enough attention to the risks associated with this? And if we are aware of the risks, are we allocating enough resources to securing these connections?
THREATS
 
Senior security consultant Giuseppe Trotta tells the story of a pentest where a private smartphone and poor network configuration resulted in a compromise of a corporate network and data exfiltration.
OPINIONS
 
In 2016, penetration testers acting as an external attacker, were able to gain access to corporate networks 55% of the time, according to this report. When acting as internal intruders, they were able to compromise the security in all cases. In 2015, the equivalent report had these numbers at 28% (...)
OPINIONS
 
When you are responsible for managing your information security, ideally you would want to do it all. But a number of factors, such as money, time, competencies and value for money, force you to prioritise. On top of that, information security has steadily become that black hole that we can keep (...)
THREATS
 
In the days of yore, an IMSI catcher was an extremely expensive unit to buy, and the training needed to use it was limited to a select few. This is no longer the case, since the knowledge needed to use IMSI catchers is now in the public domain, and the skills for creating one are more generally (...)
THREATS
 
Over the past week, various articles have been published about the Industroyer malware. The technical aspects have been laid out clear and plain for all to understand, albeit mostly picked up by the cybersecurity community itself. But how alarming is Industroyer really?
OPINIONS
 
Using cloud, whether it’s a stand-alone solution, or is integrated into the existing IT infrastructure, creates complexity, which needs to be handled by the procedures that are already in place at the company.
OPINIONS
 
SCADA systems have been running offline for years, but those days are long gone. Now, they often rely on connectivity to the Internet, but because they have been running offline for decades, the security of these systems is not ready for online exposure. So how do we secure SCADA systems?
OPINIONS
 
Outsourcing security to providers is a necessity for many organisations - but there are certain things that you need to keep in mind when doing so.
OPINIONS
 
Governments have a legitimate need to be able to access information in cases where a court order has been issued for accessing it. But calls for a general weakening of encryption will result in an alarming reduction in the security needs for not only businesses, but also the general public.
THREATS
 
The group that originally leaked the NSA tools in April, “the Shadow Brokers”, are promising to dump more exploits, which will be available through a paid subscription service starting in June. The subscription will cost $ 21,000 per month, and the group says that the monthly dumps are for " (...)
EVENT
 
The evolution of the SOC: when outbreaks like WannaCry are commonplace, it is time to move from traditional MSSP to a more comprehensive approach
EVENT
 
How far can an intruder get if you fall victim to a phishing attack, and how can you protect yourself?