RESEARCH
 
Regardless of the size, scope, geography or sector of your organisation, there are common elements that should be considered when it comes to cyber security due diligence during the M&A process.
EVENT
 
To celebrate our move to our shiny new office, we are having an open house on Thursday, 9th of February. To mark the occasion, NCC Group CEO Rob Cotton and FortConsult founder Ulf Munkedal will accompany Principal Security Consultant Neal Hindocha and Head of Security Strategy Jan Skovgren on stage.
OPINIONS
 
January is a time of rethinking and contemplation: how can we improve, and which new challenges will the year bring? FortConsult’s focus this year is to help our clients rethink the way they traditionally approach the monumental challenge that is cyber security.
EVENT
 
It is becoming increasingly challenging for companies to navigate the current threat environment, with numerous and varied threats creating an overwhelming amount of areas to focus cyber defence operations on. To help businesses on the right track, FortConsult is hosting a free webinar on how to (...)
TOOLS
 
Presenting at Kiwicon in New Zealand, FortConsult hacker Michele Orru, also known as ‘AntiSnatchOr’ in some circles, showcased and released his latest phishing kit.
RESEARCH
 
Is your organisation fully prepared for malicious attacks from both motivated external attackers and internal threat actors? As the threat landscape continues to evolve it is vital that organisations understand where the threats are and how they can protect and mitigate the risk.
RESEARCH
 
In this paper, we discuss the process of finding vulnerabilities in remotely managed routers, in particular those running on the Optimum network. We delve into the setup process for these routers, examine modifications that Optimum has made to an off-the-shelf router firmware, and highlight (...)
RESEARCH
 
Email was not designed to be used the way it is today. Organisations rely on email for daily business communication and while most are protecting against low-level threats, more sophisticated email-based attacks are on the rise.
OPINIONS
 
Last week marked the last episode of “Menneskejagt” (Danish: Hunted), a TV show that aired for six weeks on Danish national television. The show follows several groups of contestants, who are on the run from a team of professional hunters and are treated as real fugitives.
EVENT
 
The IT security industry and the threat landscape are ever-changing, and the need to stay a step ahead of the cyber criminals is of critical importance across different industries. The best IT departments invest in educating their employees, as the human factor is always the critical frontier in (...)
RESEARCH
 
NCC Group commissioned research consultancy ComRes to survey 200 board directors from UK companies with over 500 employees. The Group has released its 'Elephant in the Boardroom' report on the day its CEO, Rob Cotton, delivers a keynote at the Institute of Directors Annual Convention on (...)
RESEARCH
 
One of the main concerns relating to the replacement of IT infrastructure is the cost. The risk of introducing compatibility issues and, ultimately, downtime also causes anxiety. However, exploitation of vulnerabilities in legacy systems and software can be damaging to an organisation on both a (...)
RESEARCH
 
We’ve published a short eBook about the potential impact General Data Protection Regulation (GDPR) may have on your marketing activity. Regardless of when or how the various negotiations develop with the EU, the UK’s data protection standards will have to be equivalent to the EU’s GDPR.
THREATS
 
NCC Group was recently posed the following by one of our UK CISO Research Council members: ‘Blockchain (especially BitCoin) is highly dependent on elliptic curve crypto and hashes like SHA256 and RIPEMD-160, which are all vulnerable to quantum computing attacks using Shaw’s and Grover’s algorithms (...)
RESEARCH
 
What happens when a seemingly harmless “lightweight” protocol contains a fatal security misconfiguration? FortConsult’s Lucas Lundgren found out after stumbling across it while doing research in IoT security.