Sponsor

Peerlyst has launched an Infosec-only securedrop [Sponsor]

Many thanks to the great folks at Peerlyst, who have sponsored my writing for the last week. Peerlyst.com is where information security practitioners go to talk shop, advance their careers, and boost their professional reputations. Peerlyst has launched the very first Infosec-only securedrop. Big newspapers like The Guardian, The Intercept or Washington Post have securedrops


45 sec read

Peerlyst has launched an Infosec-only securedrop [Sponsor]

Many thanks to the great folks at Peerlyst, who have sponsored my writing for the last week. Peerlyst.com is where information security practitioners go to talk shop, advance their careers, and boost their professional reputations. Peerlyst has launched the very first Infosec-only securedrop. Big newspapers like The Guardian, The Intercept or Washington Post have securedrops


45 sec read

GhostMail. Encrypted email, chat & cloud storage. FREE and easy to use. [Sponsor]

Many thanks to the great folks at GhostMail, who have sponsored my writing for the last week. Sign up to secure encrypted GhostMail and enjoy instant free email, chat & storage facilities. No downloads needed. The GhostMail end-to-end encryption platform is literally super easy to use – and should be used by anyone who cares


33 sec read

Password RBL protects businesses from bad passwords that lead to breaches [Sponsor]

Many thanks to the great folks at Password RBL, who have sponsored my writing for the last week. Bad passwords have plagued businesses for decades, exposing proprietary and customer data. This is a significant IT security problem that has only seemed to get worse as companies put more and more data behind systems protected by


1 min read

Free eBook! GFI’s 10-step action plan for the ultimate email protection [Sponsor]

Many thanks to the great folks at GFI, who have sponsored my writing for the last four weeks. GFI Software™ develops quality IT solutions that enable businesses to monitor, manage and secure their networks with minimal administrative overhead. Serving an expanding customer base of tens of thousands of companies and securing millions of endpoints, GFI


45 sec read

Free eBook! GFI’s 10-step action plan for the ultimate email protection [Sponsor]

Many thanks to the great folks at GFI, who have sponsored my writing for the last week, and for the next few weeks. GFI Software™ develops quality IT solutions that enable businesses to monitor, manage and secure their networks with minimal administrative overhead. Serving an expanding customer base of tens of thousands of companies and


46 sec read

GlassWire helps protect your PC & privacy by visualizing your network activity. Try it free! [Sponsor]

Many thanks to the great folks at GlassWire, who have sponsored my writing for the last week. GlassWire helps protect your PC & privacy by visualizing your network activity. Try it free! This week we’re sponsored by GlassWire’s new visual firewall software. Try GlassWire free! GlassWire’s firewall management feature makes it easy to block apps


1 min read

Test yourself like the bad guys will… before they do. [Sponsor]

Many thanks to the great folks at XQ Digital Resilience, who have sponsored my writing for the last week. In the era of cyber insecurity many mature organisations have little or no idea of their security and resilience posture. They invest significant sums on people, processes and technology, and yet they often never subject themselves


1 min read

The 2015 Industrial Control Systems (ICS) Cyber Security Conference. Training and workshops included. Register today! [Sponsor]

Many thanks to the great folks at the Industrial Control Systems (ICS) Cyber Security Conference, who have sponsored my writing for the last week. The 2015 Industrial Control Systems (ICS) Cyber Security Conference takes place October 26 – 29th at the Georgia Tech Hotel and Conference Center in Atlanta. Since 2002, the ICS Cyber Security


38 sec read

GhostMail. Encrypted email, chat & cloud storage. FREE and easy to use. [Sponsor]

Many thanks to the great folks at GhostMail, who have sponsored my writing for the last week. Sign up to secure encrypted GhostMail and enjoy instant free email, chat & storage facilities. No downloads needed. The GhostMail end-to-end encryption platform is literally super easy to use – and should be used by anyone who cares


33 sec read

Download IKANOW’s eBook – “Enhancing Threat Feeds with Analytics: Making Threat Feeds Work for You” [Sponsor]

Many thanks to the great folks at IKANOW, who have sponsored my writing for the last week. IKANOW exists to advance cybersecurity through an open, scalable, high-throughput, data agnostic, analytics platform that is able to continuously optimize an enterprise’s cybersecurity posture and sharply reduce risk. IKANOW’s experience conducting high-value military intelligence work drove us to


35 sec read

See what lost productivity costs your company. Try Layer8 from Logfiller free for 30 days [Sponsor]

Many thanks to the great folks at Logfiller, who have sponsored my writing for the last week. Thanks! “We had no idea…!” See what lost productivity costs your company. Layer8 from Logfiller is a new data source that gives powerful and precise insight into what happens across IT systems in real-time. It provides broad and


40 sec read

Could you spot a Snowden? Admins or contractors could be a threat to your data [Sponsor]

Many thanks to the lovely folks at Wallix, who have sponsored my writing for the last week. Thanks! We should all know by now the enormous impact that Edward Snowden has had on the world, leaking intelligence documents which revealed the scale and scope of covert surveillance on regular internet users, companies and – indeed


41 sec read

[Sponsor] IKANOW – continually optimizing your enterprise’s security posture and reducing risk

Many thanks to IKANOW, who have sponsored my writing for the last week. Thanks guys! IKANOW exists to advance cybersecurity through an open, scalable, high-throughput, data agnostic, analytics platform that is able to continuously optimize an enterprise’s cybersecurity posture and sharply reduce risk. IKANOW’s experience conducting high-value military intelligence work drove us to build a


32 sec read

[Sponsor] activereach’s free guide to DDoS attacks and mitigation

Many thanks to DDoS mitigation and testing specialists activereach, who sponsored my writing for the last few weeks. Thanks guys! You can receive the latest part of activereach’s free “Guide to DDoS and mitigation 2015” now. In activereach’s guide to DDoS and mitigation, Max Pritchard of activereach looks at DDoS attacks and mitigation strategies, and


36 sec read

[Sponsor] activereach’s free guide to DDoS attacks and mitigation

Many thanks to DDoS mitigation and testing specialists activereach, who are currently sponsoring my writing. Thanks guys! Receive the latest part of activereach’s free “Guide to DDoS and mitigation 2015” now. In activereach’s guide to DDoS and mitigation, Max Pritchard of activereach looks at DDoS attacks and mitigation strategies, and also looks at the way


35 sec read