NIST Digital Identity Guidelines Clarify Importance of SMS in Authentication Strategies

Posted by: Claus Rosendal  /  16 November 2017 16:30:00 GMT

As we anticipated when we first wrote about the Digital Identity Guidelines published by the National Institute of Standards and Technology (NIST), the new recommendations have ignited a fierce debate in the cybersecurity community. What is the best authentication method to protect access to data and systems? Is two-factor enough or does multifactor provide the best defense? What delivery methods are the most secure? Which backend infrastructures ensure the right people access the right data?

Read More

Topics: Security, NIST, User Authentication, SMS

Cloud Security - how is 2017 shaping up?

Posted by: Ed Macnair  /  07 February 2017 09:42:36 GMT

With January rapidly becoming a distant memory, and as all those New Year good intentions get left by the wayside, I am pleased to report the race to the cloud continues apace.

But as enterprises embrace the cloud to help their businesses become more agile and responsive, they invariably encounter more security threats and become more susceptible to breaches from multiple channels. Legacy security technologies simply lag behind, as they just weren’t designed to deal with these threats.

So in this complex world, what do we think are the big up and coming cloud security trends? Here we take a look at our top five…

Read More

Topics: Cloud, Security, CensorNet, Cloud Application Control, CASB, Apps, cac

Cloud Security issues aren’t unknown

Posted by: Ed Macnair  /  19 December 2016 11:43:51 GMT

When Cloud was the new kid on the block, the risk of adoption was simply too variable and therefore untenable but that didn’t really matter. It was gathering such momentum the security market simply couldn’t keep up. So in line with tradition, the easiest option was to get the big red stamp out and mark it ‘unsafe’ and hope it would go away.

Read More

Topics: Cloud, Security, Web Security, Cloud Application Control, Email security

CensorNet and the statutory duty on radicalisation

Posted by: Ed Macnair  /  19 December 2016 11:05:11 GMT

The Department for Education’s statutory guidelines (“Keeping Children Safe in Education”) are now in force. For the first time the guidelines include the subject of the legal obligations on the school arising under the Counter Terrorism and Security Act 2015. On this subject the statutory guidelines are explicit:

Read More

Topics: Security, Compliance, Public Sector

Here phishy, phishy

Posted by: Ed Macnair  /  19 December 2016 10:58:04 GMT

The thing about well known phishing scams is they’ve essentially become industry-comedy punch lines which also puts them in danger of being diluted as a meaningful and growing threat.

If you even so much as mention to a colleague the Nigerian Prince offering you many many monies to leave the country, you will instantly engage in a series of one-upmanship debates on who’s received the most spurious spam.

Read More

Topics: Security, Phishing

Two’s company but it’s no longer enough

Posted by: Ed Macnair  /  19 December 2016 09:56:02 GMT

 

Cyber Security is now well and truly on the map. Politicians wax lyrical about how they’re fighting it, entire supplements of every major Sunday newspaper are dedicated to it and in general, the world is that little bit more savvy, I’m delighted to say.  
Read More

Topics: Security, User Authentication

Why it’s time to ditch the password…

Posted by: David Hald  /  19 December 2016 09:25:29 GMT

Given that passwords are on the front line of defence in the security of corporates and individuals, it’s mind boggling how elementary some people’s passwords are. Some recent research by LeakedSource, delved into the frequency of use of LinkedIn’s 10 most pathetic passwords. Topping the list is “123456” with an incredible 753,305 LinkedIn users, using this most perfunctory of passwords.

Read More

Topics: Security, Password, User Authentication

The NIST draft guidelines have ignited an interesting debate

Posted by: Claus Rosendal  /  19 December 2016 08:48:02 GMT

 

Read More

Topics: Security, NIST, User Authentication, SMS

CensorNet shortlisted for two Computing Security Awards

Posted by: Ed Macnair  /  19 December 2016 08:47:12 GMT

We’re delighted to say that we’ve been named a finalist in two categories at this year’s Computing Security Awards! The awards recognize the best security solutions, companies, resellers and individuals in the industry – and we’re in the running for Cloud Security Solution of the Year and SME Security Solution of the Year.

Read More

Topics: Cloud, Security, Awards

A CIO and an Entrepreneur walk into a bar…

Posted by: Ed Macnair  /  19 December 2016 08:37:22 GMT

One arbitrary Google search of ‘Shadow IT’ will instantly present a buffet of opinion; not to mention some of the most spurious marketing images in the history of the internet.

That’s the trouble with the tech sector, a genuine issue arises and before you can say the words ‘Please. Just. Stop’; everyone (and I mean everyone) has a ‘solution’ and a ‘marketing strapline’ for it. You only have to look at how many times BYOD was rinsed and repeated over the last decade to know where I’m coming from.

Read More

Topics: Cloud, Security, Cloud Application Control, CASB