2|SEC Cyber Security Blog

The Cyber Sentinel

Stay on top of the latest news and updates to stay ahead of the latest threats

Article

Cyber Security Easter Eggs

Easter Eggs

Easter eggs are hidden messages, features, or jokes that are intentionally placed in software, video games, or other digital media. They are a way for developers to add a bit of fun or personality to their products, and they are often a source of delight for users who discover them. However, Easter eggs can also […]

Easter Eggs Read More »

Cyber Plan

Cyber Plan

HOW TO MANAGE CYBER RISK In the current climate, the need for a clear understanding of the business risks as well as the tools and techniques available to deal with them is fundamental. The velocity of change and the magnitude of the problem is not always fully recognised by the whole business. We recommend that

Cyber Plan Read More »

Scenario based attack simulation

Whilst conventional assessments remain valuable tools for network security, they often miss those flaws that were previously known or for which no fix is available (it should be noted that these flaws have been proven to be effective against fully patched systems).   Scenario-based attack simulation is a specialisation of security assessments where, in addition

Scenario based attack simulation Read More »

China Cyber Dilemma in the 21st Century

PEOPLE’S REPUBLIC OF CHINA’S PRACTICE OF NETWORK POWER In today’s world, the information technology revolution is changing with each passing day. In contemporary China, the development of the network business has advanced by leaps and bounds. From mobile payment everywhere to new high-level online transaction volume; from the nationwide e-government system to the booming big

China Cyber Dilemma in the 21st Century Read More »

Operational Resilience

In late 2019, early 2020, the world woke up to the first, in modern memory, a truly global pandemic. Prior to COVID-19, Business Continuity Professionals had to go cap in hand with line of business managers to try and perform the annual Business Impact Analysis (BIA), review “their” Business Continuity, Resumption, and IT DR Plans.

Operational Resilience Read More »

To pay or not to pay?

In the UK right now, many businesses are asking themselves how they would respond to a ransomware attack, will they pay and what are their risks obligations if they are willing to do so.   That’s because the number of incidents of ransomware attacks has skyrocketed in the last two years.   In a recent

To pay or not to pay? Read More »

Scroll to Top