Author Archives: frankcoggrave

So you think your clouds are private?

A recent conversation with a security analyst made me think about the convergence of the increasing number of personal computing devices (including the iPad I’m writing this on) and the explosion of cloud services. As a company or organisation trying … Continue reading

Posted in cyber | Tagged , , | Leave a comment

1 out of every 14 programs downloaded is malware

I’ve been in IT for over 30 years and started as a developer back in the old Cobol days (and if that doesn’t date me….), so my wife’s family think I know what I’m talking about and understand the intricacies … Continue reading

Posted in cyber | Tagged , | Leave a comment

eDiscovery shouldn’t be this hard

In a recent US court case one party seemed to find the eDiscovery process so hard / complex / time consuming that they ended up being slapped by the court http://abovethelaw.com/2011/05/d-c-lawyers-screw-up-e-discovery-so-badly-it%E2%80%99s-literally-unheard-of/ So what’s so complex? Often the complexity is because people use old … Continue reading

Posted in eDiscovery | Tagged | Leave a comment

Stuxnet goes to Vanity Fair

A great review of the probable history and background to Stuxnet in, of all things, Vanity Fair http://www.vanityfair.com/culture/features/2011/04/stuxnet-201104. Its a well researched thriller of a story and highlights 2 key aspects: 1. how targeted and dangerous this attack could be. 2 how difficult … Continue reading

Posted in cyber | Tagged , , | Leave a comment

Donate those PCs securely

It was disappointing to see that the valid security concerns of many organisations are increasing the tendency to destroy computing assets. http://www.channelweb.co.uk/crn-uk/news/2035623/security-fears-hamper-reuse Reuse in most cases is not reuse within a business but donation (or low cost sale) of those devices to deserving causes – … Continue reading

Posted in Uncategorized | Tagged | Leave a comment

Progress on UK Cyber defence

News that a senior army general has been appointed to take charge of Britain’s £650m cyber security defence programme is a positive sign in the progression of the Government’s approach. http://www.scmagazineuk.com/government-moves-forward-on-cyber-crime-strategy/article/198523/ It’s another key step in their efforts to bolster protection, … Continue reading

Posted in cyber | Tagged , , | Leave a comment

Disorder in the cloud?

The ISF have just published a helpful report on how to avoid pitfallls in taking to cloud computing. Many very sensible “sins” are exposed :   https://www.securityforum.org/userfiles/public/ISF_Cloud_computing_flyer.pdf Sin no.5 Disorder is of particular intertest to me : • SIN – information … Continue reading

Posted in eDiscovery | Tagged , | Leave a comment

In-house eDiscovery reported as key trend

An interesting article that reinforces a trend we are seeing pick up in the UK  http://www.enterprisestorageforum.com/management/article.php/3927986/The-Top-Six-Trends-in-eDiscovery.htm namely in-house eDiscovery. In the article it highlights 2 parallel elements of the trend: 1. In-house eDiscovery itself, whereby companies are finding the cost … Continue reading

Posted in eDiscovery | Tagged | Leave a comment

Forensics and incident response key to minimise cost of data breaches

A recent study http://www.infoworld.com/t/security/how-not-handle-data-breach-992?source=footer shows that organisations who react before they understand the significance of a security event get hurt. Its becoming more obvious that the clever companies expect the breaches to happen (who thinks defence-in-depth is 100% secure) and plan … Continue reading

Posted in Incident Response | Tagged , , | Leave a comment

UK Critical infrastructure defence

Lat month saw the UK Government start to enlist the private sector to combine cyber defense responses http://www.telegraph.co.uk/technology/8366810/GCHQ-aims-to-protect-critical-private-networks-from-hackers.html The issue has become more significant recently with the realisation that infrastructure networks beyond the military are terrorist targets and that, with examples … Continue reading

Posted in cyber | Tagged , , | Leave a comment