Nettitude Blog

Ben Densham

Recent Posts

A quick guide to the Nettitude Security Operations Center

Posted by Ben Densham on Jan 5, 2018 11:59:24 AM

Take a guess at how many days it takes the average company to detect a cyber breach? Would you believe that it sits around the 214 day mark? That’s over 7 months where your data, your assets are at the hands of cyber criminals. Not to mention, once that attack has been spotted it can take a considerable amount of further days for that breach to be contained. By that point your business could have suffered irreparable damage, both from financial and personal data loss. 

Read More

Red Team Testing: 10 reasons why you should be doing it

Posted by Ben Densham on Oct 12, 2017 11:54:06 AM

Red Teaming is flavour of the month within the cyber security industry. But what does it mean? And should I really be considering it for my organisation/business?

Read More

Cyber Fighting Power – Who Has The Upper Hand?

Posted by Ben Densham on Sep 3, 2015 9:44:46 AM

Reading through the British Army Military Doctrine manual the other day (as you do!) the concept of Fighting Power in the context of cyber warfare got me thinking. How could a traditional approach from a historically renowned army be applied to the cyber world? Cyber, or the internet - if we remove the hyped buzz word - has been described as the fifth military domain after land, sea, air and space, and is certainly at the forefront of the attacks reported in the media these days.

Read More

Topics: Security Blog, Uncategorized

Cyber Breaches - Response In Depth (RID)

Posted by Ben Densham on Oct 28, 2014 9:42:12 AM

We know that our mind-sets need to shift these days and we must start by expecting to be hacked, but what then? How do we really manage an effective, secure environment? What steps do we need to consider?

Read More

Topics: Security Blog, Uncategorized

Windows Users At Risk From 'SandWorm' Vulnerability

Posted by Ben Densham on Oct 14, 2014 5:13:49 PM

Cyber threat intelligence provider ‘iSIGHT Partners’ has today announced* the discovery of a serious vulnerability that affects all supported versions of Microsoft Windows and Windows Server 2008 and 2012.

Read More

Topics: Security Blog, Uncategorized

Russian Password Thefts Highlight Need For ‘Response In Depth’

Posted by Ben Densham on Aug 6, 2014 5:04:58 PM

Data theft is in the headlines again as news speads that a Russian gang has reportedly stolen 1.2 billion usernames and passwords from various companies. The exact details of what and how much data has been exposed is unclear, but if such a large amount of customer data has indeed been amassed, it reminds us that companies are still being breached. While on the one hand reports of data breaches such as this keeps the cyber threat in the public eye, there is also a risk that the frequency of these incidents creates a certain amount of ‘cyber fatigue’ and a dangerous sense of complacency.

Read More

Topics: Security Blog, Uncategorized

Five Steps Towards Cyber Breach Preparation

Posted by Ben Densham on Jun 17, 2014 10:01:37 AM

Domino’s Pizza is the latest victim of a breach and ransom demand. The recent Evernote and Feedly DDoS ransom demands, along with the efforts of Cryptolocker and other tricks to extort hard cash from unsuspecting users, are being tested to the max. These brazen attempts to make a quick profit will only be fuelled for as long as they remain successful.

Read More

Topics: Security Blog, Uncategorized

eBay Suffers Breach After Cyber Attack

Posted by Ben Densham on May 22, 2014 11:43:07 AM

You can’t fail to have noticed that eBay has become the latest high-profile company to fall victim to a data breach incident, thanks to the global media attention and commentary that the incident has attracted.  In a post on eBay’s corporate site, the online auction site urged its customers to change their passwords following a cyber attack that compromised one of its databases earlier this year.  According to eBay, attackers successfully “compromised a small number of employee log-in credentials, allowing unauthorised access to eBay's corporate network”, which enabled them to access customer information, including names, encrypted passwords, email addresses, contact details and dates of birth.  Despite eBay hastening to add that no financial information had been stolen, data breaches involving customer information can be extremely damaging for any business, as lost customer confidence can be hard to regain.  Particularly, when you are responsible for 233m customers’ details.  The fact is that all companies that store client data must ensure they have a rigorous cyber security plan in place, that they identify and manage any areas of high risk and that they are fully prepared with an incident detection and response strategy should the worst happen.

Read More

Topics: Security Blog, Uncategorized

Heartbleed – How to respond

Posted by Ben Densham on Apr 9, 2014 3:37:54 PM

You can’t have failed to notice the media storm in the IT and security press around the recent vulnerability in the bedrock of the internet – SSL. The service designed to be protecting our data when sent over the big bad public wire has been wide open since early 2012 within many OpenSSL deployments (unpatched OpenSSL 1.01 or 1.02beta).

Read More

Topics: 2014 Security Breaches, BYOD, Cyber Security, Nettitude, Penetration Testing, Security Awareness Training, Security Blog, Security Testing, Uncategorized

Security Awareness Training - Latest Findings

Posted by Ben Densham on Mar 14, 2014 2:37:55 PM

Some interesting and rather alarming findings from a recent survey around Security Awareness Training (SAT): source 1,000 people surveyed by One Poll for PhishMe.

Read More

Topics: Cyber Security, Security Awareness Training, Security Blog, Uncategorized

About Nettitude

Nettitude is the trusted cyber security provider to thousands of businesses around the world. We stop at nothing to keep your data and business secure in an age of ever-evolving cyber threats.

Our experts use an award winning Threat Intelligence led approach that incorporates real-time data, ensuring that your company is protected at every stage of its journey.

Receive an update when we post!

Recent Posts