Posts by Ubong Kingsley-Udoh

Prioritising Risk Across the Cyber Attack Surface

The severity of vulnerabilities in the network is alarming these days and organisations are getting overwhelmed. In 2019, a total of 17,313 new vulnerabilities were disclosed – this means that security teams had to deal with 47 new vulnerabilities every day. As modern networks become more nimble, diverse and bigger,…

Preventative Measures for the Next KRACK Attacks

Cybersecurity
0
If we have been very circumspect as consumers of the Internet, the vulnerability of WI-FI networks wouldn’t come to us a surprise. WI-FI has always been a vulnerability vector and a huge medium of compromise against end-users and businesses alike. In 2016, Mathy Vanhoef and Frank Piessens of the University…

The Cybersecurity Poverty Line

Cybersecurity
0
When it comes to security, with a special focus on cybersecurity, there are haves and the have-nots. The drab state of security in organisations is worth giving a second thought these days. As we begin to transition deeply in the use of new technologies — the cloud, mobile, social, IoT…

The Password Policy Paradox

Insights
If recent security breaches are anything to come by, the idea that password is the root of all digital evil wouldn’t fade away any time soon. From an enterprise perspective, resources within an organisation need to be restricted to authorised users, while individuals have a password in check for the…

Mitigating Identity Theft

Identity theft can simply be defined as the crime of obtaining another person’s personal or financial information in order to make unauthorised transactions, access accounts, create new accounts, or perform fraudulent activities. The oftenness of this crime has risen at a steady pace, and criminals often use electronic means to…

A Maturity Primer for Vulnerability Coordination

Cybersecurity
At the FDA Cyber Summit in Washington, DC in January 2016, issues concerning the security of medical devices & patient records were discussed and a couple of resolutions was passed by the key policy wonks/attendees/manufacturers during the summit. Make no mistake, I’m still of the opinion that the healthcare industry…

Remediating a Security Incident

The earlier signs that you have a security incident are neither white nor black. Most individuals and organisations approach a security incident in every imaginable way and it’s always a knee-jerk reaction. To remediating a security incident, a proper incident response plan should be established. In simpler terms, Incident response…

Dirty Money in a Digital World

In the new digital economy – the advent of digital banking and cash management, criminals have perfected the art of moving money across continents at the speed of light and technological advances have made it difficult for law enforcement agencies to tackle it. If money laundering was a country, it…

Rethinking Risk and Enterprise Security in a Fierce Threat Landscape

In the zest towards achieving wholesome digital transformation journeys, the modern security landscape is rapidly evolving. The emergence of apps, cloud services, big data, and mobile technology though quite revolutionary opens up newer vistas of risks as traditional network perimeters are fading away as businesses retrofit their organisations around these…
Menu