Cyber Business ​Blog

7Safe's trusted cyber security experts share insights in this blog to help business executives understand, keep up-to-date and manage cyber security risks.

select
  • Funding

    €100m investment at the fraction of the price

    Jun 23, 2014

    With news about data breaches and privacy continuing to claim regular columns in newspapers and analysts discussing the risks about handling big data, you may be wondering what the fuss is all about. But, if you start to look more closely at the level of risks involved, you could be easily thrown into a sea [...]
  • microsoft-windows-xp

    What to do if you’re using Windows XP

    May 30, 2014

    Microsoft recently announced that they have stopped providing support for one of their key operating systems. Windows XP was created in 2001 by Microsoft as part of their Windows NT family of operating systems and, during its 13 year lifespan, Windows XP became a staple for many PC users being used in peoples’ homes and [...]
  • shutterstock_100931329

    HACKsight – a snapshot of the security vulnerabilities found last month

    May 06, 2014

    As active contributors to the cyber security arena, we in 7Safe are always looking at ways of sharing our work help you improve your security. As part of that, we have developed a monthly infographic bulletin called HACKsight which we hope will provide an interesting and informative resource.  HACKsight is a high-level snapshot of security vulnerabilities [...]
  • shutterstock_163229387

    Complexity is the enemy of security

    Mar 25, 2014

    Author:Stephen Hancock The kings and barons of history sought security in heavily fortified castles.  There might be a central keep with a surrounding wall, all on top of a mound; perhaps with a moat as well.  Of course, there also had to be a way to get in, hence a door, heavily fortified within a [...]
  • Image_10199_(mini)

    Your PCI assessment really doesn’t need to be so hard

    Oct 09, 2013

    Nobody wants to go through a PCI DSS assessment but if your business takes credit cards then sooner or later you are going to have to. There are plenty of technical solutions in the marketplace claiming to make compliance easier and quite of lot of guidance around achieving compliance. The focus of this article is [...]
  • shutterstock_310500899

    Thinking the Unthinkable: What if a Cyber Attack Succeeds?

    Jul 30, 2013

    Jerome Smith, penetration tester and ethical hacking training instructor at 7Safe, part of PA Consulting Group, invites you to ask the big “what if?” question.
  • Image_10339_(mini)

    Computer Forensic Expert Reports – Interpretation Can Make or Break a Case

    Jul 30, 2013

    Computer forensic investigations often unearth a plethora of evidence that the analyst will collate in order to compile their report. This evidence often takes the forms of documents, pictures, Internet browsing history and communications data, both live and deleted, to name but a few. However, when the investigation finishes and the findings are scrutinised by the client or legal counsel, are the most crucial evidential artefacts actually being used to serve justice?
  • July HACKsight

    Lock Picking could be a pen tester’s best friend

    Jul 30, 2013

    By Alan Phillips Black Hat USA. Monday, July 30th 2013 and it's lunch time. Beyond my burger I notice Benjamin Vallens siting down alongside an impressive array of keys and interesting looking metal tools.  After enquiring about these objects, I soon learn that he is attending a two-day training workshop put on by The CORE Group [...]
  • hacksight

    Does PCI DSS Equal Security?

    Jul 25, 2013

    One of the first things you might hear when you start getting involved with PCI DSS is that PCI DSS does not equal security. That is a little strange when you think about it – after all, it is the Data Security Standard. So why do people say that, and is it true? It might [...]
  • Training Skills Shortage

    Responding to the MS12-020 security vulnerability

    Mar 26, 2012

    On 13th March 2012, Microsoft released a security patch for the MS12-020 vulnerability relating to the remote desktop protocol (RDP). The identified vulnerability allowed attackers to execute arbitrary commands on systems running vulnerable RDP services over the network which could lead to denial of service attacks, or worse, to loss of sensitive data stored on [...]