Blog.

MELTDOWN AND SPECTRE - UNDERSTANDING AND MITIGATING THE THREATS

By now, you've heard about the processor vulnerabilities affecting almost every processor in common use today; those vulnerabilities are called Meltdown and Spectre:

WHAT IS THE THREAT?         WHAT IS THE THREAT?

 

What is the threat?

As a summary, the issues are located at the kernel level of the chips and can lead to leaking running memory outside the current process. Both would enable a hacker to access confidential information such as secret passwords, personal information or photos from desktops, laptops, cloud servers or smartphones.

Contrary to some initial reporting, this is not

Read More

22 FEBRUARY 2018: PREPARING FOR AUSTRALIA’S DATA BREACH LEGISLATION. DOWNLOAD THE LOOP WHITEPAPER.

22 February 2018: Preparing for Australia’s Data Breach Legislation. Download the Loop Whitepaper.

Benjamin Franklin once said, ‘an ounce of prevention is worth a pound of cure’. Today this can be aptly applied to the value proposition of protecting our important information. 

Unfortunately, recent history shows that data breaches are a fact of life for many organisations – no-one knows who is going to be breached, or when.

That said, proven incident handling responses and breach impact minimisation through solid operations security has a significant return on investment when compared to the potential financial impact and brand damage of a breach.

The Notifiable

Read More

HOW MUCH IS ENOUGH?

How Much Is Enough?

In cyber-security circles, this question often pops into discussions around Penetration Testing, ethical hacking or ‘Offensive Security’.

Penetration testing is a great validation mechanism that provides assurance that security controls are:

a) actually as effective as you think they are; and

b) at least as effective as when they were originally implemented. 

A ‘clean’ Penetration Test report demonstrates that the money and resources invested in security are delivering value to the company and are also invaluable during compliance and regulatory audits.

All security controls

Read More

Blurred Boundaries: Hacking across the digital and physical divide

Earlier this month, Senior Offensive Security Consultant Topaz was able to enjoy the results of a plan years in the making. That plan was to create Australia’s first lock picking and physical security conference. 

Following countless hours developing and coordinating in his spare time, the conference arrived this month in the form of OzLockCon 2017.

The goal for OzLockCon: to provide a forum for hackers and lock pickers to test their skills and push the limits of the latest physical security systems. Critically, Topaz saw this as an opportunity to bring

Read More

Is cyber insurance really worth it?

Is cyber insurance really worth it?

Protecting your business from cyber risks can be a risky exercice in itself, with a whole host of legal and financial dangers lurking in the fine print.
 

Cyber insurance: what is it, do I need it and what does it cost? Those are just some of the questions around cyber insurance, interest in which is being driven by two key factors.

Firstly, the proposed changes to privacy laws. The Privacy Amendment (Notifiable Data Breaches) Bill 2016 is currently before the Federal parliament. It provides for mandatory disclosure for certain breaches. Debate about this long-awaited and much-criticised

Read More

Mike Ingram talks about Loop and Intel’s partnership to address industry cyber security chall

Hear how a Business & Cyber Security Advisor at Loop Technology is partnering with Intel Security to provide a complete platform for Loop clients and discover the challenges he’s seeing in the industry today.

 

Watch the video here.

Read More
1 2 3 4 5 Next