I'm The Creeper, Catch Me If You Can By Adam Boad - CYSIAM Consultant It’s been 50 years since what most experts agree was the world’s first worm. Although created with no malicious intent, ‘The Creeper’, created by Bob Thomas in 1971, was a piece of self-replicating code that
About CYSIAM AdminThis author has not yet filled in any details.
So far CYSIAM Admin has created 13 blog entries.
Rules to Remember: Being a Start-Up's MD By David Allan - CYSIAM MD & CTO So, what’s it really like to be the managing director of a small start-up company? Well, it’s been a lot of things; challenging, demanding, rewarding, eye-opening, to name a few and I’m sure other MD’s can agree
CYSIAM partners with Crowdstrike to secure clients’ operations. 30th June 2021 - Press Release: The cyber security firm CYSIAM announced it is partnering with CrowdStrike, a leader in cloud-delivered endpoint and workload protection, to utilise the CrowdStrike Falcon Overwatch solution as part of CYSIAM’s new Cyber Defence Operations (CDO) service. CYSIAM will launch
CYSIAM teams up with Cranfield University - Operational Digital Forensics CYSIAM teams up with Cranfield Defence and Security to deliver Operational Digital Forensics training to global clients Cranfield Defence and Security Services Ltd., a commercial trading entity of Cranfield University, has formed a new partnership with CYSIAM, a specialist cyber security provider. The
CYSIAM supporting OSCT Accelerated Capability Environment (ACE) CYSIAM is proud to be part of the Vivace (vivace.tech) community, providing expertise and capabilities to the Accelerated Capability Environment (ACE)which is a UK Home Office unit within the Office for Security and Counter Terrorism (OSCT). Contact Us
CYSIAM awarded CREST accreditation CYSIAM is delighted to announce that it has been awarded accredited member status by CREST, the internationally recognised accreditation and certification body. This accreditation covers Penetration Testing and Cyber Incident Response services. CYSIAM is now operating in its second year and has already met many important milestones including last year
Cyber Due Diligence: The New Normal In all likelihood, cyber security capabilities will continue to lag behind both evolving digital technology and the accompanying evolution in exploitation tools and techniques. In addition, network defenders are required to stop every attack whilst hostile states, criminals and activists need only get lucky once. Technology is
Cyber Security in the Supply Chain: You're as Vulnerable as your Weakest Link It’s easy to look at the 2018 British Airways website hack and the resultant c5% fall in the IAG (BA’s parent company) share price, with a certain sense of detachment. It’s a strange phenomenon that this type of headline is
Protect Everything, Harden What's Critical When prioritising cyber security objectives, it’s tempting to identify what you deem to be business-critical and focus your investment of resources in this area. Whilst taking this approach will no doubt improve your resilience, there is a danger of overlooking other key components of your operations. As well
Cyber Risk: For Smart People Who Haven’t Studied Computer Science The torrent of jargon that I.T. people use can be overwhelming. We know because we've experienced first hand, the glazed eye “get me out of this conversation now” look on the faces of non-technical staff across the strata of organisations. This isn’t another