Cybersecurity

A Beginner’s Guide to InfoOps

2016.11.05 | Cybersecurity &Social Influence

We’re living in a world where we are frequently told that decreasingly-small actors can do big damage to those once considered great hegemonies, and technology is often cited as the cause of this rebalancing of power. There are plenty of reasons to be skeptical of this.

A Beginner’s Guide to InfoOps

Dyn DDoS: A State-Actor Threat?

2016.10.22 | Cybersecurity &Strategic Intelligence

As whole parts of the internet went down yesterday, it felt very much like this would be how world war three would most likely start. But can attribution really be pinned on a state actor as industry leaders have suggested?

Dyn DDoS: A State-Actor Threat?

The Disinformation Age

2016.09.20 | Cybersecurity &Social Influence &Strategic Intelligence

Brandolini's law, better known as the Bullshit Asymmetry Principle, states that "the amount of energy necessary to refute bullshit is an order of magnitude bigger than to produce it." Disinformation today poses a challenge without precedent to the functioning of both modern democracies and economies alike.

The Disinformation Age

The Trinity Underpinning Globalism

2016.08.18 | Cybersecurity &Strategic Intelligence

In cybersecurity there is a well accepted three-way trade-off between usability, functionality, and security. The trade-offs inherent to globalism are no different. Brilliantly designed products seek to mitigate costs, and our political leadership could be doing more.

The Trinity Underpinning Globalism

Considered the “biggest, most systemic risk” threat the insurance industry faces and a growing "national emergency" by the US government itself, the threat of cyberattack is real and present. Most organisations fail to realise the ways in which they are targets however and thus continue to underinvest in cybersecurity. This article introduces the four main tools at the disposal of policymakers seeking to improve cybersecurity at large.

Ensuring Socially Optimal Investment in Cyber-Security

Moving from Dropbox to BitTorrent Sync

2015.08.02 | Cybersecurity

Dropbox is a trusty tool used by teams and businesses around the world to communicate. But is there anything better? In a resource-intensive fast-paced environment Dropbox can seem slow and bottleneck progress. We wanted to know whether a new tool from BitTorrent, Sync, could outperform.

Moving from Dropbox to BitTorrent Sync

Generating Secure Passwords

2015.01.10 | Cybersecurity

Generating secure passwords is easy, quick and simple. In this article we cover what makes a strong password, how to remember dozens of complicated ones, how to avoid reusing the same password more than once, and how to quickly create random passwords on the go.

Generating Secure Passwords

Enabling Multi-Factor Authentication

2015.01.10 | Cybersecurity

Multi-factor authentication adds an extra layer of security to your usage of websites like Gmail, Facebook, Twitter and Apple - as well as business-critical and often data-sensitive tools like AWS, Dropbox and Namecheap. Find out how you can enable multi-factor authentication on all these sites and more in this article.

Enabling Multi-Factor Authentication

Protecting Against Spearphishing Attacks

2015.01.10 | Cybersecurity

Spearphishing is a targeted, disguised type of attack on an individual or organisation, appearing to originate from a known or trusted entity. Increasing in sophistication and number almost daily, even small businesses and operations now have consider how they might safeguard against such attacks. In this article we explore how.

Protecting Against Spearphishing Attacks

Recommended Password Managers

2015.01.10 | Cybersecurity

Security conscious web users are well-aware that they should avoid reusing the same website across multiple websites. But how practical is it to have a hundred different passwords for as many different online services? Without a password management system such a feat becomes nigh-impossible. Here we take a look at three leading password managements solutions to help you determine which one is right for you.

Recommended Password Managers
Have a project you'd like to discuss? Email us Private & confidential