All posts

The-C2 Threat Intelligence Conference

Invite-only conference for cyber security leaders

the-c2
A Guide to Fortifying Cyber Defence

Following cyber security best practices is not enough. Excellence in the face of ever-evolving adversaries requires a proactive and strategic approach combined with a solid understanding of cyber threat intelligence. The-C2 conference is the key event in this area.

Why The-C2 conference should be on your professional calendar

The-C2 threat intelligence conference is a gathering of industry leaders, security professionals and seasoned experts.

Find out more about the spirit of The-C2; explore what to expect from this cyber security community; and make a compelling case for why your senior security executives should consider it an indispensable part of their professional calendar.

Continue reading “The-C2 Threat Intelligence Conference”
All posts

3 ways attackers bypass Multi-Factor Authentication

And 3 ways to stop them.

bypass Multi-Factor Authentication

Multi-Factor Authentication (MFA) is much more popular than it used to be. It’s easy to use and the enhanced security that it provides is supported by many services. But it’s not bulletproof. It is possible to bypass Multi-Factor Authentication.

How to get past the best security measures since the password was invented

The proliferation of mobile devices that support MFA in various different ways has helped make it a convenient option for users and life much harder for attackers, who need to develop ways to get around it. So, of course, they do.

In this report we examine how attackers manage to bypass Multi-Factor Authentication, a security measure that seems rock solid on the face of it.

Continue reading “3 ways attackers bypass Multi-Factor Authentication”
All posts

3 reasons why cybersecurity fails

How businesses and home users can make improvements to protect themselves

The number of stories in the mainstream press about the devastation that hackers cause is proof enough as to who has the upper hand in the cyber war today. But there is still plenty that people can do to increase their protection by understanding the common failure points.

Continue reading “3 reasons why cybersecurity fails”
All posts

Cyber Security DE:CODED – Security opportunities for Managed Service Providers

“Every SMB is an expert in something. A passion. It’s probably not anti-virus…”

Show notes for series 2, episode 7

Small business and Managed Service Provider special!

  • Do small businesses face the same cyber threats as large organisations?
  • Are your security solutions 100% effective? And how do you pick a good one?
  • Where are the opportunities for MSPs to add value and make more money?

In June 2022*, we set up a panel of security experts to help and advise companies selling managed security services. Managed Service Providers (MSPs) need to choose a set of security solutions that they can use or possibly resell to their small business clients, known as SMBs.

The clients face the same cyber threats as large organisations, but they’re far less equipped to handle them.

We answer all of these questions and more with special guests Martin Lee from Cisco, Chad Skipper from VMware, and Luis Corrons from Avast.

Security Life Hack from John Hawes (AMTSO)!

Continue reading “Cyber Security DE:CODED – Security opportunities for Managed Service Providers”
All posts

Cyber Security DE:CODED – Testing like hackers

“When it’s not a pay-to-play test that’s behind the curtain…”

[buzzsprout episode=’10578734′ player=’true’]

Show notes for series 2, episode 3

What does it mean to test like a hacker? Can a well-intentioned tester behave the same as a real cybercriminal?

When you’re looking for a good security test, how can you tell the useful from the misleading?

Our email accounts sit at the centre of our digital lives. We look at ways to bullet-proof your most important internet account.

We discuss these questions, and more, with Frank Duff (ex-MITRE, now Tidal Cyber), Mike Sentonas (CrowdStrike) and Siggi Stefnisson (Avast).

Security Life Hack from Daniel Cuthbert!

Continue reading “Cyber Security DE:CODED – Testing like hackers”
All posts

Helping enterprises plan security

A strategic alternative to penetration testing.

Helping enterprises plan

Is Microsoft’s anti-virus good enough? Are the ‘next-gen’ endpoint products as good as they claim? Is our combination of anti-malware and whitelisting giving us full threat coverage? Enterprises are asking themselves, and SE Labs, these questions all the time. The good news is, we can help provide an answer.

Continue reading “Helping enterprises plan security”
All posts

Cyberattacks use your own tools

Security testing needs to be more realistic and subtle than just running malware

Cyberattacks use your own tools

Your own network can provide everything that an attacker needs to achieve its goal. In many ways it’s impossible to tell the difference between an effective attacker and a good systems administrator.

Continue reading “Cyberattacks use your own tools”
All posts

Outdated law firm tech creates tension with clients

Legal firms vs. data security: How to solve the tension between lawyers, their IT teams, clients and data security

outdated law firm tech

Traditional ways of working in the legal world clash with modern technology and tech-savvy clients. Outdated law firm tech might be safe, but it makes customers unhappy.

There is a tension between lawyers, their IT teams and their clients. Law firms don’t like to recognise this, at least publicly. But there is a clash between “the way things are done”, customer service and the convenience provided by modern technology.

Continue reading “Outdated law firm tech creates tension with clients”
All posts

How they sell security (and we buy it)

The world of cyber security sales is unclear at best

The secret world of cyber security sales is fascinating. And shady. If you ever wondered how they sell security, and how we buy it, we have a treat for you.

Our security reports help you choose the best anti-malware solutions for your organisation and your family. These latest lab results look at how the most popular products handle the threats everyone faces on a daily basis, as well as the sort of targeted attack you hope never to encounter (but might).

Continue reading “How they sell security (and we buy it)”
All posts

Cyber Security DE:CODED – Selling Security: The Insider’s Guide

“You’re thinking: How much truth is in that report?”

[buzzsprout episode=’8186641′ player=’true’]

Show notes for series 1, episode 5

Companies spend trillions on cyber security each year. But how do they decide which products and services are the best?

Continue reading “Cyber Security DE:CODED – Selling Security: The Insider’s Guide”

Contact us

Give us a few details about yourself and describe your inquiriy. We will get back to you as soon as possible.

Get in touch

Feel free to reach out to us with any questions or inquiries

info@selabs.uk Connect with us Find us