Commissum

Opinion & Blog


Please click on the pink buttons to filter your results by blog or opinion.
Blog Opinion


Supporting Growth in Cybersecurity Skills



Supporting Growth in Cybersecurity Skills

Cybersecurity is one of the most exciting and progressive careers out there. Computing and STEM graduates currently have their pick of cybersecurity career paths as the number of opportunities seems to greatly outstrip the number of candidates.

With the average salary for cybersecurity jobs on the up … |More

Thoughts on Threats #1 – Malware Mayhem



Thoughts on Threats #1 – Malware Mayhem


Cyber threats come in many shapes and sizes, and can strike at any time. The widespread adoption and use of the Internet has led to an increase in the threats posed to organisations and individuals alike, and the opportunities available to those looking to attack.

On … |More

Don’t Hand the Baton to the Baddies, Stay Cyber-Fit and Go for Gold!



Don’t Hand the Baton to the Baddies, Stay Cyber-Fit and Go for Gold!


Keeping information secure can feel more like a never-ending marathon than a short sprint. 2016’s summer of sport is already in full swing, with the Euros and Wimbledon seeming to have flown by and the Rio 2016 Olympics now upon us.

Such high-profile events provide an … |More

Here Comes the Summer – and with it, a Whole Raft of Security Threats



Here Comes the Summer – and with it, a Whole Raft of Security Threats

Summer, it seems, has finally arrived in Scotland (well, barring the odd thunderous shower) and with it comes the promise of peace, of beers on the beach, and switching off for a glorious couple of hours or weeks without a care in the world.

Before you … |More

Failure to Prepare for a Data Breach is Preparing to Fail



Failure to Prepare for a Data Breach is Preparing to Fail


It’s often best to head into any venture with a “plan for the worst, hope for the best” mentality, and that mantra can be applied to information security as well. No-one expects a data breach to happen at their company, but new research from the Ponemon … |More

What Does Brexit Mean For Your Cybersecurity?



What Does Brexit Mean For Your Cybersecurity?


As a member of the European Union, the United Kingdom comes under various pieces of regulation designed to standardise and strengthen information security across the European market. Given that the UK has elected by referendum to leave the EU, where does this leave us in terms … |More

Mossack Fonseca – History’s Biggest Data Breach?



Mossack Fonseca – History’s Biggest Data Breach?


On Sunday 10th April the ICIJ (International Consortium of Investigative Journalists) in joint action with over 190 of its partners began publishing details of the 11 million leaked documents of the world’s 4th biggest offshore law firm, Panama’s Mossack Fonseca. The scale of the leak … |More

The Draft Communications Data Bill – The Latest News



The Draft Communications Data Bill – The Latest News


The Draft Communications Data Bill, also known as the Snoopers’ Charter, was originally developed in response to Edward Snowden’s disclosers of mass surveillance. Web surveillance legislation aims to allow for wider police powers to hack phones as well as view Internet browsing history. The revised bill … |More

Ransomware – Practical Tips in a Straightforward Manner



Ransomware – Practical Tips in a Straightforward Manner



No doubt the evolution of ransomware remains to be a hot topic among businesses and the security community in 2016. Cybercrime ecosystems remain in place, providing easy access to tools and exploit kits to carry out crime – so here we are, trying to tackle the … |More

Juniper Firewall Backdoor Christmas Cracker!



Juniper Firewall Backdoor Christmas Cracker!



How the heck did Juniper, the world’s second largest vendor of networking kit allow a backdoor on its enterprise firewall OS?
There are so many how, what, when and who’s to this story that it’s worth breaking it down somewhat to understand the background…

I want … |More