For those in the know, last Thursday evening saw the first Security Scotland MeetUp. It was organised and hosted by Stu Hirst of Skyscanner at their snazzy office in the Quartermile part of Edinburgh. I think it’s safe to say the night was a massive success … |More
We hope you all had a great Christmas and New Year. The start to 2016 has certainly been a busy one for us! We announced late last year that due to our continued growth we would be moving to a new head office in the heart … |More
Mona Yang joins Commissum as Trainee Security Consultant and Project Coordinator, a newly created role spanning both operations management and consultancy delivery. Mona will assist Commissum in more efficient project delivery … |More
For those of you passionate about martial arts, especially Karate, you might be left feeling slightly jealous after reading this article. Jay George, Managing Consultant at Commissum, recently returned from a business and pleasure trip Japan. Business out the way he has returned with holiday … |More
We think it’s safe to say Rugby fever has certainly been caught by the nation, and Commissum is no exception! For our first home RWC in many years Commissum and friends rolled into Twickenham for the historic and epic opener. It was an excellent match with … |More
Commissum, providers of cyber security testing and consultancy services, today announces Test Analyst, Robert Cretu, has successfully completed his CREST (Council of Registered Ethical Security Testers) Registered Tester (CRT) examination.
Earlier on this month Commissum had a chance to exhibit at the largest Information Security event in Europe. Our team spent 3 full days at Olympia Kensington, showcasing our latest services and talking to visitors about emergent trends in Cyber Security.
This document is a technical advisory for a privilege escalation weakness found in HP Software Update as supplied with HP Photosmart 5520 e-ALL-IN-ONE series software. This document is being released in order to alert HP to the risk detailed below and to request remediation. Please … |More
Ericom AccessNow Server 2.x Multiple Vulnerabilities
This document is a technical advisory for weaknesses found in Ericom AccessNow Server. This document is being released in order to alert Ericom customers to the risks detailed below and to request remediation. Please note that this document may be subject to modification … |More
Commissum, a leading UK provider of Cyber Security consultancy and technical services is pleased to announce its inclusion in the Crown Commercial Service’s “G-Cloud 6” Framework – Lot 4 Specialist Cloud Services. Commissum has had its full portfolio of cyber security consulting and technical services incorporated in the … |More
Commissum, a leading UK cyber security services provider, is proud to announce this week it was assessed for and has passed the Cyber Essentials Plus Certification. Launched in 2014, Cyber Essentials is a Government-backed, industry supported scheme to help organisations protect themselves … |More
It’s fairly obvious that selling guns to foreign powers carries heavy ethical concerns, and can land the seller in a lot of trouble if not conducted in accordance with the law. But what about cyber security products? Could the sale of web filters and monitoring software lead to a breach … |More
Stuxnet, Duqu, Flame, Wiper, what all of these have in common, apart from the fancy names, is a place of honour in the all-time Hall Of Fame of malicious computer programs (if there would ever be such a thing). Just recently, what is considered by the malware analysts at Symantec… |More
On Tuesday 14th October, Commissum exhibited at what was the largest conference for C-level professionals from the entire legal sector – ‘London Law Expo 2014′. The event was completely sold out, and was attended by over 3000 visitors.
The Commissum stand was visited by a wide range of conference … |More
Following the 10 Steps to Cyber Security guide that was launched by the Department for Business, Innovation & Skills (BIS) in 2012, the UK Government, together with BIS and industry bodies, has taken the initiative to review cyber security standards to produce a new framework that is appropriate to all … |More
The leading information security practice Commissum is continuing its incentive of sponsoring the prize for the best student on The Open University course module M886 – “Information Security Management.”
The prize is awarded annually for the overall best student in assessments throughout the length of the course.
Two of the Commissum team attended the Cyber Security 2014 “The Threats and The Opportunities” on 6th February 2014; Senior Consultant Jay George, and Sales Manager Mark Pittman. The event was held at Gogarburn Conference Centre at RBS World Headquarters in Edinburgh.
Jay George has recently joined Commissum as a senior consultant bringing a wealth of knowledge in security, particularly around managed services and incident management.
Jay’s experience in managed services covers the full range of implementation and management activities, from initial scoping of requirements, selection and deployment of technical countermeasures, and … |More
5 things you should take into account in preparing for a penetration test
If you are adopting a best practice approach to security, and as part of this you are looking to engage an independent specialist company to conduct penetration testing; the following are some important points to consider.
Commissum is pleased to announce the appointment of Mark Pittman as a Sales Manager. The main focus of the position is to deliver business growth and to evaluate and implement the most effective enablers to achieve this. Having had a business development focused career in the information technology sector spanning … |More
The information security firm Commissum, based in Edinburgh, has again sponsored a prize for the best student on the Open University course module “Information Security Management”. Awarded for the best student in overall continuous assessment, the prize takes the form of a book token, and is awarded annually.
War Dialling – a Thing of the Past or the Return of Forgotten Evil?
Are you part of an organisation that performs war dialling as part of their regular external security audits? I can almost guarantee that most readers of this article will answer ‘no’ to that question. By not … |More