Updated 18th November, 2022: We no longer officially support Twitter
There are lots of ways that you can contact us, watch what we’re doing and keep up to date. But we’re stepping back from one so we can focus better on the others. Find out about the best 3 ways to follow SE Labs.
The 3 best ways to follow SE Labs
While we plan to continue maintaining a basic presence on Facebook, the best way to get the latest news, views and chat with us is to use one or more of the following three services.
“The claim that AV is dead is guaranteed to make headlines, which is why the claim is made so often”
Show notes for series 1, episode 3
Is anti-virus dead? A lot of people seem to think so, but they all have their reasons – some of which are more honest than others. We dig into the motives and passions behind this controversial question.
“Changing default settings, wildly and randomly, would achieve the tick”
Show notes for series 1, episode 2
Where can you get cyber security advice that you trust? Are certificates and Standards worthwhile and good value for money? We delve into the world of ‘official’ cyber security advice and give a balanced view on what we recommend.
Show notes for series 1, episode 1 (How Attackers Attack)
How do attackers attack? Simon and Marc look at their tactics and explore options to help recognise and evade them. They examine social engineering in a cyber security and physical context. And the guys also explore technical exploits. At the end of this episode you will have a great overview of how attackers attack.
“Even executives have families and personal lives”
Show notes for series 1, trailer 1
We’re excited to announce De:Coded Cyber, our new cyber security podcast covering security for large businesses, budding CISOs and we recognise that executives are real people too, with families and personal lives.
Understand what a real hacking attack looks like to the attacker and defenders
The IT security world is rocked by news of breach after breach, including the shocking disclosure of the SolarWinds attack. Data is stolen, deleted or corrupted and… well you know. It’s a total mess. Journalists focus on basic outcomes, while technical blogs look at esoteric technical details. We’ve explained, in laymen’s terms, what a breach looks like from an attacker’s point of view. And from the position of the defenders.
The SolarWinds breach was arguably the most significant computer hack of the decade. At least, of those breaches that we know of. Rather than jump straight into judgement and analysis, we wanted to watch as things unfurled and provide a balanced view with facts and clear thoughts later, rather than fast attention-grabbing reactions.
If an EDR solution can spot an attack, why doesn’t it stop it too?
SE Labs tested Crowdstrike Falcon in this Breach Response test, pitting it against a range of hacking attacks designed to compromise systems.
This month shattered any doubt that intrusion detection technology is necessary. Large companies and other organisations that rely on compromised technology from IT management firm SolarWinds are racing to discover possible breaches.
We’re all entitled to our opinions. So why is it so aggravating when “someone is wrong on the internet?”
Security forums vs. test results
People are biased. It’s natural human behaviour and not something we can correct. Not least because we have our own biases… In fact, research indicates that providing evidence to counter someone’s argument actually entrenches their initial position! Here, we’re going to explore opinions on security testing.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.OkPrivacy policy