ElevenPaths Cyber Security Weekly Briefing January 16-22 SolarWinds Update New details have been released about the software supply chain compromise unveiled in December. FireEye researchers have published an analysis that puts the focus on the threat actor called...
Antonio Gil Moyano Homeworking: Balancing Corporate Control and Employee Privacy (II) As a continuation of the first article in which we saw both the regulation of homeworking and the security and privacy measures in this modality, in this second issue...
Pablo Alarcón Padellano Securing your Cloud Native Applications in AWS in the New Normal The New Cloud Adoption Reality Yes, we are facing a New Normal, and we are living a new cloud adoption reality as well. Enterprise cloud adoption accelerates in face of...
ElevenPaths Cybersecurity Weekly Briefing 30 May-5 June Security Breach in 8Belts vpnMentor researchers discovered in mid-April a data breach in the 8Belts language learning platform due to an improper configuration on an Amazon Web Services S3 bucket....
ElevenPaths Cyber Security Weekly Briefing January 16-22 SolarWinds Update New details have been released about the software supply chain compromise unveiled in December. FireEye researchers have published an analysis that puts the focus on the threat actor called...
Gonzalo Álvarez Marañón Plausibly Deniable Encryption or How to Reveal A Key Without Revealing It When the secret police arrested Andrea at the airport checkpoint, she thought it was a mere formality reserved for all foreign citizens. When they searched her luggage and found...
Helene Aguirre Fake News and Cyberthreats in Times of Coronavirus Helene Aguirre tells you how cyberthreats never stop, even in the case of a global pandemic health alert.
ElevenPaths Cybersecurity Weekly Briefing July 25-31 BootHole: Vulnerability in GRUB2 Eclypsium researchers have discovered a buffer overflow vulnerability in the GRUB2 bootloader that could be used to execute arbitrary code during the boot process. It has...
ElevenPaths Cyber Security Weekly Briefing January 16-22 SolarWinds Update New details have been released about the software supply chain compromise unveiled in December. FireEye researchers have published an analysis that puts the focus on the threat actor called...
Antonio Gil Moyano Homeworking: Balancing Corporate Control and Employee Privacy (II) As a continuation of the first article in which we saw both the regulation of homeworking and the security and privacy measures in this modality, in this second issue...
Gonzalo Álvarez Marañón How to Track COVID-19 Infections, Discover Contacts On WhatsApp or Share Your Genes While Keeping Your Privacy When you sign up for a new social network, such as WhatsApp, you are often asked if you want to find out who among your contacts is already part...
Gonzalo Álvarez Marañón Are You Crypto-Agile to Respond Quickly to Changing Cyberthreats? A business is considered agile if it is able to respond quickly to market changes, adapt to maintain stability. However, without cryptography there is no security and without security...
Accelerating European cyber security between the United Kingdom and Telefonica (Wayra) – Part one of twoElevenPaths 5 April, 2018 The GCHQ (Government Communications Headquarters) is not very well known outside of the United Kingdom. The governmental organization is almost a century old (it will celebrate its 100th anniversary next year), in 1919 it started as the government’s school of codes and encryption (Government Code & Cypher School) and it was not until 1946 that it changed its name to what it is now. The GCHQ’s job is to maintain Great Britain´s security through information assurance and also signals intelligence (SIGINT). The GCHQ was founded after the first world war and had the important role during the second world war of working on how to break the German Enigma codes and also during the Cold War, from its famous center in Bletchley Park. Bletchley Park ©GCHQ The center currently has two main components, the Composite Signals Organization (CSO), which is responsible for the collection of information, and the National Cyber Security Centre (NCSC), which is responsible for securing the United Kingdom´s own communications. The main GCHQ building is an original construction known as ‘The Donut’ and it is located in the outskirts of the city Cheltenham in the United Kingdom; from there they carry out a large part of their activity whilst collaborating with their members, the Secret Intelligence Service (MI6) and MI5. The Donut, GCHQ Headquarters The National Cyber Security Centre (NCSC) was created in order to make the United Kingdom the safest place to live and do online business, by protecting critical services against cyber-attacks, managing major incidents and improving the underlying security of the internet in the United Kingdom through the best technologies, citizen advice and organisations. The GCHQ Cyber Accelerator is a collaboration between the United Kingdom’s Governmental Department for Digital, Cultural, Media and Sport (DCMS), the National Cyber Security Centre (NCSC) and Wayra UK, which is a part of Telefónica Open Future. It is part of the government’s national cyber security program which is valued at £1.9bn, which drives innovation in the cybersecurity industry and helps keep UK businesses and consumers safe from online attacks and threats. The program, which is already in its second call for proposals, has received more than a hundred applications in its latest call from startups specializing in cybersecurity; amongst which they have selected nine (RazorSecure, Warden, Intruder, TrustElevate, Secure Code Warrior, Cybershield, Ioetec, Elliptic and ExactTrack) which are being accelerated during nine months in order to allow them to expand their capabilities, improve their ideas and design leading edge technology. A group of GCHQ mentors and the group Telefonica, which includes O2 and ElevenPaths, give their support to these new companies which also receive a financial subsidy and access to a workspace in Cheltenham. In the following piece we will explain in detail the selected startups and their technology, in order to understand how they apply innovation which overcomes the current and emerging threats. Rames Sarwat Director of Strategic Alliances and Partnerships ElenvenPaths rames.sarwatshaker@telefonica.com @ramessarwat #CyberSecurityPulse: Tell me your social networks and you will be welcome in the United States (or maybe not)Monero says goodbye to the ASIC miners (at least for now)
ElevenPaths Cyber Security Weekly Briefing January 16-22 SolarWinds Update New details have been released about the software supply chain compromise unveiled in December. FireEye researchers have published an analysis that puts the focus on the threat actor called...
Antonio Gil Moyano Homeworking: Balancing Corporate Control and Employee Privacy (II) As a continuation of the first article in which we saw both the regulation of homeworking and the security and privacy measures in this modality, in this second issue...
Gonzalo Álvarez Marañón Plausibly Deniable Encryption or How to Reveal A Key Without Revealing It When the secret police arrested Andrea at the airport checkpoint, she thought it was a mere formality reserved for all foreign citizens. When they searched her luggage and found...
ElevenPaths Cyber Security Weekly Briefing January 9-15 Sunburst shows code matches with Russian-associated malware Kaspersky researchers have found that the Sunburst malware used during the SolarWinds supply chain attack is consistent in its characteristics with Kazuar, a...
Sergio De Los Santos The Attack on SolarWinds Reveals Two Nightmares: What Has Been Done Right and What Has Been Done Wrong All cyber security professionals now know at least part of what was originally thought to be “just” an attack on SolarWinds, which has just truned out to be one...
Antonio Gil Moyano Homeworking: Balancing Corporate Control and Employee Privacy (I) At this point in time and looking back on 2020, nobody would have imagined the advance in the digitalisation of organisations and companies due to the irruption of homeworking...
I provide cleaning services in London, and most of the orders are earned online, so I used to be afraid of losing my confidential data related to the business unless I hired data protection consultancy for my help. Now, I can handle all my online transactions fearlessly. Reply