From the cyber front line


Certificates, registration and crypto-agility.

Submitted by CyberHub Summit on Wed, 01/09/2019 - 11:01
Certificates, registration and crypto-agility.
Certificates, registration and crypto-agility.

Remember the days when Internet Explorer was the browser? Feels like a long time ago.. and that’s because it was, in terms of technology. 

In 2008 Google launched Chrome and it changed everything, the world wide web, for a start looked a hell of a lot better. Fast forward to 2019 ad Statcounter, reported that Chrome has a 59% market share, four times more than any of its rivals. 


Cyber Security Insurance - Why You Need it in 2019

Submitted by CyberHub Summit on Wed, 01/09/2019 - 10:50
Cyber Security Insurance - Why You Need it in 2019
Cyber Security Insurance - Why You Need it in 2019

Businesses are finally catching on to cloud technology and pretty much every business that you have ever known about, has gone online. Your local plumber now uses a local server, and sends you an invoice in an encrypted email…and yes, you can pay with bitcoin. 

Maybe that’s going a little bit too far. 

Perhaps not everyone is as advanced in terms of their cybersecurity as the cybersecurity startups that we follow, but they should be, right? Or better yet, if they can’t be on top of their cyber game, they should at least protect their assets. 


Mobile Chaos – New Dangers

Submitted by CyberHub Summit on Fri, 12/28/2018 - 11:11
Mobile Chaos – New Dangers
Mobile Chaos – New Dangers

Over the past week we have been exposed to the frightening reality that awaits us with the unprecedented and explosive growth in mobile usage. With two massive incidents that are very hard to ignore, the O2 outage and the Huawei fiasco, its hard not to start contemplating just how fraught with potential perils the mobile world actually is.

[ Join our community and receive quality content with the CyberHub Engage Newsletter ]

What has happened? 

Oh Oh - O2


Cybersecurity 2019: Connectivity

Submitted by CyberHub Summit on Thu, 12/27/2018 - 11:23
Cybersecurity 2019: Connectivity
Cybersecurity 2019: Connectivity

We are now dependent on instant and constant connectivity in both our commercial and personal lives. From fiscal transactions to Facebook, being connected on the internet dictates the efficiency with which we run our business, social relationships and our personal households.

The problem is that if someone were to suddenly ‘pull the plug’ we have no idea where to go from here.


Getting scammed by getting in shape.

Submitted by CyberHub Summit on Fri, 12/14/2018 - 10:43
Getting scammed by getting in shape.
Getting scammed by getting in shape.

The next scandal with fitness apps has just hit the headlines. 

After the scandal concerning cyber vulnerabilities inherent in Strava, which inadvertently gave away the locations of our servicemen in locations across the Middle East through a heat map and the famous hack of 150 million Fitness Pal users – you may have thought it was all over.


The Top 6 Cyber Security Awareness Tips

Submitted by CyberHub Summit on Fri, 11/30/2018 - 15:03
The Top 6 Cyber Security Awareness Tips
The Top 6 Cyber Security Awareness Tips

Keeping data secure and far from hackers, foreign adversaries and insider threats are a hot topic in any business boardroom.  Whilst we are happy to hand over our cyber security to the IT professionals, our first line of defense, cyber awareness, now incorporated into cyber security legislation across America, is severely lacking. 

We have therefore accumulated six of the most valuable security awareness tips for you to incorporate into your business operation: 

Password 101 


Cybercrime as a Service

Submitted by CyberHub Summit on Fri, 11/30/2018 - 10:03
Cybercrime as a Service
Cybercrime as a Service

The world's largest cybercrime platform has been taken down in an 11 nation- strong cyber security operation, led by Dutch and British Europol Agency Police. This joint venture required the international cooperation of the following: America, The United Kingdom, The Netherlands, Germany, Italy, Spain, Croatia, Serbia, Canada, Australia and Hong Kong. 


Virtually ready for Christmas?

Submitted by CyberHub Summit on Fri, 11/30/2018 - 09:39
Virtually ready for Christmas?
Virtually ready for Christmas?

As people rush to buy things online for the holidays some will buy real products using real discount apps and some will unfortunately fall prey to a variety of hacker ploys. There are brilliant hackers that have created apps that fool people into sharing their login credentials and take their money. 

Experts are estimating that online shoppers will spend $19.6 billion this holiday season and this number grows annually. Infosecurity magazine estimated that there was a total of 50 million global fraud attempts related to the holidays. 


Smarter Phones from Google

Submitted by CyberHub Summit on Mon, 11/26/2018 - 13:08
Smarter Phones from Google
Smarter Phones from Google

Smartphones have been notoriously easy to jailbreak and crack, the more they multiply, the easier they are to penetrate. Android phones have been known to be more vulnerable to cyber-attacks than Apple owned iPhones. 

Google is putting its best foot forward, to change that trend. Google recently announced the launch of the new Google Pixel 3 phone with an advanced security chip called Titan M, which is supposed to be the most secure chip in the mobile market today.