Quantcast
Channel: Optimal Risk Blog
Browsing latest articles
Browse All 7 View Live

Time to Accept the Value of a Converged Approach

Among operators of critical infrastructure, risk assessment is being forced to adapt to recognise that cyber security in many ways, is now developing the potential to be a more effective and attractive...

View Article



CYBER War gaming

The emerging concept in cyber defence is war gaming, which is still in its infancy in the realm of critical infrastructure, and sectors where IT infrastructure is critical or fundamental to an...

View Article

Penetration Testing is Failing

We are now reaching the point where penetration testing is becoming ineffective, and there is a long list of companies that are struggling to come to terms with the fact their systems &...

View Article

What does your incident response look like?

Every different type of event should elicit a different response. But turn it on its head and ask what your preparation looks like and this is a very different formula, despite the fact that the two...

View Article

Espionage, The Insider Threat, and why BYOD is Such a Huge Problem

The passive human vector, where staff are either lazy or careless in their adherence to security protocols and individual application of sensible security practices, leads to potentially significant or...

View Article


Reflecting on Cyber Threat Summit 2013

Optimal Risk was proud to sponsor this years CTS 2013. Optimal Risk was proud to sponsor this years Cyber Threat Summit, which is now a virtual global event. We presented on two topics highlighting in...

View Article

Security vs Defence: Time to move on.

an active defence strategy is built on the assumption that effective defence requires a pre-prepared, active plan to deter, ‘counter-act’, or engage threats as part of a specific doctrine.

View Article
Browsing latest articles
Browse All 7 View Live


Latest Images