Despite attempts to improve the general understanding of IT threats, the education sector is more at risk of attack than ever before…Continue Reading: C+ ‘Must try harder: Cybersecurity in Education
Archives for 2018
eBPF, ingrained in Rust
Today we are releasing RedBPF and ingraind, our eBPF toolkit that integrates with StatsD and S3, to gather feedback, and see where others in the Rust community might take this framework. If you are looking to up your company’s monitoring game, gather more data about your Raspberry Pi cluster at home, or just have a strong academic…Continue Reading: eBPF, ingrained in Rust
Scams can be complex, so let’s stop playing the blame game
As long as there has been the exchange of money, there has always been fraud. From Hegestratos, the first recorded fraudster in 350 BC Ancient Greece, to Charles Ponzi’s infamous scheme of redistributing investments, to the present day, criminals have always tried to find new and more sophisticated ways to dupe people out of their money. …Continue Reading: Scams can be complex, so let’s stop playing the blame game
How to build a cybersecurity strategy for your SME
The number of small businesses is growing. In fact, at the start of 2017, small businesses accounted for 99.3% of all private sector businesses. Yet, with this growth comes the risk of security breaches: these breaches aren’t limited to the major companies. The UK Government announced earlier this year that more than two in five…Continue Reading: How to build a cybersecurity strategy for your SME
Rust, meet q
We leverage the elegance of kdb+ and the power of Rust to create data applications that can process data at the rate of tens of GB/second on consumer grade hardware. At Red Sift, we use our platform to power next-generation data applications for cybersecurity. At a high level, our platform is one of those trendy…Continue Reading: Rust, meet q
Computers not consultants: Say goodbye to the age of cybersecurity consultancy
In days gone by, when an organisation wanted to protect its cyber defences, the norm would be to bring in a cyber consultant or agency. Whether it was a someone-who-knew-someone-who-knew-someone kind of contact or an established name like Capita, they would act as the go-to source of cybersecurity knowledge and execute a strategy to protect…Continue Reading: Computers not consultants: Say goodbye to the age of cybersecurity consultancy