Barracuda Load Balancer ADCs: the keystone to advanced application delivery platforms

What do you know about Application Delivery Controllers? If the answer is not very much, then it would appear that you’re in good company. A recent research report by Quocirca – “In demand: the culture of online service provision” highlighted this problem. The survey of 300 IT managers in the UK, Ireland and Nordic region, found …

Read More

Payment Processor Hacking – 1,295 Bitcoins Stolen

BIPS, based in Copenhagen, one of Europe’s largest bitcoin payment processors, was breached last week. 1,295 bitcoins, worth around $1,000,000, were stolen. It is believed that a two-stage attack was employed – DDoS followed by hack – was employed. BIPS primary service is to allow merchants to take payment in bitcoins, and then exchange them …

Read More

Security risk management: Oracle releases bumper Critical Patch update for Java to combat hackers and malware writers

Oracle has finally released its Critical Patch Update (CPU) for October 2013, and for the first time ever has incorporated Java into the patch. Previously Oracle had released Java patches on a separate cycle every 4 months. The net effect of the all-inclusive patch is a massive update which aims to fix 120 flaws across …

Read More

Cyber-attacks are becoming increasingly costly: can your business really afford not to protect against itself against such attacks?

Have you ever wondered why network security testing is so vital? Maybe you think that having already spent a considerable sum on security precautions to prevent hacking, the cost of additional vulnerability assessments and penetration testing is a step too far. Whilst Krypsys’ security experts understand such concerns, we still believe that it always pays …

Read More

Adobe hacking: customer credit card details and Adobe source code stolen

Adobe is the latest big name to have been hacked. According to the company source code for numerous Adobe products including Acrobat and ColdFusion has been stolen, customer IDs and passwords have been accessed and card details for 2.9 million customers stolen in a sophisticated cyber-attack on its website. The breach was initially carried out …

Read More

Webinar – Lunch With a Pen Tester

Security measures are often designed and implemented from the perspective of the defender i.e. from the inside looking out. From this perspective, 90% secure may look effective. To an attacker or pen tester on the outside looking in, a 10% opportunity would look like an open door. Attend this lunch-time event and get the attackers …

Read More

What is ISO 22301, and how does it differ from BS 25999?

What is ISO 22301?

ISO 22301 has been developed to help organisations minimize the risk of disruptions. ISO has officially launched ISO 22301, “Societal security – Business continuity management systems – Requirements”, the new international standard for Business Continuity Management System (BCMS). This standard will replace the current British standard BS25999.

Read More

What likely changes are expected with the updated ISO/IED 27001 revisions?

The internationally acclaimed standard for information security management, ISO/IEC 27001, is currently being revised. ISO/IEC 27001 formally specifies a management system that is intended to bring information security under explicit management control. Being a formal specification means that it mandates specific requirements. Organisations that claim to have adopted ISO/IEC 27001 can therefore be formally audited and certified compliant with the standard.

Read More

Deception protection: is your business protected against cyber threat?

How vulnerable is your business website? Are you fully protected against cyber-criminals and hackers? Most of us would like to think we are, but the more you read the less certain you can be of that fact. Cyber criminals and hackers are sophisticated and will stop at nothing to get hold of your money or your business intelligence. Is the threat of hacking and cyber-attack an over-exaggeration? Well, Krypsys would argue not. In the course of the last week alone there have been news items about a 19 year old Argentinian hacker who was caught trying to steal millions of pounds from international money transfer and gambling websites, cyber criminals caught trying to steal millions of pounds from Santander and the personal information of more than 2 million customers was stolen from Vodaphone Germany.

Read More

Secure and optimise your web applications with Barracuda’s Application Delivery Controller

One question we’re often asked at Krypsys is what’s the difference between traditional load balancers and Application Delivery Controllers? Well, both products serve a similar purpose – to direct traffic to different servers based on availability and load. However, the best ADCs, like the one we recommend from Barracuda, go further; in fact they offer a number of competitive and cost-effective advantages over regular load balancers. Application Deliver Controllers are ideal for optimising application performance and availability. You could say that they are the heart and soul of modern day data centres.

Read More

What is ISO 27001 and why is it so important for organisations?

Generally speaking, most organisations and businesses will have some form of controls in place to manage information security. These controls are necessary as information is one of the most valuable assets that a business owns. However, the effectiveness of such a policy is determined by how well these controls are organised and monitored. Many organisations …

Read More

Top 10 Tips for Implementing ISO 22301

If you are serious about implementing a Business Continuity Management System that is compliant with ISO 22301, then you should consider the following Top 10 Tips:- Get commitment and support from your senior management. Engage the whole business with good internal communication. Compare existing business continuity management system with ISO 22301 requirements. Get feedback from …

Read More

How to Hack your System i

KRYPSYS will be presenting on iSeries security at International Power 2013 on 24th September at Bletchley Park How to hack your system i Hacking and information theft are now big business. The major threat to your systems and data is no longer from teenage amateurs. Organised, professional cyber criminals want to access your systems and …

Read More

Sony and hacking: proof that once bitten doesn’t necessarily mean twice shy

Sony issued a public apology to “Grand Theft Auto 5” developer Rockstar Games and to fans of the blockbuster video game franchise last weekend after copies of the game that were downloaded from the EU PlayStation Store were prematurely opened by hackers. Whilst the hackers were not able to get the entire game up and running, they did manage to extract critical audio and video files containing details about the “Grand Theft Auto 5” storyline and soundtrack. Naturally “GTA” fans were shocked to see details about the highly anticipated “Grand Theft Auto 5” begin to trickle across gaming forums late last week, especially those who had pre-ordered the game which is due for official release on September 17 on Xbox 360 and PlayStation 3.

Read More

Penetration testing helps with mobile security.

Penetration testing has been used to uncover vulnerabilities loitering in the mobile operating systems that are most commonly used today.

1.2 Billion Smartphones will enter the market in the next 5 years, that’s 40% of handsets. 75% of companies allow employees to use their own devises at work (BOYD) this is predicted to rise to 90% BY 2014. Is penetration testing being used enough?

Read More