"In every insider threat case, there is a combination of network activity and employee behaviour. The malicious activity crosses both physical and electronic modalities..."
"When we’re doing performance management right, we can often tell within three months or less of a sales hire, even during the holidays, whether they’re going to be successful or not..."
Attackers re-write JavaScript loaded by the VPN login page for the Appliance to capture credentials; also grabbed Veeam credentials, moved laterally for full SYSTEM control.
One vulnerability bears a striking resemblance to an 0day that was actively exploited in the wild in November 2023.
“We have our low latency stream which goes into MongoDB; we have our main engineering pipeline, which goes to S3 and gets encrypted for GDPR purposes. Then we have a Spark stream, which pulls the data into Delta Lake..."
"Simulate and exercise breach readiness, especially abilities to reduce blast radius of a cyber attack. Involve top leadership, the board, and customers in separate cyber war games, as often as practical..."
"If you get a good grip on that, happy customers, happy shareholders. If you get it wrong, you are sat on millions of pounds-worth of stock in a warehouse that you have to write off..."
Cloud migration "impairment" writes off the equivalent to 81% of the Post Office's annual restructuring costs.
On Magic Quadrants, deal size, changing approaches to cyber-resilience and learning from his father.