Winner at the Great British Entrepreneur Awards 2016

I am thrilled to have won the Great British Entrepreneur Award for cyber security at a gala event at the Lancaster Hotel in London last night. Thanks to the judges for selecting us ahead of finalists from companies such as Sophos, DarkTrace, Becrypt and others.

awards1

Cutting through the Dyn

Last Friday (21 Oct), one of the largest DDoS attacks ever seen, created widespread internet outage affecting services from Twitter, AWS, Reddit, Netflix, Spotify, CNN, Paypal, NY Times, WSJ, and others. The attack was directed at Dyn, a domain name service provider, whose servers interpret internet addresses, directing web traffic to the affected companies. Dyn are like an internet postal code or zip code lookup system. A statement from Dyn reported traffic from “10s of millions of IP addresses”, and customers of affected sites were unable to access web services for about two hours. Two things stood out about this DDoS attack: (1) The increased traffic was not aimed directly at the networks affected, but targeted at DNS servers hosted by Dyn, and (2) The attack was conducted through a botnet of infected IoT devices, known as Mirai.
Continue reading

Untangling quantum entanglement

Symmetrical encryption is far quicker and less resource-intense than public/private key encryption, but has the downside that the symmetrical key needs to be distributed among parties. For this reason, we use public/private key encryption to secure the transfer of the symmetrical key, and then use symmetrical encryption to secure the actual data that needs to be transferred. But what if our symmetrical key was somehow available to the other party without us transmitting it to them? That could make the encryption process faster, less resource-intense and safer.
Continue reading

AI – the upcoming transformation of digital security

Earlier this year I wrote some thoughts on Artificial Intelligence (AI). The concept of AI first originated in the mid-1950s as attempts to develop machines more like humans. Machine learning is a subset of AI and emerged in the mid-1980s. Deep learning techniques have only been refined over the past three or four years, and are a subset of machine learning.
Continue reading

Killer Robots

Earlier this month, a Dallas police SWAT team used a Remotec Andros robot to deliver half a kilogram of C-4 explosive to eliminate a crazed sniper. The problem was resolved without exposing even more police lives to danger. The age of the Terminator is here. The Andros robot is also designed to be fitted with accessories such as a 12-guage semi-automatic shotgun. This incident raises questions about the use of killer robots.
Continue reading

Brexit and InfoSec

Last week’s EU referendum was the most important political decision of the UK in many decades. In the aftermath of a surprise result, the past few days have been tumultuous with the resignation of Britain’s Prime Minister, a plummeting of the currency and stock exchange values, turbulent situations for both main political parties, and renewed pressure on the breakup of the UK itself. The full consequences of the EU decision is largely unknown at this point. As these dramatic events unfold, Britain and Europe are clearly in a state of flux and much about the future remains uncertain.
Continue reading

Ransomware gets businesses over a barrel

While ransomware has been around since 2005, recent variants released over the past three years represent a resurgence resulting in the fairly widespread extortion we see today. Due to its ease and speed of converting successful infiltrations into cash, ransomware is the current weapon-of-choice for online criminal gangs. Criminal syndicates are extorting millions of dollars. CryptoLocker generated $30m in 100 days. CryptoWall made $18m from only 1000 victims. Angler ransomware earns $5m per month for its operators. That’s a lot of loot, and it is spurring online gangs on. This past week, the US House of Representatives started blocking YahooMail due to the large number of ransomware attacks coming through the network.
Continue reading