Here are the most interesting items to land into The Cyber Hut inboxes this week. So Ransomware is a Terrorist Act? So it seems the US Department of Justice is raising the status of ransomware investigations to be treated with the same priority as with terrorist activity. Reuters reported on June 4th the DoJ was […]
blogs and articles Attributed as a guest blog by The Cyber Hut, articles can focus upon the industry view, voice of the customer and provide independent critique. webinars We support a range of webinar video assets – including hosted interviews, fireside chats with supporting industry analysis, trends and research releases. whitepapers / ebooks Longer read […]
Welcome to The Cyber Hut! We encourage you to take advantage of the content and features available on thecyberhut.com (“Website”). Please read these non-negotiable terms of use carefully before using the website. By continuing to use the website, you (the “user”) agree to be bound by these terms of use. If you purchase any products […]
By Simon Moffatt. Earlier in January, WhatsApp announced it would be making changes to its privacy policy, regarding how data would be shared with its parent company, Facebook. Whilst this change would only impact users outside of the European Union, many users have started to look to more security and privacy focused apps, such as […]
It wouldn’t be January, without the obligatory prediction articles, taking a look at what might and might not happen in the world of each technical vertical – and cyber is no different. Cyber At The Edge Even before Covid-19 reared it’s ugly head, security enforcement, management and access control was heading to the “edge”. Not […]
Who we are Our website address is: https://www.thecyberhut.com. The Cyber Hut is a trading name of TCH Research Ltd, registered in England and Wales. Company number 13188456. What personal data we collect and why we collect it Comments When visitors leave comments on the site we collect the data shown in the comments form, and […]
Nearly all the big player social networks now provide a multi-factor authentication option – either an SMS sent code or perhaps key derived one-time password, accessible via a mobile app.  Examples include Google’s Authenticator, Facebook’s options for MFA (including their Code Generator, built into their mobile app) or LinkedIn’s two-step verification.  There are lots more […]
Unless you have been living in a darkened room for a long time, you will know the countdown for the EU’s General Data Protection Regulation is dramatically coming to a head.  May 2018 is when the regulation really takes hold, and organisations are fast in the act on putting plans, processes and personnel in place, in order […]
This is the first in a series of blogs, that will start to look at some use cases for leveraging block chain technology in the world of identity and access management.  I don’t proclaim to be a BC expert and there are several blogs better equipped to tackle that subject, but a good introductory text […]
We can get insurance for virtually anything these days.  Cars obviously (albeit if that wasn’t law, how many would pay for it?).  Ourselves.  Pets.  Eyes.  Teeth.  Holidays.  You name it and The Meerkat can sort it out.  The market for insurance is highly complex, with econometrics playing a large part in determining the potential risk […]