Cloud Security

Professor Bill Buchanan of Napier University has written a series of articles for Company Connecting on Cyber Crime and the challenges that Digital Forensic Investigators face. Yesterday we looked at Telegram. Today we look at the anonymous browser Tor.

"With the Tor network, the routing is done using computers of volunteers around the world to route the traffic around the Internet, and with every hop the chances to tracing the original source becomes reduced. In fact, it is rather like a pass-the-parcel game"

Image accompanying the article The Three Ts: Remaining Untraceable with Tor by Professor Bill Buchanan of Napier University

Professor Bill Buchanan of Napier University has written a series of articles for Company Connecting on Cyber Crime and the challenges that Digital Forensic Investigators face. Yesterday we looked at tails. Today we look at Telegram the encrypted messaging app with the ability to self destruct chat logs and old messages. Its a cloud based messaging app with a focus on security and speed.

Image accompanying the article The Three Ts: Remaining Untraceable with Telegram by Professor Bill Buchanan of Napier University

Professor Bill Buchanan of Napier University has written a series of articles for Company Connecting on Cyber Crime and the challenges that Digital Forensic Investigators face. Yesterday we looked at vishing. Over the next three days we look at tools utilised by those wishing to remain anonymous i.e. Tails, Telegram and Tor. We start with the operating system ‘Tails’.

Image accompanying the article The Three Ts: Remaining Untraceable with Tails by Professor Bill Buchanan of Napier University

Career Advice for Industrial Cyber Security

Cevn Vibert has spent 25 years working in specialities across the field of Cyber Security, from advisory boards, industrial cyber security, emergency management and situational awareness, to critical infrastructure protection.

Company Connecting spoke to Cevn to see what insights he could...

Cevn Vibert has spent 25 years working in specialities across the field of Cyber Security, from advisory boards, industrial cyber security, emergency management and situational awareness, to critical infrastructure protection. Company Connecting spoke to Cevn to see what insights he could provide for both those already working in Cyber Security and those considering a role in the field.

Career Advice for Industrial Cyber Security Cevn Vibert for Company Connecting