Research

Securing Microsoft Office 365 in the new normal: Closing the gap between attackers and defenders

Forward Microsoft Office 365 dominates the business productivity landscape today, and its place at the heart of enterprise operations was cemented by the need to adopt more flexible and agile working practices during the COVID-19 pandemic. As public cloud usage increases so does the attack surface that can be exploited by threat actors. Businesses must […]

Securing Microsoft Office 365 in the new normal: Closing the gap between attackers and defenders Read More »

The war laser: New Terrestrial Surface battlefield geometry

INTRODUCTION  Transition to a soldier armed with a Laser Weapon Device will be the next Technology Shock in conventional warfare, leading to new tactics and battle strategies. A future battle will likely have three intermeshing components: (1) Epicentre Battle fought on the Terrestrial Surface, likely to operate strategically on the offensive, but tactically on the

The war laser: New Terrestrial Surface battlefield geometry Read More »

Real-Time Prediction of Online False Information Purveyors and their Characteristics

Abstract Disinformation, misinformation, and other `fake news’ – collectively false information is quick and inexpensive to create and distribute in our increasingly digital and connected world. Identifying false information early and cost effectively can offset some of those operational advantages. In this paper, we develop light-weight machine learning models that utilize (1) a novel data

Real-Time Prediction of Online False Information Purveyors and their Characteristics Read More »

The cloud imperative for mining

Executive Summary – The cloud imperative for mining The mining industry has envisioned a future where business, human and environmental interests are not competing priorities, but complementary strengths: a “Triple Zero” future of zero harm, zero loss and zero waste. In this Triple Zero future, where zero harm is lived out day-to-day, the health and

The cloud imperative for mining Read More »

Company-Issued Computers: What are Employees Really Doing with Them?

Now more than ever, organizations are issuing computing devices – laptops, mobile phones, desktops – en masse to their staff. There was no choice, as in March a certain submicroscopic infectious agent arrived uninvited to obliterate 2020. For so many organizations around the world, one day in March was the last day in the office

Company-Issued Computers: What are Employees Really Doing with Them? Read More »

A critical analysis of the Model Statement literature: Should this tool be used in practice?

Abstract Investigators need to elicit detailed statements from interviewees to find potential leads, whilst simultaneously judging if a statement is genuine or fabricated. Researchers have proposed that the Model Statement (MS) can both (a) increase information elicitation from interviewees and (b) amplify the verbal differences between liars and truth tellers, thereby enhancing lie‐detection accuracy. Based

A critical analysis of the Model Statement literature: Should this tool be used in practice? Read More »

MITRE ATT&CK as a Framework for Cloud Threat Investigation

Executive Summary With the rapid adoption of cloud computing, new security challenges have emerged for all enter­prises. We surveyed and interviewed leading security professionals to investigate how they assess and confront these challenges, including rapidly changing technology and business models, ambi­guity between cloud providers and purchasers of cloud services about shared responsibilities for security, and

MITRE ATT&CK as a Framework for Cloud Threat Investigation Read More »

State of Cybersecurity 2020

More than ever, companies are accepting that digital business is the way of the future. Regardless of the industry, offering or customer base, digital tactics are needed to survive in a dynamic and unpredictable environment. With this in mind, cybersecurity moves from a piece of IT operations into an overarching business concern. From formal policies

State of Cybersecurity 2020 Read More »