Assembling cybersecurity: The politics and materiality of technical malware reports and the case of Stuxnet

September 26, 2019

This is an article about how cybersecurity gets “made,” with a focus on the role of commercial computer security firms in generating knowledge in matters of international cybersecurity. The argument is two-fold. Firstly, malware may be an intangible artefact in some ways, but its success and its interpretation as malware is deeply interwoven in social, technical, and material alliances.

Spotlight

Silobreaker

"Silobreaker is a high-awareness, answer-driven, data analytics and threat intelligence application widely used within corporate, government, military and financial services sectors worldwide. Instabilities such as war, terrorism, crime, corruption, disease, famine, political upheaval, and natural disasters are global and affect us all. Although there's also a lot we don't know and can't foresee, but the evidence is out there somewhere. By looking for meaning and focusing on the relatedness of people, events, and ideas, Silobreaker is designed to help anticipate, prevent, and solve problems before they become full-blown crises. Through the transformation of data into a range of graphical visualisations Silobreaker ensures that the information you uncover is digestible and insightful. Our technology enables deeper analysis, providing the contextual intelligence necessary for making decisions and taking action."

OTHER WHITEPAPERS
news image

Best Practices for Row Level Security with Entitlements Tables

whitePaper | September 16, 2022

Row Level Security (RLS) in Tableau refers to restricting the rows of data a certain user can see in a given workbook or data source at the time they view the data. It contrasts with permissions within Tableau Server (or Tableau Online), which are used to control access to content and feature functionality.

Read More
news image

Cyber Risk Appetite: Defining and Understanding Risk in the Modern Enterprise

whitePaper | January 16, 2020

Managing risk is a balancing act for organizations of all sizes and disciplines. While some organizations take on too much risk, others arguably do not take on enough. Complicating this equation is the emergence of cyber as one of the most impactful sources of risk in the modern enterprise. In fact, cyber security is now increasingly reviewed by corporate boards of directors and often discussed with financial analysts who see cyber security risk as an imminent and paramount business risk. Because the consequences of cyber security failures can be damaging to business revenues and brand reputation, CEOs have lost their positions as a result of data breaches and inept preparation and planning.

Read More
news image

22 Cybersecurity Tips for 2022

whitePaper | June 13, 2022

Many cyber-attacks involve ransomware, a form of malicious software or malware, designed to deny access to a computer system or data until a ransom is paid and a decryption key (commonly called a decryptor) is given to the victim. The encryption is virtually unbreakable without the decryption key, and you should not spend valuable time seeking a way around the encryption if you are attacked with it. Ransomware can spread in multiple ways, but most typically, through phishing emails or by unknowingly visiting an infected website. Ransomware can be catastrophic to healthcare and other organizations, preventing critical information and systems for patient care from being accessed, for example.

Read More
news image

IoT Cybersecurity vision 2018-2019

whitePaper | November 6, 2019

The emergence of IoT – the networked connection of people, process, data and things – is expected to significantly grow the number of connected devices worldwide, from billions of units we have today, to tens of billions of units expected to be deployed in the coming years as stated by several analysts.

Read More
news image

How to Reduce the Risk of Phishing and Ransomware

whitePaper | March 21, 2021

Cybersecurity challenges abound for organizations across the world. The tsunami of phishing attacks that threaten account compromise, data breaches and malware infection remains a critical threat to neutralize. Ransomware is a second critical threat, with a well-played ransomware attack capable of bringing an organization to a complete halt, and in some cases putting it out of business permanently (e.g., Travelex1 and Vastaamo2.

Read More
news image

Big Data and Ai for The Financial Sector: Challenges and Opportunities

whitePaper | September 1, 2022

Artificial Intelligence (AI) is not a recently discovered field. Since the beginning of the computer science discipline, in the late 1950s, AI has drawn a lot of attention in the international scientific community and since then it has represented a field of study which has triggered diverse and numerous research activities.

Read More

Spotlight

Silobreaker

"Silobreaker is a high-awareness, answer-driven, data analytics and threat intelligence application widely used within corporate, government, military and financial services sectors worldwide. Instabilities such as war, terrorism, crime, corruption, disease, famine, political upheaval, and natural disasters are global and affect us all. Although there's also a lot we don't know and can't foresee, but the evidence is out there somewhere. By looking for meaning and focusing on the relatedness of people, events, and ideas, Silobreaker is designed to help anticipate, prevent, and solve problems before they become full-blown crises. Through the transformation of data into a range of graphical visualisations Silobreaker ensures that the information you uncover is digestible and insightful. Our technology enables deeper analysis, providing the contextual intelligence necessary for making decisions and taking action."

Events