Mind the Gap! #7 – Gap Closing Responsibility
As we conclude our ‘Mind the Gap’ series, it’s time to tie together all the threads we’ve explored—awareness, misconfigurations, third-party risks, integration challenges, and infrastructure design. A recurring theme has been that security is not simply a product or a point solution; it’s an ongoing process requiring alignment across people, processes, and technology. Demarcation Lines…
Mind the Gap! #6 – The Perils of Poor Design
Sometimes, the weakest links in an organisation’s security chain aren’t found in the fancy technologies or advanced analytics but in the very blueprint of the infrastructure itself. Poorly designed networks, data centres, and system architectures can create latent vulnerabilities that attackers are more than willing to exploit. The Foundation Matters Infrastructure forms the foundation upon…
Mind the Gap! #5 – Disjointed Systems
Modern security environments often resemble patchwork quilts. Over the years, organisations accumulate multiple point solutions: firewalls, intrusion detection systems, endpoint protectors, data loss prevention tools, and more. While each tool serves a purpose, the lack of integration between them can create dangerous blind spots. The Complexity Conundrum As cyber threats grow in sophistication, it’s natural…
Mind the Gap! #4 – Overreliance on 3rd Parties
In an interconnected digital world, almost no organisation operates entirely on its own. Third-party vendors, service providers, and supply chain partners all play critical roles – offering specialised expertise, resources, or cost savings. However, with these partnerships come unique security challenges. Overreliance on external entities can introduce hidden gaps that undermine even the most robust…
Mind the Gap! #3 – Misconfigurations
Security misconfigurations often fly under the radar because they’re not as immediately visible as a glaring software vulnerability or a high-profile zero-day exploit. However, they can be just as dangerous – if not more so. A misconfiguration is essentially a security setting that has been incorrectly or incompletely set up, leaving a door open for…
Mind the Gap! #2 – Bridging the Human Factor
When discussing cybersecurity, it’s easy to get caught up in the latest technologies: state-of-the-art firewalls, AI-driven threat intelligence, and advanced endpoint protection. However, a robust security posture isn’t just about hardware and software – it also hinges on people. Humans can be your greatest security asset, but they can also be your most significant vulnerability….
Mind the Gap! #1 – The Unseen Vulnerabilities
Organisations, both large and small, face a growing number of security challenges. Many security measures traditionally focus on adding new technology layers – firewalls, antivirus tools, endpoint detection systems, and so on. Yet, while these solutions remain critical, there is a different angle that often goes unnoticed: the hidden or “unseen” vulnerabilities known as security…
Understanding the Kill Chain: Action on Objections
The final stage of the Cyber Kill Chain, action on objectives, represents the culmination of an attacker’s efforts. At this stage, attackers attempt to achieve their goals, which could include data theft, deploying ransomware, causing system damage, or establishing long-term persistence within the network. This is the point where an attack has the greatest potential…
Understanding the Kill Chain: Command and Control
In the command and control (C2) stage of the Cyber Kill Chain, attackers establish a communication channel between themselves and the compromised systems. This channel acts as a lifeline, enabling attackers to control infected devices, exfiltrate data, and deploy additional payloads. Without a reliable C2 connection, attackers lose the ability to operate within the target…
Understanding the Kill Chain: Installation
Once attackers successfully exploit a vulnerability, their next step in the Cyber Kill Chain is installation. This stage involves embedding malicious code or backdoors within the compromised system, enabling persistent access to the network. Installation is critical for attackers, as it allows them to execute their objectives without the need to re-establish access. For organisations,…