Stories by Robert Layton

First Look: Trend Micro Deep Discovery Inspector

By Robert Layton | 23 September, 2013 09:15

The Inspector is an offline discovery tool, taking a network feed from a mirror port on a switch, and examining traffic for patterns matching suspicious behaviour. Trend Micro identifies this “listen-only inspection of all network traffic” as a key feature of its system as it reduces strain on devices, which can occur with in-line products and end-point security programs.

Social media: the boundary between personal and professional

By Robert Layton | 13 July, 2012 14:04 | 1 Comment

The value of personal data is often underestimated by the general public; the risks are commonly ignored on social media sites, especially by those in their teens or twenties.

Is attack attribution a lost cause?

By Robert Layton | 13 October, 2011 08:51

One of the cornerstones of policing is the ability to identify perpetrators to bring them to justice.

Cybercrime Innovation Needs Strategic Responses

By Robert Layton | 07 September, 2011 20:16

Cybercrime today is run as a business, with ROI, user support, clear hierarchies and business plans. One aspect of this type of business is the high rate of innovation, leading to new technical advances in cybercrime proliferation.

Opinion: Breadth First Hacking

By Robert Layton | 13 August, 2011 10:20

Recent publicity for online hacking groups such as Anonymous and Lulzsec has seemed to show that nobody is immune from attack on the Internet. Once targeted, it seems that these groups are capable of breaching security systems and retrieving data, including identity information, from the most secure systems.

CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

IT Compliance Solutions

Enforce compliance consistently and cost-effectively across your organization.

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.