Stories by Robert Layton

First Look: Trend Micro Deep Discovery Inspector

By Robert Layton | 23 September, 2013 09:15

The Inspector is an offline discovery tool, taking a network feed from a mirror port on a switch, and examining traffic for patterns matching suspicious behaviour. Trend Micro identifies this “listen-only inspection of all network traffic” as a key feature of its system as it reduces strain on devices, which can occur with in-line products and end-point security programs.

Social media: the boundary between personal and professional

By Robert Layton | 13 July, 2012 14:04 | 1 Comment

The value of personal data is often underestimated by the general public; the risks are commonly ignored on social media sites, especially by those in their teens or twenties.

Is attack attribution a lost cause?

By Robert Layton | 13 October, 2011 08:51

One of the cornerstones of policing is the ability to identify perpetrators to bring them to justice.

Cybercrime Innovation Needs Strategic Responses

By Robert Layton | 07 September, 2011 20:16

Cybercrime today is run as a business, with ROI, user support, clear hierarchies and business plans. One aspect of this type of business is the high rate of innovation, leading to new technical advances in cybercrime proliferation.

Opinion: Breadth First Hacking

By Robert Layton | 13 August, 2011 10:20

Recent publicity for online hacking groups such as Anonymous and Lulzsec has seemed to show that nobody is immune from attack on the Internet. Once targeted, it seems that these groups are capable of breaching security systems and retrieving data, including identity information, from the most secure systems.

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Business Continuity Management Solutions

Automate business-continuity and disaster-recovery planning and enable crisis management in one solution.

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.