Feeds

Cybercops alive and kicking

Senses working overtime

3 Big data security analytics techniques

Infosec blog Infosec is often a challenge to the senses. Despite charging the public £20 for entry on the door this year, Olympia was crowded with people fighting to make their way through a hall packed with vendors vying for their attention.

Journalists had a harder job than usual this year. The writing on the floor map of the brochure would challenge those with even the best eyesight (think about the last line in eye tests you might have taken as a child, as viewed from 20 paces).

Ears were challenged too. There wasn't enough room to accommodate everyone who wanted to attend the e-crime keynote on Tuesday morning. Fortunately, the presentation was relayed to plasma screens on Olympia's upper level. Unfortunately, the volume was so low that it was impossible to hear some speakers. A dodgy set up rendered Leo Cronin, a senior director of information security at LexisNexis the data broking firm that was subject to a serious information security breach, as Mr Mummble.

Fortunately, Tony Neate, a former officer of the National High Tech Crime Unit (NHTCU) and current e-crime liaison officer at the new Serious and Organised Crime Agency (SOCA), was able to make his voice heard when chairing the e-crime debate.

Neate's appearance at the conference on Tuesday was one of the first public appearances of the new Serious and Organised Crime Agency (SOCA). Dubbed the UK's FBI by Britain's tabloids, SOCA will tackle drug trafficking, immigration crime, money laundering and identity fraud by developing intelligence on organised crime and pursuing key suspects while disrupting criminal activity.

Yesterday we questioned (somewhat mischievously) how much resource SOCA would be able to put into the fight against cybercrime. Neate tackled this point head on this morning.

"Rumours of our death have been greatly exaggerated," he said. "We are still supporting businesses and consumers in the fight against cybercrime. SOCA brings together more than 4,000 police, customs and immigration experts to create Britain's first non-police law-enforcement authority. Officers from the National High Tech Crime Unit (NHTCU) joined these ranks when the agency launched earlier this month. We're getting bigger and now four agencies have come together to fight cybercrime and other forms of serious crime."

Taking on board the lessons from previous years, nearly all the wireless LANs we could see running at Olympia were running some form of encryption. However, PCs in the press office allowed journos to use USB sticks without restrictions. Useful though this might be, is it really setting the right example? ®

3 Big data security analytics techniques

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.