TLS/SSL for applications : Right and Wrong ways to fix it.

Many applications use TLS/SSL to connect their components together. During development, unless you have lots of time and/or money you won’t have a signed certificate. Even if you have a free CA server, the chances are, your development instance was thrown up from Vagrant or a fresh AWS instance that doesn’t trust your CA. (Unless you … Continued

Amazon AWS and making use of dynamic IP addresses

If you ask AWS to give your instance a public address but don’t allocate an “Elastic IP address” then you get a dynamic address from a pool. That causes problems only when you stop/start (eg NOT when you reboot). So it will only bite you much, much, later. EIPs are in slightly short supply and … Continued

Surevine’s CEO joins PM Theresa May on trade mission to Japan

“As our closest security partner in Asia, we will discuss how we can work much more closely together on cyber security, counter-terrorism and defence – more important than ever in this uncertain world.” Prime Minister Theresa May, ahead of the trade mission to Japan. Our CEO Stuart Murdoch has today joined the UK Prime Minister … Continued

A Problem Shared

By the end of Friday, the first wave of the WannaCry Ransomware attack was over – a researcher (MalwareTechLab) had, in trying to gain further insight into the attack, inadvertently disabled its worst damage, preventing it “detonating”. The researcher wasn’t working alone – in fact, he was working alongside researchers all across the UK and … Continued

Asymmetric Information in Cyber Communities

What do Points mean? All of our engineering team take part in our sales activity, and I’m unashamedly enthusiastic about this. It gives us real visibility of the market. It establishes a connection with our customers that’s hard to beat. Most critically, it forces engineers like me to keep thinking about the technology we build … Continued

Accumulo® on AWS’s Elastic MapReduce

One of the great things about working for a small company is that you never know which technology you might need to work on. We don’t have a database team or a network team or a hardware team (we don’t have any hardware!), there are just a few of us doing everything. The latest thing to … Continued

Cyber Security Awards finalists!

We are very excited to announce that we have have earned the “Most Innovative Product” finalist status at the Cyber Security Awards for Threatvine! The Cyber Security Awards recognises leading individuals, teams, companies and products in the cyber industry. This includes not-for-profit organisations and start-up companies, as well as global leaders. Organisations and people from all over … Continued

Surevine gets shortlisted in quest to find UK’s Most Innovative Small Cyber Security Company!

In celebration of the 21st Anniversary of InfoSecurity Europe, the Department for Culture, Media & Sport (DCMS) in partnership with techUK’s Cyber Connect held a national competition focusing on new innovation to find the UK’s ‘Most Innovative Small Cyber Security Company’. Samantha Sanderson, UK’s SME Cyber Security Champion, Cyber Connect Lead, said: The UK has a thriving cyber … Continued

Debugging with Bacon

Debugging is the method for finding and fixing bugs. Bugs are behaviours in a software system which are undesirable and counter to the programmer’s intent. You’d think, given the obvious importance of debugging in providing and maintaining quality software, that it’d be easy to find hundreds of good quality tutorials on the web to guide … Continued

Keep it safe: Sharing with Surevine. Week 7 Conclusion

And so we reach the last (our seventh) in our series of weekly blogs, all under the title “Keep it safe: Sharing with Surevine”. To recap… In our first post we introduced the series, with our theme of Passwords, and focussed on Password Storage. In week 2 we took it one step further, and talked … Continued