Security feature: dropped and expired domain names

I am researching a feature on “abandoned domain” attacks: how unused or obsolete domain names can be exploited by criminal hackers.

This is often connected to business email compromise or attempts to take over email servers, but there are other ways a disused domain can be exploited.

The piece will look at how these attacks work, how they leverage expired domains, and what they are trying to achieve – exfiltration of data, say, or spreading ransomware.

And the piece will look at how security teams can monitor for domain issues, and potentially regain control of an abused domain.

To submit suggested interviewees, or for more information on the publication and deadline, please email me no later than 2nd December.

Computer Weekly: Storage articles, November 2021

I am working on the following Computer Weekly articles, and am looking for analyst or other expert input:

Cloud storage compliance pitfalls (deadline for contributions: November 11th)

What are the main laws and regulations that affect UK-based organisations using the cloud?

The piece will look at key areas of compliance, with a focus on the top 4 or 5 that might cause compliance issues, when storing data in the cloud.

Edge storage – an explainer (deadline for contributions: November 15th)

What is edge storage, where, why and how is it used?

What are the challenges around edge storage, including data protection, security, compliance and relocating data?

What solutions are available, on-premises and in the cloud?

Horizontal vs vertical scaling in storage (deadline for contributions: November 21st)

This is a slightly more technical piece, looking at how some storage systems are designed to scale vertically, some horizontally, and more rarely, some both (see this previous piece on HCI for background).

The piece is likely to cover:

  • NAS and SAN systems on-premises
  • On-premises HCI
  • Scaling in cloud storage

Plus why a CIO would specify one or the other (assuming you can’t have both). I will look at vendor resources for this piece, as well as potentially end user examples.

Please get in touch via the usual email address