Thomas Murray (@thomasmurrayds) 's Twitter Profile
Thomas Murray

@thomasmurrayds

Sharing the latest news, insights and more from Thomas Murray - third-party risk, cyber and due diligence solutions for the world's most complex sectors.

ID: 1259730740

linkhttps://thomasmurray.com calendar_today11-03-2013 15:29:29

1,1K Tweet

523 Followers

615 Following

Thomas Murray (@thomasmurrayds) 's Twitter Profile Photo

Critical vulnerabilities in ConnectWise ScreenConnect: CVE-2024-1708 and CVE-2024-1709 thomasmurray.com/insights/criti… #CyberSecurity

Critical vulnerabilities in ConnectWise ScreenConnect:
CVE-2024-1708 and CVE-2024-1709
thomasmurray.com/insights/criti…
#CyberSecurity
Thomas Murray (@thomasmurrayds) 's Twitter Profile Photo

Martin Nikel, our director of eDiscovery and legal disclosure, shares his thoughts about the use of AI in the workplace. #AI #CyberRiskManagement thomasmurray.com/cyber-series/t…

Martin Nikel, our director of eDiscovery and legal disclosure, shares his thoughts about the use of AI in the workplace. #AI  #CyberRiskManagement
thomasmurray.com/cyber-series/t…
Thomas Murray (@thomasmurrayds) 's Twitter Profile Photo

From Operation Cronos, to the supply chain breach of Bank of America, to the ALPHV attack on Prudential Financial, it was another wild month in cyber security. But which one of these stories is beginning to look like fake news? thomasmurray.com/cyber-series/o… #cyberriskmanagement

From Operation Cronos, to the supply chain breach of Bank of America, to the ALPHV attack on Prudential Financial, it was another wild month in cyber security.
But which one of these stories is beginning to look like fake news?
thomasmurray.com/cyber-series/o…
#cyberriskmanagement
Thomas Murray (@thomasmurrayds) 's Twitter Profile Photo

Experience a day in the life of our Threat Intelligence Lead, Stephen Green. From analysing open source data to hunting on the dark web, Stephen tells us about his typical workday where cyber criminals never rest. linkedin.com/pulse/day-life… #threatintelligence #cyberrisk

Experience a day in the life of our Threat Intelligence Lead, Stephen Green. From analysing open source data to hunting on the dark web, Stephen tells us about his typical workday where cyber criminals never rest.

linkedin.com/pulse/day-life…

#threatintelligence #cyberrisk
Thomas Murray (@thomasmurrayds) 's Twitter Profile Photo

Digital forensics is a complex discipline that straddles cyber security, law and data technology. This brief introductory guide breaks down a typically complex digital forensics investigation into nine distinct stages. #CyberSecurity #DigitalForensics thomasmurray.com/insights/digit…

Digital forensics is a complex discipline that straddles cyber security, law and data technology. This brief introductory guide breaks down a typically complex digital forensics investigation into nine distinct stages.
#CyberSecurity #DigitalForensics
thomasmurray.com/insights/digit…
Thomas Murray (@thomasmurrayds) 's Twitter Profile Photo

Penetration testers work to help organisations improve their defences by identifying weak spots so they can be fixed before threat actors find them. Our resident pen tester describes a typical day in the life of “a hacker who helps.” #hackers thomasmurray.com/cyber-series/d…

Penetration testers work to help organisations improve their defences by identifying weak spots so they can be fixed before threat actors find them. Our resident pen tester describes a typical day in the life of “a hacker who helps.” #hackers 
thomasmurray.com/cyber-series/d…
Thomas Murray (@thomasmurrayds) 's Twitter Profile Photo

Are you or one of your trusted colleagues a threat to your organisation? Alistair Purdy explores recent cases of malicious and well-intentioned inside actors, and how to prepare for dealing with #InsiderThreats #cybersecurity thomasmurray.com/cyber-series/c…

Are you or one of your trusted colleagues a threat to your organisation? Alistair Purdy explores recent cases of malicious and well-intentioned inside actors, and how to prepare for dealing with #InsiderThreats #cybersecurity
thomasmurray.com/cyber-series/c…
Thomas Murray (@thomasmurrayds) 's Twitter Profile Photo

An early alarm, coffee, gardening, a good book, then more gardening. In between, our cyber governance, risk and compliance director also finds time to get a lot of work done. Follow him down the garden path for a closer look at his typical workday. #GRC thomasmurray.com/cyber-series/d…

An early alarm, coffee, gardening, a good book, then more gardening. In between, our cyber governance, risk and compliance director also finds time to get a lot of work done. Follow him down the garden path for a closer look at his typical workday. 
#GRC
thomasmurray.com/cyber-series/d…
Thomas Murray (@thomasmurrayds) 's Twitter Profile Photo

"Business as usual” can be quite extraordinary when you work in cyber security. So, this week, we present some of the stories our cyber experts were willing and able to share about their experiences. #cyberrisk #cybersecurity thomasmurray.com/cyber-series/s…

"Business as usual” can be quite extraordinary when you work in cyber security. So, this week, we present some of the stories our cyber experts were willing and able to share about their experiences. 
#cyberrisk #cybersecurity 
thomasmurray.com/cyber-series/s…
Thomas Murray (@thomasmurrayds) 's Twitter Profile Photo

In this month’s review, Stephen Green, Threat Intelligence Lead, looks at the third-party cyber attacks in April that left the Department of Insurance, Securities and Banking and the London Stock Exchange Group exposed. #cyberrisk #cybersecurity thomasmurray.com/cyber-series/a…

In this month’s review, Stephen Green, Threat Intelligence Lead, looks at the third-party cyber attacks in April that left the Department of Insurance, Securities and Banking and the London Stock Exchange Group exposed.
#cyberrisk #cybersecurity 
thomasmurray.com/cyber-series/a…
Thomas Murray (@thomasmurrayds) 's Twitter Profile Photo

The number of organisations that are heavily reliant on a security operations centre (SOC) or managed detection and response (MDR) provider is growing. But in an age of increasing cyber risk, who watches these watchers? #cyberrisk thomasmurray.com/cyber-series/o…

The number of organisations that are heavily reliant on a security operations centre (SOC) or managed detection and response (MDR) provider is growing. But in an age of increasing cyber risk, who watches these watchers? #cyberrisk thomasmurray.com/cyber-series/o…
Thomas Murray (@thomasmurrayds) 's Twitter Profile Photo

Penetration tests are now a cyber security essential. Edward Starkie explains what to look for when commissioning and undergoing a penetration test, the traps to avoid, and how to ensure your next pen test delivers as it should. #CyberSecurity thomasmurray.com/cyber-series/p…

Penetration tests are now a cyber security essential. Edward Starkie explains what to look for when commissioning and undergoing a penetration test, the traps to avoid, and how to ensure your next pen test delivers as it should.
#CyberSecurity 
thomasmurray.com/cyber-series/p…
Thomas Murray (@thomasmurrayds) 's Twitter Profile Photo

Crypto-crime may have declined overall in the first six months of 2023, but the volume of payments to ransomware attackers made in cryptocurrencies has surged. Learn why cryptocurrency plays such a crucial role in the rise of ransomware attacks. #cyberrisk thomasmurray.com/insights/why-c…

Crypto-crime may have declined overall in the first six months of 2023, but the volume of payments to ransomware attackers made in cryptocurrencies has surged. Learn why cryptocurrency plays such a crucial role in the rise of ransomware attacks. #cyberrisk thomasmurray.com/insights/why-c…
Thomas Murray (@thomasmurrayds) 's Twitter Profile Photo

In part 2 of our look at how to get the most out of your penetration testing, Edward Starkie, Director of Governance, Risk and Compliance (Cyber) explains why the actions you take after your pen test are as important as the test itself. thomasmurray.com/cyber-series/r… #penetrationtesting

In part 2 of our look at how to get the most out of your penetration testing, Edward Starkie, Director of Governance, Risk and Compliance (Cyber) explains why the actions you take after your pen test are as important as the test itself.
thomasmurray.com/cyber-series/r…
#penetrationtesting
Thomas Murray (@thomasmurrayds) 's Twitter Profile Photo

May was another eventful month in cyberspace. Join threat intelligence lead Stephen Green for a review of the month that was and a look at the trending digital threats facing the financial sector. #cyberrisk thomasmurray.com/cyber-series/m…

May was another eventful month in cyberspace.  Join threat intelligence lead Stephen Green for a review of the month that was and a look at the trending digital threats facing the financial sector. #cyberrisk 

thomasmurray.com/cyber-series/m…
Thomas Murray (@thomasmurrayds) 's Twitter Profile Photo

Despite the increasing emphasis on cybersecurity and its part in the economy, there are still some widely held misconceptions about its role in the M&A process. Ed Starkie busts some common myths about cybersecurity and M&A due diligence. #cybersecurity thomasmurray.com/cyber-series/m…

Despite the increasing emphasis on cybersecurity and its part in the economy, there are still some widely held misconceptions about its role in the M&A process. Ed Starkie busts some common myths about cybersecurity and M&A due diligence. #cybersecurity  thomasmurray.com/cyber-series/m…
Thomas Murray (@thomasmurrayds) 's Twitter Profile Photo

Regulators have a lot to think about when it comes to cybersecurity. Edward Starkie looks at what can be expected from cybersecurity regulation over the next few years, based on the current direction of travel and recent case law. #cybersecurity thomasmurray.com/cyber-series/c…

Regulators have a lot to think about when it comes to cybersecurity. Edward Starkie looks at what can be expected from cybersecurity regulation over the next few years, based on the current direction of travel and recent case law. #cybersecurity thomasmurray.com/cyber-series/c…