WATCH: Google Titan USB keys on sale after internal use results in zero hacks
Google is selling USB security keys to its customers after the ‘Titan’ keys so far resulted in zero hacks of its 85,000 employees’ accounts. The Titan Security Key, also available in a Bluetooth...
View ArticleBritish Airways breach: Outsourcing, legacy systems and even GDPR under fire
The British Airways breach has prompted cybersecurity experts to cite outsourcing, a profusion of overlapping IT systems and even GDPR as potential contributory factors. The airline is investigating...
View ArticleAI, network security and extended warranties among talking points at IDIS Summit
The growing importance of AI, network security and extended warranties were among the subjects discussed at a recent gathering of security and video surveillance specialists. Hosted by IDIS in Seoul,...
View ArticleHow to keep your organisation GDPR-compliant
The General Data Protection Regulation (GDPR) came into force in May 2018 and applies to any business or organisation that collects, stores or handles the personal data of EU residents. In the months...
View ArticleWATCH: ‘Show Me How’ highlights from IFSEC 2018
IFSEC 2018 saw the debut of the ‘Show Me How’ campaign, in which solution providers showed visitors how to install, use and maintain their products – the emphasis being on education rather than sales...
View ArticleHanwha Techwin Europe MD reflects on GDPR, cybersecurity and 40% sales growth
Despite having a global presence with regional and local support offices in the Americas, Asia, Middle East and across Europe, Hanwha Techwin is very much defined by its Korean heritage. Founded as...
View ArticleWATCH: Highlights from IFSEC 2018 – including Drone Zone, Attack Testing and...
Courtesy of IFSEC TV, here are several highlights videos from IFSEC 2018, Europe’s largest annual security trade show. Videos include overall highlights, footage from the Show Me How campaign, the LPCB...
View ArticleThe rising role of IT in physical access control
The rising role of IT in physical access control A white paper from HID Global, which powers trusted identities of people, places and things with access control, identity management, asset tracking and...
View ArticleIoT security fundamentals
If you keep track of the latest cybersecurity news, you might have noticed the growing number of IP camera botnets emerging, vulnerabilities in smart home controllers being discovered and wireless...
View ArticleWATCH: Breach of 50 million Facebook accounts could lead to GDPR fine of up...
Ireland’s Data Protection Commission has asked for an explanation of the scale and nature of the breach, revealed by Facebook on Friday, that left around 50 million user accounts compromised. Watch...
View ArticleWATCH: Why visit or exhibit at IFSEC International? Let’s count the reasons…
If you’ve ever wondered whether trekking to London ExCeL for IFSEC International is really worth the effort – as a visitor or exhibitor – the trade show’s post-show report of its 2018 edition may...
View ArticleTrust is currency in the world of security systems procurement
Trust is one of the most important factors in sealing a business deal. It’s one that a wise person will treat as currency. Like money, trust is hard earned and – if you’re not careful in your...
View ArticleFinalists revealed for Security & Fire Excellence Awards 2018
The finalists for the Security & Fire Excellence Awards 2018 have been announced. Held in partnership with IFSEC and FIREX International the awards will be presented on Wednesday 21 November 2018...
View ArticleCryptomining usurps ransomware as top cybersecurity threat, according to new...
Cryptomining is now a bigger threat than ransomware, according to a new report. Malware that harnesses its victim’s computer processing power to mine cryptocurrency, cryptomining accounted for 52% of...
View ArticleHikvision Evaluation IP series gains Common Criteria cybersecurity certification
Hikvision’s Evaluation IP camera product series (models DS-2CD3 and DS-2CD5) has been certified under the Common Criteria for Information Technology Security with assurance type EAL2 augmented with...
View ArticleWhy critical healthcare infrastructure needs Blockchain as a service and 24/7...
The number of cyber-attacks on organisations has soared in recent years, causing chaos for hospitals and healthcare organisations. Last year, the now infamous WannaCry ransomware attack crippled NHS...
View ArticleSurveillance camera commissioner Tony Porter to headline Security TWENTY 18...
The next Security TWENTY 18 event, a series of regional conference and exhibitions, is taking place at Park Inn Hotel, London Heathrow on Wednesday 7 November 2018. ST18 London event will feature top...
View ArticleAxis Communications wins UK police endorsement through PPS accreditation
Axis Communications has been given full membership of Secured by Design (SBD), a UK police initiative that promotes the importance of making physical security solutions more resilient against physical...
View ArticleWorld’s first quantum-driven secure chip on silicon is “iPhone moment” for...
A British company says its newly launched quantum-driven secure chip (QDSC) on silicon is a world-first in IoT security and almost impossible to hack. Unveiled by Crypto Quantique at the IoT Solutions...
View Article‘Canada’s First Lady of Security’ Bonnie Butlin wins Women of Influence Award...
Information security expert Bonnie Butlin has won a Women of Influence Award courtesy of the Executive Women’s Forum (EWF) on Information Security, Risk Management & Privacy. She has also just won...
View Article