The value of cyber risk assessments and how to reinforce your soft...
Headlines revealing the latest cyber-attack have cropped up with concerning regularity in 2017. It will therefore come as little surprise to learn that the latest institutions to be found wanting in...
View ArticleNational Cyber Security Centre marks first year of protecting the UK
In the last 12 months cyber experts within the new National Cyber Security Centre received 1,131 incident reports, with 590 classed as ‘significant’. A report published to mark the first anniversary of...
View ArticleKrack wifi flaw could compromise IoT devices for decades to come
Reverberations of the wifi vulnerability revealed this week could be felt for many years to come, a security researcher has claimed. Speaking to Wired, HD Moore, a network security researcher at...
View ArticleUK SMEs are negligent – and complacent – when it comes to cybersecurity
UK SMEs are neglecting their cybersecurity practices – ultimately, placing themselves, their data and their business at risk of cyber-crime, a study by Xperience Group has found. The findings concluded...
View ArticleWatch: The top 5 global influencers in cybersecurity revealed
After consultation with a panel of judges with wide knowledge of the cybersecurity sector, we revealed our top five global influencers in cybersecurity earlier this year. Part of our Top 50 influencers...
View ArticleWatch: 5 smart buildings that got hacked
With IT and building control bound ever-more inextricably together, cybersecurity is an unignorable risk for facilities and security managers as well as IT professionals. Smart or connected buildings...
View ArticleHow to protect your business from cyber-attack: The insurance claims perspective
The Petya-Wannacry ransomware crippled parts of the NHS and a number of major companies across the world. Nearer home, Saint Gobain and its subsidiary Glass Solutions, a major supplier to the insurance...
View ArticleTrust nothing, question everything: Social engineering and the insider threat
Social engineering (in the context of information security): The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes....
View ArticleAre smart-home devices and applications cyber-safe?
Web-based smart-home control applications communicate with and control smart household components like thermostats or lighting systems from your smartphone or PC. The problem is that these apps are...
View ArticleParadise Papers: How perceived immorality sometimes trumps criminality in...
It’s revealing to compare the media coverage of the Paradise Papers hack to that of other high-profile data thefts. It’s mostly been referred to in headlines as a ‘leak’ rather than a ‘hack’ for a...
View ArticlePacemakers and other implanted medical devices present “life or death”...
Closeup of a pacemaker on an electrocardiograph Many medical devices are now vulnerable to cyber-attack with potentially “life or death consequences,” an IT research expert has told the Financial...
View ArticleHow public CCTV operators can avoid eye-watering fines under the GDPR...
The General Data Protection Regulation (GDPR) comes into force across the EU – including the UK – from 25 May 2018. With fines for non-compliance potentially being a staggering 79 times greater than...
View ArticleSecurity sector insights in the age of terror and the cyber-attack
Security sector insights in the age of terror and the cyber-attack A review of the seminar theatres at IFSEC International 2017. IFSEC 2017 featured presentations from respected industry experts on...
View ArticleWatch: Rise of the amateur hackers – how ransomware-as-a-service is fuelling...
There were 167 times as many ransomware attacks in 2016 (638 million) as 2015 (four million). Could off-the-shelf hacking tools be a big part of the reason? Our video below explores a troubling new...
View ArticleWatch: iPhone X Facial ID fooled within week of launch by 10-year old boy
Cybersecurity researchers have found an ingenious way to fool Apple’s Face ID just a week after the launch of the iPhone X. More embarrassing still for the tech giant, a 10-year old boy has found a way...
View ArticleFace-pixellating module is first video surveillance product to be declared...
KiwiVision Privacy Protector, which pixellates the faces of persons captured in video surveillance footage in real time, has been declared ‘GDPR ready’. Developed by KiwiSecurity, the product was...
View ArticleHow to keep your business communications secure in the age of IoT and ‘bring...
A growing epidemic of cyber-attacks and the proliferation of internet-connected devices is freighting corporate communications with security risks. With employees increasingly using their own...
View ArticleWhy employee training matters: Negligent users are top insider threat
Access is a crucial concept behind any successful firm – access to clients, to suppliers, to services and to data. As such, controlling who has access to places and data pivotal to the functioning of...
View ArticleGermany bans kids’ smart watches over privacy concerns
Germany’s telecommunications regulator has announced a ban on the sale of children’s smartwatches over concerns that these devices can transmit audio from their surroundings. Jochen Homann, president...
View ArticleWhy are one in three CNI organisations skipping cybersecurity checks?
This article was a joint effort between Mike GIllespie, MD of Advent IM, and Ellie Hurst, the company’s communications manager. Some elements of our critical national infrastructure (CNI) are failing...
View Article