Cyber Security

Sony-Style Hacks Could Be 'New Normal' In 2015

Huffington Post UK/PA | Posted 18.12.2014 | UK Tech

The Sony Pictures hack has been unprecedented in its scale and impact. Welcome to the new normal. Experts have said that massive cyber attacks c...

Prepare for the Festive IT Headache

Graham Welch | Posted 08.12.2014 | UK Tech
Graham Welch

The holidays are a time for giving, we all know, and 2014 continues the trend of the past few years - one of the most popular gifts this year will be a new tablet, smartphone or laptop...

Is 2015 the Year for the Threat-centric Network?

Graham Welch | Posted 05.12.2014 | UK Tech
Graham Welch

As an old year comes to a close we often start to look for trends and predictions of what the New Year holds for us in business and especially those in cybersecurity who are increasingly at the forefront of defending the enterprise from the continual threat and reality of cybercrime.

Staying Safe on Cyber Monday

David Emm | Posted 28.11.2014 | UK Tech
David Emm

Cyber Monday, which this year falls on 1 December, is one of the busiest online shopping days of the year - for consumers and fraudsters alike. With more and more of us living connected lives, less people are shopping on the high street.

Spycam Hacking Shock

Graham Welch | Posted 23.11.2014 | UK Tech
Graham Welch

What shocked me about this story was not that this happens, but that people are surprised it has and we have failed to take even the most basic security steps like setting a password when connecting cameras and monitors to the Internet.

Connectivity Everywhere

Graham Welch | Posted 04.11.2014 | UK Tech
Graham Welch

Everyone knows that in today's world we have never been so connected. The Internet is a part of most of our lives at work and at play every day. Indeed ask most teenagers and they will consider the Internet as being almost as important as the air that they breathe!

100 Mr Big's Control Cybercrime

Graham Welch | Posted 19.12.2014 | UK Tech
Graham Welch

While I wouldn't want to speculate on if this number is correct or not, I do agree that such is the industrialisation of cybercrime today faced by businesses, governments and consumers, that relatively small numbers of common exploits and cybercrime tools are widely used by the professional gangs operating around the world.

A Generation of Coders? Cyber-Skilling Takes Centre Stage

Peter Armstrong | Posted 03.12.2014 | UK Universities & Education
Peter Armstrong

This September kids up and down the country returned to school to find that alongside the traditional subjects of Maths, English and Science, three new areas of study in computer science, digital skills and IT had been introduced to the national curriculum.

GCHQ Just Launched A Video Game To Try And Save The World

The Huffington Post UK | Posted 21.08.2014 | UK Tech

British cyber spooks have created a new online game to find new recruits - and test the public's ability to deal with hacking attacks. Intelligence...

Here's How You Break Into A Car Using Just Your Laptop

The Huffington Post UK | Thomas Tamblyn | Posted 07.08.2014 | UK Tech

A video has been uploaded showing a man breaking into his own car using nothing but a laptop. Security researcher Dr Silvio Cesare exclusively reve...

A Russian Gang Just Stole Over A Billion Passwords

The Huffington Post UK | Thomas Tamblyn | Posted 06.08.2014 | UK Tech

A Russian criminal gang has successfuly carried out the world's largest data breach amassing over a billion usernames and passwords as well as over 50...

Sunscreen, Passport, Swimwear... Tablet

Graham Welch | Posted 27.08.2014 | UK Tech
Graham Welch

As we head into July and the holiday season gets into full swing, the thoughts of many of us will turn towards our summer holidays and what we will do to rest and relax for our well earned breaks.

Google Glass Can Recognise Your Pin

The Huffington Post UK | Thomas Tamblyn | Posted 25.06.2014 | UK Tech

A person wearing Google Glass can now use a piece of software to recognise your pin from over 10m just by using the camera. Developed by the Cyber ...

Don't Score an Own Goal With Security

Graham Welch | Posted 16.08.2014 | UK Tech
Graham Welch

A certain major sporting event gets underway this month with the eyes of the world glued to their televisions, smartphones, tablets and laptops looking for the latest news coming out of Brazil and the fate of their national sides and favourite players.

Is Trust the New Business Currency?

Graham Welch | Posted 06.08.2014 | UK Tech
Graham Welch

Trust has become one of the world's most important commodities. Just ask the former CEO of a major American retailer, who resigned after a particularly large cyber attack or any other major organisation that has been hacked and customer data apparently lost.

Is Anti-Virus Really Dead?

Graham Welch | Posted 13.07.2014 | UK Tech
Graham Welch

Despite 'snake oil' claims from many security product vendors, there are no silver bullets and security is no longer simply a question of building up the walls around your business, you need to have threat visibility across your entire enterprise and deal directly with the issue quickly and efficiently. Only by deploying a solution to execute on the entire lifecycle of the threat can you ensure you are protected before, during and after the attack.

Is the War of Cybercrime Really Lost?

Graham Welch | Posted 05.07.2014 | UK Tech
Graham Welch

Verizon said, having analysed 10 years' worth of data covering 100,000 security incidents, that 92 percent of attacks could be traced back to just nine threats - meaning firms have continued to fall for the same types of scams and attacks all this time repeatedly.

Could E-Voting Threaten Our Democracy?

David Emm | Posted 30.06.2014 | UK Tech
David Emm

The Internet now reaches into nearly every aspect of our lives. Vast numbers of us routinely bank, shop and socialise online and the public services we all rely on are equally dependent on computers and the Internet. It's also true that the widespread use of social media has provided new ways for citizens to engage with the political process in the countries in which they live.

The UK Launches Its Computer Emergency Response Team

Victoria Woodbine | Posted 17.06.2014 | UK Tech
Victoria Woodbine

The UK was delighted to host at the launch Larry Zelvin, the Director of the National Cybersecurity Communications Integration Centre (NCCIC). The NCCIC is CERT-UK's natural US counterpart based in the Department of Homeland Security. The UK welcomed Director Zelvin's US perspectives and the emphasis he firmly placed on the importance of close collaboration between the UK and US.

Cracking the Code to a Career in Cyber Security

Karen Price | Posted 11.06.2014 | UK Universities & Education
Karen Price

Every day thousands of people are working to defend UK businesses and citizens from crippling cyber attacks, including fraud and terrorism. Online crime has reached epic proportions, yet we are ill-equipped to fight the battle due to severe skills shortages and an ageing workforce...

8 Tips On How To Land A Job In Cyber Security

The Huffington Post UK | Posted 09.04.2014 | UK Universities & Education

Your career adviser might not be too well versed on cyber security, let alone how to get a job in it. So we spoke to Philippa Melaniphy, Marketing ...

Coping With Cyber Threats : An Agenda for Corporates

Preetam Kaushik | Posted 20.05.2014 | UK Tech
Preetam Kaushik

Cyber threats are growing virally, necessitating a new approach in combating them by the corporate world, who even today regard antivirus programs and firewalls as a baseline for their security efforts.

Energy Firm Cyber-defence Too Weak

Graham Welch | Posted 03.05.2014 | UK Tech
Graham Welch

Why are these critical infrastructure companies failing these tests? After all most of these large organizations are serious about cybersecurity. They run specialized departments tasked with protecting two key networks: data center (servers) and office automation (workstations).

Security for the Internet of Things

Graham Welch | Posted 26.04.2014 | UK Tech
Graham Welch

It is happening already and today you need to manage the whole attack continuum - before, during and after an attack. Only then can you hope to regain some of the initiative and ensure that damage to reputation and customer data is minimized, uncovered and remediated as quickly as possible.

Digital Fraud Continues to Dominate Discussion in 2014

Mark Braund | Posted 13.04.2014 | UK Tech
Mark Braund

For many in the technology sector, one of the most discussed topics in recent months has been digital fraud and online security. This is an area in which I have a great deal of interest, as it continues to play a significant role in the demand for specialist skills in the Financial Services & Banking Sectors.