Cyber Security

Cracking the Code to a Career in Cyber Security

Karen Price | Posted 14.04.2014 | UK Universities & Education
Karen Price

Every day thousands of people are working to defend UK businesses and citizens from crippling cyber attacks, including fraud and terrorism. Online crime has reached epic proportions, yet we are ill-equipped to fight the battle due to severe skills shortages and an ageing workforce...

8 Tips On How To Land A Job In Cyber Security

The Huffington Post UK | Posted 09.04.2014 | UK Universities & Education

Your career adviser might not be too well versed on cyber security, let alone how to get a job in it. So we spoke to Philippa Melaniphy, Marketing ...

Coping With Cyber Threats : An Agenda for Corporates

Preetam Kaushik | Posted 21.03.2014 | UK Tech
Preetam Kaushik

Cyber threats are growing virally, necessitating a new approach in combating them by the corporate world, who even today regard antivirus programs and firewalls as a baseline for their security efforts.

Energy Firm Cyber-defence Too Weak

Graham Welch | Posted 04.03.2014 | UK Tech
Graham Welch

Why are these critical infrastructure companies failing these tests? After all most of these large organizations are serious about cybersecurity. They run specialized departments tasked with protecting two key networks: data center (servers) and office automation (workstations).

Security for the Internet of Things

Graham Welch | Posted 25.02.2014 | UK Tech
Graham Welch

It is happening already and today you need to manage the whole attack continuum - before, during and after an attack. Only then can you hope to regain some of the initiative and ensure that damage to reputation and customer data is minimized, uncovered and remediated as quickly as possible.

Digital Fraud Continues to Dominate Discussion in 2014

Mark Braund | Posted 13.04.2014 | UK Tech
Mark Braund

For many in the technology sector, one of the most discussed topics in recent months has been digital fraud and online security. This is an area in which I have a great deal of interest, as it continues to play a significant role in the demand for specialist skills in the Financial Services & Banking Sectors.

What Is the Hardest Conversation You Have Had to Say?

Graham Welch | Posted 26.03.2014 | UK Tech
Graham Welch

No one likes to have to have a difficult conversation with a friend, family member or colleague. In the context of the home, there is nothing worse than having to tell your son or daughter their cherished hamster has died for example.

iPhones Change the Business Landscape

Graham Welch | Posted 15.03.2014 | UK Tech
Graham Welch

Seven years ago last week Steve Jobs stood up at Macworld, San Francisco, and announced the first iPhone in San Francisco and in doing so launched a revolution that is still having a monumental impact on the business and social world today.

Keeping Britain Safe and Prosperous Online

Victoria Woodbine | Posted 11.03.2014 | UK Tech
Victoria Woodbine

In its first year, the programme focused on understanding the problem. Threats in cyberspace are growing: over the past year, some 93% of large companies (and 87% of smaller ones) reported a cyber breach. Understanding these threats, and being able to detect them, was a vital first step.

'Tis the Season for Predictions...

Graham Welch | Posted 11.02.2014 | UK Tech
Graham Welch

Cybercrime today is not like the early days of virus writers and hackers who bragged about their exploits with friends. Today cybercrime is a serious business where actually most hackers do not want to be noticed as the longer they remain hidden in the network and are free to conduct their operations, the more information they can steal and the more money they can make.

The Weakest Link in Cyber Security - Staff

Graham Welch | Posted 25.01.2014 | UK Tech
Graham Welch

It seems people cannot stop themselves clicking on links they receive in emails without even the most cursory check on whether it is a valid link or not. It is an easy step often overlooked that you hover your mouse over the link and see what web address it is trying to send you to.

Testing Times for UK Banks

Graham Welch | Posted 23.01.2014 | UK Tech
Graham Welch

For years the cyber security industry has talked about the latest silver bullet that will protect against the latest threat. But the sad fact is despite millions of pounds being spent to protect institutions around the world, cyber attacks seemingly continue day after day.

Hire The Hackers

The Huffington Post UK/PA | Posted 22.10.2013 | UK

Hackers with a criminal past could be recruited to serve in the new military cyber force, the Defence Secretary Philip Hammond indicated. He said t...

Cyber Warfare: The Modern Cold War?

Peter Armstrong | Posted 23.01.2014 | UK Tech
Peter Armstrong

It's difficult to imagine how cyber warfare could wreak the same havoc as traditional, conventional war. But as former director of national intelligence Mike McConnell once noted, cyber war has the potential to mirror the nuclear challenge - less in the physical sense, but in terms of the potential economic and psychological effects.

What Is Malware? (Part two)

Allen Scott | Posted 16.11.2013 | UK Tech
Allen Scott

No piece of software is perfect or can ever be perfect. These imperfections within the code can be exploited by hackers to gain access to your computer. Once an exploit is found, it is patched by the software company which then sends an update to its users. This is the update that you keep ignoring.

The Case for Cyber Capacity Building

Victoria Woodbine | Posted 05.11.2013 | UK Tech
Victoria Woodbine

The UK's National Cyber Security Strategy aims to increase the scale and impact of these efforts by building resilience globally and assisting those countries that lack the infrastructure and expertise to protect their cyberspace, while also working to ensure cyberspace supports innovation, economic growth and social benefits.

A Cyber Health Check for Business

Victoria Woodbine | Posted 06.10.2013 | UK Tech
Victoria Woodbine

The project is a great opportunity for company Boards to understand and manage risks that have the potential to cause major damage to their business. Companies can demonstrate leadership by making cyber a major part of risk management across their whole business.

Going Retro in the World of Digital

Graham Welch | Posted 17.09.2013 | UK Tech
Graham Welch

Security is now a question of trying to think like the attacker and assume that something bad will eventually happen. Today knowing what you are going to do before, during and after the attack is the thing that will make the difference and lessen the embarrassment and damage a breach could ultimately cause.

Please Switch Off Your Electronic Devices.....

Graham Welch | Posted 02.09.2013 | UK Tech
Graham Welch

why is it we seem to value physical over digital so much? We often act very much more recklessly in the digital world than the physical. After all how many of us have taken directions from a friend or colleague to visit a certain website without a second thought? Few people take the trouble to check the validity of the website we are visiting before we go there, or even know what to look for.

Time to Test Defences

Graham Welch | Posted 25.08.2013 | UK Tech
Graham Welch

We need to recognize that the cybercriminals who carry out today's attacks are professionals. They are well funded, well resourced and they bring in the right expertise to do the job they are paid to do. They are often in it for the long game and they will work for days, weeks, months or even years to find a weak link and exploit it.

An Information Storm In A Teacup

Christian Toon | Posted 06.08.2013 | UK Tech
Christian Toon

The internet cafe can appear a practical godsend. It sounds simple enough, doesn't it? But just how secure are internet cafes? And, more importantly, how safe is your information going to be?

The Next Big Thing in Security Is...

Graham Welch | Posted 23.06.2013 | UK Tech
Graham Welch

Today the bad guys are increasingly well-financed, professional and work hard to develop new ways to get through defences. At the same time, we increasingly live our lives online which means the information and data we hold on our PCs and networks are valuable assets that can be traded and used.

Government and Business Team Up to Strengthen UK Cyber Security

Victoria Woodbine | Posted 08.06.2013 | UK Tech
Victoria Woodbine

The launch follows a successful pilot instigated by the prime minister which included over 160 companies from across five sectors of business including defence, pharmaceuticals, telecommunications, finance and energy - all of which are industries with a strong element of UK-US trade and investment.

Welcome to Generation Hack

Andrew Tipp | Posted 31.05.2013 | UK Tech
Andrew Tipp

You don't need to be a web trendster or pop culture vulture to recognise we're on the cusp of a new age; a fresh wave of inquisitive HTML meddlers. Never mind Generation X. Forget Generation Y. This isn't Generation Z. It's Generation Hack.

Laying the Foundations for an Open, Secure and Prosperous Digital Europe: The New EU Cyber Security Strategy

Dr Marco Roscini | Posted 17.04.2013 | UK Tech
Dr Marco Roscini

The EU Strategy responds to debates over human rights and the internet, especially regarding censorship, by reaffirming fundamental rights, democracy and the rule of law in cyberspace. What I find interesting is that, according to the Strategy, there is no human 'right' to access the internet.