Cybersecurity

Huge Military Investment Announced To Fight Britain's 'Unseen Enemies'

The Huffington Post UK/PA | Posted 14.07.2014 | UK

A huge investment is to be made in Britain's military to fight its "unseen enemies", including cyber attacks and terrorism. Prime Minister David C...

Sunscreen, Passport, Swimwear... Tablet

Graham Welch | Posted 30.06.2014 | UK Tech
Graham Welch

As we head into July and the holiday season gets into full swing, the thoughts of many of us will turn towards our summer holidays and what we will do to rest and relax for our well earned breaks.

Don't Score an Own Goal With Security

Graham Welch | Posted 17.06.2014 | UK Tech
Graham Welch

A certain major sporting event gets underway this month with the eyes of the world glued to their televisions, smartphones, tablets and laptops looking for the latest news coming out of Brazil and the fate of their national sides and favourite players.

World Cup... Prime Time for Cybercrime

Eric Ehrmann | Posted 13.06.2014 | UK Sport
Eric Ehrmann

With World Cup mania underway fans everwhere need to keep track of their smartphone. Cybercrime has become a pandemic and smartphone theft is where it all begins.

Small Business Has More at Stake Than Most

Mike Foreman | Posted 11.06.2014 | UK Tech
Mike Foreman

Unsurprisingly this caused widespread alarm among thousands of computer users everywhere. But it's small business that should pay closest attention because they have more at stake than most. It's not just that the safety of their financial data is crucial to their prosperity.

Is Trust the New Business Currency?

Graham Welch | Posted 09.06.2014 | UK Tech
Graham Welch

Trust has become one of the world's most important commodities. Just ask the former CEO of a major American retailer, who resigned after a particularly large cyber attack or any other major organisation that has been hacked and customer data apparently lost.

Skills Shortage in Cyber and Cloud?

Gary Newe | Posted 04.06.2014 | UK Tech
Gary Newe

A lot has been said about how technology is changing and the impact that is having on the way businesses operate and the way we live our lives. We're more mobile, we have the world's information available to us at the click of a button and our data is stored on interconnected servers spread throughout the world.

Users Have 'Two Weeks' To Protect Against Virus That Is 'Literally Extorting People'

The Huffington Post UK | Thomas Tamblyn | Posted 03.06.2014 | UK Tech

UK residents will have 'two weeks' to protect themselves against a 'powerful computer attack' that ransoms people's data, according to the National Cr...

New Study Finds Students Pay Little Attention to Digital Security

Alessandro Bonzio | Posted 20.07.2014 | UK Tech
Alessandro Bonzio

Digital security is still a relatively unfamiliar issue among university students; what's perhaps worse is that many of them don't even realize how little they know. More than 40 per cent admit not logging out after accessing an online service or having no password protecting their smartphone.

US Charges Five Chinese Officials In First Ever Cyber Espionage Case

The Huffington Post UK | Posted 19.05.2014 | UK

The US has handed down its first ever charges for cyber-espionage to five Chinese military officials, who are accused of hacking into American compani...

Is Anti-Virus Really Dead?

Graham Welch | Posted 13.07.2014 | UK Tech
Graham Welch

Despite 'snake oil' claims from many security product vendors, there are no silver bullets and security is no longer simply a question of building up the walls around your business, you need to have threat visibility across your entire enterprise and deal directly with the issue quickly and efficiently. Only by deploying a solution to execute on the entire lifecycle of the threat can you ensure you are protected before, during and after the attack.

In a Post-Snowden World, Can We Afford to Criticise Clarkson?

The Conversation UK | Posted 14.07.2014 | UK Politics
The Conversation UK

I have no idea whether he is racist, though I suspect he isn't. Intended or not, ill-used words do cause damage but it is the presence or absence of hateful intent behind such remarks rather than the words used that define the mindset of the speaker. We can't read minds so we interpret that intent, by proxy, from people's words...

Is the War of Cybercrime Really Lost?

Graham Welch | Posted 05.07.2014 | UK Tech
Graham Welch

Verizon said, having analysed 10 years' worth of data covering 100,000 security incidents, that 92 percent of attacks could be traced back to just nine threats - meaning firms have continued to fall for the same types of scams and attacks all this time repeatedly.

The UK Launches Its Computer Emergency Response Team

Victoria Woodbine | Posted 17.06.2014 | UK Tech
Victoria Woodbine

The UK was delighted to host at the launch Larry Zelvin, the Director of the National Cybersecurity Communications Integration Centre (NCCIC). The NCCIC is CERT-UK's natural US counterpart based in the Department of Homeland Security. The UK welcomed Director Zelvin's US perspectives and the emphasis he firmly placed on the importance of close collaboration between the UK and US.

Cyber Attack! 60% of Small Companies Out of Business in Six Months

Shivvy Jervis | Posted 03.06.2014 | UK Tech
Shivvy Jervis

Coaching your employees on data protection just isn't enough. In the video, Holman speaks to this point, explaining "You could buy the most high-tech security software, then the admin guy whacks a generic password on it ... and you're sunk".

Energy Firm Cyber-defence Too Weak

Graham Welch | Posted 03.05.2014 | UK Tech
Graham Welch

Why are these critical infrastructure companies failing these tests? After all most of these large organizations are serious about cybersecurity. They run specialized departments tasked with protecting two key networks: data center (servers) and office automation (workstations).

Security for the Internet of Things

Graham Welch | Posted 26.04.2014 | UK Tech
Graham Welch

It is happening already and today you need to manage the whole attack continuum - before, during and after an attack. Only then can you hope to regain some of the initiative and ensure that damage to reputation and customer data is minimized, uncovered and remediated as quickly as possible.

What Is the Hardest Conversation You Have Had to Say?

Graham Welch | Posted 26.03.2014 | UK Tech
Graham Welch

No one likes to have to have a difficult conversation with a friend, family member or colleague. In the context of the home, there is nothing worse than having to tell your son or daughter their cherished hamster has died for example.

iPhones Change the Business Landscape

Graham Welch | Posted 15.03.2014 | UK Tech
Graham Welch

Seven years ago last week Steve Jobs stood up at Macworld, San Francisco, and announced the first iPhone in San Francisco and in doing so launched a revolution that is still having a monumental impact on the business and social world today.

Keeping Britain Safe and Prosperous Online

Victoria Woodbine | Posted 11.03.2014 | UK Tech
Victoria Woodbine

In its first year, the programme focused on understanding the problem. Threats in cyberspace are growing: over the past year, some 93% of large companies (and 87% of smaller ones) reported a cyber breach. Understanding these threats, and being able to detect them, was a vital first step.

Big Data in 2014: Five Predictions

Mark Braund | Posted 11.03.2014 | UK Tech
Mark Braund

2013 was a year in which big data became a 'hot topic' for discussion and debate, reaching far beyond the usual industry journals and making the mainstream news for a number of good and bad reasons. With that in mind there has been a great deal of speculation about what trends we should expect to see in big data in 2014.

Businesses Listen Up: Take the Threat of the 'Dark Web' Seriously

Shivvy Jervis | Posted 17.02.2014 | UK Tech
Shivvy Jervis

Being prepared means understanding the nature of these dangers - and really that means recognizing the importance of the dark web as part of any information security strategy.

'Tis the Season for Predictions...

Graham Welch | Posted 11.02.2014 | UK Tech
Graham Welch

Cybercrime today is not like the early days of virus writers and hackers who bragged about their exploits with friends. Today cybercrime is a serious business where actually most hackers do not want to be noticed as the longer they remain hidden in the network and are free to conduct their operations, the more information they can steal and the more money they can make.

It's the Most Wonderful Dangerous Time of the Year

David Emm | Posted 01.02.2014 | UK Tech
David Emm

We're particularly vulnerable at Christmas. Many of us now routinely shop online, because it's quick and convenient. But at Christmas the volume of online transactions goes through the roof.

Don't Let CryptoLocker Hold Your Business to Ransom

Mike Foreman | Posted 25.01.2014 | UK Tech
Mike Foreman

CryptoLocker shows that this is just the kind of complacency that criminal gangs are banking on. Gene Marks, a well-known small business writer and commentator, certainly seems to agree.