off

BlackBerry report highlights most common tactics used by cyber criminals

BlackBerry Limited has issued its 2020 Threat Report examining the latest adversarial techniques and tactics as analysed by BlackBerry Cylance threat researchers, duly providing key guidance organisations can leverage in order to mitigate risk. Key findings include the continued...
Posted On 20 Feb 2020
off

Business Continuity Strategy Planning: The Six Mistakes to Avoid

Any organisation can face significant downtime, data loss and employee displacement if unprepared when a disaster strikes. All of these scenarios can have a serious and detrimental impact on the viability of a business. On that basis, detailed and thorough planning for them can...
Posted On 29 Jan 2020
off

400%-plus increase in lost laptops at Ministry of Justice across last three years

Apricorn has announced findings from Freedom of Information (FoI) requests submitted to five Government departments focusing on the security of devices held by public sector employees. According to Apricorn, it emerges that the Ministry of Justice lost 354 mobile phones, PCs,...
Posted On 17 Dec 2019
off

“Account checking Armageddon close at hand in New Year” warns Blueliv

Liv Rowley, threat intelligence analyst at Blueliv, has shared details of the company’s predictions on the biggest cyber threats likely to develop in the New Year, from account checking Armageddon through to Monero cryptocurrency mining. With users continuing to re-use the...
Posted On 29 Nov 2019
Tom Knierim
off

Biometric Automation for Airports: Travelling Bliss or Privacy Nightmare?

Checkpoints at airports have always been an object of passenger discontent with both document and immigration checks consistently receiving the lowest scores in passenger satisfaction surveys. Biometric technology has long been hailed as the ‘silver bullet’ to solve...
Posted On 21 Nov 2019
off

Wavestore’s HyperRAID technology offers end users N+5 hard drive redundancy

The resilience offered by the proprietary HyperRAID technology suite recently introduced by Wavestore means that the risk of data loss for end users due to hard drive failure can now be reduced to practically zero. By taking the redundancy offered by conventional RAID solutions...
Posted On 07 Mar 2019
off

Top Five cyber security predictions for New Year outlined by NordVPN

It’s not an easy task to remember a week in 2018 without a major data leak or security breach. Passwords were leaking, new sophisticated malware attacks were spreading, data was breached and Governments around the world once again overturned privacy rules. According to...
Posted On 03 Jan 2019
off

BSI survey highlights “significant variations” in data security readiness within UK’s public sector

An in-depth survey conducted by the BSI’s Cyber Security and Information Resilience Centre of Excellence in conjunction with GovNewsDirect has unearthed a range of inconsistencies in terms of how prepared the UK’s public sector organisations really are for potential cyber...
Posted On 05 Sep 2018
off

TÜV SÜD appointed as Certified Body for UK Government’s Cyber Essentials programme

TÜV SÜD United Kingdom has achieved Certified Body status for the UK Government’s Cyber Essentials programme, which is specifically designed to protect today’s organisations from myriad cyber security threats. Organisations certified by TÜV SÜD can promote the fact that...
Posted On 04 Jul 2017
off

34th East-West International Security Conference in Rome highlights global trends

Attending the 34th East-West International Security Conference that ran at the Best Western Universo Hotel in Rome on Monday 21 and Tuesday 22 November were delegates from the Russian Federation, the Ukraine and Albania representing commercial, private and public sector...
Posted On 21 Dec 2016
12