Delfina Chain
off

Laying the Groundwork for Combating AI-Powered Cyber Crime

Artificial Intelligence (AI) is already being applied to diverse use cases, from consumer-oriented devices such as voice-controlled personal assistants and self-directed vacuum cleaners, through to groundbreaking business applications that optimise everything from drug discovery...
Posted On 20 Nov 2019
off

Shift in key security decision-makers creates risks as firms migrate to microservices

Radware, the provider of cyber security and application delivery solutions, has released its 2019 State of Web Application Security Report which finds that, while organisations shift their applications to microservices environments, the responsibility for securing these...
Posted On 10 Oct 2019
off

NCSC offers key advice to organisations on mitigating Denial of Service attacks

A suspected Denial of Service (DoS) attack resulted in Wikipedia experiencing intermittent outages in the early hours of Saturday 7 September. Organisations worried about the threat of DoS attacks are now recommended to read guidance just published by the National Cyber Security...
Posted On 13 Sep 2019
Patrice Puichaud
off

How Does Ransomware Work?: Beating the Cyber Criminals

Threats come and go, but one thing remains the same: the ability of cyber criminals to adapt to circumstances. A brief decline of interest in ransomware as criminals focused their attention on cryptojacking during the previous year appears to have come to an end and ransomware...
Posted On 29 Aug 2019
off

DigiCert research unveils corporate losses associated with IoT-related security missteps

A new study orchestrated by DigiCert, the provider of TLS/SSL, PKI and Internet of Things (IoT) security solutions, reveals that enterprises have begun sustaining significant monetary losses stemming from the lack of good practices as they move forward with incorporating the IoT...
Posted On 19 Nov 2018
off

BSI survey highlights “significant variations” in data security readiness within UK’s public sector

An in-depth survey conducted by the BSI’s Cyber Security and Information Resilience Centre of Excellence in conjunction with GovNewsDirect has unearthed a range of inconsistencies in terms of how prepared the UK’s public sector organisations really are for potential cyber...
Posted On 05 Sep 2018
For the first time, the results of the latest British Crime Survey issued by the ONS show that fraud and cyber crime are the most prevalent types of criminality committed against people in England and Wales
off

British Crime Survey reveals true extent of fraud and cyber criminality in England and Wales

For the first time, the results of the latest British Crime Survey issued by the Office for National Statistics highlight the fact that fraud and cyber crime are the most prevalent forms of criminality perpetrated against individuals and businesses across England and Wales. The...
Posted On 16 Oct 2015
The ICS Security Lab has been launched by Applied Risk
off

Applied Risk launches ICS/SCADA Security Lab to address emerging industrial security threats

Applied Risk, a specialist in the development of industrial control systems security, has announced the launch of its ICS Security Lab to help protect industrial assets and infrastructure from costly cyber attacks. The lab has identified its first vulnerability in Moxa...
Posted On 20 Sep 2015
Paul Heffernan: Principal Consultant (Cyber) at Unipart Security Solutions
off

Targeted Attack Defence Mechanisms: How effective are your cyber solutions?

Scanning the latest Information Security Breaches Survey1, it would seem that 90% of large-scale organisations and 74% of smaller businesses have suffered some form of cyber security breach. On that basis, becoming a cyber security victim seems a near certainty for many. Paul...
Posted On 12 Aug 2015
Mike Denning: vice-president of global security for Verizon Enterprise Solutions
off

Cyber threats “increasing in sophistication” yet many attacks use “decades-old techniques”

Verizon’s 2015 Data Breach Investigations Report reveals that cyber attacks are becoming increasingly sophisticated. However, many cyber criminals are still relying on decades-old techniques such as phishing and hacking. According to this year’s report, the bulk of cyber attacks...
Posted On 14 Apr 2015
12