off

Risk Management: Upgrading the Approach to Access Control

‘If it ain’t broke, don’t fix it’ is a mantra that often describes the best course of action for many situations in life, writes Nick Smith. It’s a phrase that’s probably best suited to something like a bookcase or an oven, but it also often describes the...
Posted On 04 Mar 2019
off

Perpetuity Research undertakes survey on use of advanced technology in physical security measures

Advances in technology and the Internet of Things have changed the way in which we all live and work. They’re also altering the manner in which security operates. ‘Traditional’ security measures are evolving and becoming more advanced and, in some cases, interconnected, but...
Posted On 25 Feb 2019
off

BlackBerry moves to complete acquisition of cyber security specialist Cylance

BlackBerry Limited – the enabler of the Enterprise of Things by dint of its provision of technology that allows endpoints to trust one another, communicate securely and maintain privacy – has completed its previously-announced acquisition of Cylance, the privately-held...
Posted On 25 Feb 2019
off

Vulnerability to cyber attacks “poses biggest risk to businesses adopting 5G in UK”

UK businesses are most concerned about the susceptibility of 5G to cyber attacks according to EY’s latest Technology, Media and Telecommunications (TMT) research. 40% of respondents are worried about 5G and cyber attacks while a similar percentage (37%) are cautious over the...
Posted On 20 Feb 2019
off

Print and Printer Security: Why The Threat is Real

Cyber security is, of course, already high on the agenda for both risk professionals and C-Suite executives who have realised the financial cost, legal implications and reputational damage that can result from a serious data breach.  However, while most responsible organisations...
Posted On 18 Feb 2019
Adrian Taylor
off

Combating the Threat to 5G Services: Empowering Next Generation Smart Devices

For the telecoms industry, 2019 is the year of 5G writes Adrian Taylor. Service providers are in a race to roll-out 5G services that will empower the next generation of smart devices and the Internet of Things (IoT). With its massive increase in bandwidth speeds, ultra-low...
Posted On 18 Feb 2019
Jonathan Couch
off

Cyber Security: Attack Vectors Across the Next 12 Months

Cyber security professionals are currently busy sharing their predictions for the coming year, writes Jonathan Couch, who’s not a big fan of these types of predictions. That’s because what actually happens in any given year tends to be more of the same with one or two new,...
Posted On 06 Feb 2019
Adrian Taylor
off

5G and the Evolution of Mobile Networks

Just like the preceding 4G LTE and WiMAX networks, fifth generation networks are expected to greatly increase available bandwidth, with improved end-to-end performance providing a better end user experience, writes Adrian Taylor. In the most basic of terms, 4G LTE was the...
Posted On 05 Feb 2019
off

Digital transformation era “putting organisations’ sensitive data at risk” asserts Thales

Critical information systems, cyber security and data security specialist Thales believes that the rush towards digital transformation is putting sensitive data at risk for organisations worldwide. According to the 2019 Thales Data Threat Report (Global Edition), as organisations...
Posted On 30 Jan 2019
off

Complexity heralds return of ‘back to basics’ approach for information security professionals

It appears that many organisations will begin the New Year by reviewing their security infrastructure and taking a ‘back to basics’ approach to information security. This is according to the latest in a series of social media polls conducted by Infosecurity Europe 2019. Asked...
Posted On 22 Jan 2019