Anthony Perridge
off

Effectively Managing Cyber Threats on Critical Infrastructure

Criminals are tirelessly attacking critical infrastructure around the world and compromising the Industrial Control System and the Supervisory Control and Data Acquisition systems that control these infrastructures, writes Anthony Perridge. In 2010, the Stuxnet worm infiltrated...
Posted On 12 Sep 2019
off

67% of UK-based firms feel cyber security worries prevent new tech adoption

Over two-thirds (67%) of British companies feel that cyber security concerns prevent them from adopting new technology to grow their business faster. That’s according to a new report from EY based on a survey of 175 C-Suite executives at UK-based organisations. Cloud...
Posted On 26 Aug 2019
Trevor Ball
off

Data-Driven Facilities Management: Realising Enhanced Security

Ever since the inception of the Internet, data has been used to improve processes across the globe. Since the turn of the millennium in particular, the storage and use of data has expanded considerably, writes Trevor Ball. A 2018 report by IBM found that 90% of the data in the...
Posted On 09 Aug 2019
off

Remote Risk Monitoring: Managing Water Leaks in the Cloud

From 2012 up until 2017, approximately 10% of water leak detection systems were equipped with the ability to send external notifications, using GSM technology to deliver this service. Since that time, cloud technology has become increasingly reliable for the delivery of data that...
Posted On 07 Aug 2019
off

5G: The Need for Next Generation Security to Combat Cyber Threats

Rest assured that 5G is coming. It promises to be faster with less latency and better support for applications such as the Internet of Things (IoT) than any of its predecessors, asserts Gunter Reiss. It will be strikingly faster than 4G, and this will be particularly obvious when...
Posted On 07 Aug 2019
off

Palo Alto Networks study highlights preference for AI management of cyber security

An online study of more than 10,000 respondents in EMEA conducted by Palo Alto Networks and YouGov alongside Dr Jessica Barker, an expert in the human nature of cyber security, has explored attitudes towards new cyber security technologies, such as Artificial Intelligence (AI),...
Posted On 08 Jul 2019
off

Secure IoT 2019 tackles risks and vulnerabilities posed by using connected devices

The potential risks and vulnerabilities posed by using Internet of Things (IoT) systems and connected devices, along with IoT security Best Practice and guidelines, will be up for discussion at Secure IoT 2019. The third annual Secure IoT Cyber Security Conference will be held on...
Posted On 05 Jul 2019
Dan Byles
off

Dan Byles appointed non-executive chair of BSI’s Standards Policy and Strategy Committee

Dan Byles has been appointed in a non-executive role by the British Standards Institution (BSI) to serve as chairman of the organisation’s Standards Policy and Strategy Committee (SPSC), the most senior of the BSI’s Standards Committees. The main objective of the SPSC...
Posted On 01 Jul 2019
Angus Darroch-Warren
off

Doctor or Dalek? The Evolving Space of the Security Manager

If you’re familiar with the long-running UK TV sci-fi series Doctor Who, you’ll know that the lead character (‘The Doctor’) and various adversaries have continually evolved since the show’s debut back in 1963. Our hero’s villains have all adapted, becoming more...
Posted On 23 Jun 2019
Campbell Murray
off

Maintaining a Circle of Trust

As news outlets report on yet another vulnerability impacting a popular application – in this case WhatsApp – it’s time that we ask ourselves: ‘With all the different methods we use to communicate for work, with friends and with family, which messaging apps can...
Posted On 21 May 2019