off

Perpetuity Research undertakes survey on use of advanced technology in physical security measures

Advances in technology and the Internet of Things have changed the way in which we all live and work. They’re also altering the manner in which security operates. ‘Traditional’ security measures are evolving and becoming more advanced and, in some cases, interconnected, but...
Posted On 25 Feb 2019
off

BlackBerry moves to complete acquisition of cyber security specialist Cylance

BlackBerry Limited – the enabler of the Enterprise of Things by dint of its provision of technology that allows endpoints to trust one another, communicate securely and maintain privacy – has completed its previously-announced acquisition of Cylance, the privately-held...
Posted On 25 Feb 2019
off

Vulnerability to cyber attacks “poses biggest risk to businesses adopting 5G in UK”

UK businesses are most concerned about the susceptibility of 5G to cyber attacks according to EY’s latest Technology, Media and Telecommunications (TMT) research. 40% of respondents are worried about 5G and cyber attacks while a similar percentage (37%) are cautious over the...
Posted On 20 Feb 2019
Adrian Taylor
off

Combating the Threat to 5G Services: Empowering Next Generation Smart Devices

For the telecoms industry, 2019 is the year of 5G writes Adrian Taylor. Service providers are in a race to roll-out 5G services that will empower the next generation of smart devices and the Internet of Things (IoT). With its massive increase in bandwidth speeds, ultra-low...
Posted On 18 Feb 2019
Jonathan Couch
off

Cyber Security: Attack Vectors Across the Next 12 Months

Cyber security professionals are currently busy sharing their predictions for the coming year, writes Jonathan Couch, who’s not a big fan of these types of predictions. That’s because what actually happens in any given year tends to be more of the same with one or two new,...
Posted On 06 Feb 2019
Adrian Taylor
off

5G and the Evolution of Mobile Networks

Just like the preceding 4G LTE and WiMAX networks, fifth generation networks are expected to greatly increase available bandwidth, with improved end-to-end performance providing a better end user experience, writes Adrian Taylor. In the most basic of terms, 4G LTE was the...
Posted On 05 Feb 2019
off

Complexity heralds return of ‘back to basics’ approach for information security professionals

It appears that many organisations will begin the New Year by reviewing their security infrastructure and taking a ‘back to basics’ approach to information security. This is according to the latest in a series of social media polls conducted by Infosecurity Europe 2019. Asked...
Posted On 22 Jan 2019
off

“Extended enterprise risk management set to be keen focus in 2019” asserts Deloitte

Recognising that the greatest risk to the enterprise may come from outside the organisation, a recent online poll conducted by Deloitte has revealed that 70% of respondents indicated a moderate to high level of dependency on external entities that might include third, fourth or...
Posted On 15 Jan 2019
off

“Almost half of companies still unable to detect IoT device breaches” reveals Gemalto study

Gemalto, the digital security specialist, has revealed that only around half (48%) of businesses can detect whether or not any of their Internet of Things (IoT) devices suffers a breach. This news comes despite companies having an increased focus on IoT security. Spending on...
Posted On 15 Jan 2019
Tom Kellermann
off

Looking Over The Horizon: What Does Cyber Security Have in Store for 2019?

In every intelligence industry there’s often a central aim: predicting the future. We collect and analyse, dissect and interpret, looking for that essential nugget that will give us the edge over our adversaries by indicating what they’ll do next. While this activity goes on...
Posted On 14 Jan 2019