off

Carbon Black’s Global Incident Response Threat Report details “notable rise” in Island Hopping episodes

Carbon Black – a specialist in the realms of cloud-delivered, next generation endpoint security – has just issued its latest Global Incident Response Threat Report, aggregating key findings from IR partner investigations during the last 90 days. The company’s...
Posted On 10 Apr 2019
off

AMG Systems introduces robust Mini media converter for security and transport applications

AMG Systems has launched a Mini media converter specially designed to be robust enough to withstand the challenging extremes of temperature which can face security and transport camera and device installations. The ruggedised 9HMEC Mini media converters are small enough to be...
Posted On 09 Apr 2019
off

BT signs licensing deal with QiO Technologies for SATURN cyber analytics solution

BT has announced the licensing of the company’s cyber security visual analytics technology, SATURN, to QiO Technologies, an advanced analytics and Artificial Intelligence (AI) software company. BT developed SATURN to ingest and analyse huge amounts of data using AI, and then...
Posted On 27 Mar 2019
Adam Vincent
off

Cyber Security in the Manufacturing Sector: The Post-Brexit Outlook

We’re all very well aware of the potential economic impacts of Brexit, but the impending political and regulatory upheaval goes deeper than that. Cyber security could also be affected by a disorderly exit from the EU as the UK’s information exchange with partners around the world...
Posted On 19 Mar 2019
off

Cyber Security: Why Hacking Isn’t Always Bad News

Cyber security is an evolving discipline. It’s an ongoing endeavour to beat the hackers and cyber criminals at their own game and mitigate the risk they represent. As Scott Nicholson points out, though, for many organisations this is easier said than done. While the...
Posted On 19 Mar 2019
Anthony Perridge
off

Four Reasons Why CISOs Should Adopt The A.R.T. of Cyber Threat Intelligence

For today’s modern organisations, data has never been so valuable but, sadly, it’s also a valuable commodity for cyber criminals, asserts Anthony Perridge. The data held within your organisation is now more dynamic than ever. However, the bad news is that this truism...
Posted On 21 Feb 2019
Jon Abbott (left) and Steve Thomson (Photo: Simon Jacobs)
off

ThreatAware platform “aims to transform cyber security” for risk-focused managers

A new software platform aims to “transform cyber security” by allowing practising risk and security-focused managers to monitor the whole of their cyber security realm from one single screen. ThreatAware brings together cyber security tools and company-wide compliance...
Posted On 12 Feb 2019
Jonathan Couch
off

Cyber Security: Attack Vectors Across the Next 12 Months

Cyber security professionals are currently busy sharing their predictions for the coming year, writes Jonathan Couch, who’s not a big fan of these types of predictions. That’s because what actually happens in any given year tends to be more of the same with one or two new,...
Posted On 06 Feb 2019
Adrian Taylor
off

5G and the Evolution of Mobile Networks

Just like the preceding 4G LTE and WiMAX networks, fifth generation networks are expected to greatly increase available bandwidth, with improved end-to-end performance providing a better end user experience, writes Adrian Taylor. In the most basic of terms, 4G LTE was the...
Posted On 05 Feb 2019
Tom Kellermann
off

Looking Over The Horizon: What Does Cyber Security Have in Store for 2019?

In every intelligence industry there’s often a central aim: predicting the future. We collect and analyse, dissect and interpret, looking for that essential nugget that will give us the edge over our adversaries by indicating what they’ll do next. While this activity goes on...
Posted On 14 Jan 2019