Jon Abbott (left) and Steve Thomson (Photo: Simon Jacobs)
off

ThreatAware platform “aims to transform cyber security” for risk-focused managers

A new software platform aims to “transform cyber security” by allowing practising risk and security-focused managers to monitor the whole of their cyber security realm from one single screen. ThreatAware brings together cyber security tools and company-wide compliance...
Posted On 12 Feb 2019
Jonathan Couch
off

Cyber Security: Attack Vectors Across the Next 12 Months

Cyber security professionals are currently busy sharing their predictions for the coming year, writes Jonathan Couch, who’s not a big fan of these types of predictions. That’s because what actually happens in any given year tends to be more of the same with one or two new,...
Posted On 06 Feb 2019
Adrian Taylor
off

5G and the Evolution of Mobile Networks

Just like the preceding 4G LTE and WiMAX networks, fifth generation networks are expected to greatly increase available bandwidth, with improved end-to-end performance providing a better end user experience, writes Adrian Taylor. In the most basic of terms, 4G LTE was the...
Posted On 05 Feb 2019
Tom Kellermann
off

Looking Over The Horizon: What Does Cyber Security Have in Store for 2019?

In every intelligence industry there’s often a central aim: predicting the future. We collect and analyse, dissect and interpret, looking for that essential nugget that will give us the edge over our adversaries by indicating what they’ll do next. While this activity goes on...
Posted On 14 Jan 2019
Dr Sandra Bell
off

Resilient Organisations Make Hay When The Sun Shines

Supply chain risk is often thought of only in terms of how the failure of such chains could disrupt a given organisation’s day-to-day operations. In the modern and interconnected world, localised operational disruptions, often caused by relatively mundane incidents such as...
Posted On 12 Dec 2018
off

Bosch’s Video Management System Version 9.0 determines to “put end users first”

The security industry is driven by a constant stream of new innovations. However, innovation can have a negative knock-on effect when it leads to increased complexity, makes installation more complicated, set-up more confusing and operation more strenuous. This is precisely why...
Posted On 30 Oct 2018
off

Fortinet moves to acquire cloud-based threat analytics company ZoneFox Limited

Fortinet, a specialist in the field of broad, integrated and automated cyber security solutions, has completed the acquisition of ZoneFox Limited, a privately-held cloud-based insider threat detection and response company headquartered in Edinburgh. The acquisition further...
Posted On 24 Oct 2018
off

Industrial Control Systems: Securing The Heartbeat of Critical Infrastructure

Industrial Control Systems (ICS) are a specialised set of physical and cyber systems that drive production for critical infrastructure industries such as power generation and distribution, oil production and refining, chemical manufacturing and more, observes Mark Carrigan. ICS...
Posted On 23 Oct 2018
off

Successful threat intelligence programmes save UK businesses £6 million on average in past 12 months

Security platform provider ThreatConnect’s latest survey, entitled ‘Building A Threat Intelligence Programme’, reports that cyber security decision-makers inside organisations with mature threat intelligence programs (70%) say their infrastructure has blocked...
Posted On 25 Sep 2018
off

Dahua publishes detailed White Paper on ‘Electronic Surveillance within Education’

In days gone by, electronic surveillance within the education sector has often been viewed as a ‘grudge purchase’, and particularly so in smaller institutions. It’s something that you have to have. A necessary evil. As a result, many schools and universities have spent only...
Posted On 18 Sep 2018