This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

FEATURED

Could MH17 sanctions push Russia to cyber warfare?

Could MH17 sanctions push Russia to cyber warfare?

A leading cyber security academic has warned the US and European governments that tougher sanctions on Russia relating to the MH17 airplane crash could result in the start of cyber warfare.

MORE NEWS

Queen's website hosts controversial tracking technique

Queen's website hosts controversial tracking technique

Advertising tracking called 'canvas fingerprinting' is used on many websites and identifies unique individuals and their browsing habits and works surreptitiously.

Snowden, Ellsberg ask hackers to help obscure whistleblower activity

Snowden, Ellsberg ask hackers to help obscure whistleblower activity

Crowds of people came out to see Daniel Ellsberg chat with Edward Snowden at HOPE X conference.

Apple accused of hiding backdoors in all 600 million iOS devices

Apple accused of hiding backdoors in all 600 million iOS devices

Apple has built backdoors in its iOS operating system that can leak the personal data of all 600 million iPhone and iPad users and may have been exploited by the US secret service, according to a new US research paper.

PRODUCT REVIEWS

nCryptedCloud

nCryptedCloud adds a layer of encryption between the user and the storage provider.

Zscaler Security Cloud

This service forces users through the cloud instead of via direct access to an organisation’s internet portal.

ADF TriageG2, Responder, Examiner

starstarstarstarstar
These three products are approximately the same type of tool, but with different functionalities depending on the market in which they are used.

Virtual Events

Opinions

Insiders can use whistleblowing tools to steal data without a trail

Insiders can use whistleblowing tools to steal data without a trail

The tools exist to by-pass many data leakage programmes and facilitate mass exfiltration of data, so enable internal whistelblowing - to avoid external access says Edward Parsons.

Know thy neighbour: Dealing with third-party cyber attacks

Know thy neighbour: Dealing with third-party cyber attacks

It'd not enough to protect your own network, you aslo have to be prepared to cope with third party negligence says Brian Foster.

The dungeon of the 'Deep Web'; where even the spiders dare not travel

The dungeon of the 'Deep Web'; where even the spiders dare not travel

Charles Sweeney asks, are your staff inadvertently leaving the back door open via an innocent lunch-time browse?

Director's Cut

Sign up to our newsletters