This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

FEATURED

Could MH17 sanctions push Russia to cyber warfare?

Could MH17 sanctions push Russia to cyber warfare?

A leading cyber security academic has warned the US and European governments that tougher sanctions on Russia relating to the MH17 airplane crash could result in the start of cyber warfare.

MORE NEWS

34 European banks hit by Android app security attacks

34 European banks hit by Android app security attacks

Banks need to put their heads together to develop common and more secure methodologies says Sarb Sembhi, STORM Guidance, following operation Emmental.

Entrepreneur develops hacked data search engine

Entrepreneur develops hacked data search engine

A Portuguese entrepreneur is said to have developed a specialised search engine that can allow access to leaked or allegedly stolen access credentials.

Insider threat levels from ex-staffers greater than expected

Insider threat levels from ex-staffers greater than expected

A third of of ex-employees have access to company data and 9 percent have used their access privileges, says new research.

PRODUCT REVIEWS

nCryptedCloud

nCryptedCloud adds a layer of encryption between the user and the storage provider.

Zscaler Security Cloud

This service forces users through the cloud instead of via direct access to an organisation’s internet portal.

ADF TriageG2, Responder, Examiner

starstarstarstarstar
These three products are approximately the same type of tool, but with different functionalities depending on the market in which they are used.

Virtual Events

Opinions

Critical National Infrastructure: how to reduce industrial-scale risk

Critical National Infrastructure: how to reduce industrial-scale risk

Nation-state attacks on CNI will be faciliated by the internet of things, and government regulation is needed to set standards, but the actual likelihood of CNI attacks remains very low says Raimund Genes.

Insiders can use whistleblowing tools to steal data without a trail

Insiders can use whistleblowing tools to steal data without a trail

The tools exist to by-pass many data leakage programmes and facilitate mass exfiltration of data, so enable internal whistelblowing - to avoid external access says Edward Parsons.

Know thy neighbour: Dealing with third-party cyber attacks

Know thy neighbour: Dealing with third-party cyber attacks

It's not enough to protect your own network, you also have to be prepared to cope with third party negligence, says Brian Foster.

Director's Cut

Sign up to our newsletters