This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

FEATURED

ICYMI: Internet of Things bugs, Apple woes in China and the CISO shelf-life

ICYMI: Internet of Things bugs, Apple woes in China and the CISO shelf-life

This week's In Case You Missed It column looks at the Internet of Things, Apple's troubles in China and a strongly worded goodbye note by the outgoing head of GCHQ.

LATEST NEWS

VC cyber security funding tops £850 million

VC cyber security funding tops £850 million

A new study from US-based research firm CBI Insights reveals that corporate cyber security investments have risen five-fold since 2009, with 30 percent growth in the last year alone.

Russian/Chinese cyber-security pact raises concerns

Russian/Chinese cyber-security pact raises concerns

News that Russia and China are set to sign a cyber-security treaty next month have left Western cyber experts unsure whether it is a threat or a promising development.

UK police arrest trio over £1.6 million cyber theft from cash machines

UK police arrest trio over £1.6 million cyber theft from cash machines

London Police have arrested three suspected members of an Eastern European cyber-crime gang who installed malware on more than 50 bank ATM machines across the UK to steal £1.6 million.

Password recovery made too easy

Password recovery made too easy

A senior malware analyst has slammed the availability of a `password recovery' utility from Freehostia, noting that the software actually uses network admin utilities to take credentials from the users' PC.

PRODUCT REVIEWS

Pleasant Password Server

starstarstarstarstar
Pleasant Password Server (PPS) is a simple yet effective way for organisations to manage their passwords everywhere.

PFU Systems iNetSec Smart Finder

starstarstarstar½
The iNetSec Smart Finder from PFU systems is an excellent network access control system for organisations of any size.

Virtual Events

Opinions

Women in cyber security: Changing pathways and perceptions

Women in cyber security: Changing pathways and perceptions

Security consultant Dr Jessica Barker says that the next step to getting more women into cyber security hinges on changing minds and career pathways.

Zeroing in on zero-day vulnerabilities with looping

Zeroing in on zero-day vulnerabilities with looping

Zero-day vulnerabilities are a fact of life in cyber-security, which is why looping is so essential, says Darren Anstee.

Humanise outsourcing with a Pay As You Go CISO

Humanise outsourcing with a Pay As You Go CISO

Outsourcing your CISO is an option medium sized organisations should consider says Carl Shallow, who advises a Pay As You Go model to buy in expertise.

Director's Cut

Sign up to our newsletters