This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

FEATURED

ICYMI: Questions on cyber warfare, start-up money and helping out charities

ICYMI: Questions on cyber warfare, start-up money and helping out charities

This week's In Case You Missed column considers the possibility of cyber warfare, the money reaching cyber security start-ups and how charity can start at home for InfoSec practitioners.

MORE NEWS

4% of Googlebots are fake and can launch attacks

4% of Googlebots are fake and can launch attacks

Admins' fear of damaging their SEO gives malicious search engine bots a 'VIP pass' into sites.

Brit Lauri Love faces more US hacking charges

Brit Lauri Love faces more US hacking charges

Lauri Love, a 29-year-old British man from Stradishall in Suffolk, has been charged by a US court with hacking into multiple US government computers and stealing more than 100,000 employee and financial records.

More questions than answers as BBC outage fuels DDoS talk

More questions than answers as BBC outage fuels DDoS talk

The British Broadcasting Corporation was hit by a prolonged outage on its website and iPlayer video-on-demand service (VOD) last weekend, raising questions about the cause and whether it was subjected to a distributed-denial-of-service (DDoS) attack.

PRODUCT REVIEWS

nCryptedCloud

nCryptedCloud adds a layer of encryption between the user and the storage provider.

Zscaler Security Cloud

This service forces users through the cloud instead of via direct access to an organisation’s internet portal.

ADF TriageG2, Responder, Examiner

starstarstarstarstar
These three products are approximately the same type of tool, but with different functionalities depending on the market in which they are used.

Virtual Events

Opinions

Securing the energy industry: is success a dead CERT?

Securing the energy industry: is success a dead CERT?

Industry needs a brighter collaborative approach to help bring it out of the dark ages says Alan Carter

Critical National Infrastructure: how to reduce industrial-scale risk

Critical National Infrastructure: how to reduce industrial-scale risk

Nation-state attacks on CNI will be faciliated by the internet of things, and government regulation is needed to set standards, but the actual likelihood of CNI attacks remains very low says Raimund Genes.

Insiders can use whistleblowing tools to steal data without a trail

Insiders can use whistleblowing tools to steal data without a trail

The tools exist to by-pass many data leakage programmes and facilitate mass exfiltration of data, so enable internal whistelblowing - to avoid external access says Edward Parsons.

Director's Cut

Sign up to our newsletters