As Russia increases its military and civilian cyber-security capabilities, is the West under-estimating these developments?
UK Defence Secretary Michael Fallon announced that the UK will invest up to £265 million to boost the defence of military cyber-systems
Phil Filleul discusses how banks can beat off cyber-criminals using a range of methods and explores how graph analytics can improve their defence and protection
Nic Scott discusses what IT decision makers can do to make their organisation immune from ransomware so they too can laugh at the scammers trying to take company files for a ride.
Operational intelligence firm Splunk describes 'full lifecycle' of attacks and advocates analytics-driven security
The details of a years long campaign against a Swiss defence contractor have been released in partnership with Swiss CERT.
Without synchronised security, information system controls don't talk to each other, so can't work together to react to threats says John Shaw, advocating a more joined-up approach to security to defend against attacks.
Singapore Telecommunications (Singtel) has opened a new facility to help enterprises enhance cyber-security skills and test their networks in dealing with cyber-threats.
To quickly detect an occurring cyber-attack on endpoints, there are seven important security controls required to be put in place by a wide variety of security regulations.
Russia fires a warning shot across the US bows in response to the 'US offensive cyber-threat,' saying that it does not lag behind the US when it comes to cyber-technology, noting that its hackers are among the best.
Forty-two young codebreakers competed Friday in a realistic cyber-security simulation, designed to unearth hidden talent and find tomorrow's cyber-security experts.
Ireland's Central Bank's deputy governor, Cyril Roux, has warned that it may only be a matter of time before a cyber-attack builds a problem that descends across the broader financial industry.
Cyber-attacks are a top threat to organisations today; however, despite an increased effort to keep up with the rising scale and complexity of threats, IT teams are struggling to defend their networks, says Mike Smart.
Russians concerned that sanctions could hit support for and even supply of Western software used in its defence sector.
In the wake of successful cyber-attacks, and security incidents taking down some of the biggest brands on the planet, impacting critical infrastructure and banking systems alike, it may be asserted that, when it comes to technology, by evidenced implication, it would seem to be exposed, fragile and vulnerable.
Security is needed everywhere within the software-defined data centre as physical security is no longer an adequate defence against current threats says Dr Gerhard Knecht.
Rocket Kitten hackers are spear-phishing in Germany and Israel using GHOLE and woollen goldfish attacks hosted on Microsoft products.
Foreign Secretary Philip Hammond called for the security agencies to be given the powers and technology needed to match the foes they face - while subject to parliamentary oversight.
Deal with APT intruders logically, not emotionally, and get the upper-hand - even if that means leaving them on the network says Mike Auty,
A new National Control Centre of Defence is intended to combat cyber-threats targetting Russia and its governmental websites.
Europol agency EC3 is partnering with Zeus and CryptoLocker threat specialist AnubisNetworks, as it bids to make take-downs more successful.
Learn from the misfortunes of your peers and prepare to defend against repeat use of the same cyber-attack techniques as part of your defence planning advises David Stubley.
Nation-state attacks on CNI will be faciliated by the internet of things, and government regulation is needed to set standards, but the actual likelihood of CNI attacks remains very low says Raimund Genes.
The Pitty Tiger APT has been targeting telcos, defence companies and at least one government in a cyber-espionage campaign that relies on spear phishing and malware prying on vulnerabilities in Microsoft Office.
But there are viable defence solutions say the security experts...
Information sharing, responsibility for security, and the balance between the state and the individual were among topics covered by the International Fraud Group forum.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Interim CISO (Chief Information Security Officer) - Cyber Security Director
CYBER EXECS - London (Central), London (Greater)
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- 9.2 million medical records for sale on darkweb
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Researchers hack Visa cards in six seconds
- The information security implications of M&A deals
- Cyber-security must reflect risk not just regulation
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?