Defence

Russia's increasing cyber-capabilities underestimated?

Russia's increasing cyber-capabilities underestimated?

By

As Russia increases its military and civilian cyber-security capabilities, is the West under-estimating these developments?

Cyber-defence spending increased

By

UK Defence Secretary Michael Fallon announced that the UK will invest up to £265 million to boost the defence of military cyber-systems

The right connections - how graph analytics beats fraudsters and cyber-crime

The right connections - how graph analytics beats fraudsters and cyber-crime

Phil Filleul discusses how banks can beat off cyber-criminals using a range of methods and explores how graph analytics can improve their defence and protection

Why ransomware is a paper tiger

Why ransomware is a paper tiger

Nic Scott discusses what IT decision makers can do to make their organisation immune from ransomware so they too can laugh at the scammers trying to take company files for a ride.

MoD goes Splunk to advance information as a 'force multiplier'

MoD goes Splunk to advance information as a 'force multiplier'

By

Operational intelligence firm Splunk describes 'full lifecycle' of attacks and advocates analytics-driven security

Swiss defence contractor hacked, details released

Swiss defence contractor hacked, details released

By

The details of a years long campaign against a Swiss defence contractor have been released in partnership with Swiss CERT.

A synchronised approach to security

A synchronised approach to security

Without synchronised security, information system controls don't talk to each other, so can't work together to react to threats says John Shaw, advocating a more joined-up approach to security to defend against attacks.

Singtel opens unique cyber-security institute in Asia-Pacific

By

Singapore Telecommunications (Singtel) has opened a new facility to help enterprises enhance cyber-security skills and test their networks in dealing with cyber-threats.

IT pros lack key info to defend against cyber-attacks

By

To quickly detect an occurring cyber-attack on endpoints, there are seven important security controls required to be put in place by a wide variety of security regulations.

Russia to spend $250m strengthening cyber-offensive capabilities

Russia to spend $250m strengthening cyber-offensive capabilities

By

Russia fires a warning shot across the US bows in response to the 'US offensive cyber-threat,' saying that it does not lag behind the US when it comes to cyber-technology, noting that its hackers are among the best.

Video: Young and gifted codebreakers compete in cyber-security masterclass final

Video: Young and gifted codebreakers compete in cyber-security masterclass final

By

Forty-two young codebreakers competed Friday in a realistic cyber-security simulation, designed to unearth hidden talent and find tomorrow's cyber-security experts.

Only a matter of time before cyber-attack hits broader finance

By

Ireland's Central Bank's deputy governor, Cyril Roux, has warned that it may only be a matter of time before a cyber-attack builds a problem that descends across the broader financial industry.

Incident response - time is of the essence

Incident response - time is of the essence

Cyber-attacks are a top threat to organisations today; however, despite an increased effort to keep up with the rising scale and complexity of threats, IT teams are struggling to defend their networks, says Mike Smart.

Russian defence sector could lose access to Western software

Russian defence sector could lose access to Western software

Russians concerned that sanctions could hit support for and even supply of Western software used in its defence sector.

Organisations are compromised - time to Respond!

Organisations are compromised - time to Respond!

In the wake of successful cyber-attacks, and security incidents taking down some of the biggest brands on the planet, impacting critical infrastructure and banking systems alike, it may be asserted that, when it comes to technology, by evidenced implication, it would seem to be exposed, fragile and vulnerable.

Five steps to creating a secure software defined environment

Five steps to creating a secure software defined environment

Security is needed everywhere within the software-defined data centre as physical security is no longer an adequate defence against current threats says Dr Gerhard Knecht.

Rocket Kitten phishing with woollen goldfish & GHOLE

Rocket Kitten phishing with woollen goldfish & GHOLE

Rocket Kitten hackers are spear-phishing in Germany and Israel using GHOLE and woollen goldfish attacks hosted on Microsoft products.

Security agencies - increase powers, tech and oversight

Security agencies - increase powers, tech and oversight

By

Foreign Secretary Philip Hammond called for the security agencies to be given the powers and technology needed to match the foes they face - while subject to parliamentary oversight.

Turning the tide on APTs and nation state attackers

Turning the tide on APTs and nation state attackers

Deal with APT intruders logically, not emotionally, and get the upper-hand - even if that means leaving them on the network says Mike Auty,

National Control Centre designed to ensure Russian IT security

National Control Centre designed to ensure Russian IT security

A new National Control Centre of Defence is intended to combat cyber-threats targetting Russia and its governmental websites.

Europol plans more malware 'takedowns'

Europol plans more malware 'takedowns'

By

Europol agency EC3 is partnering with Zeus and CryptoLocker threat specialist AnubisNetworks, as it bids to make take-downs more successful.

Cool in a crisis

Cool in a crisis

Learn from the misfortunes of your peers and prepare to defend against repeat use of the same cyber-attack techniques as part of your defence planning advises David Stubley.

Critical National Infrastructure: how to reduce industrial-scale risk

Critical National Infrastructure: how to reduce industrial-scale risk

Nation-state attacks on CNI will be faciliated by the internet of things, and government regulation is needed to set standards, but the actual likelihood of CNI attacks remains very low says Raimund Genes.

Pitty Tiger APT exploits older version Office flaws

Pitty Tiger APT exploits older version Office flaws

By

The Pitty Tiger APT has been targeting telcos, defence companies and at least one government in a cyber-espionage campaign that relies on spear phishing and malware prying on vulnerabilities in Microsoft Office.

Hackers winning says US Secret Service

Hackers winning says US Secret Service

By

But there are viable defence solutions say the security experts...

'Take responsibility for your own security' - IFG

'Take responsibility for your own security' - IFG

By

Information sharing, responsibility for security, and the balance between the state and the individual were among topics covered by the International Fraud Group forum.

SC Webcasts UK

Sign up to our newsletters

FOLLOW US