The fact is that 'shoulder-surfing' or 'visual hacking' is a threat to organisational data that is just as serious as any other, and not one to be ignored.
Organisations that operate across the UK and Europe need to make sure they have a strong information-sharing framework in place ahead of March 2019 so that joint operations can withstand any change in national relationships.
Defence Cyber School at the Defence Academy, Shrivenham opens as part of government moves to increase the country's cyber-defence capability - while government restates willingness to use offensive cyber-weapons.
- but rising awareness is not enough to address the cyber-threat. Robust procedures must be put in place to protect data and fulfil organisations' responsibility to customers and staff.
It quickly becomes obvious that traditional methods of data security on their own aren't sufficient to provide complete data visibility, but an effective defence strategy must adequately cover all zones in which data can be accessed.
An Indicator of Compromise is typically observed after an initial attack or compromise, whereas Indicators of attack (IOAs) are events that may reveal an active attack before IOCs become visible.
Russian hacking group Fancy Bear, have exploited weakspots in the email systems of defence contract workers to access top secret information on US defence technology, including drones.
A handful of tech companies have given a Russian defence agency the opportunity to sort the source code of their software, to uncover vulnerabilities that the Russians say could be exploited by bad actors.
Change is afoot in the cyber-security industry - from the shift in reporting styles and measures of success, to the evolving role and responsibilities of the CISO. Here's how this development could transpire in the year ahead.
In a wide ranging interview, Lloyd Rush, UK Cyber Defence Centre manager, Airbus Defence and Space provides SC with insight into the latest attack trends, including fileless, plus the threat of criminal AI use and SOC responses.
US President Donald Trump signed into law the US National Defence Authorisation Act for Fiscal Year 2018, which prohibits US federal use of products and services from Russian-based cyber-security firm Kaspersky Lab.
Several NATO members are contemplating a change in the alliance's doctrine regarding how it might react to future cyber-attacks, possibly enabling a more robust response.
The most fundamental thing new Defence Secretary Gavin Williamson can do is to lead from the front and foster a nationwide culture of resilience, publicly champion government initiatives and share the lessons of best practice.
A manual approach to cyber-defence is no longer sufficient. When technology controls work together and can communicate, IT can let the technology start to make some automated decisions for you explains Steve Mulhearn.
The US Defence Department's vulnerability disclosure programme (VDP) has yielded 2,837 security flaws in the nearly one year since its inception.
IOCs look for specific artifacts that indicate an intrusion whereas Gil Barak explains BIOCs look for specific behaviours that indicate malicious activity, such as the injection of code into memory or a script running within an application.
It's rare that CISOs have a horizontal view across their controls to know where to focus their resources for best overall effect which is why Nik Whitfield says agile analytics is a core capability that security teams already require today.
Con Mallon advises, conduct a compromise assessment based on the assumption that you've already been compromised, then pick the right tools, processes, technology and intelligence to combat that threat.
Concerns around compromise increase among IT pros in the face of major breaches at even the most security aware organisations, highlighting muddled responses to softening perimeter.
Phishing is on an upward trajectory, with a 600% surge in the number of malicious URL emails in Q3 2017. But there are policies and procedures which can be implemented to help prevent users from falling victim to a phishing attack.
Patching and application control should be first on the list to strengthen your organisation against attack, but take a strategic approach, and don't just patch for the latest WannaCry, but for the next big attack too says Amber Boehm.
Newly published research suggests that while there has been a marked increase in spending to mitigate against Distributed Denial of Service (DDoS) attacks, organisations are still falling victim.
30GB of data stolen from a small Australian military defence contractor which included technical information on jet fighters, transport aircraft, 'smart bomb kits.' Culprit, the lone IT technician.
The US government's decision to ban Kaspersky Lab security software raised concerns from users over their own Kaspersky purchases and drew a sharp rebuke from the Kremlin about anti-competitive practices
In addition to intrusion detection and surveillance hardware, technology decision-makers within major cities must consider additional technologies to ensure the hardware and tools themselves are protected says Maya Canetti.
On Tuesday Singapore's armed forces were hit by revelations that the personal data belonging to some 850 servicemen was stolen.
Stephanie Forrest discusses the parallels between computer viruses and biology and how our understanding of them is informing cyber-security.
ViperRat discovered by researchers, designed to exfiltrate data from Israeli Defence Force via Android phones using honey traps.
Submissions are now being accepted for the second annual Defence Innovation Challenge by the NATO Communications and Information (NCI) Agency.