As the threat from Putin's Russia escalates, the West is bracing itself for further cyber-attacks and disinformation campaigns. How sophisticated are its cyber-offensive capabilities and how might they be used?
What do cybersec professionals need to know to build a cyber-business? Guidance from one of the UK's leading cyber-security accelerators.
UK police are secretly deploying technology which allows them to download all of the content and data from someone's phone on a questionably legal basis due to a lack of clarity in the law, according to a recent report.
The UK is responding to finding itself in conflict with Russia by flaunting its cyber-skills and promoting exports to its allies with a new cyber security export strategy.
There's no need to update valid technologies unless the cost of maintaining them outweighs the upgrade cost. Take into account some legacy systems can increase your vulnerability if not designed for the current threat landscape.
Phishme announced that it has been acquired by a consortium of private equity firms and has changed its name to Cofense.
Competition clash: Cyber 9/12, the UK's first cyber-policy & strategy competition, & Cyberthreat 2018 where competitors gain elite technical skills, showcase breadth of talent and expertise needed to cope with the threats faced.
The government is making £50,000 cyber-security training grants available, and separately it has invested £1.8 million in 'innovative' machine learning technologies that will help improve threat detection capabilities at airports.
Core Security issued an advisory for multiple vulnerabilities it found in Kaspersky Labs' Secure Mail Gateway that if left unpatched could lead to administrative account takeover.
The issue with manual patching it that it is very time consuming and vulnerabilities can be missed due to human error. Organisations can combat these issues by delegating the task to technology.
A handful of tech companies have given a Russian defence agency the opportunity to sort the source code of their software, to uncover vulnerabilities that the Russians say could be exploited by bad actors.
Many organisations need to implement technology upgrades and end-to-end protection to assist them in meeting GDPR's data privacy requirements.
A higher percentage of girls are taking A-levels in the three sciences, technology and maths, yet they are still avoiding going on to study the same subjects at university, a study of 100,000 sixth formers by The Times has found.
Tech moves fast, but cryptography - the field which holds it all up - runs at a decidedly slower pace, marking its breakthroughs in years, not quarters. With something so inherently important, why would it be so slow to evolve?
A GulfTech researcher spotted multiple vulnerabilities In Western Digital's MyCloud products, some of which could lead to remote code execution and unauthorised access.
The Internet of Things (IoT) is set to revolutionise the farming and agricultural sector, but many agritech companies are concerned by the cyber-threats associated with the technology.
A new Kaspersky Lab report states that the company's threat detection technologies identified an average of 360,000 malicious files per day in 2017, an 11.5 percent increase over the previous year, and a five-fold increase since 2011.
A tech CEO noticed the free Wi-Fi at his local Starbucks didn't exactly come without a price after discovering the network was secretly jacking his computing power to mine crypto-currency.
A vulnerability found in two keyless entry door locks enables local attackers to lock and unlock doors as well as create their own RFID badges by sending unauthenticated requests to affected devices.
Implementing the best defences, tools, process and technology can help mitigate an attack and quicken time to remediation. It's important to think about not only the tools, but the process, people, intelligence and technology.
The UK Chancellor Philip Hammond, announced his autumn budget today, and while it was a pro-tech budget, he had nothing to say specifically about cyber-security, hence the industry has had a lot to say about his plans.
Senior leadership should pursue stronger business outcomes. Theresa Grafenstine says that becomes a much smoother proposition when at least one board member - ideally several - have expertise in governance of technology.
Has the one-armed bandit met its match in the sophisticated cyber-thief?
GDPR - Process change is just the beginning, but more interestingly we will see new technologies and use-cases being born and blossom that we can't yet imagine says Todd Ruback.
Email fraud can only be solved using technology to improve what is, and always has been, an inherently unsafe communication method says Nick Yarham. Remove threats & halt fraudulent attempts before they reach the end user.
Google will start shaming websites for not encrypting connections between the user and the site itself by telling users exactly when they are visiting HTTP sites
Research from security company Okta is claiming that companies which aren't agile on technology upgrades are putting themselves at risk of cyber-attacks.
A trio of students from St Petersburg State University in Russia have been dubbed world champions in the 40th annual ACM International Collegiate Programming Contest (ICPC) finals.
Chief constable Stephen Kavanagh tells techUK's Partners Against Crime seminar that the police need to engage more effectively with the private sector in developing new crime fighting capabilities.