Information Security no longer the Department of “NO”

Information Security no longer the Department of “NO”

| | CISO, Infosec, management
The information security function within business has gained the rather unfortunate reputation for being the department of “no”, often viewed as a blocker to IT innovation and business transformation. A department seen as out of touch with genuine business needs, and with the demands of evolving workforce demographic of increasing ... Read More
43% of Cybercrimes Target Small Businesses - Are You Next?

43% of Cybercrimes Target Small Businesses – Are You Next?

Cybercrimes cost UK small companies an average of £894 in the year ending February of 2018. Small businesses are an easy target for cybercrooks, so it little surprise that around about 43% of cybercrime is committed against small businesses. According to research conducted by EveryCloud, there is much more at ... Read More
The Emergence of Geopolitical Fuelled Cyber Attacks

The Emergence of Geopolitical Fuelled Cyber Attacks

A new breed of cyberattack is emerging into the threat landscape, fuelled by geopolitical tension, there has been a rise in stealthy and sophisticated cyber attacks reported within recent industry reports. Carbon Blacks 2019 Global Threat Report, released on Wednesday (23/1/19), concluded global governments experienced an increase in cyberattacks during ... Read More
Is AI the Answer to never-ending Cybersecurity Problems?

Is AI the Answer to never-ending Cybersecurity Problems?

Paul German, CEO, Certes Networks, talks about the impact and the benefits of Artificial Intelligence(AI) driven cybersecurity. And how AI adoption is helping organisations to stay ahead in the never-ending game that is cybersecurity.Artificial Intelligence (AI) isn’t going anywhere anytime soon. With 20% of the C-suite already using machine learning ... Read More
The Biggest Data Breaches of 2018

The Biggest Data Breaches of 2018

| | Data breach
Online security label manufacturer Seareach.plc.uk who specialise in asset labels and asset tracking, has collated some of the biggest data breaches of 2018.February150 million MyFitnessPal app users had their details leaked in a data breach including usernames, email addresses and passwords.MarchOrbitz had 880,000 customers payment card details, stolen by a ... Read More
Microsoft Windows 7 & Windows 2008 End of Life

Microsoft Windows 7 & Windows 2008 End of Life

Microsoft Windows 7 and Windows Server 2008 End of Life is fast approaching. 'End of Life' is the point where the operating system will be no longer supported with security patches, unless you (as a business) take out a rather expensive extended warranty agreement with Microsoft.As a home user, you ... Read More

Cyber Security Conferences to Attend in 2019

A list of Cyber and Information Security conferences to consider attending in 2019. Conference are not only great places to learn about the evolving cyber threat landscape and proven security good practices, but to network with industry leading security professionals and likeminded enthusiasts, to share ideas, expand your own knowledge, ... Read More
What does Cybersecurity have in store for 2019?

What does Cybersecurity have in store for 2019?

A guest article authored by Tom Kellermann, Chief Cybersecurity Officer, Carbon BlackIn every intelligence industry there’s often a central aim: predicting the future. We collect and analyse, dissect and interpret, looking for that essential nugget that will give us the edge over our adversaries by indicating what they’ll do next ... Read More
Cyber Security Roundup for December 2018

Cyber Security Roundup for December 2018

The final Cyber Security Roundup of 2018 concludes reports of major data breaches, serious software vulnerabilities and evolving cyber threats, so pretty much like the previous 11 months of the year.5.3 millions users of "make your own avatar" app Boomoji had their accounts compromised, after the company reportedly didn't secure ... Read More
Cyber Security Predictions for 2019

Cyber Security Predictions for 2019

A guest article authored by Jim Ducharme, Vice President of Engineering and Product Management at RSA1. Prepare for IOT, the “Identity of Things”From personal assistants, to wearables, smartphones, tablets and more, there is no shortage of connected devices. The explosion of IOT has finally reached a tipping point where the ... Read More