Featured

The latest collection of expert opinions, news analysis and featured contributions from the IT security community

Neil Kell

As digital footprints widen and the value of data increases, so too does the risk for organisations. The latest Cyber Security Breaches survey reported that 43 per cent of UK businesses experienced a breach in the previous 12 months. This figure rises to 65 per cent in medium to large businesses. No sector is immune from cyber attacks and the increasing level of sophistication means that they present some of the most the most strategically...

Read more
Cloud

  Load balancing of application traffic has been around for a long time. But, as more organisations move to the private and public cloud, it’s undergoing significant changes. Let’s look at some of the important considerations of this evolving technology. Three major requirements underline IT operations and DevOps today: agile, efficiency and, multi-cloud operations. Agile: The movement toward public cloud is arguably driven by an organisation’s desire to deliver more functionality faster. Public clouds like...

Read more
Combatting The Cyber Threat To The UK Legal Sector.

Cyber crime remains one of the foremost risks to the legal sector. Targeted attacks against firms are on the rise, with 60% of law firms reported to have suffered an information security incident during 2018, and in 2017 alone, £11million of client money was taken. The threat is greater for larger firms, with 90% of the top 25 law firms and 73 of the top 100 having experienced a threat. The primary threats to the...

Read more
Fujitsu Consigns Passwords To History With New PalmSecure Biometric Offering.

Fujitsu today launches a new, extended range of PalmSecure-based biometric security solutions that consigns passwords to history by making biometric ID easy to use across a wide variety of day-to-day applications. Available immediately to customers in Europe, the Middle East, India and Africa, the expanded Fujitsu PalmSecure offering comprises four main elements1: Fujitsu Biometric Authentication PalmSecure ID Engine, ID GateKeeper, ID LifePass and ID Login V2 for access to client computing, physical access to buildings...

Read more
Survey Data: Safety Fears Over Use Of Robots In Medical Procedures.

Only 9% of people would prefer to undergo surgery carried out by a robot surgeon compared to a human, despite recent advances in technology that have led to a rise in the use of robotics in a medical setting. This is according to a new survey, conducted by specialist distributor of industrial components Northern Connectors, which found 51% of people would still favour a human surgeon, as opposed to a robotic device. The survey, which...

Read more
The EU Cybersecurity Act: What Is It And What Does It Mean For Europe?

The European Union’s Cybersecurity Act is a key step in establishing the regulatory frameworks and certification schemes necessary for developing cyber-resilience. In addition, the Act also provides for a permanent mandate and more resources for the EU Cybersecurity Agency, ENISA. In his 2017 State of the Union Address, President Jean-Claude Juncker said: “In the past three years, we have made progress in keeping Europeans safe online. But Europe is still not well equipped when it...

Read more
Brits Still Prefer Using Passwords Over Biometrics To Log In.

30% of people say that typing in a password is still their preferred method of logging in to their online accounts according to a survey of 1,050 people in the UK carried out by email services company GMX. Compared to a similar GMX survey in 2016, this number has almost halved from 61%. Despite this, alternative login methods have not yet become widely accepted. The most favoured biometric authentication method in 2019, fingerprint recognition, is...

Read more
security, hipster computer user

Cloud infrastructure presents new risks, new systems, and less control for security teams that are already overwhelmed by security alerts, manual processes and siloed security tools that complicate decision-making and the hand-off of remediation to IT counterparts. To help solve this challenge, ServiceNow, the digital workflow company that creates great experiences and unlocks productivity, has extended its security operations portfolio with the release today of two integrations with AWS Security Hub. ServiceNow is aligned with AWS’s strategy...

Read more
Anthony Perridge

By Anthony Perridge, VP International, ThreatQuotient In 2017, the value per Bitcoin reached over €20,000 (£17,324) - a climax in the hype surrounding the cryptocurrency. However, confidence has been lacking for the price to remain stable. To date, online currencies are more speculation than real means of payment as concerns around security are being raised. An establishment is only possible if users believe in the value’s sustainability, and this applies to every means of payment....

Read more
DDoS

Key Takeaways: A new UDP reflection/amplification DDoS vector is observed in the wild. The surprising nature of the abusable reflectors/amplifiers. Recommended DDoS Defense and Best Current Practices (BCPs) for ARMS. Anatomy of a New DDoS Vector One of the ground truths of distributed denial-of-service (DDoS) defense is that literally any kind of packet can be utilized to launch an attack against a host, service, application, or network. And when attackers initially identify a service or...

Read more
Page 12 of 24 1 11 12 13 24