Cyber Security
Firmware weakness exposes encryption keys
Consultants from cyber security provider F-Secure have discovered a weakness in modern computers that attackers can use to steal encryption keys and other sensitive information. The discovery has compelled the researchers to warn PC vendors and users that current security measures aren’t enough to protect data in lost or stolen laptops.
ISECOM STAR security certification achieved
The remote management solution, eWON Argos, from HMS Industrial Networks, is now ISECOM STAR security certified. The eWON Argos remote management service is an important part of the eWON remote solutions from HMS Industrial Networks.
Successful threat intelligence saved average of £6m
Intelligence-driven security platform provider, ThreatConnect, has released the survey, ‘Building a Threat Intelligence Programme’, which reports that cybersecurity decision makers within organisations with mature threat intelligence programs (70%) say the infrastructure has blocked threats to the business that would have otherwise cost on average, an estimated £6m in the last year.
Most WiFi solutions can’t automatically detect all threats
The new Trusted Wireless Environment framework has been launched by WatchGuard Technologies, which helps businesses and solution providers to build WiFi services that offer high performance, scalable management and verified, comprehensive security. This new initiative seeks to upset the status quo in the wireless market, which has prioritised performance over security.
Protect yourself, your devices and your home
The era of protecting everything that goes online is here. F-Secure TOTAL has been expanded to provide premium cyber security to anyone who uses the internet, their devices and their homes. The new F-Secure cyber security offering for consumers combines connected home protection and password management with internet security and a consumer virtual private network.
Protecting infrastructure from cyber attack
In October 2016, the UK government launched the National Cyber Security Centre (NCSC) aimed at enhancing the country’s ability to deal with cyber threats. The move outlined the growing importance of cybersecurity in both the private and the public sector. Here, Nick Boughton, Digital Lead at Boulting Technology, shares his advice for making critical infrastructure more secure.
Dual-use commercial tech creates significant growth opportunities
Frost & Sullivan’s recent analysis, US DoD Cybersecurity Market, Forecast to 2023, reveals that intense attacks from adversaries and non-state actors are compelling Department of Defense (DoD) cybersecurity spend for commercial off-the-shelf (COTS)-based cybersecurity tools and systems and the development of quantum computing and artificial intelligence technologies. Defense cybersecurity industry consolidation is expected to increase w...
Keeping up with the changing face of security
We have been lucky in 2018 after the terror that tore across Europe and the UK in 2016 - 2017 with vehicle, knife and bomb attacks happening in Nice, London Bridge, Westminster, Manchester and Barcelona. These are just a few of the places left reeling from a wave of extremism targeting people going about their normal lives and enjoying themselves. The often crudeness of the weaponry used belies the sophistication of many of the attacks. By Phili...
Act efficiently to identify malicious actors targeting networks
Provider of the industry's extensible, intelligence-driven security platform, ThreatConnect, has announced its integration with Dragos WorldView intelligence, which delivers critical insight about threat activity groups specifically targeting industry control networks (ICS) worldwide.
Security research reveals password inadequacy still a top threat
New research from the WatchGuard Threat Lab shows the emergence of the Mimikatz credential-stealing malware as a top threat and the growing popularity of brute force login attacks against web applications. The research also reveals that 50% of government and military employee LinkedIn passwords, largely from the US, were weak enough to be cracked in less than two days.