Cyber Security
Mobile solutions for friendlier yet secure border control
Across the Member States, border control authorities are hard-pressed to both enforce security and facilitate mobility within the EU. Advanced mobile solutions are slated to help facilitate non-intrusive border crossing for legitimate travellers while guarding against illegal and threatening cross-border activities.
WiFi - the most important communications platform
Richard Edgar, Director of Communications, Ensigma, from Imagination Technologies has commented on the recent news of the WiFi Krack vulnerability.
Calling time on insecure connected toys
In a statement released today, independent consumer body Which? has called for all insecure connected toys to be removed from sale immediately. Which? has expressed its frustration with toy manufacturers that have failed to address vulnerabilities highlighted by researchers, in internet or Bluetooth connected products and believe that enough is enough.
Next-gen UAVs – enter the dragonfly
Working from its Laboratory at Begbroke Science Park, Oxford, the core of the business of Animal Dynamics is to harness a deep understanding of movement in animals to create more efficient and powerful systems capable of performance beyond anything currently found in nature or engineering.
Black Duck acquisition to strengthen Synopsys
Synopsys and Black Duck Software have signed a definitive agreement for Synopsys to acquire privately held Black Duck, provider of automated solutions for securing and managing open source software. The addition of Black Duck's Software Composition Analysis solution will enhance Synopsys' efforts in the software security market by broadening its product offering and expanding its customer reach.
Registrations on the up for youth cyber security competition
Global security company, Northrop Grumman, has launched this year’s CyberCenturion, the UK’s national youth cyber defence competition for 12-18 year olds. A record 575 teams, made up of more 2,500 students, including 116 all-female and 45 cadet teams from across the country have registered to participate, marking a more than threefold increase over last year. This is the fourth consecutive year the CyberCenturion competition has ...
How would your company respond to a cyber ransom attack?
After three years of development, Anquan has launched the CAST (Cyber Attack Survival Training) platform. CAST provides a new concept and approach to address the critical lack of cyber awareness at an executive level within organisations. It exploits immersive educational, exercise and planning techniques and each simulation is delivered by a team of subject matter experts drawn from across government and t...
Cyber attacks are just as damaging as natural disasters
Acording to a new EY report, Risk Pulse: Navigating the power and utilities sector in transformation, which ranks the strategic, financial, operational and compliance risks across the sector, cyber attacks are among the top risks to power and utilities companies alongside natural disasters such as storms and catastrophic events.
Partners provide secure eSIM solutions for Windows 10 devices
eSIM management and secure connectivity company, G+D Mobile Security, has announced its partnership with Microsoft to release an eSIM solution for Microsoft Windows 10. This partnership introduces an end-to-end (E2E) eSIM Management solution which will largely redefine the consumer connectivity experience with Microsoft Windows devices.
Whitepaper maps the risks of quantum attacks for Bitcoin
Combining expertise in quantum technologies and cryptography, researchers have been projecting future dates that quantum computers could jeopardise the security of current cryptocurrencies, a market now worth over USD $150 billion, and assessing countermeasures to such attacks.