Sunday , 23 September 2018
Home >> S >> Security Technology (page 4)

Security Technology

Irwin Mitchell LLP selects Darktrace for cyber-threat monitoring

Law firm Irwin Mitchell LLP has deployed security software provider Darktrace’s “enterprise immune system” solution to monitor and control cyber threats. The UK law firm has 11 offices and employs over 2,400 people across the country. It provides a range of private client and business legal services to private individuals, businesses, charities and organisations. Related articles It had been looking ... Read More »

Privacy and security in the cloud are not the same thing

Education WLAN Buyers Guide 2016 While connectivity has become an expectation for students, and provides a platform for digital learning, the increased number of mobile devices in the classroom also represents many challenges that IT departments are continually facing. How do you achieve the required levels of visibility, capacity, and control, without overburdening both your users and IT department? Download Read More »

Over half of UK banks have insecure SSL implementations associated with login functions

More than half of the UK’s retail banks have insecure instances of SSL, which are associated with supposedly “secure” login functions, making it easier for cyber criminals to get their hands on financial data.   Global security firm Xiphos Research looked into UK high street banks and building societies and their implementations of SSL certificates, particularly in relation to their ... Read More »

UK’s critical infrastructure could be taken out by hackers, warns expert

There’s no reason to believe the UK critical infrastructure couldn’t be taken down by a cyber attack because modern networks haven’t been designed with security in mind, an expert has warned. Dr Kevin Curran, senior member of Institute of Electrical and Electronics Engineers (IEEE) and security lecturer at Ulster University, issued the warning following reports that hackers used malware to ... Read More »

AVG puts Chrome users at risk with security-compromising browser extension, says Google

Web security firm AVG has come under fire from Google, accused of offering a Chrome browser extension that directly compromises security. The ironic accusation came from an employee of Google Security Research, who reported AVG’s “AVG Web TuneUp” Chrome extension – which apparently now has almost nine million active users – after concerns the extension could be used to remotely ... Read More »

Juniper silent on claims that China was the source of compromise in ScreenOS

The top 10 UK data-breach stories of 2015 Read More »

The top cyber security myths

Can customers in the cloud attack each other? Can cloud users control their own data? Will cloud providers disclose your content? Worldpay’s DevOps lead, Miroslav Danov, answered all three questions at Computing‘s Enterprise Security and Risk Management 2015 today. Danov began by making a general point about security: it doesn’t matter what rules you follow, the risks are the same. ... Read More »

Cyber security skills gap: ‘Pay more and the problem will go away,’ says Reuters IT security chief

The IT security “skills gap” could quickly be narrowed by simply paying security staff more, according to Thomson Reuters’ senior information security architect, Andy Boura, speaking on a panel at Computing’s Enterprise Security and Risk Management 2015 summit yesterday. Furthermore, he argued, organisations could – indeed, should – help ordinary IT staff to upskill so that they can shift into ... Read More »

Irwin Mitchel LLP selects Darktrace for cyber-threat monitoring

Yes, Trident really could be vulnerable to a cyber attack, warn experts Read More »

ISIL ‘doing their best’ to use the internet to kill UK citizens, warns Osborne as he pledges to double cyber crime funding

ISIL is planning cyber attacks to directly threaten human lives, Chancellor George Osborne has said today, prompting a doubling of UK cyber crime funding to £1.9bn a year by 2020. “The stakes could hardly be higher. If our electricity supply or our traffic control, or our hospitals are successfully attacked online, the impact could be measured not just in terms ... Read More »

==[ Click Here 1X ] [ Close ]==