Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2016-10-11 04:21:32 |
Middle East CISO Council CEO warns of global cyber security storm (lien direct) |
Cyber security issues will be a major theme at this month's GITEX Technology Week 2016 conference in Dubai |
|
|
|
|
2016-10-10 09:23:16 |
(Déjà vu) Security Think Tank: Phishing: protect, educate and limit damage (lien direct) |
What are the most effective types of security controls and end user training approaches to dealing with phishing? |
|
|
|
|
2016-10-10 09:00:46 |
Singapore: a nation united on its digital future (lien direct) |
Singapore is setting itself to be a leader in the digital age, with a reorganised government department the protagonist |
Guideline
|
|
|
|
2016-10-10 05:04:53 |
Smartwatches banned from UK Cabinet as EC plans IoT security standards (lien direct) |
The EC is planning a security certification scheme for internet of things devices as the UK Cabinet bans smartwatches amid heightened fears of cyber espionage |
|
|
|
|
2016-10-10 04:30:29 |
(Déjà vu) Security Think Tank: Four key elements to defending against phishing attacks (lien direct) |
What are the most effective types of security controls and end user training approaches to dealing with phishing? |
|
|
|
|
2016-10-07 07:21:45 |
Security industry failing users, says behaviour expert (lien direct) |
The information security community is failing to educate users in a way that helps then understand cyber threats and change their behaviour, according to consultant Jessica Barker |
|
|
|
|
2016-10-07 05:00:42 |
London police charge third member of ATM hacking gang (lien direct) |
London police arrest and charge a third man suspected of being involved in a series of ATM thefts across the UK in 2014 using malware to bypass security controls |
|
|
★★★
|
|
2016-10-06 10:30:08 |
(Déjà vu) Security Think Tank: Combine technology and communication to combat phishing risks (lien direct) |
What are the most effective types of security controls and end user training approaches to dealing with phishing? |
|
|
★★★
|
|
2016-10-06 09:00:29 |
NSA contractor arrest for spying underlines insider threat (lien direct) |
Malicious insiders are still one of the biggest threats and a popular means of data theft, according to famous spy catcher Eric O'Neill and other security industry experts |
|
|
★★★★
|
|
2016-10-06 04:30:42 |
Terror groups likely to be first to unleash cyber weapons, says Eugene Kaspersky (lien direct) |
Terror groups are more likely than nation states to unleash cyber weapons and critical infrastructure is the most likely target, warns Kaspersky Lab chief |
|
|
|
|
2016-10-06 04:00:38 |
(Déjà vu) Security Think Tank: Three-pronged approach to phishing prevention (lien direct) |
What are the most effective types of security controls and end user training approaches to dealing with phishing? |
|
|
|
|
2016-10-05 11:15:32 |
TalkTalk hit by record £400,000 fine over data breach (lien direct) |
The Information Commissioner's Office issues its largest ever data protection fine after more than 150,000 customers had their data exposed by TalkTalk breach |
|
|
★★
|
|
2016-10-05 08:15:00 |
IoT security threat is real, says researcher (lien direct) |
The security threat posed by IoT devices is not hype, says security researcher James Lyne |
|
|
★★★
|
|
2016-10-05 06:00:11 |
Birmingham Uni beefs up network automation, virtualisation to support research (lien direct) |
The University of Birmingham has deployed a Brocade switching infrastructure and network virtualisation to support the needs of its research teams |
|
|
|
|
2016-10-05 05:30:28 |
SMEs are the Achilles heel for Asean security (lien direct) |
Small to medium-sized enterprises in the Asean region will be gateways to large enterprises for cyber criminals unless they improve their security |
|
|
|
|
2016-10-05 04:30:11 |
(Déjà vu) Security Think Tank: Making a game of phishing (lien direct) |
What are the most effective types of security controls and end user training approaches to dealing with phishing? |
|
|
|
|
2016-10-04 11:15:57 |
Look to over-the-top services to secure mobile, says specialist (lien direct) |
Mobile network operators should look to 3G and 4G while enterprises should consider OTT services to provide the best security, says telecommunications industry veteran and pioneer Charles Brookson |
|
|
★★
|
|
2016-10-04 09:00:35 |
Mastercard rolls out selfie payments in UK (lien direct) |
Financial services provider Mastercard announces its cardholders in the UK will be able to use a selfie as authentication to pay for goods |
|
|
|
|
2016-10-04 04:30:46 |
Mirai IoT botnet code release raises fears of surge in DDoS attacks (lien direct) |
Organisations with an online presence should prepare for terabit-class IoT botnet-based DDoS attacks that could knock almost any business offline or disable chunks of the internet, warn security experts |
|
|
|
|
2016-10-03 12:00:19 |
Time to move on with social engineering training, says Jenny Radcliffe (lien direct) |
Organisations need to move from awareness of the risk of social engineering to empowering employees to understand and recognise the threat to protect themselves and the company, says Jenny Radcliffe |
|
|
★★
|
|
2016-10-03 10:30:19 |
19 local councils sign up for Gov.uk Verify trials (lien direct) |
GDS will lead pilots of using identity assurance system for local authority digital services |
Guideline
|
|
★★★★★
|
|
2016-10-03 02:26:51 |
Security Think Tank: Phishing awareness a key element of a security positive culture (lien direct) |
What are the most effective types of security controls and user training approaches for dealing with phishing? |
|
|
|
|
2016-09-30 11:00:15 |
CISOs need to be more business-focused, says Publicis CISO (lien direct) |
Information security leadership is about politics, getting a place at the top table and showing what security can do for the business, according to Publicis CISO Thom Langford |
Guideline
|
|
|
|
2016-09-30 06:00:08 |
Brexit has thrown ICO plans into flux, admits information commissioner (lien direct) |
The ICO is working to ensure that the UK's post-Brexit data protection law is progressive, stands up to scrutiny and provides stability, says information commissioner Elizabeth Denham |
|
|
|
|
2016-09-29 11:34:33 |
NGOs challenge UK and US mass surveillance in human rights court (lien direct) |
Privacy International, Liberty and the American Civil Liberties Union are among 10 human rights groups backing a landmark challenge to mass surveillance in the European Court of Human Rights |
|
|
★★★★
|
|
2016-09-29 10:31:40 |
Breaches should be on the decline by now, says infosec veteran John Walker (lien direct) |
A focus on the board, governance and compliance is distracting many infosec leaders from the real objective of security data, says John Walker |
Guideline
|
|
|
|
2016-09-29 07:00:34 |
Trust issues stifling digital economy growth, study shows (lien direct) |
Businesses that have products and services based on trust have a significant opportunity to future-proof their business, but those who do not risk being side-lined, a study shows |
|
|
|
|
2016-09-28 10:45:22 |
NHS Digital aims to put healthcare on firm cyber security footing (lien direct) |
NHS Digital set to work closely with National Cyber Security Centre (NCSC) to boost healthcare sector cyber security capabilities |
|
|
|
|
2016-09-28 06:33:23 |
UK National Cyber Security Centre set to launch (lien direct) |
NCSC is due to launch officially on 1 October 2016 and will help the healthcare sector deliver consistent quality of data security |
|
|
|
|
2016-09-27 09:07:14 |
Lax perimeter security exposes bank to hacker extortion attempt (lien direct) |
Failure to follow standard network security best practice has exposed a Californian investment bank to cyber criminals' demands |
|
|
|
|
2016-09-27 08:45:19 |
Yahoo breach underlines need for Security Serious Week (lien direct) |
The recently disclosed Yahoo data breach shows that no business is immune, underlining the need to raise awareness and improve practices, say the organisers of Security Serious Week |
|
Yahoo
|
|
|
2016-09-27 00:00:00 |
Adrian Davis discusses the evolution of security in the age of IoT (lien direct) |
Cloud computing and the internet of things will have a major impact on how security is implemented going forward. |
|
|
★★★★
|
|
2016-09-26 10:30:26 |
Yahoo sued over data breach (lien direct) |
Yahoo is facing a class action lawsuit that alleges that the internet firm showed a reckless disregard for the security of its users that resulted in a breach affecting half a billion people |
|
Yahoo
|
|
|
2016-09-26 05:45:32 |
Yahoo security still poor despite massive breach, claims Venafi (lien direct) |
Yahoo is likely to have been a victim of its own encryption and security is still poor despite the huge breach that hit the company in 2014, according to security firm Venafi |
|
Yahoo
|
|
|
2016-09-26 05:15:54 |
Apple to fix backup security vulnerability in iOS 10 (lien direct) |
Apple is to issue a security update for a security vulnerability in iOS 10 that could give hackers access to passwords and other security data |
|
|
|
|
2016-09-25 19:05:40 |
Australia must take cyber security opportunity (lien direct) |
Australia may never be able to create an IT industry like that in the US, but it can lead in cyber security |
Guideline
|
|
|
|
2016-09-23 05:45:25 |
Yahoo under fire over data breach affecting 500 million users (lien direct) |
Yahoo comes under fire for not detecting and notifying users sooner of the biggest breach of personal details to date |
|
Yahoo
|
★★★★
|
|
2016-09-22 13:53:57 |
Investigatory Powers Bill – the case for mass surveillance (lien direct) |
As the Investigatory Powers Bill goes through its final stages in Parliament, a former GCHQ intelligence officer puts the case for the bulk surveillance powers contained in the legislation |
|
|
★★★
|
|
2016-09-22 04:15:09 |
Cyber attack aimed at destruction, says TV5Monde (lien direct) |
TV5Monde counting the cost of not being adequately prepared for a cyber attacked that downed the network in 2015 |
|
|
|
|
2016-09-21 19:00:30 |
Many don\'t test disaster recovery plans properly, survey finds (lien direct) |
Nearly 40% of UK organisations do not test disaster recovery plans properly, mainly because of concerns about disruption to production operations |
|
|
★★★
|
|
2016-09-21 10:42:46 |
London Capital Group improves service deployment with SDN (lien direct) |
Online trading firm has revitalised its service delivery after switching a legacy physical network for VMware NSX SDN |
|
|
★★★★
|
|
2016-09-21 09:45:32 |
$81m cyber heist highlights gap between attacker and defenders, says Swift (lien direct) |
Secure messaging service Swift was surprised by the gaps in banks' cyber security practises highlighted by mega cyber heist, says CISO Alain Desausoi |
|
|
|
|
2016-09-21 02:21:17 |
Qadars Trojan gears up to target UK banks (lien direct) |
Advanced Trojan that has been targeting different regions is now preparing to hit UK banks, according to IBM X-Force Research |
|
|
|
|
2016-09-20 09:45:20 |
Business warned not to be complacent about cyber security (lien direct) |
Lloyds of London survey reveals just how badly some European firms are failing in terms of cyber security and low levels of awareness about the role of cyber insurance |
|
|
|
|
2016-09-20 05:00:16 |
Cyber security a key feature of US rules on self-driving cars (lien direct) |
The US government publishes a policy aimed at ensuring the safety of self-driving cars |
|
|
|
|
2016-09-19 09:04:15 |
Consumers trust banks more than government for biometric security (lien direct) |
UK citizens think banks are the best organisations to provide biometric authentication for payments |
|
|
|
|
2016-09-16 09:00:25 |
Alleged hacker Lauri Love can be extradited to the US, court rules (lien direct) |
Westminster Magistrates' Court has ruled that alleged hacker, Lauri Love, can be extradited to the US, where he could face a 99-year prison sentence |
|
|
|
|
2016-09-16 05:15:21 |
Lauri Love: the student accused of hacking the US (lien direct) |
How did a brilliant but fragile teenager from a rural English town end up facing life imprisonment in the US? Computer Weekly speaks to Lauri Love |
|
|
|
|
2016-09-16 00:00:00 |
Lauri Love - my battle with extradition (lien direct) |
A court ruled today that Lauri Love, a 31-year old electrical engineering student, from Suffolk, can be extradited to the US to face hacking charges. |
|
|
|
|
2016-09-15 05:53:35 |
Cabinet Office role in information security in government not clear (lien direct) |
The UK government has work to do to reduce complexity of security policies, according to the NAO |
|
|
|