Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2016-09-21 10:42:46 |
London Capital Group improves service deployment with SDN (lien direct) |
Online trading firm has revitalised its service delivery after switching a legacy physical network for VMware NSX SDN |
|
|
★★★★
|
|
2016-09-21 09:45:32 |
$81m cyber heist highlights gap between attacker and defenders, says Swift (lien direct) |
Secure messaging service Swift was surprised by the gaps in banks' cyber security practises highlighted by mega cyber heist, says CISO Alain Desausoi |
|
|
|
|
2016-09-21 02:21:17 |
Qadars Trojan gears up to target UK banks (lien direct) |
Advanced Trojan that has been targeting different regions is now preparing to hit UK banks, according to IBM X-Force Research |
|
|
|
|
2016-09-20 09:45:20 |
Business warned not to be complacent about cyber security (lien direct) |
Lloyds of London survey reveals just how badly some European firms are failing in terms of cyber security and low levels of awareness about the role of cyber insurance |
|
|
|
|
2016-09-20 05:00:16 |
Cyber security a key feature of US rules on self-driving cars (lien direct) |
The US government publishes a policy aimed at ensuring the safety of self-driving cars |
|
|
|
|
2016-09-19 09:04:15 |
Consumers trust banks more than government for biometric security (lien direct) |
UK citizens think banks are the best organisations to provide biometric authentication for payments |
|
|
|
|
2016-09-16 09:00:25 |
Alleged hacker Lauri Love can be extradited to the US, court rules (lien direct) |
Westminster Magistrates' Court has ruled that alleged hacker, Lauri Love, can be extradited to the US, where he could face a 99-year prison sentence |
|
|
|
|
2016-09-16 05:15:21 |
Lauri Love: the student accused of hacking the US (lien direct) |
How did a brilliant but fragile teenager from a rural English town end up facing life imprisonment in the US? Computer Weekly speaks to Lauri Love |
|
|
|
|
2016-09-16 00:00:00 |
Lauri Love - my battle with extradition (lien direct) |
A court ruled today that Lauri Love, a 31-year old electrical engineering student, from Suffolk, can be extradited to the US to face hacking charges. |
|
|
|
|
2016-09-15 05:53:35 |
Cabinet Office role in information security in government not clear (lien direct) |
The UK government has work to do to reduce complexity of security policies, according to the NAO |
|
|
|
|
2016-09-14 06:30:14 |
Crest takes over NSA Cira accreditation (lien direct) |
Crest hopes to grow the accreditation programme into a global initiative to certify cyber response capabilities |
|
|
★★★★★
|
|
2016-09-14 06:02:24 |
WADA condemns Russian hackers for leaking Olympic athletes\' medical data (lien direct) |
The global anti-doping agency confirms attack on database led to leak of data belonging to Olympic athletes |
|
|
★★★★★
|
|
2016-09-14 06:00:50 |
NHS trusts and suppliers not ready for end of N3 network (lien direct) |
Network integrator Updata has warned that NHS organisations and network suppliers must mobilise now to get ready for the transition to the Health and Social Care Network next year |
|
|
|
|
2016-09-13 05:48:33 |
UK SMEs have false sense of cyber security (lien direct) |
Many small businesses have the mistaken impression that they are safe from cyber attacks and the huge damage they can cause |
|
|
|
|
2016-09-13 04:00:20 |
A Good American: a personal take on mass surveillance (lien direct) |
Director Friedrich Moser draws some conclusions on mass surveillance from his groundbreaking documentary on the work of NSA whistleblower, Bill Binney |
|
|
|
|
2016-09-12 07:45:58 |
MaidSafe secure internet concept enters testing phase (lien direct) |
Scottish internet startup MaidSafe brings its vision for a more private and secure approach to the web a step closer to reality |
|
|
|
|
2016-09-09 11:30:08 |
Cloud security processes need to mature, says panel (lien direct) |
Many organisations still need to adapt their business practices to ensure security in the cloud, according to a panel of IT leaders |
Guideline
|
|
|
|
2016-09-09 09:20:19 |
RSA upbeat about future in Dell Technologies (lien direct) |
RSA to maintain its independence, but will benefit from being part of Dell Technologies, says RSA president Amit Yoran |
|
|
|
|
2016-09-08 11:00:56 |
Understanding criminal underground key to defence, says Trend Micro (lien direct) |
Studying criminal undergrounds provides clues as to how to plan cyber defences, says Trend Micro researcher |
|
|
|
|
2016-09-08 08:30:21 |
(Déjà vu) Security Think Tank: Awareness and incident response key to fighting evasive malware (lien direct) |
How can businesses best prepare their cyber defences in light of the fact that attackers are increasingly using malware designed to evade detection and analysis? |
|
|
|
|
2016-09-08 07:40:31 |
RSA\'s mission unchanged by Dell-EMC merger, says Amit Yoran (lien direct) |
It is business as usual, says Amit Yoran, chief of EMC security division RSA, as the company officially becomes part of the newly formed tech giant to be known as Dell Technologies |
|
|
|
|
2016-09-08 06:15:00 |
Enterprise network access policies must change to account for IoT (lien direct) |
With IoT devices set to outnumber notebooks, smartphones and tablets by more than three times, businesses will need to adjust their network access policies to keep things running smoothly, says Gartner |
|
|
|
|
2016-09-08 03:55:47 |
Intel to raise $3.1bn by spinning off security business (lien direct) |
Ending what many saw as an uncomfortable marriage, Intel is to spin off its security business as a standalone pure-play cyber security company |
|
|
|
|
2016-09-07 11:35:00 |
Expanded Security Serious Week returns in October (lien direct) |
The second annual Security Serious Week in October is to include a government-backed conference and an awards ceremony for unsung IT security heroes |
|
|
★★★★
|
|
2016-09-07 11:00:12 |
(Déjà vu) Security Think Tank: Business should assess where to use AI to sniff out smart malware (lien direct) |
How can businesses best prepare their cyber defences in light of the fact that attackers are increasingly using malware designed to evade detection and analysis?
|
|
|
★★★★
|
|
2016-09-07 10:45:22 |
Private encryption key sharing worrying but not new, say security experts (lien direct) |
A study has revealed a 40% increase in the past year in the number of internet-connected devices using shared encryption certificates, highlighting that this security risk of mass hacking is growing |
|
|
|
|
2016-09-07 08:10:45 |
NSA used Iraq war to develop surveillance capability, documents show (lien direct) |
As the controversial Investigatory Powers Bill inches closer to becoming law, NSA documents reveal that the agency used the Iraq war to develop and expand its surveillance infrastructure |
|
|
|
|
2016-09-07 06:00:05 |
Basic security could have prevented OPM breach, says report (lien direct) |
Basic security controls and malware-detection tools could have prevented the breach of more than 21 million records at the US Office of Personnel Management in 2015, claims a congressional report |
|
|
|
|
2016-09-06 19:15:56 |
Identity prominent in Australian security debate (lien direct) |
Identity is at the forefront of the cyber security debate in Australia |
|
|
|
|
2016-09-06 12:00:51 |
Use ransomware to get security buy-in, says Trend Micro CTO (lien direct) |
Ransomware is one of the top cyber threats to business, but organisations should use that to engage stakeholders and review processes and defences, says Trend Micro CTO Raimund Genes |
|
|
|
|
2016-09-06 05:00:21 |
(Déjà vu) Security Think Tank: How to detect the undetectable? (lien direct) |
How can businesses best prepare their cyber defences in light of the fact that attackers are increasingly using malware designed to evade detection and analysis? |
|
|
|
|
2016-09-05 19:15:04 |
Mobile device use feeds card fraud in Asean region (lien direct) |
Card fraud is rising in Asean countries, with the high use of mobile devices a contributing factor. |
|
|
|
|
2016-09-05 10:15:50 |
Simulated cyber attack in London adds finalists to 2016 UK Cyber Security Challenge (lien direct) |
Ten would-be cyber warriors head to the final of the UK Cyber Security Challenge after showing off their skills to prospective employers in dealing with a simulated cyber attack |
|
|
★★★
|
|
2016-09-05 08:15:39 |
(Déjà vu) Security Think Tank: Malware infection is inevitable, so be prepared (lien direct) |
How can businesses best prepare their cyber defences in light of the fact that attackers are increasingly using malware designed to evade detection and analysis? |
|
|
|
|
2016-09-05 06:00:12 |
Microsoft gets wide support in fight against US gagging orders (lien direct) |
Microsoft wins support from a wide range of US organisations in its push back against the secrecy of US government data access requests |
|
|
|
|
2016-09-02 11:45:05 |
Last.FM joins Dropbox in confirming 2012 hack figure (lien direct) |
More than 43 million accounts have been confirmed as compromised in a hack at Last.FM in 2012, underlining the weaknesses of password-based security |
|
|
|
|
2016-09-02 08:15:00 |
(Déjà vu) Security Think Tank: Addressing the malware arms race (lien direct) |
How can businesses best prepare their cyber defences in light of the fact that attackers are increasingly using malware designed to evade detection and analysis? |
|
|
|
|
2016-09-02 05:45:09 |
Crest report outlines ways to address cyber security gender gap (lien direct) |
Report on the causes and potential remedies for addressing the gender gap in cyber security is aimed at stimulating debate and co-operation in the industry |
|
|
|
|
2016-09-02 04:01:18 |
SpaceX rocket explosion is setback for Facebook internet project (lien direct) |
Facebook's internet project has lost a satellite it was planning to use to provide broadband coverage to sub-Saharan Africa |
|
|
|
|
2016-09-01 10:31:39 |
More IoT botnets connected to DDoS attacks (lien direct) |
Security researchers have found another botnet operation exploiting internet of things devices to carry out powerful distributed denial of service attacks, prompting calls for IoT device makers to improve security |
|
|
★★
|
|
2016-09-01 10:30:09 |
(Déjà vu) Security Think Tank: Human factor is key to defeating evasive malware (lien direct) |
How can businesses best prepare their cyber defences in light of the fact that attackers are increasingly using malware designed to evade detection and analysis? |
|
|
★★★★
|
|
2016-08-31 11:05:13 |
Businesses struggling with EU-US data transfer uncertainty (lien direct) |
Businesses are facing a highly complex regulatory landscape due to uncertainty around the future of transatlantic data transfers, according to the initial findings of an IAPP report |
|
|
★★★★★
|
|
2016-08-31 09:16:18 |
KYC: a financial services business enabler (lien direct) |
In the financial services arena, know your customer (KYC) is set to emerge as a key strategic element of organisations' business models |
|
|
★★★★
|
|
2016-08-31 07:38:09 |
Evidence of DNS tunnelling in two-fifths of business networks (lien direct) |
Cyber criminals are capitalising on the failure of many businesses to examine their DNS traffic for malware insertion and data exfiltration, according to Infoblox |
|
|
|
|
2016-08-31 05:48:14 |
Cyber security breaches reported to ICO double in a year (lien direct) |
An increase in cyber security incidents reported to the Information Commissioner's Office is further evidence of the need to shift to automated, artificial intelligence-led defences, says Huntsman Security |
|
|
|
|
2016-08-31 05:30:05 |
Security Think Tank: Blended attacks require blended defences (lien direct) |
How can businesses best prepare their cyber defences in light of the fact that attackers are increasingly using malware designed to evade detection and analysis? |
|
|
|
|
2016-08-31 03:57:43 |
Swift warns banks of fresh wave of cyber heists (lien direct) |
An undisclosed number of banks have been targeted and some have lost money in a new wave of cyber thefts, Swift has warned |
|
|
|
|
2016-08-31 02:00:22 |
Prism and the law: The state of play in August 2016 (lien direct) |
Computer Weekly assesses the history, legal aspects and latest developments in the story of the mass surveillance programme launched by the US National Security Agency |
|
|
|
|
2016-08-30 19:15:52 |
Asean ministers discuss Europol equivalent in Singapore (lien direct) |
Governments in Southeast Asia are considering setting up a regional equivalent of Europol to help fight cyber crime |
|
|
|
|
2016-08-30 09:46:23 |
Encryption hiding malware in half of cyber attacks (lien direct) |
Cyber attackers are using encryption to hide malicious activity, making it increasingly difficult to find as more organisations turn to encryption to protect data, a study has revealed |
|
|
|