network security

Visit/mobile/5g/354286/why-5g-could-be-a-cyber-security-nightmare
5G

Why 5G could be a cyber security nightmare

The latest generation of mobile connectivity promises many marvellous things, but it could also be a hacker's dream
6 Dec 2019
Visit/security/network-security/354040/how-your-network-can-take-on-the-cloud-and-win
network securitywhitepaper

How your network can take on the cloud - and win

Think beyond traditional networking toward a secure digital perimeter
15 Nov 2019
Visit/security/network-security/354135/patch-management-best-practices
network securitywhitepaper

Patch management best practices

Reduce your patch management workload
5 Nov 2019
Visit/security/34711/could-virgin-galactic-s-ipo-indicate-an-interstellar-step-change-for-cyber-security
Virgin Galactic
Security

Is cyber security about to go interstellar?

When we think about the cyber attacks of the future, we may have to think bigger
30 Oct 2019
Advertisement
Visit/security/34708/never-give-humans-the-keys-to-your-kingdom-say-goldman-sachs-security-chiefs
Security

Humans 'unfit' to handle access managment, say Goldman Sachs

Privileged access management is rarely done well and humans are usually the issue
29 Oct 2019
Visit/google-android/34657/android-gets-new-security-sandboxing-features
Google Android

Android gets new security sandboxing features

Google brings mobile site isolation to Chrome to protect against ‘Spectre-like’ attacks
18 Oct 2019
Visit/security/34488/thousands-of-webcams-vulnerable-to-attack
Security

Thousands of webcams vulnerable to attack

Exposed connections could lead to loss of privacy or information theft
25 Sep 2019
Visit/security/34443/modern-cyber-security-bears-great-resemblance-to-the-titanic-disaster-says-stena-ciso
Magnus Carling
Security

Modern cyber security bears 'great resemblance to Titanic'

The security head likens the maritime disaster to cyber security blunders and gives his thoughts on how to move forward
19 Sep 2019
Visit/denial-of-service-dos/34353/ncsc-issues-dos-guidance-following-wikipedia-attack
DoS mockup
denial of service (DOS)

NCSC issues DoS guidance following Wikipedia attack

The popular online knowledge sharing website experienced large outages at the weekened, prompting a response from Britain's cyber body
9 Sep 2019
Advertisement
Visit/security/34153/microsoft-observes-russian-hackers-actively-attacking-businesses-through-iot-devices
Growling Grizzly bear with Russian hat
Security

Russian hackers are attacking businesses through IoT devices

The group known as Fancy Bear has played a role in some of the biggest hacks of recent years
6 Aug 2019
Visit/security/33537/what-is-shadow-it
Man holding mobile phone over laptop with double exposure city overlay
Security

What is shadow IT?

Hardware and software that isn't authorised by IT departments can leave businesses vulnerable
19 Jul 2019
Advertisement
Visit/network-internet/34051/kazakh-government-will-intercept-the-nation-s-https-traffic
Network & Internet

Kazakh government will intercept the nation’s HTTPS traffic

The latest authoritarian attempt to regulate web usage involves launching MitM attacks against every citizen
19 Jul 2019
Visit/security/34006/nhs-anaesthetic-machines-vulnerable-to-hackers
Security

NHS anaesthetic machines vulnerable to hackers

Devices can be remotely controlled to deliver life-threatening anaesthetic doses
11 Jul 2019
Visit/security/33946/50-of-cyber-attacks-now-use-island-hopping
City office buildings image with overlay of security padlocks and network showing a data breach
Security

50% of cyber attacks now use island hopping

Financial, retail and manufacturing businesses are in the firing line of this increasingly popular cyber attack method
3 Jul 2019
Visit/network-internet/31914/what-is-network-intelligence
Brain, network, network intelligence, AI, computing, connected, artificial intelligence, machine learning
Network & Internet

What is Network Intelligence?

A look at the technology enabling businesses to analyse data packets in real-time
3 Jun 2019
Advertisement
Visit/cyber-attacks/33644/microsoft-fixes-critical-flaw-in-legacy-windows-systems-to-prevent-wannacry-like
hacking and ransomware
cyber attacks

Microsoft fixes critical RCE flaws in legacy Windows systems

Windows 7 and XP machines are at risk of autonomously spreading malware between PCs and networks
15 May 2019
Visit/network-internet/domain-name-system-dns/354105/how-a-dns-firewall-can-help-battle-against-advanced
Domain Name System (DNS)whitepaper

How a DNS firewall can help battle against advanced cyber threats

Protect your business against advanced persistent threats and similar malware
7 May 2019
Visit/network-internet/domain-name-system-dns/354104/assessing-the-dns-security-risk
Domain Name System (DNS)whitepaper

Assessing the DNS security risk

Discover how IT professionals around the world assess and mitigate DNS risks
7 May 2019
Visit/security/endpoint-security/354103/exposing-the-threat-of-shadow-devices
endpoint securitywhitepaper

Exposing the threat of shadow devices

Do you know what’s lurking on your network?
7 May 2019
Visit/policy-legislation/33505/huawei-granted-partial-access-to-uk-telecoms-infrastructure
UK parliament
Policy & legislation

Huawei granted partial access to UK telecoms infrastructure

Theresa May has reportedly signed off on the agreement before a full review of the six-month report into British telecoms suppliers
24 Apr 2019
Visit/security/33384/it-chiefs-are-compromising-security-for-smoother-business-operations
Image of an unlocked padlock casually discarded onto on a keyboard
Security

IT chiefs compromising security for business continuity

An epidemic of unhealthy patching regimes across UK firms raises alarms in light of the Equifax disaster
4 Apr 2019
Advertisement
Visit/security/33382/capita-warns-schools-to-stop-using-its-pupil-data-sharing-platform
Digital skills
Security

Capita warns schools to stop using its data-sharing platform

Embattled outsourcing firm says the glitch in its data-transfer mechanism is only "very low-level"
4 Apr 2019
Visit/security/33303/36-vulnerabilities-in-lte-4g-standard-could-enable-data-interception
4G LTE mobile
Security

36 vulnerabilities in LTE 4G standard discovered

'Fuzzing' tool used by researchers to find exploits ranging from spoof SMS messages to disconnecting victims from networks
25 Mar 2019