Security

Displaying 1 - 10 of 134

Report explores the roles of information security leaders

Report explores the roles of information security leaders
  The inaugural CISO Report has been published by Synopsys, the result of a two-year data-driven study exploring the roles of information security leaders and the organisational dynamics that affect them. The Chief Information Security Officer (CISO) Report identifies four approaches to the CISO role called 'tribes', each with distinct characteristics.
22nd January 2018

Security company provides high levels of design and data security

Security company provides high levels of design and data security
Microsemi has announced its products are not affected by the recently identified security flaws associated with the use of x86 and ARM and a number of other processors, including its Field Programmable Gate Arrays (FPGAs). The announcement comes as security researchers recently revealed major computer chip vulnerabilities, called Spectre and Meltdown, in chips - affecting billions of devices globally.
22nd January 2018

Cyber threats to keep businesses awake at night

Cyber threats to keep businesses awake at night
Like natural disasters, a cyber attack can potentially impact hundreds of companies and incidents have escalated. Cyber incidents (#1 with 60% of responses) are this year’s top business risk in the UK, according to the Allianz Risk Barometer 2018. So-called 'cyber hurricane' events, where hackers disrupt large numbers of companies through common internet infrastructure dependencies, are increasing.
22nd January 2018


DPI Solution enables security of cloud applications

DPI Solution enables security of cloud applications
An embedded deep packet inspection (DPI) engine from Rohde & Schwarz Cybersecurity serves as the core for Barracuda's NextGen firewall F-series. The Barracuda F-series firewall is able to classify network applications up to Layer 7 in real-time, and can granularly control what applications are permitted, prioritized or de-prioritised for access.
19th January 2018

The DDoS threat for energy and utility companies

The DDoS threat for energy and utility companies
Protecting our critical infrastructure from cyber attacks has become a top priority for governments around the world - largely as a result of the IoT. Within the energy sector, the increased connectivity brought about by IoT has improved how we manage our power distribution and consumption, enabling a more flexible and efficient energy grid. By: Scott Taylor, VP at Corero Network Security.
19th January 2018

Duo ensure the cyber security of infotainment units

Duo ensure the cyber security of infotainment units
In order to ensure the cyber security of connected automotive technologies, Argus Cyber Security and STMicroelectronics have announced a joint effort. As telematics and infotainment units become increasingly complex to support high-value connected services, they become more vulnerable to cyber attacks. Securing these units against such attacks requires sophisticated, multi-layered security, and ongoing monitoring throughout the lifetime of the vehicle.
16th January 2018

Attackers bypass login credentials in corporate laptops

Attackers bypass login credentials in corporate laptops
Thanks to the insecure defaults in Intel’s AMT, intruders are able to completely bypass user and BIOS passwords and TPM and Bitlocker PINS to backdoor almost any corporate laptop in a matter of seconds. F-Secure reports a security issue affecting most corporate laptops that allows an attacker with physical access to backdoor a device in less than 30 seconds.
16th January 2018

New security event coming to Birmingham in 2019

New security event coming to Birmingham in 2019
A new exhibition has been announced by Western Business Exhibitions (WBE) for the UK’s security industry. The Security Event will be held from the 9th to 11th April 2019 at the NEC, Birmingham. The Security Event is backed by seven industry leading manufacturers and distributors as founding partners, all of whom will be exhibiting at the event including Anixter, Comelit, Dahua, TDSi, Texecom, Tyco and Videcon.
15th January 2018

Dynamic certificates make cloud service providers more secure

Dynamic certificates make cloud service providers more secure
The volume of digital data produced and stored by companies is growing. Cloud technology offers a convenient solution: IT service providers offer storage space or software which enables data to be saved remotely. But how can companies be sure that their data is protected against unauthorised access or deletion? Researchers from the Technical University of Munich (TUM) have studied this issue and developed a model which allows service providers to be checked and certified reliably.
15th January 2018

Intel AMT security issue lets hackers bypass login credentials

Intel AMT security issue lets hackers bypass login credentials
Security company F-Secure has reported a security issue affecting most corporate laptops that allows an attacker with physical access to backdoor a device in less than 30 seconds. The issue allows the attacker to bypass the need to enter credentials, including BIOS and Bitlocker passwords and TPM pins, and to gain remote access for later exploitation. It exists within Intel’s Active Management Technology (AMT) and potentially affects millions of laptops globally.
12th January 2018


Security documents


Sign up to view our publications

Sign up

Sign up to view our downloads

Sign up

Embedded Systems and MtoM & Objets Connectés
21st March 2018
France Paris expo Porte de Versailles
IoT Tech Expo 2018
18th April 2018
United Kingdom Olympia, London
The Security Event 2019
9th April 2019
United Kingdom NEC, Birmingham