Cyber Security
Key considerations when it comes to designing security devices
In 1880 the first movie cameras were developed by Thomas Edison and William Dickson. The seed for video surveillance had been planted. During World War 2, miniature portable cameras appeared, making covert surveillance possible for the military. Shortly after, Closed Circuit Television (CCTV) was first used in Germany to monitor the launch of V2 rockets. And the rest, as they say, is history. But the history of surveillance is...
UK start-up launches autonomous drone ADDER
UK start-up, FlareBright has launched its latest autonomous drone product, ADDER (Autonomous Delivery Drone Emergency Resupply). ADDER permits accurate and autonomous last-mile resupply to a pinpoint location. It is delivered by air and glides in the last few hundred metres to its target location on the ground. This product uses Artificial Intelligence and complex software to create pinpoint delivery of small packages in all-weather and atmospher...
Shaping connected home security standards
F-Secure has joined Broadband Forum, the communications industry’s organisation focused on accelerating broadband innovation, standards, and ecosystem development, to better serve communication service providers and secure its wireless home offerings better in the battle against ever-increasing cyber threats.
Rockwell Automation joins ISA Global Cybersecurity Alliance
Production facilities can contain thousands of technologies from different vendors. Cyber security threats only need to exploit one of them to steal trade secrets, stop production or even harm workers. To better secure today’s complex and often vulnerable production operations, the ISA Global Cybersecurity Alliance recently announced Rockwell Automation as a founding member.
London hit with nearly one million cyber attacks every month
Cyber criminals have launched nearly three million attacks on the City of London, the governing body of the City of London, in the first three months of 2019, according to official figures. The findings, which were released under Freedom of Information (FOI) legislation, paint a disturbing picture of the threats posed to the 10,000 residents of the CoL as well as ten million annual tourists and 400,000 daily commuters who enter the city.
Enterprise security - brought to you by the letters A and I
When it comes to securing your organisation, how can you go about best addressing risk? Do you even know where your organisation’s risk exists? Don’t worry, most organisations have a hard time understanding this too, and THIS is what keeps C-level leaders up at night. Here Jackie Brinkerhoff, Senior Director of Product Marketing, SailPoint delves deeper into the matter.
Hidden dangers of public WiFi and how to avoid them
In the era when cybercrime is flourishing, public WiFi has become a golden opportunity for various types of criminals. A recent survey shows that 79% of public WiFi users take significant risks when choosing their WiFi connection. They select a hotspot for its WiFi strength, go for a name that sounds appropriate, or simply pick any free option.
Serious security issue in F5’s BIG-IP could lead to cyber breaches
Cyber security provider F-Secure is advising organisations using F5 Networks’ BIG-IP load balancer, which is popular amongst governments, banks, and other large corporations, to address security issues in some common configurations of the product.
Cyber security in finance sector faces broad range of threats
The latest in cyber security news from F-Secure tells us that while today’s thieves use cyber attacks instead of Tommy Guns to steal money from financial institutions, the range of threats facing organisations working directly and indirectly with the global finance sector go far beyond traditional theft.
Hackers can get inside your child’s classroom
Internet-connected classrooms have transformed the learning process in schools all over the UK. However, it’s also given rise to new dangerous online threats. Much like other public WiFi networks, school WiFi might be vulnerable to hackers.