Computer security guru Professor Ross Anderson has criticised the European Union's proposed computer security directive which, he says, represents "yet another unfortunate step towards the militarisation of cyberspace". EU security ...
The UK has joined 25 countries in committing to a set of principles intended, they claim, to make digital networks more secure and resilient. Foreign secretary William Hague signed the World Economic Forum's Partnering for Cyber ...
Tags: digital networks, Cyber Resilience, UK Cyber Security Strategy U
Cloud hosting company FireHost has claimed that cross-site scripting attacks increased by an estimated 160 per cent in the final quarter of 2012. The company claims that it has detected a spike in what it calls a "superfecta" of attempted ...
The European Commission’s latest cyber security strategy has been slammed by a member of the European Parliament, who accused the strategy of being “incoherent and lacking in focus” on Thursday. The Cyber Security ...
Tags: Politician, EU, Cyber Security Strategy
Nine out of 10 companies do not believe that they are vulnerable to hackers,despite the fact that half have faced a"security incident"in the past year. That is the conclusion of a report into computer security by consultants Deloitte ...
Tags: Nine out of 10 companies not vulnerable, security incident
The UK Defence Committee is urging the Government to be more vigorous in its approach to cyber threats. A new report released by the Committee says that the British military is now too dependent on information and communications ...
Tags: military, IT, cyber threats, information, communications technology
Software engineers working for the US military will have to follow new testing procedures to reduce the risk of security flaws in their code. That is one of a number of computer security-related measures contained in the 2013 National ...
Tags: Software, US Military, Legal Checks
Infoworld-Network and endpoint security may not strike you as the first place to scratch an experimental itch.After all,protecting the company's systems and data should call into question any action that may introduce risk.But IT security ...
Tags: crazy IT security tricks
CIO - When it comes to securing business-technology systems, CIOs face a challenge that won't go away. The problem isn't necessarily new attack techniques, insecure software or even the latest government regulations. Rather, it's the ...
Tags: CIOs, CSOs, business technology systems, techniques, software
BT is to extend its cyber security agreement with the Ministry of Defence (MOD) in a deal that will see the company expand its cyber defence service. BT said work had already begun on the seven-year agreement that builds on an existing ...
Enterprise IT security professionals faced increasingly sophisticated, stealthy and dynamic threats in 2012, but numerous surveys revealed that knowledge and understanding of the latest attack techniques are lacking in many organisations. ...
Tags: IT security, user security awareness, IT industry, cyber
The government has today released documents detailing what it sees as highlights in the UK Cyber Security strategy it put into place last year, and its plans for the future. It has also detailed how much money is expected to be spent in ...
Tags: UK, cyber, security, government
HERZELIA, ISRAEL, July 12, 2012 /24-7PressRelease/ -- Alentus announced today its partnership with GamaSec, a remote online website security scan service. GamaScan identifies web application vulnerabilities, provides real-time vital ...
Tags: Alentus, GamaSec, online website security scan service
Companies must take responsibility for cyber security at board level to tackle the exponential growth in attacks, the government has urged. The warning comes as ministers launch a Cyber Security for Business booklet to encourage company ...
Current business security models fail to prepare for cyber threats in the face of highly sophisticated, powerful cyber attack tools that are no longer the preserve of nation states, as they filter down to a wider community of attackers. ...
Tags: security models, hackers, cyber attacks, Cyber criminals