Cyberspace security, the Internet and information technology have been key in China's development, and the country has been striving to build itself into a major Internet power. At a study session attended by China's top leaders, ...
Tags: Internet, Information Technology
At the opening of the second World Internet Conference on Wednesday, China made sure its voice was heard: Every country has the right to create its own Internet governance model, and the cyber sovereignty of all nations should be respected. ...
Tags: cyber sovereignty, Internet
Arbor Networks' 2013 research of DDoS activity in the Middle East has revealed that the average size of attacks in the region is 2.376Gbps and the average duration of an attack exceeds an hour and ten minutes. Mahmoud Samy, Area Head, ...
Tags: middle east, Arbor, network, attack
The UK's biggest companies are not considering cyber risks in their decision making, according to a new survey from the Department for Business, Innovation and Skills. The survey, dubbed the cyber governance health check, was sent by the ...
Tags: UK, FTSE, cyber risks, Government
The FBI has offered large rewards for information that could help them catch a clutch of alleged cyber-criminals. They include an El Salvadoran national accused of selling a Trojan designed to spy on husbands or wives believed by their ...
The Cyber Security Challenge UK (CSC UK), a series of national events designed to encourage talented professionals to join the UK IT security industry, is a government- and industry-backed initiative that has enabled 40 participants to ...
Tags: Computer Products, software
Only four per cent of UK organisations have IT security functions that fully meet their needs, a new survey released by one of the "big four" international professional services firms, Ernst & Young, claims. Ernst & Young's 16th annual ...
Tags: Computer Products, software
There's a shortage computer hackers willing to fight back against cyber criminals on behalf of government and businesses, a former White House security chief has warned. "As with anything, it really comes down to human capital and there ...
Tags: Computer Products, software, web security
Two-thirds of public sector officials feel that security should play a bigger role in the government's Digital by Default reform agenda, according to research by McAfee. The research, conducted in association with specialist political ...
Tags: Computer Products, software
Degree-level apprenticeships in cyber security have been launched in the UK as part of an employer-backed "Cyber Academy". The Cyber Academy, which was launched by the National Skills Academy for IT and e-skills UK, will see employers ...
Tags: Computer Products
The New York Times website was unavailable to its readers yesterday afternoon in the US, after a cyber attack on the organisation's web host, Melbourne IT. Twitter, which uses Melbourne IT as a domain name registrar, was also affected by ...
Tags: Computer Products, webservice
The government's "digital by default" agenda should be accompanied by one of "security by default" if public sector organisations are to truly protect themselves against cyber security threats and avoid a cyber security skills crisis. ...
Tags: Computer Products
IBM has signed an agreement to acquire security company Trusteer, and plans to set up a cybersecurity software lab in Israel. The financial terms of the proposed acquisition were not disclosed. With offices in Boston and Tel Aviv, ...
One of the biggest challenges facing the IT industry is determining how to boost the number of skilled cyber security professionals in order to combat an epidemic of cyber crime. That's according to Jon Ramsey, CTO of Dell SecureWorks, the ...
Tags: Security Skills, DELL, Computer Products, IT
Prison sentences for hacking and cyber crime are set to rise across Europe if a new draft directive becomes law, as the EU looks to combat cyber espionage and cyber attacks against critical national infrastructure. A draft directive set ...
Tags: Computer Products, software