Must Respect the Sovereignty of Other Countries

Must Respect the Sovereignty of Other Countries

Microsoft is returning to court to challenge the US government’s demand that it hand over emails stored at an Irish data centre, which are alleged to contain details of narcotics sales. Microsoft is suggesting that to hand them over would put it in breach of privacy laws, and argues that the government “must respect the […]

Unable to Provide Access to Encrypted Data

Unable to Provide Access to Encrypted Data

With Apple and other tech organisations facing pressure from the US government for being unable to provide access to encrypted data, Comment from security expert Dr Nithin Thomas, on why it is imperative for firms to invest in new technology that will allow them met the requirements of the law. [su_note note_color=”#ffffcc” text_color=”#00000″]Dr Nithin Thomas […]

Remote Code Execution Flaws Affecting Microsoft Office

Affecting Microsoft Office

Issue of Microsoft’s September 2015 Patch Tuesday includes five critical bulletins, two of which tackle remote code execution flaws affecting Microsoft Office. Security experts from tripwire commented on the Microsoft Patch Tuesday. [su_note note_color=”#ffffcc” text_color=”#00000″]Tyler Reguly, Manager of Security Research at Tripwire : “The best word to describe this month is probably vanilla. There’s nothing […]

Older and Disabled People to use Apps to Improve their Public Transport

Older and Disabled People

Meeting the Needs of Older and Disabled Travellers, published by the Institution of Engineering and Technology (IET) and ITS UK, highlights that over 80 per cent of the over 60s would not use journey planning websites, apps or text messages that can give them valuable travel information to significantly improve their journey. This is a […]

Offering Military Strength Encryption without Impacting Performance

Encryption without Impacting Performance

London cyber security start-up launches mobile app to make your mobile communications inaccessible to prying eyes SQR Systems, a London based cyber security start-up is launching a new mobile encryption application, CEERUS.  Targeted at businesses and professionals who need to ensure the complete confidentiality of their mobile communications, CEERUS is the only app to provide […]

Inability to Remediate Vulnerabilities Posed by Untrustworthy CAs

Vulnerabilities Posed by Untrustworthy CAs

Nearly two-third (63%) of infosec professionals falsely believe or don’t know that a Certificate Authority (CA) does not actually secure certificates and cryptographic keys Roughly two-thirds (64%) of infosec pros understand the risks associated with untrustworthy CAs like CNNIC but aren’t doing anything about it Even though mobile devices trust hundreds of CAs, survey responders […]

Protects Against Hackers Compromising User Accounts

Hackers Compromising User Accounts

Solution Combines Protection of User Accounts, Web Applications and Enterprise Data In The Cloud and On-premises Imperva, Inc., (NYSE: IMPV), committed to protecting business-critical data and applications in the cloud and on-premises, today announced availability of Imperva SecureSphere 11.5. The latest release of the industry-leading  SecureSphere platform, which includes Web Application Firewall and Database Activity […]

Businesses must Prepare for New Generation of Cyber Risks

New Generation of Cyber Risks

Allianz report highlights that cyber risks are evolving far beyond privacy or reputational issues. Global cyber insurance market forecast to grow to over $20 billion by 2025. In the UK, the cost of cyber-crime as a percentage of GDP is .16%, with an estimated cost of $4.3bn (£2.8bn). Interconnectivity of devices and businesses drives new […]