Skills, Strategy and Security: The Recipe to Tackle Cybercrime in 2016

Businesses are and increasingly will be, in the firing line of big cyber threats. Kaspersky Lab has announced the end of the Advanced Persistent Threat (APT) as we know it in 2016. Specifically, we believe that attackers will swap ‘Advanced’ and ‘Persistent’ malware for off-the-shelf code that allows them to maximize ROI and stealth techniques […]

Age Verification for Online Pornography

Age Verification for Online Pornography

GOVERNMENT COMMITMENT TO PROTECT CHILDREN FROM ONLINE PORNOGRAPHY Public consultation launched to require age verification for pornographic content online. Under new proposals, companies profiting from online pornography will have a legal obligation to ensure those accessing material are over 18. Proposals will deliver on our manifesto commitment to introduce age verification to “all sites containing pornographic material”. The government has confirmed today that […]

New Consortium to Create Interoperable Secure Communications

New Consortium to Create Interoperable Secure Communications

The Secure Chorus Group was announced today to support and promote interoperable, secure communications for enterprise and government. Secure Chorus is an independent, not-for-profit group with founding members including Armour Communications, BT, CESG, Cryptify, Cyber Y, Finmeccanica, Samsung, SQR Systems and Vodafone. Further members will be announced soon. Secure Chorus will promote the development and […]

Why Cloud is a must: How to get the most from your Devices

How to get the most from your Devices

Owing to the fact that cloud computing offers you superb flexibility and scalability, impenetrable security against cyber criminals, greater collaboration among employees, and a number of cost-saving benefits, there are few reasons why you shouldn’t upgrade to virtual solutions like 100TB Cloud Servers. However, this doesn’t mean to say that cloud services and the devices […]

Top 10 Hacking Methods

Top 10 Hacking Methods

The recent data breach of 10,000+ Departments of Justice and Homeland Security staff and over 20,000 supposed Federal Bureau of Investigation (FBI) employees is another example that becoming an insider by using social engineering tactics is much easier for hackers than writing zero-day exploits Balabit, a leading provider of contextual security technologies, today announced its recent CSI […]