fbpx

Latest cyber security publications


Top three tips for safeguarding your network when deploying IoT

Ken Hosac, VP of IoT strategy and business development at Cradlepoint, identifies some of the most effective ways to capitalise on IoT’s benefits while mitigating the security risks Love it or loathe it, the Internet of things (IoT) is here to stay. Gartner’s latest predictions suggest the number of IoT devices will hit 14.2 billion… Read More


Myspace says all music uploaded to site from 2003 to 2015 has been lost

Users fear millions of breakout tracks from artists in their early years have been lost forever Early social network Myspace has apologised after admitting to losing music uploaded to the site since its founding in 2003 until 2015. In an announcement to users, the Californian company said “any photos, videos and audio files you uploaded… Read More


Report questions success of UK cyber security programme

The National Audit Office says it is also unsure whether the programme is value for money as it reaches its mid-point It is unclear whether the UK’s strategy against cyber threats is value for money due to failings in the way the Cabinet Office established its current programme, a report has claimed. £1.9 billion was… Read More


The Three P’s of Third-Party Risk – Prevention, Policies and Promises
By implementing a three-pronged approach that brings together prevention, policies and promises, companies can strengthen their security posture, mitigate risk and maintain trust with customers, says Mark Sangster, vice president and industry security strategies at eSentire  There is a significant disconnect happening between the third-party policies companies have on the books and the effectiveness of... Read More

Ciaran Martin reiterates cyber danger after top UK firms confess ignorance

FTSE 350 company leaders admit to not fully understanding the impact of a cyber attack on their business Leaders at some of the UK’s largest companies have been told to be more aware of cyber attacks to avoid falling victim. Despite almost all of the country’s top firms having a cyber security strategy in place,… Read More



Do NOT follow this link or you will be banned from the site!