Hardware/Network

Back to homepage

Why do we need a risk-based approach to authentication?

20 years ago, everyone worked at a desktop workstation hardwired into an office building. This made network security simple and organizations felt they could depend on the time-tested method of

What online attacks will dominate the threat landscape this year?

This article will focus on three different and pressing issues that the IT security industry needs to be prepared for during 2018 – the increase of cyber threats via social

Let’s Not Make the Distributed Internet Insecure

We built the internet to be fast and efficient, but made mistakes that have led to the security problems we see today: DDoS attacks, massive breaches, thefts of huge amounts

Tackling the insider threat: Where to start?

Many organizations still believe the definition of an insider threat is limited to a rogue employee purposefully leaking embarrassing information, or nuking a couple of systems when he or she

Most remain dissatisfied with threat intelligence quality and accuracy

While security professionals are increasingly recognizing the importance of threat intelligence, the majority remain dissatisfied with its accuracy and quality, according to a study conducted by the Ponemon Institute Meanwhile,

Business Wire Suffers Week-Long DDoS Attack

Press release network Business Wire has admitted suffering an ongoing Distributed Denial of Service (DDoS) attack lasting a week so far, in a sign of the continued pressure high-profile firms

IoTroop botnet: How to protect yourself from the cyber-storm of the century

The IoTroop botnet, which shares an extensive code base with the leaked Mirai source code, stands to cause even more damage than its predecessor.Almost one year ago exactly, computers across

Insider Threats: Protecting Ourselves From Ourselves

As we defend our networks from sophisticated external threats, we sometimes overlook perhaps a greater threat lurking within. This threat has a badge into the building and a password onto

Growing Number of IT Pros Unaware of DDoS and Ransomware Attacks

IT defenders face the increasing sophistication of adversaries who are responsible for the growth in size and frequency of cyberattacks – and alarmingly, many attackers have infiltrated corporate networks without

Defending our public services from the DDoS of Things

It has been described by the government as “the second digital revolution” and received £32m in funding to promote its benefits and development across the UK, so it’s no surprise