Tag "Cyber Defence"

Back to homepage
Software

Cyberwarfare: the danger and potential answers

Following comments by, Nick Carter, Chief of the Defence Staff, the most senior uniformed military adviser to the Secretary of State for Defence and the Prime Minister, Information Age quizzed

Software

Understanding the art of phishing

The goal is to trick the recipient into believing the email is genuine, with the intention of getting the target to either download malware, or hand over personal information.Using cyber-attacks

Hardware/Network

In Praise Of The Hackers

Buried treasure is not just the stuff of fiction and legend. For at least some of our ancestors, it was quite simply the most effective means of protecting prized possessions

Hardware/Network

Deflecting DDoS – Key Tactics in the Battle Against IoT-Powered Attacks

What makes a DDoS successful? I asked myself that question at the end of August when the central bank of Spain, Banco d’Espana, was hit by a DDoS attack that

Software

Security automation can help IT teams limit cyberattack risks

Attacks are becoming largely automated forcing security solutions to provide multiple layers of defence. Basic forms of automation in IT management could already greatly help in keeping networks and infrastructure

Software

Software testing and cyber-security: The forgotten defence

There is one critical way by which you can stay one-step ahead and that’s by ensuring your defensive software is doing its job.Cyber-attacks can take a variety of forms from

Software

Building an effective cyber defence against polymorphic malware

Jan Van Vliet, VP and GM EMEA at Digital Guardian, goes through the best practices to protect against polymorphic malware.Recent research suggests as much as 97% of all malware infections

Hardware/Network

The evolution of DDoS attacks – and defences

In October 2016, a new method for distributing DoS attacks emerged – using a network of Internet of Things (IoT) devices to amplify attacks. What is the biggest cyber-threat to

Software

Rethinking pen testing

Penetration testing is a valuable tool in any modern-day cybersecurity defender’s toolkit. But are current methods as effective as they can be? Ed Skoudis, Faculty Fellow and Penetration Testing Lead

Industry Insights

6 ways you are sabotaging your cyber defences

If we asked any of the IT departments that we deal on a daily basis about their current priorities, they would all unfailingly say that protecting their company against cyber