Cyber Security
Whitepaper claims GDPR will spark lean data revolution
In its new whitepaper, BDO calls on enterprises to replace box ticking with P&L (profit and loss) thinking when it comes to GDPR. BDO demonstrates how mature information security and data privacy programmes can enhance the professionalism of a company’s employees and reinforce an organisation’s public reputation and recalls that the cost of ‘bad’ data is estimated to cause between 15% and 25% loss of income f...
Hardware-based security solutions to protect routers
Routers and other network equipment face increasingly sophisticated threats. Successful attackers can gain access to critical systems, modify network configurations and access customer data. That’s why Juniper Networks has invested in enhanced security by adding hardware-based security solutions to its already robust secure networking portfolio. Juniper is using the OPTIGA Trusted Platform Module (TPM) from Infineon Technologies in its rout...
French president visits DroneGun Tactical at army camp
DroneShield has become aware of reports in French media in relation to DroneGun Tactical and the visit of His Excellency President of France Emmanuel Macron to French Army Camp Mourmelon.
Partner-driven service to stop targeted cyber attacks globally
Businesses globally are being compromised by an onslaught of targeted and fileless cyber attacks, and cyber security vendor F-Secure is answering the demand for new types of services to combat these attacks. Via its growing network of channel partners, F-Secure has introduced a new purpose-built managed endpoint detection and response (EDR) service to protect companies from targeted cyber attacks and advanced threats. Co-created with partners, th...
Security software enhanced with Stratum mining protocol
R&S PACE 2 deep packet inspection (DPI) software from Rohde & Schwarz has been enhanced to include Stratum protocol classification capabilities. The DPI engine can now reliably classify and therefore enable network security solutions to blockmalicious mining activities.
Email attacks keep causing headaches for companies
According to a new report published by F-Secure, over one-third of all security incidents start with phishing emails or malicious attachments sent to company employees. F-Secure’s new Incident Response Report summarises findings from F-Secure’s incident response investigations and provides insights into how real hackers attack organisations.
Cyber security threatens renewable energy infrastructure
A significant role in the energy industry has been given to renewable energy technologies. Because of their prominence and growing importance to power supplies, it is vital for the industry to develop appropriate security, and specifically cyber security, strategies. A new report from the Renewables Consulting Group (RCG) and Cylance provides insight into cyber security for the renewable energy industry, focusing on threat and impact assessment, ...
Deutsche Telekom implements G+D Mobile Security's solution
Deutsche Telekom has conducted a tender process which resulted in G+D Mobile Security being chosen as the supplier for eSIM management of private users' mobile devices. Deutsche Telekom is thus expanding its eSIM platform, in order to prepare for the increasing availability of mobile devices with a pre-installed eSIM, as well as rising user numbers for eSIM-based services. The Bonn based group already uses an eSIM solution from G+D Mobile Securit...
What should you do when your business is hit by ransomware?
When faced with an attack, it’s not uncommon for business owners to panic. However, whilst it may be too late to take on the advice about backing up and protecting your data, there are steps that can be made to ensure that the damage is as limited as possible. In this article Nigel Crockford, Business Development Manager of IT consultancy eSpida, explains how businesses can reduce the damage caused by a ransomware attack.
Security flaw forces Microsoft to rebuild Skype
Microsoft has confirmed that Skype has fallen victim of a security flaw that can allow attackers to gain system-level privileges to vulnerable computers. However, the company won’t immediately fix the issue because doing so would require a complete code overhaul.