IoT regulations: fact or fiction?

New gadgets and, increasingly, connected homes, vehicles and even smart cities open up a whole host of possibilities. Connected devices now control entire homes and offices, including door locks, children’s toys, cameras and medical products. All are available and connected through the Internet, making access very convenient for the user but also for the bad […]

Using simulated disaster management to tackle the security skills gap

With the increasing need for cyber security professionals, organisations are turning to new ways to address the skills gap facing the security sector Academic qualifications, such as Cyber Security & Computer Forensics BSc (Hons) and Cyber Security MSc, provide cyber security professionals with the necessary knowledge for their career, but nothing compares to real-world experience […]

Connectivity in the smart city

Smart buildings and cities are becoming less of a rarity, attracting both tech-savvy entrepreneurs and established businesses. The smart city environment fosters thriving communities, where businesses can excel and their people can work happily, achieving their full potential. More than this, they help businesses to cut costs, streamline operations and increase profit margins. One of […]

Marriott hit by hack but where was their log management?

Marriott International Inc is the latest hack to be announced and this one could be the largest breach in corporate history. Details of some 500 million guests were accessed from the company’s reservation database at its Starwood unit. This included passport numbers, mailing and email addresses and even some credit card details. The breach reputedly […]

The Future of Network-Connected Device Security

The proliferation of poorly secured network-connected devices has prompted the UK government to publish new best practice guidelines. Do these go far enough? Wireless functionality has improved workplace efficiency and organisations are no longer restricted by cabling access. Unfortunately, many of these devices are poorly secured and rarely have their firmware updated. The vulnerabilities in […]

Can you trust one free app to keep all your passwords safe?

How to navigate the world of virtual storage vaults as hackers target providers. A password manager can be a vital tool to keep your personal information out of the hands of online criminals – giving you a single log-in to an app that saves you having to remember lots of different codes. Once you have […]

The chilling email threatening to share embarrassing information that is ‘driving people to suicide’

“It breaks up perfectly stable relationships and causes untold misery” A shocking email is reportedly being sent round to random victims threatening that embarrassing information will be shared online unless large sums of money are paid. The ransom messages are even believed to be leading some victims to the brink of suicide, according to cyber […]

How trustworthy is AI?

Artificial intelligence (AI) and machine learning (ML) are two very hot buzzwords within the broader waves of technological change that are sweeping through our world under the banner of the Internet of Things (IoT). And, although their benefits look good, there is a fear that AI programs could go rogue and turn on us – […]