A new approach for cyber security in the UK

As the threat of terrorism becomes far more than just a physical danger, cyber security increases in importance within the UK

Hiding behind the Great British Firewall

Following GCHQ’s plans to create a protective British Firewall, Counter Terror Business asks whether sharing cyber strength is a weakness waiting to be exploited?

How to combat the cyber threat

Andrew Scott, of the Business Continuity Institute, analyses how likely it is that your organisation will suffer from a cyber attack and the best ways to combat the danger

Risk appetite is considered the volume of risk that an organisation is willing to take in order to meet their strategic objectives. Adrian Wright, vice president of research at the UK chapter of the Information Systems Security Association, explores risk appetite in more detail.

Cyber Security - The lone wolf terrorist and the deep, dark web

The potential that the internet poses for terrorists and criminals is developing at an alarming rate. The Institute of Civil Protection & Emergency Planning asks how can we be cyber secure?

Investigatory Powers BillIs everyone a suspect?

Professor Mike Jackson, IT and cyber security expert at Birmingham City University’s Business School, examines the proposed ‘Investigatory Powers Bill’

Three years after the National Cyber Security Strategy was launched, the government has published a report on its progress and its future plans to thwart cyber crime

Amar Singh of international IT governance association ISACA reports on the damage denial of service (DoS) attacks can do and shares advice on how organisations can protect themselves

The Security Institute’s Mike Gillespie highlights why those that protect the UK’s critical national infrastructure need to anticipate threats and monitor the technological supply chain

Whatever the size or location of the firm, processes must be in place to be able to deal with a cyber attack, should one occur, urges Andrew Scott at the Business Continuity Institute

Nowadays, every threat seems to have a cyber dimension to it – cyber crime, cyber espionage and cyber war. It is natural, then, to talk of cyber terrorism, but does the reality match the rhetoric?

Businesses can often be part of a crucial supply chain, and sophisticated adversaries could seek to target the weakest link to gain access 
to a higher-profile target, warns Paul Weatherly

A progress report on the National Cyber Security Strategy issued in December aims to demonstrate the progress made by the UK in addressing the threat from cyber attacks, and includes plans to double annual cyber exports to £2bn a year by 2016

Given the amount of attention that data breaches get and the wealth of standards and technology available to prevent them, why do they still occur, asks Mike Small

In the film Skyfall, a large audience has been exposed to a James Bond plot that initially seems more plausible than the stereotypes. Certainly a stolen MI6 hard drive being used to identify and expose undercover agents is more grounded than stealing nuclear submarines. But just how plausible is it exactly? Would any megalomaniac supervillain be able to access the data? And would it present a serious threat to the nation?

Pages

Supplier Profiles

Flowmon Networks

Flowmon Networks empowers businesses to manage and secure their computer networks confidently.

Soliton Systems
Lepide
Silensec
Gallagher
SALZER