Cyber-crime now tops traditional crime in UK

By | 2017-09-24T19:47:34+00:00 September 8th, 2016|Cyber Crime|

A new report found that cyber crime in the UK has passed traditional crime in terms of impact. In its Cyber Crime Assessment report for 2016, the National Crime Agency (NCA) detailed the top threats facing UK businesses. The rapid growth of technology and cyber crime are now outpacing the ability for businesses to respond [...]

Comments Off on Cyber-crime now tops traditional crime in UK

Web Application Testing

By | 2017-09-24T19:47:34+00:00 September 3rd, 2016|IT Security|

We offer a number of services to test servers and networks with impartial reporting and advice on how to rectify issues, where necessary. We also work alongside development teams to test software on an independent basis. Testing can be carried out on a project or roll out basis and on a scheduled basis. We review [...]

Comments Off on Web Application Testing

Anti-virus software might NOT be keeping your computer safe, and this is why

By | 2017-09-24T19:47:34+00:00 August 31st, 2016|Cyber security, Uncategorized|

WORRYING research finds that hundreds of well-known security products could be letting hackers and criminals secretly access your PC. Your PC may not be as secure as you think, even if you have anti-virus software installed, according to some troubling new findings. Research from security experts has discovered that many leading computer security products are [...]

Comments Off on Anti-virus software might NOT be keeping your computer safe, and this is why

Solving Problems with Integrated Security and Access Control

By | 2017-09-24T19:47:34+00:00 August 22nd, 2016|IT Security|

Being able to remotely monitor the security situation across a whole site or number of locations would have been the stuff of science fiction a few generations ago, but now this is something that all organisations can utilise, often at very reasonable costs. With increasingly intelligent solutions also come new ways of using this technology [...]

Comments Off on Solving Problems with Integrated Security and Access Control

Integrated Security Solutions for Hybrid Cloud Deployments

By | 2017-09-24T19:47:34+00:00 August 18th, 2016|IT Security|

A hybrid cloud environment is one in which both public and private cloud models are used in combination, performing different functions. Often, more sensitive data and processes are confined to the private cloud environment, while less sensitive activities are performed in the public cloud. According to recent research from Right Scale, 71 percent of organizations [...]

Comments Off on Integrated Security Solutions for Hybrid Cloud Deployments

IT Security Expert Blog

By | 2017-09-24T19:47:34+00:00 August 9th, 2016|IT Security|

A UK view on Cyber, Information & IT Security by Security Expert Dave Whitelegg. Providing advice and explaining security for everyone, and also contemplating advanced themes and future trends in security. With a focus on all the latest developments & issues within the UK Information Security space such as Hacking, DDoS, Botnets, Malware, Identity Theft, [...]

Comments Off on IT Security Expert Blog

Web and social media intelligence transforms security and safety planning

By | 2017-09-24T19:47:34+00:00 August 3rd, 2016|Cyber security|

Web and social media platforms offer vast array of information for enhancing security, investigating breaches, and streamlining operations Over the course of the last decade, we’ve seen a blurring of lines between cyber and physical security concerns. Whether it’s the hacking of corporate information or the use of social media for nefarious activities, it’s clear [...]

Comments Off on Web and social media intelligence transforms security and safety planning

Integrated Security Solutions for Hybrid Cloud Deployments

By | 2017-09-24T19:47:35+00:00 July 21st, 2016|IT Security|

A hybrid cloud environment is one in which both public and private cloud models are used in combination, performing different functions. Often, more sensitive data and processes are confined to the private cloud environment, while less sensitive activities are performed in the public cloud. According to recent research from RightScale, 71 percent of organizations are [...]

Comments Off on Integrated Security Solutions for Hybrid Cloud Deployments

Ethical hacker certification bundle gives you the keys to an in-demand six-figure career

By | 2017-09-24T19:47:35+00:00 July 21st, 2016|Cyber security|

Cyber security is a rapidly-evolving field, and high-level IT security professionals have a mandate to stay one step ahead by locating and fortifying an organization’s vulnerabilities before malicious hackers do. These experts regularly save companies millions in revenue and data breach loss, a high value for any business. To leap into a cybersecurity career, the [...]

Comments Off on Ethical hacker certification bundle gives you the keys to an in-demand six-figure career

LightCyber lands $20 million Series B to secure networks using behavioral analytics

By | 2017-09-24T19:47:35+00:00 July 21st, 2016|Cyber security|

Every network is under siege these days as attackers search for a way in. The industry lingo calls them attack vectors, but that just means a hacker finds a weak link in the network and exploits it. Once they’re in they begin to do damage, but in doing so, they behave in ways that might be out of [...]

Comments Off on LightCyber lands $20 million Series B to secure networks using behavioral analytics