Crime and Punishment: Bring Hackers to Justice
Traditionally considered an easy crime with minimal consequence, law enforcement agencies – including the FBI and newly formed NCA – are determined to make cybercriminals pay for their crimes. This article will consider how much ‘teeth’ these agencies have, look at some of the punishments and penalties served to date, and take a look at the future of cybercrime and the law.
British Information Security Companies
This article will look at the information security companies founded in the United Kingdom. It will also explore the R&D and innovation happening in British universities and labs.
Pirated Software Security Concerns
Pirated software continues to be prevalent worldwide, but particularly in lesser developed countries. Putting legal issues aside, pirated software does not benefit from the patches and security fixes that genuine software does, leaving machines exposed and highly vulnerable to exploit. This article will investigate the extent of the issue, and look at what can be done within the industry to protect these machines and users and prevent the damage that can be spread through computers running pirated software.
The Tale of Heart Bleed
The recently discovered heart bleed bug has taken the industry by storm, with information security researchers and practitioners declaring it a “catastrophic 11 on a scale of 1-10”. This article will take a look at the heart bleed timeline, from discovery to present, and explain everything you need to know about this flaw phenomenon.
Expired XP and the Finance Industry’s Reluctance to Trade it in
April marked the end of support for Windows XP by Microsoft, and undoubtedly the beginning of a hacker spree to target vulnerable machines. Whilst XP usage has dropped across the board, new analysis shows that here’s still plenty of work to be done – especially in the financial sector.
The Soaring Cost of Cyber Security Tools
Each year the costs of purchasing security tools continues to rise. As larger security firms buy out smaller companies, they tack on nominal costs. Are public sector CISOs better off putting all their eggs in one basket, staying with one company's suite of tools and getting a multi discount? What are the considerations and security implications? How should CISOs approach this challenge given the current budgetary environment?