Infosecurity News Features

#EuroCACS: Where Awareness and Learning are King
One of the main themes appeared to be that of incident response, and security awareness

GDPR: One Year and Counting
Today marks exactly 12 months until the European GDPR comes into effect and with just a year to go it’s now imperative that companies of all sizes are fully focused on getting their houses in order

All You Need to Know about the Cyber Retraining Academy
The Cyber Retraining Academy is an HM Government program delivered in partnership with SANS to address the cybersecurity skills gap

Will Vault7 Shake Infosec Like Snowden?
The Wikileaks ‘Vault7’ release earlier this month reignited the reality of state-sponsored espionage, and what our governments know about us

Security Certifications are Useless, Right?
How many security jobs have you seen recently that said “CISSP not required, we don’t care what level of education you’ve attained, we just care that you’re super smart at security”?

ACE Skills Learned & on Display
Teams were information security professionals working for a fictional power company ‘Transcorp’ which had been taken over, and it was the job of the teams to use their skills to take back the network

Neurodiversity & Cybersecurity Careers: Recruiting & Retaining Autistic Cybersecurity Professionals
At the Defence Academy of the United Kingdom on March 2 2017, many relevant parties gathered to discuss neurodiversity and careers in cybersecurity

Detect, Protect and Survive
Incident response has become one of those areas of cybersecurity that people think they could do better, but how often do they test it and how well could they actually act in the event of an incident occurring?

Help Save the Youth of Cyber
The news over the weekend was full of stories about how the youth of the UK was going to be taught cyber skills.

Password Managers - Resolution to Authentication Headaches
“Password managers are a good thing” as they give “huge advantages in a world where there's far too many passwords for anyone to remember”

Identifying the Problem of Disruption
Why do so many disruptions occur outside of the organization’s network control and why are they hard to monitor and identify?

All At Sea
Cables run between continents, channelling terabits of information down a single fibre-optic link. They are incredibly expensive to build, with a transatlantic link costing around $500 million, and only a handful of firms have the ability to lay them.

#WIREDSecurity: The Best Bits
WIRED Magazine recently held it's first WIRED Security Conference in London. Here are our highlights from the day

CREST Workshop Gathers to Tackle Gender Gap in InfoSec
It’s no secret that women have been overwhelmingly underrepresented in the cybersecurity industry for a number of years

#Oktane16: Journalist Brian Krebs on Cyber-attacks, Authentication and Authorization
Renowned investigative journalist Brian Krebs took to the stage this week at Oktane16 to discuss all things cybersecurity

Almost a Third of Staff Still Fall for Phishing Emails
Research from Duo Security's Duo Insight phishing tool found 31% of staff clicked the link in emails sent by their internal team

How to be a Successful Next-Gen CISO: A Panel Discussion – Part Two
At Infosecurity Europe 2016 an impressive panel of industry security leaders sat down to discuss the evolving role of the CISO.

How to be a Successful Next-Gen CISO: A Panel Discussion – Part One
At Infosecurity Europe 2016 an impressive panel of industry security leaders sat down to discuss the evolving role of the CISO.

We’re Vulnerable to Attack, Say 89% of UK Organizations
Companies planning to invest in security in the next 12 months are running the risk of doing so in the wrong areas, says Vormetric.

Harsh Lessons Learned by Linkedin
A 2012 breach of LinkedIn user data was believed to have contained “close to 6.5 million unsalted password hashes” and for this writer, it taught me a lot about salting and hashing as LinkedIn raced to fix the issue.








