Information Security Seven steps to safer software

The Cast annual CRASH report into the global state of software quality has been released. The study looked at over …

News Website security certificates vulnerable to hackers

21 percent of websites are still using certificates signed with the vulnerable Secure Hash Algorithm, SHA-1, an outdated encryption algorithm that has …

News WikiLeaks publishes details of alleged CIA hacking tools

Whistleblowing group WikiLeaks has published what it claims are details of malware and cyber weapons used by the CIA - …

News Robots could damage your cyber security

A report from information security services firm IOActive identifies more than 50 common cyber security flaws across six of the biggest …

News Free online cyber security course from Newcastle University

Newcastle University’s School of Computing Science is offering a free cyber security course. The course is open to anyone, including …

News Calling all hackers…

So you can hack into a luxury car! You could be just what the UK needs. Thirty cyber security amateurs have …

News 24 hours: that’s how long it takes to steal your data

Nine out of ten hackers can break through cyber security defences and into the systems they target within 12 hours. …

News Cyber breaches: ever more complex, pervasive & damaging

Verizon's Data Breach Digest for 2017 once again has employees "front and centre" in the battle against cyber breaches. It's …

Culture & Education Stormy times ahead for the cloud?

UK organisations are proving more risk averse towards adopting cloud computing than their peers across the globe. While this isn't …

Information Security Enterprise security isn’t working

Organisations are spending $75 billion on security, yet data breaches are continuing at an alarming rate A new Forrester study has …

Culture & Education A new way to prove your identity

For a lot of services, online and offline, you need to provide evidence of your identity or your age. It …

Information Security UK cyber resilience: “Could do better”

How resilient are UK organisations to damage from cyber threats? New research from the Ponemon Institute indicates that there is …