Ransomware Insurers under the thumb of hacker ransom demands

Global insurers that cover cyber-attacks are facing more claims related to ransom-demanding hackers who cripple businesses’ technology systems, and only …

Podcast What can we learn from the dark side to help solve our skills shortage?

What can we learn from the way cybercriminals recruit and train people in their networks to help us with our …

Cyber crime Europol: “People need to understand the value of reporting”

“Sophisticated” nation state attacks vs “low-level” cybercrime; which is the more menacing? Steven Wilson, Head of European Crime Centre at …

Cyber crime How is Europol tackling cybercrime?

Steven Wilson, Head of European Crime Centre, Europol, summarises the guidance that Europol offers to organisations to help them protect …

Information Security Cybercrime in a post-Brexit era: Will hackers exploit our political turmoil?

Dr. Guy Bunker, CTO at Clearswift, discusses the impact Brexit has had on attitudes towards cyber security spending. In the …

Nation states Ciaran Martin, CEO of NCSC: How prepared is the UK for a tier one...

Speaking at #teissLondon2019, Ciaran Martin, CEO of the National Cyber Security Centre, highlights the increase in cyber crime, what organisations …

Podcast How is the Met tackling international cybercrime?

On this week’s teissPodcast I speak with Detective Superintendent Andrew Gould, Head of the Metropolitan Police Cyber Crime Unit. We …

Information Security How real is the threat of cryptojacking?

Danielle Russell, group product marketing manager at AlienVault, an AT&T company, says that 2018 was the year of cryptojacking. Can …

Cyber crime How to beat the criminals at their own game this festive season

American consumers just wrapped up another Black Friday shopping season, and cybercriminals were out in force trying to steal credit …

Threats What makes a cybercriminal?

The late 19th/20th century Italian criminologist, Cesare Lombroso, claimed that criminals could be identified by physical attributes such as hawk-like noses …

Threats How to detect algorithmically generated malicious domains

Enoch Agyepong, Senior Cyber Security Engineer, Cyber Operations Team, Airbus CyberSecurity, shows us how an approach that examines frequency and …

Information Security A day in the life of an ethical hacker

Ever wondered what it's like to be an ethical hacker? Alfonso Arjona, Senior IT Security Consultant and Ethical Hacker at …