Atlas VPN reports: 41% of business cyberattacks are through Cloud servers

Recent changes in IT infrastructure, such as companies’ transition to Cloud solutions – all of which which have been triggered by the rise in remote work – have shifted the focus of cyberattacks. Atlas VPN discusses. According to the data…

Enea’s 2022 IoT trends

Nation states will ramp up mobile cyber-attacks; hyperscalers will mimic Google and introduce powerful proprietary encryption protocols; and new edge clouds could make the last mile vulnerable. These are amongst the major trends Enea has highlighted in a new report…

What areas need defending against cybercrime?

Following the announcement of a new Cyber Strategy in the UK, Chris Ross, SVP Sales, International at Barracuda Networks offers his comments. He offers insight into the damage cyber crime has had and what areas need to be defended against.…

Department for Education boosts cyber training courses in security revamp

The Department for Education (DfE) overhauled its security investment in the most recent financial year (FY 20-21), by increasing security courses on offer to staff from four to 44. Additionally, course participants surged from just under 7,000 in FY 19-20,…

Nearly half of remote employees engage in risky password behaviour

LastPass by LogMeIn has released findings of its fourth Psychology of Passwords global report, which revealed that while 92% of people know that using the same password or a variation is a risk, 65% still re-use passwords across accounts, drastically…

ETSI releases specifications boosting trustful end-to-end network and service automation

ETSI has announced the release of three major specifications and report developed by its Zero-touch network and Service Management (ZSM) group. ETSI GS ZSM 003, defines end-to-end network slicing management and orchestration architecture blueprint and solutions, and ETSI GS ZSM 009-1 specifies the…

Group report on encrypted traffic integration released to protect users from attacks

ETSI’s Industry Specification Group on Encrypted Traffic Integration (ISG ETI) has concluded the early part of its work, by identifying problems arising from pervasive encrypted traffic in communications networks. In the group’s first report, ETSI GR ETI 001, entitled Encrypted Traffic Integration…

‘Bad bots’ make up nearly two-fifths of all internet traffic

A new report from Barracuda networks has revealed that automated traffic takes up nearly two-thirds of internet traffic (64%) – and whilst just 25% of automated traffic was made up by good bots, such as search engine crawlers and social network bots,…

GCHQ launch programme to solve national security challenges

GCHQ, the UK’s intelligence and cyber agency, is looking for five ambitious businesses to join its pioneering innovation programme to apply trailblazing technologies to national security challenges. The GCHQ Innovation Co-Lab, developed in partnership with HOST, the Home of Skills &…

Politicians under cyber attack: preventing attacks and leaks of confidential information

Various organisations, firms and offices, are being broken into more frequently than before through digital identity theft. Politicians have been affected as well. Leaks of important and confidential data from email accounts or inappropriately secured applications are more and more…