Edge computing will be key to combat zero-day attacks and IoT dangers in 2023

Balancing cybersecurity and user experience needs is no mean feat. As threats increase rapidly and customer demands spiral, it can be tricky for businesses to know where to focus their efforts to reap the most reward. In 2023, leaders will…

Department for Education boosts cyber training courses in security revamp

The Department for Education (DfE) overhauled its security investment in the most recent financial year (FY 20-21), by increasing security courses on offer to staff from four to 44. Additionally, course participants surged from just under 7,000 in FY 19-20,…

Nearly half of remote employees engage in risky password behaviour

LastPass by LogMeIn has released findings of its fourth Psychology of Passwords global report, which revealed that while 92% of people know that using the same password or a variation is a risk, 65% still re-use passwords across accounts, drastically…

ETSI releases specifications boosting trustful end-to-end network and service automation

ETSI has announced the release of three major specifications and report developed by its Zero-touch network and Service Management (ZSM) group. ETSI GS ZSM 003, defines end-to-end network slicing management and orchestration architecture blueprint and solutions, and ETSI GS ZSM 009-1 specifies the…

Group report on encrypted traffic integration released to protect users from attacks

ETSI’s Industry Specification Group on Encrypted Traffic Integration (ISG ETI) has concluded the early part of its work, by identifying problems arising from pervasive encrypted traffic in communications networks. In the group’s first report, ETSI GR ETI 001, entitled Encrypted Traffic Integration…

‘Bad bots’ make up nearly two-fifths of all internet traffic

A new report from Barracuda networks has revealed that automated traffic takes up nearly two-thirds of internet traffic (64%) – and whilst just 25% of automated traffic was made up by good bots, such as search engine crawlers and social network bots,…

GCHQ launch programme to solve national security challenges

GCHQ, the UK’s intelligence and cyber agency, is looking for five ambitious businesses to join its pioneering innovation programme to apply trailblazing technologies to national security challenges. The GCHQ Innovation Co-Lab, developed in partnership with HOST, the Home of Skills &…

Politicians under cyber attack: preventing attacks and leaks of confidential information

Various organisations, firms and offices, are being broken into more frequently than before through digital identity theft. Politicians have been affected as well. Leaks of important and confidential data from email accounts or inappropriately secured applications are more and more…

Funding to help organisations fight against encrypted traffic threat

Venari Security, the defender of encrypted networks, has announced it has raised a Series A funding of £4.2m with a post money valuation of £14.2m. With some of the best known and most influential figures in the cyber security industry…

National Crime Agency rescues over one million victims of cyber crime

The National Crime Agency (NCA) and its subset, the National Cyber Crime Unit (NCCU) have safeguarded over one million victims of cyber crime, according to official figures. The data, contained in the NCA’s recently published annual report and accounts for the most…