Department for Education boosts cyber training courses in security revamp

The Department for Education (DfE) overhauled its security investment in the most recent financial year (FY 20-21), by increasing security courses on offer to staff from four to 44. Additionally, course participants surged from just under 7,000 in FY 19-20,…

Nearly half of remote employees engage in risky password behaviour

LastPass by LogMeIn has released findings of its fourth Psychology of Passwords global report, which revealed that while 92% of people know that using the same password or a variation is a risk, 65% still re-use passwords across accounts, drastically…

Smart Factory: What it is and the solutions you need to build one

There are already many articles on the topic of smart factory. In this article, I will try to simplify it a little bit, starting off with a brief overview of the history of industrial revolutions, introduction of what smart factory…

ETSI releases specifications boosting trustful end-to-end network and service automation

ETSI has announced the release of three major specifications and report developed by its Zero-touch network and Service Management (ZSM) group. ETSI GS ZSM 003, defines end-to-end network slicing management and orchestration architecture blueprint and solutions, and ETSI GS ZSM 009-1 specifies the…

Group report on encrypted traffic integration released to protect users from attacks

ETSI’s Industry Specification Group on Encrypted Traffic Integration (ISG ETI) has concluded the early part of its work, by identifying problems arising from pervasive encrypted traffic in communications networks. In the group’s first report, ETSI GR ETI 001, entitled Encrypted Traffic Integration…

‘Bad bots’ make up nearly two-fifths of all internet traffic

A new report from Barracuda networks has revealed that automated traffic takes up nearly two-thirds of internet traffic (64%) – and whilst just 25% of automated traffic was made up by good bots, such as search engine crawlers and social network bots,…

IET report explores advancing safety in transport through automation

The need for a road crash investigations branch is one of the recommendations in a new report from the Institution of Engineering and Technology (IET) that explores the expected impact automation will have on the transport sector. Advancing safety in…

Edge Computing enables IT and OT convergence with three core benefits

The convergence of information technology (IT) and operational technology (OT), as well as the cross-over of responsibility for those technologies for IT and operations professionals have been a long-standing discussion. Jason Andersen, Vice President of Strategy and Product Management, Stratus Technologies explains more. Digital Transformation initiatives over recent…

GCHQ launch programme to solve national security challenges

GCHQ, the UK’s intelligence and cyber agency, is looking for five ambitious businesses to join its pioneering innovation programme to apply trailblazing technologies to national security challenges. The GCHQ Innovation Co-Lab, developed in partnership with HOST, the Home of Skills &…

Politicians under cyber attack: preventing attacks and leaks of confidential information

Various organisations, firms and offices, are being broken into more frequently than before through digital identity theft. Politicians have been affected as well. Leaks of important and confidential data from email accounts or inappropriately secured applications are more and more…