After the OPM hack InfoSec Institute identifies five key areas of vulnerability to protect against catastrophic damage. read more
Ponemon Institute: There is a gap in perception between boards of directors and IT executives. read more
A German Army Patriot missile system was allegedly hacked by a remote source. read more
Mistake Exclusion means a failure to maintain adequate data security can turn out to be very costly. read more
Greater levels of automation mean the aviation industry is more vulnerable to cyber threats. read more
The FBI cannot access the encrypted platforms being used by Islamic State to recruit lone-wolf terrorists. read more While EUROPOL are aiming to take on IS propaganda. read more
The Hacking Team scandal and a successful challenge to UK Surveillance laws coincide. Opinion by Alex Krasodomski read more
Vulnerabilities in Adobe Flash only came to light following Hacking Team data dump. read more
Loss of customer trust & confidence are the most damaging consequences of attacks. read more
Proposed legislation for mandatory compliance with bulk data collection will include domestic interception. read more
Greek bank customers are limited to a 60 Euros daily cash withdrawal. Maybe Bitcoin will come in useful. read more
A growing list of American allies, in addition to France & Germany, are being spied on by the NSA. read more
Drones currently represent equal parts threat and opportunity for nuclear facilities. Opinion by Caroline Baylon. read more
Thanks to the IoT there will be more than 40 billion connected devices in use within five years. read more
Moore's Law in Action: Smaller, Faster, Cooler, More Powerful. read more
Fintech problems throw doubt on the capability of the major banks' ageing technology systems. read more
Hacker Hell: It's a virtual civil war ... read more
Insider Threat Report uncovers the hard facts on insider threats. read more