Denying the deniers: tackling DDoS attacks
- Details
- Published: Wednesday, 17 February 2016 09:15
By Professor Avishai Wool.
Distributed denial of service (DDoS) attacks are an old attack vector but they continue to be popular; and highly effective.
By Professor Avishai Wool.
Distributed denial of service (DDoS) attacks are an old attack vector but they continue to be popular; and highly effective.
The prpl Foundation, an open-source non-profit organization, has announced the availability of a new document, ‘Security Guidance for Critical Areas of Embedded Computing’, which describes a hardware-led approach to connected device security
Most UK business decision makers admit that their organization will suffer from a cyber security breach at some point. They also anticipate that to recover from a data breach would cost upwards of £1.2 million on average for their organization, the highest figure globally.
Not only does a software-defined data center / centre provide CIOs with a way to improve disaster recovery and combat shadow IT, but it is also the first step in moving toward a truly service-defined enterprise and acts as the catalyst that redefines the CIO’s role from technologist to business enabler and innovator.
Paul German looks at the specific security issues with VoIP session initiation protocol and explains why the risks need to be taken seriously. It’s time to think differently about SIP security: before it is too late…
Almost two-thirds of organizations are considering outsourcing all, or parts of their security operations in light of growing and diversifying cyber-security threats. This is according to a survey of 300 IT decision makers sponsored by mission critical IT services provider Advanced 365.
Tripwire, Inc., has published the results of an extensive study conducted by Dimensional Research on its behalf. The study evaluated the confidence of IT professionals regarding the efficacy of seven key security controls that must be in place to quickly detect a cyber attack in progress.
UK small businesses are hugely underestimating the impact that a cyber attack could have on their reputation and must take steps to protect it, according to the findings of the Small Business Reputation and the Cyber Risk report, published by the Government’s Cyber Streetwise campaign and KPMG.
A new agreement between INTERPOL and Barclays marks an important development in public-private partnerships to more effectively combat cybercrime.
Barclays will become the first financial institution to have staff working full-time alongside police and other experts
The entire Continuity Central website is scanned daily by Sucuri to ensure that no malware exists within the site. This means that you can browse with complete confidence.
Business continuity can be defined as 'the processes, procedures, decisions and activities to ensure that an organization can continue to function through an operational interruption'. Read more about the basics of business continuity here.