Skip to content

Rublon

JuliaSoft SRL

Advancis Software

Osirium

ScorpionBonus

Variti

Trend Micro

Safeguard Cyber

Safetell

SSL247

RedLock

Unbound Tech

eSentire

Pentest People

CrowdStrike

NCP Secure Communications

My1Login

ISACA

The Security Institute

HyTrust

Cleafy

StayPrivate

Neustar

Sophos Ltd.

Illumio

HackerOne

Forum Systems

VenomIT

Flowmon Networks a.s.

ForeScout Technologies Inc

Echoworx

SecuLution GmbH

WatchGuard Technologies

Informatica

Symantec

CyberArk Software Ltd

Vectra Networks

CloudWatchHub

BSI Group

ID Quantique

Diskshred

Sumo Logic

Secureworks

AVG Business by Avast

Duo Security

DOSarrest Internet Security

NSFOCUS Technologies (UK), Limited

Mthree Consulting

Landesk

Hitachi ID Systems

DPSP Cluster

Darktrace

CompTIA

BlueCat Networks

AXELOS Global Best Practice

Aqua Security

Algosec

Activereach

Blackberry

DYN

(ISC)2

Trusted Knight Corporation

SailPoint Technologies Ltd

Cpacket Networks

CipherCloud

Bitdefender

Hexatier

Centrify

Varonis

iProov

Digitranz

Elastica

100 PercentIT

F-Secure

Qualys

EITDigital

Twist and Shout Media

Firelayers

Kalray

Watchful Software

SSH Communications Security

Alert Logic

Caretower

Server Choice

Netskope

CloudBric

Blancco Technology Group

OneLogin Inc.

Raritan

Datto INC

Article 10

Trend Micro

iWebGate EMEA Ltd

Security analytics

68% of UK businesses hit by a cyberattack this year

News

Huawei logo

BT wants Huawei hardware far, far Huawei from critical infrastructure

News

Hacker fraud

Kubernetes security flaw allows hackers to infiltrate backend servers

News

FBI Executive Assistant Director Amy Hess

Two Iranians indicted for SamSam ransomware attacks

News

London skyline

Time to get national cybersecurity strategy in order, UK committee warns

News

AI system predicts business cyberattacks hatched in dark web forums

News

RiskIQ names Magecart as hacker group behind British Airways data breach

News

Trend Micro apps found to be secretly harvesting data

News

British Airways suffers data breach

News

Printing

Why slack print security is leaving you wide open for breaches

Feature

Report: only half of UK companies have secured critical data

News

Charity sector commits high number of data breach offences

News

RBI

Reserve Bank of India to improve security in FY19

News

Caution tape

Brand safety: what are the priorities in an ever brand-centric economy

Interview

Facebook Iran

Facebook pulls 650 accounts linked to misinformation campaign

News

Israel cybersecurity

Israel pledges $24 million to boost cybersecurity

News

Fortnite Android

Fortnite on Android at risk of malware

News

AI malware

Researchers identify new AI-powered malware threat

News

IoT automotive

IBM launches four X-Force Red cybersecurity facilities

News

Symantec

Symantec releases industry-first email attack solution

News

Timehop

Timehop database breached, 21 million users affected

News

social media

Social media in 2018: moving away from data?

Feature

Facebook

Facebook warned not to ‘play games’ with UK government

News

Quantum security: will we make it in time?

Feature

Cortana

Cortana leaves Windows 10 vulnerable on locked devices

News

Dixons Carphone

Dixons Carphone suffers data breach after attack

News

kaspersky

Kaspersky sues Dutch newspaper for defamation

News

MyHeritage

MyHeritage leaks 98 million email addresses

News

SOC

SOC workers and bosses can’t see eye-to-eye, says study

News

TalkTalk

Police discouraged TalkTalk from going public with breach

News

GDPR

The mania of GDPR Day One

News

Zerto previews 7.0 and releases IT resilience platform

News

AimBrain releases free biometrics platform for small businesses

News

Car salesman asks customer to tick reCAPTCHA box… on paper

News

Microsoft to extend GDPR rights internationally

News

A week before GDPR, Greenwich University fined for data breach

News

Kaspersky moves to Switzerland following corruption claims

News

IoT botnet Hide and Seek evolves to survive device reboot

News

GDPR

Data breaches, security and GDPR – getting a consistent, continuous approach in place

Feature

380,000 Hong Kong Broadband customer details leaked

News

GDPR may hinder cybersecurity, say experts

News

34 firms sign Cybersecurity Tech Accord, big names missing

News

How to have your cloud and eat it

Feature

Blockchain: a poisoned chalice for the police?

Interview

Engaging with your people to make InfoSec an enabler

Feature

Avoiding an Orwellian future through effective regulation

Feature

SK Telecom buys $65M stake in Swiss quantum cryptography company

News

GDPR identity

The changing face of identity in the 2020s

Interview

Cybercrime and the scale of justice

Interview

Winter Olympics hit by cyber attack during opening ceremony

News

What government agencies tell us about cloud security

Feature

Symantec adds security layer to Azure

News

How cybercrime is changing across the world

Feature

Major security flaw found in Oman stock exchange

News

Kaspersky discovers powerful Skygofree mobile Trojan

News

Intel CEO addresses Meltdown, announces quantum developments

News

Android users being targeted by fake Uber app

News

Ticket tout bots criminalised by UK government

News

Cybersecurity chief: Singapore escaped cyberattacks largely by chance

News

Cybersecurity in 2018: what we can expect to face

Feature

Security spending rockets amid tighter rules and growing fear

News

Barclays cuts ties with Kaspersky following NCSC guidance

News

NATO members consider cyber attacks against adversaries

News

Critical security vulnerability in millions of Intel processors

News

Google chief lawyer slams ‘right to be forgotten’ ECJ cases

News

BYOD

Building security and privacy protection into a BYOD environment

Feature

Data protection

GDPR: Data protection as a collaborative process

Feature

Russian Trojan

Silence Trojan stealing money from Russian banks

News

Security

Cybersecurity detection more important than protection, says Microsoft CTO

News

Microsoft drops secrecy order case as DoJ changes rules

News

Kaspersky Labs to release source code to drive transparency

News

Oracle releases AI-based cloud security and management suite

News

Max Schrems data transfer case passed to European Court of Justice

News

Ransomware: a growing global threat

Feature

Cybersecurity integration

Why integration is key to effective security change

Feature

Ransomware

The swelling tide of ransomware and how to fight back

Feature

Deloitte cyberattack leaks emails and details of clients

News

Equifax

The Equifax example: Bridging the gap between Security and DevOps

Opinion

Cloud security and adoption in the APAC region

Feature

Viacom

Viacom server leak exposes critical data

News

44CON Insider: The importance of collaborative efforts in cybersecurity

News

Singapore boosts investment in deep-tech startups and research

News

Equifax data breach leaks 143 million U.S. customers’ personal information

News

Cyber attack group with links to Russia attacking western energy sector, says Symantec

News

Up to six million Instagram accounts affected by data breach

News

CeX suffers data breach affecting up to two million customers

News

Cross-industry team disrupts WireX botnet attack

News

Accuweather found to be sharing location data without users’ permission

News

PlayStation suffers social media hack, possible data breach

News

Privacy

Rackspace announces fully managed privacy and data protection offering

News

McAfee

McAfee launches advanced security platform for AWS

News

Why the security industry is teaming up in the fight against ransomware

Feature

GPS may be on the way out for ships amid security fears

News

UK Data Protection Bill to put more power into users’ hands

News

New tool allows smartphone camera to record fingerprints

News

Webcam

WikiLeaks reveals CIA tool for hacking webcams

News

Symantec sells web security solutions for almost $1bn

News

Game of Thrones script leaked as HBO suffers data breach

News

Network security

Profile-based anomaly detection promises greater network security

News

Code suggests iPhone 8 will have facial recognition and no home button

News

EAC flags

How Africa is working to harmonise data privacy

Feature

Changing cybersecurity landscape creates global threat, warns Accenture

News

Cybersecurity Army

U.S. Army opens cyber research centre

News

TSB biometrics

TSB to roll out iris scan biometric authentication

News

IBM Z

IBM Z mainframe allows round the clock data protection

News

Mobile security

Symantec to acquire Israeli mobile security startup Skycure

News

iPhone facial recognition

Apple reportedly testing 3D facial recognition for iPhone 8

News

UK Parliament

Liberty to challenge UK Investigatory Powers Act

News

Patient data

The challenges surrounding patient data sharing

News

Technology giants allowing Russian government access to source code

News

NHS A&E

Cyber security is a critical business risk for the NHS, warns Barclays CSO

News

Data breach

198 million voter records leaked by analysis firm

News

TSA

TSA trials new biometrics tech to eliminate boarding passes

News

Foscam

Multiple severe security flaws discovered in Foscam cameras

News

Fireball

Chinese ‘Fireball’ malware infects 250 million

News

Threat intelligence

Cisco and IBM partner to tackle cloud security threats

News

CIA

Latest WikiLeaks Vault7 release details CIA Windows spyware

News

Passwords

Why machine learning is set to transform identity and access management

Feature

Zomato app

Zomato hacked, 17 million users’ data stolen

News

Patient data

Google mishandled NHS patient data, investigation warns

News

GDPR EU

Why encryption is a critical step towards GDPR compliance

Feature

Economist ransomware

Ransom demands by hackers determined by The Economist

News

Botnet search engine

Shodan search tool tracks down botnet command-and-control servers

News

Perimeter Verizon

Verizon releases software-defined perimeter security service

News

Digital Economy Bill to be debated again in the House of Lords

News

EU report raises FinTech, blockchain concerns

News

Lacework launches Polygraph, a zero-touch cloud security tool

News

BankBot malware targets hundreds of Google Play apps

News

Ed tech

Surveillance culture begins in school, finds EFF report

News

Binoculars

Netflix found to leak information on HTTPS-protected videos

News

Computer virus

Word vulnerability exploited to send Dridex malware to millions

News

White Papers at The Stack

White paper: Identity and Access Management (IAM) without compromise

White Paper

Identity Access Management

Identity-as-a-service demand rises with cloud growth

Default

Home security

Qualcomm patents indoor radar WiFi router

Default

Federal cybersecuirty

Federal committee considers cybersecurity corps

Default

Pegasus Android

Android variant of Pegasus spyware discovered

Default

Research investigates link between cybercrime and autistic traits

Default

Airline phishing

Airline phishing attack has 90% success rate

Default

German military

German military to introduce cyber command amid rising threats

Default

Mirai variant

U.S. college endures 54-hour Mirai variant attack

Default

Cloudflare piracy

District court rules against Cloudflare in anti-piracy suit

Default

CCTV airport

Hitachi develops AI for real-time people detection and tracking

Default

CIA Apple

Apple claims WikiLeaks vulnerabilities fixed years ago

Default

Mobile base station

Fake mobile base stations used to spread malware in China

Default

Ransomware authors burying payloads deeper in installer packages

Default

WhatsApp encryption

WhatsApp vulnerability sidesteps message encryption

Default

UK surveillance

UK government launches surveillance camera strategy

Default

JSON encryption scheme contains critical vulnerability

Default

New technique authenticates passwords via lip reading

Default

Radiographer

Thousands of NHS workers’ personal data stolen in hack

Default

Marines ask if Cyber Command could help online harassment issues

Default

Government report warns China and Russia dangerously ahead of U.S. in cyberwar capabilities

Default

Russia tells Denmark to leave ‘smart’ mobile devices at home during visit

Default

Unsecured backup exposes global spam farm

Default

Research proposes ‘full-journey’ email encryption

Default

Web-connected teddy bear toys leak 2 million private voice messages and other private data

Default

Singapore Mindef

Personal data stolen from Singapore Ministry of Defence servicemen and staff

Default

Open source DoD

DoD launches Code.mil open source initiative

Default

PC LED

Hard drive LED can leak air-gapped data

Default

Fingerprinting

Judge rules against forced fingerprinting

Default

Gordon Ramsay

Celeb chef Gordon Ramsay’s in-laws charged with hacking

Default

Squirrels outrank hackers as threat to U.S. electrical grid

Default

Xen Project proposes issuing fewer advisories

Default

Proof of concept ransomware could poison water supply

Default

Cisco defends Smart Install protocol, which permits unauthenticated logins

Default

Cardless ATMs use smartphones to access cash

Default

JQuery mobile vulnerability allows cross-site scripting, no fix soon

Default

CRYSIS ransomware

CRYSIS ransomware distributed by brute force attacks

Default

Bitcoin anonymous

New system increases anonymity for bitcoin transactions

Default

New chaos-based algorithm improves surveillance network

Default

Bodycam Taser

Taser to bring artificial intelligence to police on-body cameras

Default

Trump

U.S. wants travellers to disclose social media passwords on visa application

Default

72% of ‘anonymous’ browsing history can be attached to the real user

Default

UK government: National Insurance numbers misused as ‘National ID’

Default

Public records

California to decide whether personal device communication is public record

Default

NHS Google

Google blocks NHS for ‘botnet’ resemblance

Default

All new Thai SIMs will require fingerprint registration from March

Default

Adblock-blockers ‘ineffective’, adblocking up 30% globally in two years

Default

Manage, monitor and control physical access to server rooms and racks

Brochure

Solving the security dilemma of shared data centres

Article

Russia suspected in Czech foreign ministry hack

Default

U.S. anti-ISIS web propaganda hobbled by language/cultural barrier

Default

Matryoshka malware-loaded document aimed at NATO

Default

WhatsApp to introduce live location sharing feature

Default

DDoS attack

To DIY or not to DIY: when it comes to DDoS protection, it’s not really a question

Default

Apple MoD

UK military to ‘harden’ iPhone 7 for communicating state secrets

Default

Hacker fraud

Honour among thieves: Website reveals fraud within hacking world

Default

Kaspersky Lab

Russian cybersecurity expert arrested over treason charges

Default

Shields: Tor, archive.org, WordPress and more aid ‘vile’ terrorist propaganda

Default

Android Malware poses as Netflix app

Default

Border control

Australia plans to replace passports with biometric border control

Default

Lloyds Bank survives three-day DDoS onslaught

Default

Mac-compatible ‘Fruitfly’ malware escapes detection for years

Default

Social media curator algorithms may be detrimental to user

Default

Ericsson Telstra

Demo achieves in-transit data encryption over 10Gbps international link

Default

Microsoft avoids Swiss legal battle with Windows 10 changes

Default

IRS lax on bitcoin investment guidance, report says

Default

On-body transmission and its biometric implications

Default

CISO Board

Communicating cyber risks to the board

Default

Giuliani BlackBerry

BlackBerry and Giuliani partner in cyber security venture

Default

Cyber security U.S.

Cyber policy at the dawn of a new administration

Default

Facial recognition

Anti-surveillance clothing obscures wearer from facial recognition tech

Default

Reduce the risk of a data breach with an Aperio® Server Cabinet Lock

Press Release

Aperio® is easy to integrate and helps to manage, monitor and control physical access to server rooms and racks.

David Kay

Paul Duckling

Senior Technologist

Fred Ellis

Intelligence Analyst and Financial Investigator

Mark Nicholls

Head of Information Security & Governance

Steve Wright

Data Protection & Information Security Officer

Eve Salomon

Chair

Victoria Baines

Founder

Ben Russell

Head of Threat Response

Joyce Hakmeh

Cyber Research Fellow, International Security Department, and Co-Editor of the Journal of Cyber Policy

Daniele Màtyàs Tieghi

CTO and Product Manager

Dr Lee Hing Yan

​Executive Vice President of APAC ​

Hatem Naguib

SVP of Security

Raj Samani

McAfee Fellow & Chief Scientist

Martin Hoskins

Associate Director, BRS

Alvaro Hoyos

CISO

OneLogin Inc.

Joe Pindar

Director of Product Strategy

Daniele Catteddu

CTO

Darren Thomson

Chief Technology Officer (CTO) and Vice-President of Technology

Symantec

Sandra Bell

Head of BC & ISDG Consulting

Sungard Availability Services

Joshua Stenhouse

Technology Evangelist

Al Sargent

Senior Director Product Marketing

OneLogin Inc.

Fredrik Forslund

Director, Cloud & Data Center Erasure Solutions

Blancco Technology Group

Pat Clawson

CEO, Blancco Technology Group

Blancco Technology Group

David Meyer

VP Product

OneLogin Inc.

Lee Field

Associate Director, Solution Architecture

Verizon