Tuesday, August 21, 2018
Cyber Risk rating

Do you use cyber risk rating for third-party suppliers?

The risk of a data breach due to a third-party supplier is nothing new. Organisations have long shared data with suppliers on the assumption it is secure. Much of that assumption...
OTS wants gig worker platforms to deduct tax

OTS wants gig worker platforms to deduct tax

The Office of Tax Simplification (OTS) has reported on how PAYE for gig workers could be simplified. The report, entitled Platforms, the Platform economy and Tax Simplification runs to just 20-pages....
Lee Chen, A10 networks talks about cybersecurity challenges for CEOs

A10 Network’s Lee Chen talks about CEO cybersecurity worries

When founder and CEO of A10 Networks, Lee Chen, flew into London recently, Enterprise Times (ET) got time to talk to him. Chen has grown A10 from a company that delivered...
GDPR data request costs likely to burden NHS

Exonar warns over costs of GDPR data requests

Data discovery tools vendor Exonar has warned that data requests under GDPR could cost the public sector millions. The claim is made in a report entitled The Impact of Privacy on...
Robot Transformer, Image credit Pixabay/Ralpoonvast

FinancialForce transforms the transformer

FinancialForce has announced that Methods had seen “a dramatic improvement in business performance and customer service”. Enterprise Times decided to take a closer look at what the professional services company had...
Growth Spring Sprout Image credit Pixabay/larsoncoach

Public Sector organisation invests in Sage Intacct for growth

Sage Intacct recently revealed that the Public Health Accreditation Board (PHAB) has successfully implemented and leveraged its ERP solution. The PHAB was founded in May 2007 as a non profit organisation to...

Cambridge University builds on core competence and adds Ivanti

Stephen Hoensch is Head of Frontline Services at Cambridge University. He is responsible for introducing and extending the University’s core services beyond its fibre network which criss-crosses the city to support...
Olimpiyskiy National Sports Complex in Kiev, Ukraine

Will VPNFilter attack disrupt Champions League final?

UPDATE: Radio Free Europe has come back to us with the correct link to the alert from the SSU. The story is in Ukranian but does link VPNFilter and the Champions...
Blockchain

Deloitte research confirms enterprise blockchain interest

According to a new Deloitte survey, while commercial use of blockchain may still be limited, global executives with excellent-to-expert knowledge of the technology are poised to make some major moves over...
Apttus Accelerate 2018-4

What can Apttus offer IBM blockchain? 

At Apttus Accelerate 2017, the Quote-to-Cash company was positively cool on the subject of blockchain. Come forward a year and it is a very different story. The company now has a...

LATEST NEWS

Hacking prosecutions in UK fell in 2017

Hacking prosecutions continue to fall

There were just 47 prosecutions for hacking under the Computer Misuse Act in 2017 claims UK legal firm RPC. It is 18% lower than...
Team Warrior won the NCA-set F2F cyber security challenge

Forensics key to NCA challenge

29 people, one just 14 years of age, gathered at the Defence Academy of the United Kingdom for the latest Cyber Security Challenge face-to-face...
Marap downloader uses evasion techniques

Millions of emails spreading the Marap downloader

Researchers at Proofpoint have identified a new malware downloader they have called Marap. It is being used in a new email malspam campaign aimed...
FlawedAmmyy RAT targets users in banks

Malspam campaign drops FlawedAmmyy RAT

Trustwave has spotted a new malspam (malware spam) campaign posing as an invoice. Malspam emails with infected invoices are nothing new. Most organisations see...

MedChain and Cognition Foundry to use blockchain and IBM technology  

MedChain, a start-up building globally compliant healthcare blockchain and decentralized applications (dApps) for electronic medical records (EMRs), has announced it is teaming up with...
Okta finds Microsoft MFA vulnerability

Vulnerability hits Microsoft MFA

Multifactor Authentication is seen as the solution to weak password-based security. Unfortunately, like any solution, it is just as prone to vulnerabilities as anything...
boxers Image credit pixabay/skeeze

Oracle punches Rimini Street hard in court

Oracle has issued an almost gleeful announcement after its latest win in its ongoing litigation battle against Rimini Street. In contrast Rimini Street issued...

Partnership to accelerate space exploration through blockchain

Goonhilly Earth Station (Goonhilly), the UK satellite communications and space gateway, has announced it is collaborating with space blockchain technology pioneers, Spacebit. Their intention...
KeyPass ransomware starts to spread

KeyPass is the latest ransomware to hit computers

In the last week security researchers from several companies have reported seeing a new ransomware. It is called KeyPass and, according to Bleeping Computer,...
Cyber Resiliency with Felicity March

Talking Cyber Resilience with Felicity March

The risk of a business threatening cyber-attack is ever present today. Ransomware locks up data making it hard for businesses to operate. The impact...
Confiant detects largest single day malvertising attack

4 million malvertising hits blocked in a single day

Confiant has revealed that on 11 June it blocked the biggest single-day malware redirect ever seen. The attack lasted for more than 7.5 hours...
Do you have sufficient in-house cyber security skills?

Do you have sufficient in-house cyber security skills?

Struggling to find staff with cyber security skills? Can't find affordable staff to protect your data? That's not the case for customers of backup...
Duo Security investigates Twitter bots

Duo Security hunts Twitter Bots

There is considerable attention on the problem of fake social media accounts. These accounts are enrolled into botnets that are used to push fake...
FAXPLOIT

 Hackers give the Fax a new lease of life

Forgotten about that fax in the corner of the office? Once the ‘must have’ communications device in every office, it has since be usurped...