Survey shows executives are concerned about network security threats

Nearly eight in ten Americans (77%) believe their company has gaps in its current security tools, according to Lynx Software Technologies (Lynx). Lynx, an innovator in modern platform software technologies, commissioned a survey of 500 Americans in managerial and executive…

Department for Education boosts cyber training courses in security revamp

The Department for Education (DfE) overhauled its security investment in the most recent financial year (FY 20-21), by increasing security courses on offer to staff from four to 44. Additionally, course participants surged from just under 7,000 in FY 19-20,…

Nearly half of remote employees engage in risky password behaviour

LastPass by LogMeIn has released findings of its fourth Psychology of Passwords global report, which revealed that while 92% of people know that using the same password or a variation is a risk, 65% still re-use passwords across accounts, drastically…

ETSI releases specifications boosting trustful end-to-end network and service automation

ETSI has announced the release of three major specifications and report developed by its Zero-touch network and Service Management (ZSM) group. ETSI GS ZSM 003, defines end-to-end network slicing management and orchestration architecture blueprint and solutions, and ETSI GS ZSM 009-1 specifies the…

IP platform provides computing at the Edge with integrated security subsystem

Sondrel has created a powerful, quad core IP platform, the SFA 200, that is suitable for ASIC solutions for remote gathering and processing of video and data at the Edge with secure onwards transmission of the results. The resulting, single…

Group report on encrypted traffic integration released to protect users from attacks

ETSI’s Industry Specification Group on Encrypted Traffic Integration (ISG ETI) has concluded the early part of its work, by identifying problems arising from pervasive encrypted traffic in communications networks. In the group’s first report, ETSI GR ETI 001, entitled Encrypted Traffic Integration…

‘Bad bots’ make up nearly two-fifths of all internet traffic

A new report from Barracuda networks has revealed that automated traffic takes up nearly two-thirds of internet traffic (64%) – and whilst just 25% of automated traffic was made up by good bots, such as search engine crawlers and social network bots,…

IET report explores advancing safety in transport through automation

The need for a road crash investigations branch is one of the recommendations in a new report from the Institution of Engineering and Technology (IET) that explores the expected impact automation will have on the transport sector. Advancing safety in…

GCHQ launch programme to solve national security challenges

GCHQ, the UK’s intelligence and cyber agency, is looking for five ambitious businesses to join its pioneering innovation programme to apply trailblazing technologies to national security challenges. The GCHQ Innovation Co-Lab, developed in partnership with HOST, the Home of Skills &…

Politicians under cyber attack: preventing attacks and leaks of confidential information

Various organisations, firms and offices, are being broken into more frequently than before through digital identity theft. Politicians have been affected as well. Leaks of important and confidential data from email accounts or inappropriately secured applications are more and more…