Huawei to be removed from UK 5G networks by 2027 due to security fears

Huawei to be removed from UK 5G networks by 2027 due to security fears

HUAWEI WILL be completely removed from the UK’s 5G networks by the end of 2027, the Government has announced, following new advice produced by the National Cyber Security Centre (NCSC) on the impact of US sanctions against the telecommunications vendor. Ahead of this there will be a total ban on the purchase of any new 5G kit after 31 December 2020.

security fears, Huawei to be removed from UK

UK authorities and allies expose Russian cyber attacks on Coronavirus vaccine development

UK authorities and allies expose Russian cyber attacks on Coronavirus vaccine development

RUSSIAN CYBER actors are strongly believed to be targeting organisations involved in Coronavirus vaccine development, UK security officials have revealed. The National Cyber Security Centre (NCSC) has published an advisory detailing the activities of the threat group known as APT29, which has exploited organisations globally.

expose Russian cyber attacks, attacks on Coronavirus vaccine

Digital privacy: A double-edged sword

Digital privacy: A double-edged sword


Digital privacy is paramount to the global community, but it must be balanced against the proliferation of digital-first crimes, including child sexual abuse, human trafficking, hate crimes, government suppression, and identity theft. The more the world connects with each other, the greater the tension between maintaining privacy and protecting those who could be victimized.

Digital privacy

Remote working security challenges urge MFA implementation

Remote working security challenges urge MFA implementation


The past few years have seen an increase in employees using personal devices and systems to access work emails and company databases, and exchange valuable information with colleagues, clients, and vendors. These tools can help people complete their jobs but are fraught with security challenges.

Remote working security

The current state of consumers’ cybersecurity awareness

The current state of consumers' cybersecurity awareness


With the second anniversary of GDPR on the horizon, the topic of data security is as pertinent as ever. Despite the proliferation of connected devices and the personal information and sensitive data they harbor, many consumers are unaware of just how susceptible their pocket-sized computers are to cyberattack.

consumers’ cybersecurity awareness, cybersecurity ,

Cybersecurity software sales and training in a no-touch world

Cybersecurity software sales and training in a no-touch world

The pandemic has led to an outbreak of cybercriminal activity focused on remote workers and enterprises that needed to quickly migrate to the cloud to maintain business continuity. More than 3,100 phishing and counterfeit websites were created each day in January. By March, that figure exceeded 8,300. Communication and collaboration phishing sites also grew by 50% from January to March.

Cybersecurity software, training in a no-touch world

European Commission: Still Work to Do on GDPR

European Commission: Still Work to Do on GDPR

The GDPR has successfully met its main objectives but work still needs to be done to improve cross-border investigations, increase regulator resources and address fragmented approaches across the EU, according to the European Commission..

Still Work to Do on GDPR, GDPR

How to protect remote workers from phishing and other attacks

How to protect remote workers from phishing and other attacks


Working from home is a new ‘norm’ for many organizations, but the shift toward remote work has been steadily increasing for the past decade. In fact, between 1996 and 2016 there’s been a 300% increase in the number of companies offering remote work options. Now, of course, it’s mandatory for many of us.

protect remote workers, phishing, attacks

5 Tips for Minimizing Third-Party Risk

5 Tips for Minimizing Third-Party Risk


Outsourcing has become a vital part of most business strategies. Not only is it a way to save money, but it’s a simple way to take advantage of expertise you might not currently have in house. But outsourcing can also leave companies vulnerable if the third-party doesn’t have proper cybersecurity procedures.

Minimizing Third-Party Risk

A look inside privacy enhancing technologies

A look inside privacy enhancing technologies


There is a growing global recognition of the value of data and the importance of prioritizing data privacy and security as critical cornerstones of business operations. While many events and developments could be viewed as contributing to this trend, it would be difficult to argue that the increased discussion generated by today’s accelerating regulatory environment has not played a significant role.

privacy enhancing technologies

Five signs a virtual CISO makes sense for your organization

Five signs a virtual CISO makes sense for your organization


As today’s threat landscape continues to feature more sophisticated, well-funded, highly organized and increasingly complex cyber adversaries, defense and remediation strategies have become much more challenging. Protecting an enterprise and preparing for current and future threats requires a great deal of expertise, planning and timely and targeted actions.

Virtual, CISO, organization

Passwords still widely used, despite known weaknesses

Passwords still widely used, despite known weaknesses

Nearly a third (29%) of organizations in Europe and the Middle East still see usernames and passwords as one of the most effective means to protect access to their IT infrastructure, two years after the inventor of the complex static password admitted they don’t work, according to Thales.

Passwords, weaknesses

The state of data quality: Too much, too wild and too skewed

The state of data quality: Too much, too wild and too skewed

We live in the age of data. We are constantly producing it, analyzing it, figuring out how to store and protect it, and, hopefully, using it to refine business practices and better understand the markets and customer we work with. However, this is all easier said than done and one of the biggest concerns that businesses have around their data is the quality – a fact confirmed by 1,900 people surveyed at the end of last year on the state of data quality. Despite being aware of data quality issues, many are uncertain about how to best address those concerns.

data quality

The Biggest Cybersecurity Mistakes CISOs Might be Making Today

The Biggest Cybersecurity Mistakes CISOs Might be Making Today

As more organizations move to the cloud, the need for airtight security has become paramount. As threats evolve and become more sophisticated, mitigating hacks and malicious attacks has become very difficult. And for many Fortune 1000 CISOs, some still believe that managing their security in-house or on-premise is safer and more cost-effective—when the opposite can very well be true.

Cybersecurity Mistakes, CISOs

21% of SMBs Don’t Have a Data Backup or Disaster Recovery Solution in Place

21% of SMBs Don't Have a Data Backup or Disaster Recovery Solution in Place

New research (…) indicates that 58 percent of C-level executives at small and medium businesses (SMBs) said their biggest data storage challenge is security vulnerability. Nearly half (49 percent) of top leaders at SMBs said cyberattacks are their biggest data protection concern. Yet more than 20 percent of SMB leaders said they do not currently have a data backup or disaster recovery solution in place.

SMBs Don’t Have a Data Backup, Disaster Recovery Solution, data protection, cyberattacks

Nearly 60% of Security Professionals Trust Cybersecurity Findings Verified by Humans over AI

Nearly 60% of Security Professionals Trust Cybersecurity Findings Verified by Humans over AI

New research revealed that while over half of organizations use artificial intelligence (AI) or machine learning in their security stack, nearly 60 percent are still more confident in cyberthreat findings verified by humans over AI.

security professionals, artificial intelligence (AI), cybersecurity, Cybersecurity Findings Verified by Humans over AI

Hacking has become a viable career, according to HackerOne

Hacking has become a viable career, according to HackerOne

HackerOne announced findings from the 2020 Hacker Report, which reveals that the concept of hacking as a viable career has become a reality, with 18% describing themselves as full-time hackers, searching for vulnerabilities and making the internet safer for everyone. Not only are more hackers spending a higher percentage of their time hacking, they’re also earning a living doing it.

Hacking, career

Do your employees feel valued? 64% have one foot out the door

Do your employees feel valued? 64% have one foot out the door

The estimated current cybersecurity workforce is 2.8 million professionals, while the amount of additional trained staff needed to close the skills gap is 4.07 million professionals, according to (ISC)2. This makes retaining employees a top priority, but how can companies be successful at this?

employees, valued