Subscribe or login to read our latest issue and access our other features
APT Investigation in Large Commercial Networks
In this research the focus is on reactive investigation, and it sought to improve efficiencies for APT reactive investigation in large commercial networks. Large networks are characterised by large data volumes, data velocity, and veracity challenges. In these conditions attackers hide within the usual system workflows and conceal activities by using common network processes.
The Coventry Churchill Myth and Today’s Digital Dilemma – Separating Fact from Fiction
The Coventry - Churchill myth highlights the complexity of historical events and the oversimplification of facts that can occur over time. In the present day, and governments along with their Militaries and intelligence agencies have a new battleground, the digital realm.
Controlling Digital Forensic Environments - Unlocking Compliance & Efficiency
The Forensics Science Regulator’s Codes of Practice, prepared under Section 2 of the Forensic Science Regulator Act 2021, came into force on 2nd October 2023. These statutory requirements for forensic laboratories ensure sufficient controls are in place throughout Forensic Science Activities (FSAs) to meet the requirements of the UK judicial system. However, meeting all these requirements in a busy digital forensic laboratory can prove difficult. This article is intended to help!
Professionalising The Security Testing Industry - Taming the Wild West of Security Testing
There is currently an inherent lack of trust in the cyber industry between the buying community and the service industry. This is in part caused by the lack of understanding that surrounds cyber security specialisms’; whilst members of the general public understand the gist of what a cyber security professional or generalist does, the more niche specialisms can be a mystery.
Nuclear Security Leadership - ONR And Accenture Deliver Executive Cyber Security Briefings
This article highlights relevant good practice, relating it to the requirements of the civil nuclear sector and is based upon the materials produced to support executive briefings and has wide applicability to the leadership and governance of cyber security in other organisations.
Plus all the regular features...
Latest News
Search Begins for the Next Generation of Cyber Security Talent
In partnership with Department for Science, Innovation and Technology (DSIT), Foreign, Commonwealth and Development Office (FCDO) and the National Cyber Security Centre (NCSC) will be sending a team of young women to represent the UK at the inaugural Kunoichi Cyber Games taking […]
Continue ReadingEntries Open for the 2025 Cyber OSPA’s
The Cyber OSPAs have been running since 2021 and aim to recognise and highlight outstanding performance by companies, people, products and initiatives across the cyber security sector globally. Entry to the Cyber OSPAs is currently open through to 4 February […]
Continue ReadingNational AI Awards 2024 winners Showcase Industry Innovation
The prestigious National AI Awards which took place at Adastral Park, Ipswich, announces winners. The National AI Awards 2024 celebrates the remarkable achievements of AI innovators, teams, and organisations that have demonstrated outstanding leadership in transforming industries, improving lives, and advancing the state […]
Continue ReadingNational Cyber Awards 2024
National Cyber Awards, set to take place on September 23rd 2024. Sponsored by leading organisations in cybersecurity, including Headline Sponsor BAE Systems, as well as IBM, Fortinet, Qualys, UK Cyber Security Council, Chartered Institute of Information Security, TechUK, SANS Institute, […]
Continue ReadingLatest Blog Articles
Survey Reveals AI’s Real-World Priorities: GenAI Enthusiasm Isn’t the Whole Story
Domino Data Lab, provider of the leading Enterprise AI platform trusted by the largest AI-driven enterprises and major government agencies, has announced the findings of a survey conducted by BARC Domino commissioned of 278 enterprise AI leaders globally about how […]
Continue ReadingThe Hostile Hotel – Actually It’s Good That Hotels Announced Room Searches
The Grugq – Independent Cybersecurity Researcher Twitter: @thegrugq Some hotels in Vegas have alerted their guests there will be daily room searches to look for anything with too many hacker vibes. While this is naturally upsetting to many people, it […]
Continue Reading60 Hurts per Second – How We Got Access to Enough Solar Power to Run the United States
Posted with permission of BitDefender. The electricity grid – the buzzing, crackling marvel that supplies the lifeblood of modernity – is by far the largest structure humanity ever built. It’s so big, in fact, that few people even notice it, […]
Continue ReadingThe Role of APIs within Large Language Models and the Shift Towards a Multi-LLM World
With the arrival of Large Language Models (LLMs) such as ChatGPT, BERT, Llama, and Granite, the operational dynamics within the enterprise sector have significantly changed. LLMs introduce unique efficiencies, paving the way for innovative business solutions. LLMs currently stand at […]
Continue Reading