Huawei decision won’t affect US-UK intelligence sharing, says MI5 chief
The US-UK intelligence sharing partnership will remain intact if Huawei is allowed to participate in the roll-out of Britain’s 5G network, the head of MI5 has said. The intervention comes amid a...
View ArticleUse of Huawei in UK 5G networks would be “madness”, say US officials
The use of Huawei technology in the United Kingdom’s 5G networks would be “nothing short of madness”, senior United States officials have reportedly warned British ministers. Last year, the Chinese...
View Article“We say no to more money from our partners – security is a behavioural...
Freshfields Bruckhaus Deringer is a global law firm with 27 offices. Like many businesses, the company is in the midst of a big digital transformation programme, which aims to change the capabilities...
View ArticleClearview AI facial recognition startup partners with “600” law enforcement...
A controversial facial recognition startup that harvested billions of images from social media sites has struck partnerships with more than 600 law enforcement agencies, it has claimed. The firm,...
View ArticleWhy the UK is banning default passwords in IoT devices
From washing machines and children’s toys to personal assistants, we are increasingly seeing more of our daily lives connected to the internet. In fact, research suggests by 2025 there will be 75...
View ArticleUK to give Huawei limited role in 5G networks, dealing a major blow to Trump
The UK has agreed to give Huawei a limited role in the development of Britain’s 5G networks, defying pressure from Washington to issue an outright ban on the Chinese tech giant’s equipment. At a...
View ArticleNHS ransomware attacks plummet – but why?
The NHS has seen a staggering drop in the number of successful ransomware attacks in the last two years, according to data revealed under transparency laws. Since 2014, at least 65 NHS trusts have been...
View ArticleWhat Twitter’s response to Clearview tells us about facial recognition’s future
Technological developments can break down all sorts of boundaries, distinctions and seperations. The most recent of these ruptures has led to a battle over who owns our faces. It has been reported that...
View ArticleThe cyber arms race in the cloud: new threats require a new approach to defense
With companies rushing to embrace digital transformation projects, 2020 will see an explosion of cloud adoption across businesses in all sectors. And while the efficiency and scalability of cloud...
View ArticleHow consolidation is reshaping the cyber security market
The cyber security technology sector continues to experience a wave of acquisitions. Leading technology vendors and security service providers continue to strengthen their portfolios by acquiring...
View ArticleDisaster recovery must be at the core of any business continuity strategy
Disaster recovery – didn’t that go out with the mainframe computer? Unfortunately, one of the primary jobs of an IT professional is still to evaluate and manage risk as well as plan for contingencies....
View ArticleVodafone to remove Huawei equipment from network cores
Vodafone confirmed on Wednesday (5 February) that it plans to strip out Huawei’s equipment from the core of its European networks over the course of the next two years. The decision comes after the UK...
View ArticleWhy the Iowa app fiasco came as little surprise to developers
At this stage, it’s not exactly what went wrong with the mobile app created to speed up the process of counting state-wide votes during the Democratic caucus in Iowa last week, but developers across...
View ArticleRussia’s GRU was behind cyber attacks on Georgian government and media, says...
British security officials have identified a Russian military intelligence unit as the source of a series of “large-scale, disruptive cyber attacks” on Georgia last autumn. The former Soviet Union...
View ArticleCyber security is still an afterthought for most organisations, EY survey shows
A new survey from professional services firm EY shows many organisations failing to integrate cyber security into technology planning despite a continued increase in cyber attacks. The problem: poor...
View ArticleCoronavirus: Moscow deploys facial recognition to enforce self-isolation
Moscow authorities have deployed facial recognition software to police new self-isolation rules imposed on Russian citizens returning from China amid the coronavirus outbreak. The city’s mayor warned...
View ArticleWhen it comes to insider threats, trouble starts at the top
Despite years of warnings about the risk of insider cyber threats, the number of incidents and the associated costs has risen sharply over the last two years. The burden of responsibility for data...
View ArticleDISA breach could provide leverage to nation state attackers, says ex-CIA...
A hack on the Defence Information Systems Agency (DISA), responsible for US military comms including calls made by President Trump, exposed the personal data of about 200,000 people, it was announced...
View ArticleClearview AI hack is sweet irony for privacy advocates
Clearview AI, the controversial facial recognition company, announced that someone with “unauthorized access” hacked sensitive information, including its entire client list. The organisation has...
View ArticleMI5 chief to tech firms: help us get around encryption
The outgoing director general of MI5 has become the latest spy chief to issue a call for “exceptional” access to encrypted platforms. In an interview due to be broadcast on ITV tonight (27 February),...
View Article