Category: UK Exclusives

Is more regulation for drones the answer?

As the number of drones or Remotely Piloted Aerial Systems (RPAS) in our skies continues to soar both for commercial and leisure use it is perhaps not too surprising that we are seeing more and more calls for enhanced regulation or, at the very least, more coordination and consistency of approach across borders. Tim Compston takes a closer look at demands for the increased regulation of drones.

Three IT Security Predictions for 2016

An abundance of security breaches came to light throughout 2015; so many that hearing yet another hacking story on the news wasn’t surprising. Now that 2016 has arrived, Paul German, VP EMEA, Certes Networks gives three predictions for what will happen in IT security this year.

Solving the security dilemma of shared data centres

Some of the world’s best-known companies have succumbed to data breaches that proved expensive—in terms of both cost and reputation. The focus, usually, is on a digital attack. Passwords and anti-hacking procedures come under scrutiny, particularly in a world where so much of our information lives in the cloud.

"Cyber security isn't working - security breaches are inevitable

“Cyber security isn’t working – security breaches are inevitable.”

Paul German insists it is time to face up to the futility of breach detection and protection alone, and that organisations must make a change to avoid the fate of the organisations that have recently hit the hacking headlines. Too many companies are being breached; and governments globally are recognising the need to invest heavily to protect vital services and infrastructure.

Right to be Forgotten and EU GDPR: A Corporate Dilemma

Right to be Forgotten and EU GDPR: A Corporate Dilemma

IT governance & technology deficiencies impede organisations from complying with “Right to be Forgotten” & EU GDPR by 2018 – although 46 percent of global organisations received customer requests to remove data in last 12 months, 41 percent lack defined processes, documentation and technology, according to Blancco Technology Group study.

Connected medical devices creating cybersecurity risks

Security experts billed 2015 as the ‘year of the healthcare hack’, with increasing numbers of medical and pharmaceutical systems being attacked by cyber criminals targeting valuable personal data. While cybersecurity is commonly associated with software attacks, the healthcare sector is finding that the hardware it’s employing to improve patient care is creating backdoors for the criminal element. Neil Oliver, technical marketing manager of Accutronics, takes a look at the vital role hardware encoding plays in the battle to secure medical devices.

Physical security and cyber security predictions for 2016

As we head into a new year, Tim Compston at SecurityNewsDesk gives security vendors and industry experts an opportunity to share what, in their opinion, is likely to make waves security-wise over the next 12 months with their physical security and cyber security predictions for 2016.

Scroll to Top