Ukraine and EU explore deeper cyber collaboration

Officials from Ukrainian cyber agency the State Service of Special Communications and Information Protection (SSSCIP) and its European Union (EU) counterpart, the EU Agency for Cybersecurity (ENISA), have held high-level talks in... Read more »

Security Think Tank: Design security in to reap container benefits

Containers have quickly become a fundamental part of DevOps. Their lightweight and portable nature makes them attractive to all sizes of organisation, from small startups trying to reduce costs to large multibillion-pound... Read more »

filter (computing)

What is a filter in computing? The term filter in computing can mean a variety of things, depending on the technology or technical discipline in question. There are four distinct applications for... Read more »

Proposals for scanning encrypted messages should be cut from Online Safety Bill, say researchers

Proposals in the Online Safety Bill to give the telecoms regulator Ofcom powers to mandate technology companies to use scanning software to monitor encrypted messages for illegal content should be dropped, it... Read more »

Air gaps for backup and how they help against ransomware

The air gap is a fundamental concept of storage and backup.  Essentially, it means to have a physical or logical disconnect between production systems and the location of secondary data, including backups.... Read more »

network security

What is network security? Network security encompasses all the steps taken to protect the integrity of a computer network and the data within it. Network security is important because it keeps sensitive... Read more »

Use site reliability engineering to address cloud instability

Cloud platforms, as a remotely managed service, come with a service-level agreement (SLA) that guarantees an uptime percentage or your money back. These SLAs, and the shifting of responsibility of infrastructure maintenance... Read more »

France extradites Spanish EncroChat cryptophone distributors for complicity with organised crime

Three Spanish nationals have been extradited from Spain to France to face charges that they supplied EncroChat encrypted phones that were used by organised crime groups. French public prosecutors argue that the... Read more »

initialization vector

What is an initialization vector (IV)? An initialization vector (IV) is an arbitrary number that can be used with a secret key for data encryption to foil cyber attacks. This number, also... Read more »

CIO interview: James Fleming, Francis Crick Institute

The Francis Crick Institute has hundreds of global partnerships that require controlled access to sensitive health data. Its current CIO is James Fleming, who joined the research institute four years ago. Fleming,... Read more »