Dutch PhD project aims to automate discovery and deciphering of steganography

The Netherlands Forensics Institute (NFI) is part of Uncover, a project aiming to help law enforcement agencies track criminal digital messaging.   Since the encrypted communication network EncroChat was dismantled, criminals have been... Read more »

The 5 principles of zero-trust security

Perimeter security is no longer the best option for enterprise IT departments. A far more flexible architecture is needed that focuses on users, devices and services. The concept of zero trust was... Read more »

Security Think Tank: Three steps to a solid DevSecOps strategy

The pace of life seems to be ever increasing as technology and software tries to keep up with the real and perceived demands of users. This race to get out the latest... Read more »

Where does security fit into a business continuity plan?

Business continuity plans ensure data availability and maintain operations during disasters and downtime. Downtime mitigation is a requirement for every organization, and a strong business continuity plan is key to maintain or... Read more »

How Russian intelligence hacked the encrypted emails of former MI6 boss Richard Dearlove

A Russian cyber attack group has been targeting politicians, journalists, and military and intelligence officials across Britain and Europe for at least seven years, and may have stockpiled access to and data... Read more »

PoINT to offer on-site S3 object storage archive on disk and tape

In October, Germany-based PoINT will launch an object storage archiving product based on disk and tape media. “Our idea is to offer on-site exactly the same thing as AWS [Amazon Web Services]... Read more »

Conversation between two police officers formed basis of EncroChat warrant, court hears

The National Crime Agency (NCA) received a warrant to covertly harvest hundreds of thousands of messages from the EncroChat encrypted mobile phone network, on the basis of a conversation between a French... Read more »

It’s time for engineering teams to own DevSecOps

The biggest factor impacting the evolution of application security is the speed at which technology changes. Much of this is due to widespread consumerisation – people expect new technologies and updates to... Read more »

Google dork query

What is a Google dork query? A Google dork query, sometimes just referred to as a dork, is a search string or custom query that uses advanced search operators to find information... Read more »

NCA ‘deliberately concealed’ information when it applied for EncroChat warrants, tribunal hears

The National Crime Agency “deliberately concealed” information when it applied for a warrant to access hundreds of thousands of intercepted messages and photographs from the EncroChat encrypted mobile network, a court has... Read more »