Operating in a secure online environment

With technology now prevalent in all areas of life, security of devices should be encouraged in the same way as physical security, writes Hannah Khoo

Encryption and online messaging, a terrorist enabler?

Ahead of the UK Security Expo, Philip Ingram looks at some of the security issues that will form some of the discussions

A new approach for cyber security in the UK

As the threat of terrorism becomes far more than just a physical danger, cyber security increases in importance within the UK

Hiding behind the Great British Firewall

Following GCHQ’s plans to create a protective British Firewall, Counter Terror Business asks whether sharing cyber strength is a weakness waiting to be exploited?

How to combat the cyber threat

Andrew Scott, of the Business Continuity Institute, analyses how likely it is that your organisation will suffer from a cyber attack and the best ways to combat the danger

Risk appetite is considered the volume of risk that an organisation is willing to take in order to meet their strategic objectives. Adrian Wright, vice president of research at the UK chapter of the Information Systems Security Association, explores risk appetite in more detail.

Cyber Security - The lone wolf terrorist and the deep, dark web

The potential that the internet poses for terrorists and criminals is developing at an alarming rate. The Institute of Civil Protection & Emergency Planning asks how can we be cyber secure?

Investigatory Powers BillIs everyone a suspect?

Professor Mike Jackson, IT and cyber security expert at Birmingham City University’s Business School, examines the proposed ‘Investigatory Powers Bill’

Three years after the National Cyber Security Strategy was launched, the government has published a report on its progress and its future plans to thwart cyber crime

Amar Singh of international IT governance association ISACA reports on the damage denial of service (DoS) attacks can do and shares advice on how organisations can protect themselves

The Security Institute’s Mike Gillespie highlights why those that protect the UK’s critical national infrastructure need to anticipate threats and monitor the technological supply chain

Whatever the size or location of the firm, processes must be in place to be able to deal with a cyber attack, should one occur, urges Andrew Scott at the Business Continuity Institute

Nowadays, every threat seems to have a cyber dimension to it – cyber crime, cyber espionage and cyber war. It is natural, then, to talk of cyber terrorism, but does the reality match the rhetoric?

Businesses can often be part of a crucial supply chain, and sophisticated adversaries could seek to target the weakest link to gain access 
to a higher-profile target, warns Paul Weatherly

A progress report on the National Cyber Security Strategy issued in December aims to demonstrate the progress made by the UK in addressing the threat from cyber attacks, and includes plans to double annual cyber exports to £2bn a year by 2016


Supplier Profiles

Me and You Education

Me and You Education is a collaboration between two companies with divergent backgrounds that provides deep insights into the murky and complex world of Counter Terrorism.