AXELOS extends the contracts of six examination institutes

Side view of two blurred businessmen talking in conference room

AXELOS®, owners of the ITIL® and PRINCE2® Global Best Practice methodologies, has extended the contracts of six examination institutes. APMG, BCS, CSME, EXIN, Loyalist, and PeopleCert have had their contracts for offering exams for AXELOS’s Global Best Practice portfolio extended for three years from January 2015. In a press release on AXELOS’s website, they explained […]

Free webinar: Conducting an information security risk assessment with vsRisk

blog-standards

Risk assessments are an essential component of effective information security management: only by adequately evaluating the threats you face will you be able to establish a suitable security posture that can protect your organisation’s critical data assets – and profits. PwC’s 2014 Global State of Information Security Survey found that the number of detected incidents […]

HMRC phishing scam exposed!

iStock_000024086772XLarge

If you receive an email offering a tax rebate and think it’s too good to be true, it is. HM Revenue and Customs has reported a massive increase in phishing emails purporting to offer rebates to taxpayers. 74,743 scam emails were reported to HMRC between April and September this year, a 70% increase on the […]

Microsoft warns all Windows users of new zero-day attack

Hacker typing on a laptop

Microsoft has warned of a vulnerability present in Microsoft OLE, which affects all supported releases of Windows except for Windows Server 2003. “At this time, we are aware of limited, targeted attacks that attempt to exploit the vulnerability through Microsoft PowerPoint,” the software giant said in Security Advisory 3010060, issued late on 21 October. It […]

Flash Player users may be vulnerable to new attacks

Defence shield

This week, experts have warned that users who haven’t updated their Flash Player with the fixes released in October may be vulnerable to new attacks using a commercial exploit kit called Fiesta. Adobe has already issued a fix in the Flash Player updates for this vulnerability, which is being tracked as CVE-2014-0569 in the Common […]

Geraint Williams, Head of Technical Services at IT Governance, takes the lid off browser cryptography

cyber-security

Introduction This October we saw a 2014 attack (POODLE) on a 1990s security protocol (SSLv3), which highlights the fact that, although we consider computing to be a fast-moving field, there are issues with ensuring compatibility with legacy applications and devices, which give rise to security issues. All e-commerce is conducted using secure HTTP (HTTPS), which […]

ICO warns UK broadcasters over use of drones for filming purposes

Helicopter drone filming video

The Information Commissioner’s Office (ICO) has released an updated document, In the picture: A data protection code of practice for surveillance cameras and personal information. The increased use of drones and the overall evolution of CCTV technology have encouraged the ICO to update a code of practice that hasn’t been updated since 2008. Drones are […]

Which exams and certs do I need to get my first job in cyber security?

Training-catalogue

I had the pleasure of attending the Cyber Security Expo event in London last week, which focused on information security recruitment and career development in the UK.  From the many IT professionals and students I spoke to, there was really only one question: “Which exams and certs do I need to get my first job […]

UK is the No. 1 target for Advanced Persistent Threat cyber attacks

cyber-security

A report published by leading security specialist Firefly has discovered that the UK is the number one target for Advanced Persistent Threats. Taking data from the first half of 2014 the report looked at the cyber threat landscape across Europe, the Middle East and Asia (EMEA). Firefly published its findings in its Regional Advanced Threat […]