24th March 2025
De Vere Grand Connaught Rooms
7th & 8th October 2025
Radisson Blu Hotel Manchester Airport
Search
Close this search box.

Global nuclear cyber-defence ‘inadequate’

One of Europe’s leading cyber warfare experts claims that the world’s ability to defend against cyber attacks targeting nuclear weapons is grossly inadequate, and could lead to an accidental nuclear war. Dr Sandro Gaycken, Director of the Digital Society Institute at the ESMT Berlin business school and Director of NATO’s SPS Cyberdefence project, says that […]

One in ten Brits victim to cyber fraud

A survey carried out by online security experts BullGuard has revealed that one in ten Brits have been victim of cyber fraud, whilst not protected by paid-for cybersecurity software. Over 10,000 consumers were researched for the survey, which also revealed that 66% of BullGuard customers have used a free antivirus solution in the past and […]

Biggest ransomware attack in history cripples NHS

The Government and NHS bosses have been called upon to answer questions as to how hospitals were allowed to become victims of a global cyber attack that took down services and caused chaos during the weekend. Hackers demanding a ransom managed to infiltrate the NHS’ computer systems, forcing operations and appointments to be cancelled, as […]

Half of all phishing attacks originate from EMEA

A report published by NTT Security has revealed that over half (53%) of the world’s phishing attacks originated from Europe, the Middle East and Africa (EMEA). The Global Threat Intelligence Report (GTIR) analysed global threat trends from 1st October 2015 – 31st September 2016 and showed that of all phishing attacks worldwide, 38% came from […]

GUEST BLOG: Is your business playing music illegally?

Speakers

By John Hannen, Digital Marketing Executive, MediaWorks You’ve probably seen the latest advert from PRS – it’s usually played before films in the cinema, which starts in a barber shop – proceeding to cover a range of locations where music is played to the general public. However, what the advert highlights is that more often […]

Meet the experts you need at the Security IT Summit

The latest high profile online security breaches suffered by Netflix and Google last week show that even the biggest names are susceptible to serious attacks. Amassing the tools to avoid these type of attacks is vital for all businesses – and at the one-day Security IT Summit, we aim to help you do just that. […]

Teenage hacker responsible for Sony and Microsoft DDoS attacks jailed

The man responsible for creating a hacking program that brought down the Sony and Microsoft networks has been jailed for two years. Adam Mudd, from Kings Langley, Hertfordshire, was 16 years-old at the time and lived at home with his parents. The Guardian has revealed that Mudd created a program called Titanium Stresser, designed to […]

Global Peace, Security and Strategic Studies MA launched

Vesalius College, Brussels, has announced a new Masters programme aimed specifically for those who want to pursue a career working towards the world’s future peace and security. The MA in Global Peace, Security and Strategic Studies is in partnership with Egmont Institute, the Royal Military Academy, the Institute of Economics and Peace and Vesalius College, […]

GUEST BLOG: John Cannon: What’s your data breach action plan?

John Cannon is commercial director of Callcredit Information Group, and has worked for over 20 years in the information industry. During that time he has held a number of senior roles including heading Infocheck Group’s insurance business and leading Equifax’s ID & Fraud team. For the last 10 years, John has focussed on the areas […]

£2 million at risk in ‘race against crime’

Neustar

Businesses could be losing around $2.5 million (around £2 million) in lost revenue each year through security risk, according to new research. The study by international security company Neustar has been released to warn companies of their vulnerability against Distributed Denial of Service (DDoS) attacks, which many hackers use to overflow servers and gain access […]