Calendar An icon of a desk calendar. Cancel An icon of a circle with a diagonal line across. Caret An icon of a block arrow pointing to the right. Email An icon of a paper envelope. Facebook An icon of the Facebook "f" mark. Google An icon of the Google "G" mark. Linked In An icon of the Linked In "in" mark. Logout An icon representing logout. Profile An icon that resembles human head and shoulders. Telephone An icon of a traditional telephone receiver. Tick An icon of a tick mark. Is Public An icon of a human eye and eyelashes. Is Not Public An icon of a human eye and eyelashes with a diagonal line through it. Folder An icon of a paper folder. Breaking An icon of an exclamation mark on a circular background. Camera An icon of a digital camera. Caret An icon of a caret arrow. Clock An icon of a clock face. Close An icon of the an X shape. Comment An icon of a speech bubble. Ellipsis An icon of 3 horizontal dots. Envelope An icon of a paper envelope. Facebook An icon of a facebook f logo. Camera An icon of a digital camera. Home An icon of a house. Instagram An icon of the Instagram logo. Linked In An icon of the Linked In logo. Magnifying Glass An icon of a magnifying glass. Menu An icon of 3 horizontal lines. Next An icon of an arrow pointing to the right. Notice An explanation mark centred inside a circle. Previous An icon of an arrow pointing to the left. Rating An icon of a star. Tag An icon of a tag. Twitter An icon of the Twitter logo. Video Camera An icon of a video camera shape. WhatsApp An icon of the WhatsApp logo.

cyber attack

Opinion

Cyber Attacks – A threat that is here to stay

With the exponential growth of Internet users in the last ten years comes two potential problems that organisations and individuals connected to the web need to be aware of; privacy and cyber security.

Opinion

Getting into the Minds of the Malicious: why we need cyber intelligence

What’s your motivation? That’s the common question asked of many an actor but it’s also a highly relevant one in the cyber security industry - particularly when it comes to protecting critical infrastructure. Understand the reasons for an attack and you’re more likely to be able to narrow down the field and focus resource on attack mitigation. But gaining that information can be difficult.