
Coronavirus: A cyber threat
By Atul Periwal. The outbreak of coronavirus (Covid-19) has halted the entire world for months and it’s not ended yet....

Coronavirus: Remember to stay safe online too
By Chloe Wood. It has been 99 days since Boris Johnson announced to the UK that we will be going...

Passwords and Paranoia
By Anton Scott. The issue with universal passwords We have all been there, midway through creating a new account for...

The importance of Ethical Hacking
By Shameer Sabar. As technology advances, and organisations incorporate more and more IT systems into their business in order to...

Minimising risk in business: the relevance of cybersecurity and data protection
By Ivan Seifert. Despite being a term on everyone’s lips and an increasing wealth of information becoming available online, cybersecurity...

Changing characteristics in private-public cybersecurity cooperation
By Kate Dinnison. 1. Techplomacy First came the creation of a U.S. Government ambassador to the Silicon Valley, then came...

Darkweb crack-down spurs digital refugee crisis
The FBI, DEA and Europol are celebrating the successful take-down of AlphaBay and Hansa, two of the Dark Web’s...

Interview with Dr. Tim Stevens, Lecturer in Global Security at King’s College London
By Kate Dinnison. Recently, we chatted with Dr. Tim Stevens, a lecturer in Global Security at King's College London. His...

Crash Override: Too big to ignore
By Kate Dinnison. Last December, hackers targeted an electric transmission station in Ukraine, causing approximately one-fifth of the city to...

An interview with Misha Glenny, author of ‘DarkMarket: How Hackers Became the New Mafia’
By Kate Dinnison. We recently interviewed Misha Glenny, journalist and author of DarkMarket: How Hackers Became the New Mafia. His 2011...