Search Results for "Royal Holloway Information Security seriesstart=10start=10"
-
Royal Holloway: Security evaluation of network traffic mirroring in public cloud
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway security series examines network traffic mirroring, demonstrating how the technique is being implemented in public cloud and the challenges it faces due to the inherent characteristics of the public cloud – security challenges that, if not addressed, can be detrimental to the security posture of an enterprise.
-
Royal Holloway: Cloud-native honeypot deployment
Sponsored by: TechTarget ComputerWeekly.comExploring open problems facing cloud infrastructure, this article in our Royal Holloway security series describes the implementation, feasibility and benefits of cloud-native honeypots.
-
Storage Capacity 101 to Post-Grad in a Flash
Sponsored by: TechTarget ComputerWeekly.comIn this report from Quocirca, analyst Clive Longbottom explains why you don't always get what you think you're getting with flash storage.
-
Royal Holloway: Investigating the security vulnerabilities and solutions for connected and autonomous vehicle technologies
Sponsored by: TechTarget ComputerWeekly.comThis article introduces connected and autonomous vehicles, analysing the underlying technologies and considering their cyber security vulnerabilities and attacks. We identify and assess the existing and emerging countermeasures for such vulnerabilities, and propose high-level recommendations.
-
Royal Holloway: Secure connected and autonomous vehicles - the long road ahead
Sponsored by: TechTarget ComputerWeekly.comAdvances in technology have led to safety and comfort features being added to vehicles, with ambitious plans for driverless cars and other connected and autonomous vehicle (CAV) systems being developed. This article looks at some of the requirements, constraints and challenges, including two areas of uncertainty: data and software updates.
-
Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk
Sponsored by: TechTarget ComputerWeekly.comCyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.
-
Proving ownership of IPv6 addresses
Sponsored by: TechTarget ComputerWeekly.comIn this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.
-
How long does it take to get owned?
Sponsored by: TechTarget ComputerWeekly.comA study to investigatethe amount of time that it takes for stolen credentials to be used by a hacker.
-
Royal Holloway: A novel approach to clustering malware behaviour to improve malware detection
Sponsored by: TechTarget ComputerWeekly.comClustering malware behaviour can be very useful, but it is unknown how accurate clustering algorithms are when dealing with malware
-
Aligning to NIS2 Cyber Security Risk Management Obligations in the EU
Sponsored by: CloudflareWith the Network and Information Security Directive 2.0 (NIS2), the EU is expanding the reach of regulations, imposing stricter requirements, and stepping up enforcement. How can your organization reduce security risks and streamline compliance? Download the white paper to learn more.