Cloud Security

Cloud Security is a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing. It is a sub-domain of computer security, network security, and, more broadly, information security.

Scottish IT Companies: Cyber Security Infographic 2018

Check out the infographic from Company Connecting on Scottish tech companies with Cyber Security  related skills. The infographic covers 270 companies based in Scotland. Company Connecting has detailed information on almost 4,500 tech companies of which 2,763 are in Scotland.

It's been almost two years since we last published information on Cyber Security Companies. Our last article looked at al the companies with Cyber Security skills on the Company Connecting database. This time we have focused on the 270 Scottish companies with Cyber Security skills. We have almost 4,500 tech companies on our database of which 2,700+ are in Scotland. So about 10% of the Scottish tech companies have some cyber security skills.

Image of a key fob unlocking a laptop accompanying the article Scottish Cyber Security Infographic 2018

Professor Bill Buchanan of Napier University has written a series of articles for Company Connecting on Cyber Crime and the challenges that Digital Forensic Investigators face. Yesterday we looked at Telegram. Today we look at the anonymous browser Tor.

"With the Tor network, the routing is done using computers of volunteers around the world to route the traffic around the Internet, and with every hop the chances to tracing the original source becomes reduced. In fact, it is rather like a pass-the-parcel game"

Image accompanying the article The Three Ts: Remaining Untraceable with Tor by Professor Bill Buchanan of Napier University

Professor Bill Buchanan of Napier University has written a series of articles for Company Connecting on Cyber Crime and the challenges that Digital Forensic Investigators face. Yesterday we looked at tails. Today we look at Telegram the encrypted messaging app with the ability to self destruct chat logs and old messages. Its a cloud based messaging app with a focus on security and speed.

Image accompanying the article The Three Ts: Remaining Untraceable with Telegram by Professor Bill Buchanan of Napier University

Professor Bill Buchanan of Napier University has written a series of articles for Company Connecting on Cyber Crime and the challenges that Digital Forensic Investigators face. Yesterday we looked at vishing. Over the next three days we look at tools utilised by those wishing to remain anonymous i.e. Tails, Telegram and Tor. We start with the operating system ‘Tails’.

Image accompanying the article The Three Ts: Remaining Untraceable with Tails by Professor Bill Buchanan of Napier University

Career Advice for Industrial Cyber Security

Cevn Vibert has spent 25 years working in specialities across the field of Cyber Security, from advisory boards, industrial cyber security, emergency management and situational awareness, to critical infrastructure protection.

Company Connecting spoke to Cevn to see what insights he could...

Cevn Vibert has spent 25 years working in specialities across the field of Cyber Security, from advisory boards, industrial cyber security, emergency management and situational awareness, to critical infrastructure protection. Company Connecting spoke to Cevn to see what insights he could provide for both those already working in Cyber Security and those considering a role in the field.

Career Advice for Industrial Cyber Security Cevn Vibert for Company Connecting