IT security

Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Finance and retail applications most vulnerable to breaches

    Finance and retail applications are most susceptible to hacking attacks because of data input by customers, according to research

  • GCHQ produces BYOD guidelines for organisations

    GCHQ's IT security arm provides guidance to organisations who want to allow employees to use personal devices at work

  • Courier firm UPS warns of potential data breach

    UPS has found malware at 51 franchises in 24 US states, which may have compromised customers' credit and debit card information

  • National Crime Agency calls for public to update security software

    The National Crime Agency (NCA) is launching a campaign to make people aware of the dangers of being online without security software

  • Android banking apps susceptible to hacking

    A vulnerability in Android applications built on the Apache Cordova platform has sparked new fears over mobile banking

  • USB-connected devices present cyber vulnerabilities

    Connecting devices to computers using a USB port could lead to security breaches, say Berlin-based researchers

  • Global Risks 2014

    Cybercrime and government surveillance pose a risk to the internet comparable in a scale comparable to the 2008 financial melt-down, the World Economic Forum warns in this analysis of the risks facing business and governments in 2014. The report assesses the impact of cybercrime and government surveillance on the public’s trust in the internet, and warns that the potential fragmentation of the internet could have a serious impact on the global economy. The World Economic Forum’s Global Risks 2014 report identifies cyberattack as one of the most likely global risks in 2014 and the breakdown of critical information infrastructure as among the global risks likely to have the most impact. The report analyses 31 global risks and includes a special in-depth investigation into digital disintegration. Other risks of significant concern include income disparity, extreme weather events, unemployment and fiscal crises.

  • Time puts servers at risk of denial-of-service attacks

    The Network Timing Protocol, which is used to keep servers on the internet synchronised, could become a major vector of attack for hackers

  • NSA insiders reveal what went wrong

    In this memo to President Obama, dated January 2013, former employees of the US electronic intelligence agency explain how NSA leaders allegedly failed in their intelligence collection and analysis before 9/11, covered up the mistakes, violated the US constitution, wasted billions of dollars on technology and mislead the public.

  • Russian hackers steal over a billion usernames and passwords

    A group of Russian cyber criminals have attacked 500 million email addresses and gained 1.2 billion usernames and passwords

  • VIEW MORE ON : Antivirus
  • Finance and retail applications most vulnerable to breaches

    Finance and retail applications are most susceptible to hacking attacks because of data input by customers, according to research

  • GCHQ produces BYOD guidelines for organisations

    GCHQ's IT security arm provides guidance to organisations who want to allow employees to use personal devices at work

  • Load balancing supports Kent County Council's VDI project

    Kent County Council picks Kemp Technologies load balancers to support a deployment of VMware Horizon View and Workspace across its estate

  • What ingredients go into the successful app store?

    An enterprise app store should provide the controlled availability of apps for employees.We look at what is available for organisations to use

  • National Crime Agency calls for public to update security software

    The National Crime Agency (NCA) is launching a campaign to make people aware of the dangers of being online without security software

  • Android banking apps susceptible to hacking

    A vulnerability in Android applications built on the Apache Cordova platform has sparked new fears over mobile banking

  • Automating Information Governance - assuring compliance

    In the past twelve months, the impact of data leaks and security breaches, most especially the Edward Snowdon activities, has brought the security and privacy elements of information governance strongly into play. Metadata has become an issue for front-page news, and heads-of-state discuss individuals’ rights to data privacy and information deletion. Meanwhile, massive data leaks of personal information have damaged corporate reputations and hardened already strong views in some jurisdictions. We therefore need to work harder to protect live content and preserve content records, but the volume, velocity and variety of content generation makes it nearly impossible to manually maintain and enforce the policies we so earnestly set. In this report we take an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.

  • Financial Services Data Privacy and Data Migration

    Keith Bucknall, head of Strategy, Architecture & Infrastructure for Lloyds motor insurer, ERS, looks at the data protection challenges faced by the organisation, in this PowerPoint presentation for Computer Weekly’s 500 Club for IT leaders. You can read more about his presentation here.

  • Global Risks 2014

    Cybercrime and government surveillance pose a risk to the internet comparable in a scale comparable to the 2008 financial melt-down, the World Economic Forum warns in this analysis of the risks facing business and governments in 2014. The report assesses the impact of cybercrime and government surveillance on the public’s trust in the internet, and warns that the potential fragmentation of the internet could have a serious impact on the global economy. The World Economic Forum’s Global Risks 2014 report identifies cyberattack as one of the most likely global risks in 2014 and the breakdown of critical information infrastructure as among the global risks likely to have the most impact. The report analyses 31 global risks and includes a special in-depth investigation into digital disintegration. Other risks of significant concern include income disparity, extreme weather events, unemployment and fiscal crises.

  • NSA insiders reveal what went wrong

    In this memo to President Obama, dated January 2013, former employees of the US electronic intelligence agency explain how NSA leaders allegedly failed in their intelligence collection and analysis before 9/11, covered up the mistakes, violated the US constitution, wasted billions of dollars on technology and mislead the public.

  • VIEW MORE ON : IAM
  • Time Warner network fault cuts million off internet

    A network fault at Time Warner Cable has cut off millions of US customers from the internet

  • DDoS attack downs Twitch on news of Amazon acquisition

    Just hours after Amazon announced a $970m deal to acquire Twitch, the service was taken offline by a DDoS attack

  • Finance and retail applications most vulnerable to breaches

    Finance and retail applications are most susceptible to hacking attacks because of data input by customers, according to research

  • GCHQ produces BYOD guidelines for organisations

    GCHQ's IT security arm provides guidance to organisations who want to allow employees to use personal devices at work

  • National Crime Agency calls for public to update security software

    The National Crime Agency (NCA) is launching a campaign to make people aware of the dangers of being online without security software

  • Android banking apps susceptible to hacking

    A vulnerability in Android applications built on the Apache Cordova platform has sparked new fears over mobile banking

  • USB-connected devices present cyber vulnerabilities

    Connecting devices to computers using a USB port could lead to security breaches, say Berlin-based researchers

  • Global Risks 2014

    Cybercrime and government surveillance pose a risk to the internet comparable in a scale comparable to the 2008 financial melt-down, the World Economic Forum warns in this analysis of the risks facing business and governments in 2014. The report assesses the impact of cybercrime and government surveillance on the public’s trust in the internet, and warns that the potential fragmentation of the internet could have a serious impact on the global economy. The World Economic Forum’s Global Risks 2014 report identifies cyberattack as one of the most likely global risks in 2014 and the breakdown of critical information infrastructure as among the global risks likely to have the most impact. The report analyses 31 global risks and includes a special in-depth investigation into digital disintegration. Other risks of significant concern include income disparity, extreme weather events, unemployment and fiscal crises.

  • Russian hackers steal over a billion usernames and passwords

    A group of Russian cyber criminals have attacked 500 million email addresses and gained 1.2 billion usernames and passwords

  • Malware incidents make up 25% of CERT-UK's work in first 100 days

    Over half the incidents reported to CERT-UK in the first three months of its operation were not related to critical national infrastructure

  • VIEW MORE ON : Continuity
  • Finance and retail applications most vulnerable to breaches

    Finance and retail applications are most susceptible to hacking attacks because of data input by customers, according to research

  • NHS Spine infrastructure transition successful, says HSCIC

    The infrastructure behind the critical NHS Spine platform has been replaced by The Health and Social Care Information Centre (HSCIC)

  • GCHQ produces BYOD guidelines for organisations

    GCHQ's IT security arm provides guidance to organisations who want to allow employees to use personal devices at work

  • US supermarket retail chain Supervalu reports cyber breach

    Supermarket chain Supervalu is the latest in a string of US retailers to report a breach of its card payment network

  • National Crime Agency calls for public to update security software

    The National Crime Agency (NCA) is launching a campaign to make people aware of the dangers of being online without security software

  • Android banking apps susceptible to hacking

    A vulnerability in Android applications built on the Apache Cordova platform has sparked new fears over mobile banking

  • USB-connected devices present cyber vulnerabilities

    Connecting devices to computers using a USB port could lead to security breaches, say Berlin-based researchers

  • Automating Information Governance - assuring compliance

    In the past twelve months, the impact of data leaks and security breaches, most especially the Edward Snowdon activities, has brought the security and privacy elements of information governance strongly into play. Metadata has become an issue for front-page news, and heads-of-state discuss individuals’ rights to data privacy and information deletion. Meanwhile, massive data leaks of personal information have damaged corporate reputations and hardened already strong views in some jurisdictions. We therefore need to work harder to protect live content and preserve content records, but the volume, velocity and variety of content generation makes it nearly impossible to manually maintain and enforce the policies we so earnestly set. In this report we take an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.

  • Data protection, privacy and the IT department

    Mike Cope, IT Director, University College London, looks at the data protection challenges faced by the university in this PowerPoint presentation for Computer Weekly’s 500 Club for IT leaders.

  • Financial Services Data Privacy and Data Migration

    Keith Bucknall, head of Strategy, Architecture & Infrastructure for Lloyds motor insurer, ERS, looks at the data protection challenges faced by the organisation, in this PowerPoint presentation for Computer Weekly’s 500 Club for IT leaders. You can read more about his presentation here.

  • VIEW MORE ON : Data Breach Incident Management and Recovery
  • Security experts identify top 10 software design flaws

    The IEEE Center for Secure Design has published a report on how to avoid the top 10 software security design flaws

  • Finance and retail applications most vulnerable to breaches

    Finance and retail applications are most susceptible to hacking attacks because of data input by customers, according to research

  • Can national security and privacy co-exist?

    In this week’s Computer Weekly, we talk to NSA whistleblower Bill Binney about the often-conflicting needs of security and privacy. We find out how Google is using artificial intelligence to improve datacentre energy efficiency. And we look at a project to use wearable technology and big data to help tackle Parkinson’s disease. Read the issue now

  • GCHQ produces BYOD guidelines for organisations

    GCHQ's IT security arm provides guidance to organisations who want to allow employees to use personal devices at work

  • The internet of things is coming: Is your datacentre ready?

    Gartner estimates the IoT will see 26 billion units installed by 2020 – channelling huge volumes of data traffic into datacentres

  • National Crime Agency calls for public to update security software

    The National Crime Agency (NCA) is launching a campaign to make people aware of the dangers of being online without security software

  • Android banking apps susceptible to hacking

    A vulnerability in Android applications built on the Apache Cordova platform has sparked new fears over mobile banking

  • USB-connected devices present cyber vulnerabilities

    Connecting devices to computers using a USB port could lead to security breaches, say Berlin-based researchers

  • Forrester: Build an app store into your corporate mobility strategy

    Corporate internal app stores can distribute the tools staff need, but they can also control who uses what and shore up data security

  • Automating Information Governance - assuring compliance

    In the past twelve months, the impact of data leaks and security breaches, most especially the Edward Snowdon activities, has brought the security and privacy elements of information governance strongly into play. Metadata has become an issue for front-page news, and heads-of-state discuss individuals’ rights to data privacy and information deletion. Meanwhile, massive data leaks of personal information have damaged corporate reputations and hardened already strong views in some jurisdictions. We therefore need to work harder to protect live content and preserve content records, but the volume, velocity and variety of content generation makes it nearly impossible to manually maintain and enforce the policies we so earnestly set. In this report we take an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.

  • VIEW MORE ON : Secure Coding and Application Programming