In Depth
In Depth
Antivirus, firewall and IDS products
-
How can healthcare organisations fight increased cyber crime in 2021?
As the Covid-19 pandemic enters what may be its most dangerous phase, we explore how healthcare organisations can ward off cyber threats while preserving their ability to deliver critical care Continue Reading
-
Security Long Reads: Cyber insiders reveal what’s to come in 2021
In this long read, we gather together the thoughts of cyber security insiders from across the industry to get their take on what will happen in 2021 Continue Reading
-
Post-pandemic approaches to IAM for cloud security
Cloud technology may have saved businesses from catastrophe during the pandemic, but it has also introduced additional challenges around identity and access management. Here’s why IAM policies are crucial in the new normal Continue Reading
-
This Christmas, Covid-19 heightens retail security risks for everyone
Do you think it’s only retailers and consumers who need to consider cyber security when shopping online during the holidays? You’re dead wrong. This year, the Covid-19 pandemic and the shift to remote working has thrown a spanner in the works Continue Reading
-
DDoS mitigation strategies needed to maintain availability during pandemic
The growing prevalence of DDoS attacks combined with the increased reliance on internet connectivity during the pandemic means enterprises can no longer afford to ignore the threat of DDoS attacks. Computer Weekly explores organisations’ perceptions... Continue Reading
-
Intelligent ways to tackle cyber attack
Artificial intelligence-powered security tools should enable IT security teams to achieve more with less Continue Reading
-
How to apply zero-trust models to container security
Containers have become a common fixture in software development, but they have resulted in new concerns for security teams. Is zero-trust the answer to tackling them? Continue Reading
-
Coronavirus: How to go back to the office safely and securely
Security teams should be used to supporting remote workers effectively by now, but what’s going to happen when people start returning to their offices? We look at the risks and how to address them. Continue Reading
-
What are the security priorities for the post-coronavirus world?
The Covid-19 pandemic is forcing massive change across the business world and things may never go back to normal. What does security look like in this new world, and what will buyers be prioritising? Continue Reading
-
Why security validation matters
FireEye’s top executives in Asia-Pacific discuss the benefits of security validation and offer their take on the region’s cyber threat landscape Continue Reading
-
Coronavirus: How to implement safe and secure remote working
Find out what CIOs and CISOs need to know to enable their end-users to work remotely and stay secure during the Covid-19 coronavirus crisis, and learn how users can help themselves Continue Reading
-
Inside the SOC: the nerve centre of security operations
Security operations centres are the bedrock of any cyber defence strategy, but operating one is increasingly challenging, with mounting workloads and a shortage of skilled personnel Continue Reading
-
Layer your approach to web security
Combining unified threat management with other security systems and a strategic CISO is essential to defend against threats Continue Reading
-
What are the CDN options for enterprises?
We look at how content delivery networks can give your organisation’s web presence a literal edge Continue Reading
-
A guide to choosing cloud-based security services
Cloud-based security services can help organisations with a growing cloud footprint to reduce cost and address the manpower crunch in cyber security Continue Reading
-
An insider’s look into the dark web
A principal research scientist at Sophos offers a glimpse into the abysses of the dark web in a bid to uncover what cyber crooks are up to Continue Reading
-
Getting threat intelligence right
Threat intelligence feeds provide valuable information to help identify incidents quickly, but only if they are part of an intelligence-driven security programme Continue Reading
-
How UK organisations are leaving themselves open for cyber attack
UK organisations are leaving themselves wide open to cyber attack despite huge investments in cyber security systems, according to two former hackers now working in cyber defence Continue Reading
-
Breaking the cyber kill chain
Traditional antivirus is no longer good enough for fileless malware attacks that don’t leave a trace Continue Reading
-
Cost-effective managed IPS for small businesses
Small businesses typically struggle to afford cyber intrusion prevention systems, but the introduction of a service tailored for this market could change that Continue Reading
-
The true cost of a cyber security breach in Australia
The costs of cyber security breaches can quickly add up with fines, reputational damage and overhauls to network security all hitting the coffers. The case of one Australian firm shows why paying a ransom to a hacker might be tempting. Continue Reading
-
Mobile security -- what works and what doesn't?
Experts told the CW500 Security Club how mobility brings new challenges to security departments and an opportunity to go beyond building walls around the enterprise Continue Reading
-
Asean organizations braced for cyber attack
As an emerging economic power bloc, Asean is bracing itself for an influx of cyber crimes as hackers look for lucrative targets Continue Reading
-
Australian businesses under cyber attack
What are the cyber security risks facing businesses in Australia and New Zealand and how are organisations addressing them? Continue Reading
-
Turning machine data into operational intelligence
We look at how companies analyse server and security logs to tackle cybercrime and internal fraud, and optimise the user experience Continue Reading
-
Anatomy of a cyber attack – the risks facing small businesses
A small business owner tells the story of how a cyber attacker nearly brought down her firm, and the expert who helped her highlights the lessons learned Continue Reading
-
Companies must act quickly to tackle cyber crime
With cyber attacks becoming more sophisticated and widespread, companies must take stronger measures to prevent and tackle them Continue Reading
-
Companies must act quickly to combat cyber crime
With cyber attacks becoming more sophisticated and widespread, companies must take stronger measures to prevent and tackle them Continue Reading
-
CW 500 Security Club: Securing the end point: a key challenge for business
With multitudes of devices connecting businesses and their customers to interlinking systems, securing the end point has never been more vital Continue Reading
-
Check the state of network security and stay safe
Many organisations are planning to increase their investment in proactive security controls and threat intelligence measures. Continue Reading
-
Hacktivism: good or evil?
IT lawyer Dai Davis looks at the rise of hacktivism and its impact on business and international politics Continue Reading
-
After Prism revelation there is nowhere to hide
UK business should not ignore revelations about the US Prism internet surveillance programme. Continue Reading
-
Collaboration is key in enterprise security puzzle
Collaboration is key to security, cyber security professionals told attendees of Trend Micro’s customer event in London Continue Reading
-
Top 10 Android security tips
As Android becomes more prevalent in the enterprise, Computer Weekly gives you 10 top tips for keeping your devices secure Continue Reading
-
Securing Android for business
As more Google Android devices enter the workplace, Computer Weekly looks at the best ways of securing the mobile operating system Continue Reading
-
How to secure Macs in the enterprise
Apple computers are becoming increasingly used in the enterprise - we look at how to securely introduce Macs in the corporate network Continue Reading
-
Top 10 supplier profiles 2012
Download in-depth reports on leading IT suppliers from Computer Weekly Continue Reading
-
CW500 Security Club: Dealing with attacks inside networks
Perimeter defences are no longer enough to keep data safe, experts told IT security leaders at the CW500 Security Club Continue Reading
-
How to make your business Flame-proof
Advanced threats such as Flame can show CIOs what cyber attack tools of the future could look like Continue Reading
-
Interview: Angela Tucci, chief strategy officer, Symantec
Angela Tucci, chief strategy officer at Symantec, talks to Computer Weekly about the company's strategic plans Continue Reading
-
Essar’s WAN encryption strategy to secure data in motion: In focus
Indian conglomerate Essar puts WAN encryption in place using Cisco’s GET VPN to protect data flows between remote locations. A closer look. Continue Reading
-
Infosecurity: The changing landscape
The role of the chief information security officer (CISO) must adapt as businesses rethink IT security Continue Reading
-
CIOs sold on flexible working benefits – so what is holding it up?
Flexible working offers business benefits and allows employees to improve their work/life balance – but will managers accept it? Continue Reading
-
How to formulate an effective smartphone security policy
The mobile revolution offers new ways of working, but what are the challenges and how can they be overcome? Continue Reading
-
Computer Weekly / TechTarget IT priorities survey 2012
Learn which IT priorities are at the top of UK IT managers lists for 2012. Coverage from across our network includes cloud, budget cuts, networking, security, disaster recovery and more. Continue Reading
-
Microsoft: Is computing more trustworthy 10 years on?
Microsoft is marking the 10th anniversary of its Trustworthy Computing group (TwC), but has any significant progress been made since 15 January 2002 when Microsoft chairman Bill Gates sent an email memo to all employees, identifying trustworthy ... Continue Reading
-
Security Think Tank: What is the most important nut for infosec to crack in 2012?
What is the most important nut for infosec to crack in 2012? Continue Reading
-
The security threats of technology ubiquity
The ubiquity of mobile technology and internet-connected devices present new threats and increase the challenges for IT security managers. Continue Reading
-
Self-encrypting drives: What's holding back SED hard drive encryption security?
The self-encrypting drive (SED) provides a high level of data security, is invisible to the user, does not affect workflow or performance and cannot be turned off, yet SED technology has been adopted by relatively few organisations – so what's ... Continue Reading
-
Self-encrypting drives: SED the best-kept secret in hard drive encryption security
The SED solves many common data loss problems and is easy to use and manage with minimal impact on system performance – yet relatively few businesses and governments use SEDs. Continue Reading
-
The business value of balancing openness with security to manage risk
The risks to businesses of using social media is a hot topic, but it is indicative of a much broader challenge that is facing not only business, but also government, publishers and regulators, in how to balance openness and collaboration with ... Continue Reading
-
Case study: Shear Flexibility
On-premise versus on-demand. It’s an offering’s battle that has taken place since the ASP model first took root within the CRM industry over ten years ago. Since then, customers have traditionally been forced to split their decisions between the ... Continue Reading
-
Case study: UK town secures its network with Fortinet
A major town of nearly 150,000 people, Blackpool is a well-known UK holiday resort and third largest settlement in North West England, after Manchester and Liverpool. Continue Reading
-
Quocirca: Where to buy good IT security
When should buyers rely on what is provided by infrastructure suppliers and when should they turn to IT specialists? Continue Reading
-
Who is responsible for blocking malvertisments?
In February the London Stock Exchange (LSE) came under scrutiny when an advertisement carried on its website was blamed for distributing a virus. Continue Reading
-
Video: Lizamoon SQL injection attacks step up fast to hit hundreds of thousands of websites
A mass injection attack dubbed Lizamoon is spreading rapidly and has infected up to more than 1.5 million URLs. Continue Reading
-
Buyer's Guide to Retail: Retail data security
The retail market is typified by having a convoluted value chain. Continue Reading
-
Video: Royal engagement search results poisoned, warn security firms
Some search results related to the engagement of Prince William and Kate Middleton lead to rogue websites that offer fake anti-virus scans, security firm... Continue Reading
-
Basic security can help tackle Stuxnet
One important lesson IT managers can learn from Stuxnet is that it is a huge mistake to buy software with known hardcoded passwords, says John Pescatore, research vice-president at Gartner. Continue Reading
-
Sneaking a smart phone into the enterprise
Are smart phones connected to the corporate network a good idea? Continue Reading
-
Buyers guide to network security
For years network security has been seen as central to preventing the undesirable outside world gaining access to corporate networks. Continue Reading
-
EDS report on 'dangerous' Chinook software published for the first time
Computer Weekly is publishing, for the first time, a technical analysis of the software installed on the Chinook Mk2 helicopter, the Chinook model which featured in the RAF's worst peacetime crash. Continue Reading
-
Code breaker secrets
The fact that the code breakers at Bletchley had cracked the codes used to encrypt the messages sent to and from the German high command was possibly the...
Continue Reading -
How the Lorenz machine worked
In answer to Hitler's demand for a machine that produced unbreakable code, the electrical engineering firm Siemens designed and built the Lorenz SZ40. Continue Reading
-
ISSA UK: ‘Treacherous Computing’ can constrain legitimate software
Why is corporate adoption of the trusted computing standard still very low when over 70% of new computing devices have built-in trusted platform modules (TPMs)? Continue Reading
-
Content monitoring breaks 10gpbs barrier
Researchers at Queens University in Belfast are working on a content filtering system capable of scanning internet traffic at more than 10 gigabits per...
Continue Reading -
Quantum maths on a silicon chip
A quantum calculation able to crack one of the most common forms of data encryption has been performed on a silicon chip for the first time. Continue Reading
-
Email security – Essential Guide
Email security is a priority for all businesses, with the growing threat of hackers, viruses spam, phishing and identity theft, as well as the need to secure business information. Continue Reading
-
Computer security for small businesses – Essential Guide
Computer security for small businesses can be multi-layered, using desktop security products such as antivirus, antispam and firewalls, and network intrusion detection, and hardware technologies such as security tokens, disk encryption and biometric... Continue Reading
-
Cryptography breakthrough paves way to secure cloud services
A research student who had a summer job at IBM, has cracked a cryptography problem that has baffled experts for over 30 years. The breakthrough may pave the way to secure cloud computing services. Continue Reading
-
Securing e-business with web application firewalls
You have had your network firewall in place for years, and it makes you feel safe. Your ports are all locked down, so that no-one can hack your e-mail or FTP servers. So how is it that the database serving content to your website just got hacked, ... Continue Reading
-
Security zone: untangle complexity
Since early viruses were created (often transmitted by floppy disk) there has been an ever escalating challenge for those working in security to keep data and resources safe. This "war" is characterised by increasing technology on both sides of the ... Continue Reading
-
Securing the mobile enterprise Executive Overview
How to reduce the security risk to business assets when deploying mobile technologies Continue Reading
-
Assess your software- and hardware-based full disk encryption options
Full disk encryption is expected to be the top security technology to be tested or adopted this year, what are the challenges and benefits likely to be?
Assess...
Continue Reading -
Security zone: malware testing
Nearly a year after the discussions that led to the founding of the Anti-Malware Testing Standards Organization, testing seems to be the only thing anyone wants to talk to me about, in and out of my company. Continue Reading
-
How to manage your software assets
In May, the Business Software Alliance, the industry's licensing watchdog, launched a six-week blitz to cut the use of illegally copied or counterfeit software across 5,000 businesses in the Manchester area. Continue Reading
-
Identity is no longer a matter of what you know, but who you are
Protecting your personal information with ‘what you know’ is no longer good enough as it is now easy to find personally identifiable information online. Additional measures of combining ‘what you know’ (eg Pin numbers) with ‘what you have’ (eg ... Continue Reading
-
Facing up to security perils of outbound traffic
What about the threat from within and, more specifically, the security issues that arise from outbound traffic risks? Continue Reading
-
Securing the desktop and still allowing for flexibility
Few enterprises could bear a $7.2bn loss caused by a "computer genius" avoiding company policies and controls. But for international bank Société Générale,...
Continue Reading -
Best IT blogs: Full shortlist for Computer Weekly's IT Blog Awards 2008
Shortlist for Computer Weekly's IT Blog Awards 2008 in full, with links direct to all the shortlisted blogs. Continue Reading
-
Chinook helicopter disaster - computer software failure or pilot error?
Chinook helicopter crash: was it computer software failure or a cause we'll never know? This article gives the background to the Chinook helicopter disaster with links to all the relevant articles published by ComputerWeekly and other useful web ... Continue Reading
-
Veracode automates software testing process
Testing software applications to minimise the risk of security vulnerabilities and compliance failings is a time-consuming and costly process, albeit an essential one. Security testing company Veracode has developed a automated tool that promises to... Continue Reading
-
Open source software security
The security of open source software is a key concern for organisations planning to implement it as part of their software stack, particularly if it will play a major role. Continue Reading
-
RSA Conference 2008 round-up: Reports from RSA USA
A round-up of reports from RSA 2008 in San Francisco, one of the biggest events in an IT security professional’s calendar Continue Reading
-
Constant vigilance keeps Stroud & Swindon secure
"Information security is part of life now for financial services organisations and you have to take it seriously. If the business is linked to any loss of sensitive data, it causes serious reputational damage and you can't afford for that to happen,... Continue Reading
-
Infosecurity 2008: show guide and preview
Infosecurity Europe is the event where those responsible for securing their organisations' information can find all the latest technology, services and advice, with more than 300 of the top security companies from across the globe taking part. Continue Reading
-
Making software secure from first principles
Steve Lipner is no stranger to the challenge of building software programs without security bugs. The director of security engineering strategy at Microsoft started trying to write secure software code in the seventies. "My idea at the time was that... Continue Reading
-
Trusted client computing cuts out the operating system to ensure security
Lloyds TSB recently informed some of its on-line banking customers that their home computers had been infected with a virus which stole passwords. The... Continue Reading
-
Game: Debug your system with Infosecurity Europe
Coffee break? Play Debug, a great free online game from Infosecurity Europe, and get that virus out of your system. Continue Reading
-
Fingerprint recognition in the fight against football hooliganism
To combat football hooliganism in the Netherlands, the football clubs of Ajax, Feyenoord and Vitesse trialled fingerprint recognition at entry points to stadia Continue Reading
-
Security Handbook to establishing a security policy - Essential Guide
There exist many threats to hinder the normal running of organisations, including, of course, being hit by a computer virus intrusion or hack. Continue Reading
-
Spyware: make sure your company is prepared and protected
The spyware/malware problem has gotten a lot worse over the last twelve months so it’s vital you get prepared now. This executive overview will indeed help you to undertake such action. Continue Reading
-
Checklist for purchasing hardware-based encryption
Encryption appliances sit inline on a network and use specially designed electronics to encrypt data at line speeds, essentially eliminating the performance penalty imposed by encryption software running on a general server. While software-based ... Continue Reading
-
Hardware-based encryption product specifications
The product snapshots in this chapter highlight key specifications for a cross section of dedicated encryption appliances. Continue Reading
-
The best Microsoft security content online
This list features the best pieces of Microsoft Windows content on the internet. Continue Reading
-
Tape encryption purchase considerations
Storage administrators who use tape-based won't slow up their backups and will have peace of mind knowing that the tape content is secure. However, LTO-4 tape drives have specific encryption issues. Continue Reading
-
Microsoft Vista tutorial on security
In our ultimate Microsoft Vista security tutorial, take a deeper look into Vista security. Check out examples of Vista security tips, podcasts, webcasts and excerpts from popular Vista texts to learn all about the features of Vista, like User ... Continue Reading
-
Understanding VoWLAN
Like VoIP, VoWLAN contributes to cost efficiency. Because calls can be routed over the data network internally or over the Internet externally, mobile telephony costs can be eliminated or decreased significantly. In the long term, VoWLAN deployment ... Continue Reading
-
Vendor report: PCI; Is your Business up to the Standard?
Far too many businesses are still struggling to meet conditions that specify how merchants safeguard customer account information using encryption, firewalls, vulnerability assessments, and other means Continue Reading
-
Your shout: business skills a necessity for successful CIOs
Readers have their say Continue Reading