In Depth
In Depth
Application security and coding requirements
-
Do website design platforms pose too big a security risk?
Cloud-based website design platforms are booming in popularity because of their simplicity and affordability, but business security should be considered carefully when using such services Continue Reading
-
UK sale of surveillance equipment to Macedonia raises questions over export licence policy
The UK approved an export licence for the sale of surveillance equipment to Macedonia – while the country was engaged in an illegal surveillance programme against its citizens. A senior minister was consulted on the decision Continue Reading
-
The Macedonian surveillance scandal that brought down a government
Macedonia has been accused of using surveillance technology for covert spying - the subsequent political protests were instrumental in the ruling party losing power after 10 years Continue Reading
-
Tips on how to get a Hana implementation off the ground
The confusion around SAP’s in-memory database is holding many customers back. We look at some of the approaches being taken to simplify implementation Continue Reading
-
APAC banks warming up to big data
Financial institutions in the APAC region fear they may be left behind if they don’t embrace big data Continue Reading
-
Secure IoT before it kills us
Experts say more must be done to mitigate the potentially catastrophic threats presented by connected devices Continue Reading
-
Lauri Love: the student accused of hacking the US
How did a brilliant but fragile computer science student from a rural English town end up facing life imprisonment in the US? Computer Weekly speaks to Lauri Love Continue Reading
-
The true cost of a cyber security breach in Australia
The costs associated with a security breach can mount up and it is difficult to put a number on it, but organisations are increasingly trying to do this as attacks increase Continue Reading
-
The true cost of a cyber security breach in Australia
The costs of cyber security breaches can quickly add up with fines, reputational damage and overhauls to network security all hitting the coffers. The case of one Australian firm shows why paying a ransom to a hacker might be tempting. Continue Reading
-
CW500: Are you human or are you machine?
As more things become internet-connected, systems designed to authenticate people now need to deal with machine-to-machine authentication Continue Reading
-
Mobile security -- what works and what doesn't?
Experts told the CW500 Security Club how mobility brings new challenges to security departments and an opportunity to go beyond building walls around the enterprise Continue Reading
-
Asean organizations braced for cyber attack
As an emerging economic power bloc, Asean is bracing itself for an influx of cyber crimes as hackers look for lucrative targets Continue Reading
-
Australian businesses under cyber attack
What are the cyber security risks facing businesses in Australia and New Zealand and how are organisations addressing them? Continue Reading
-
Making the most of logs
Most IT systems produce log files, which IT administrators can use to automate security systems Continue Reading
-
Turning machine data into operational intelligence
We look at how companies analyse server and security logs to tackle cybercrime and internal fraud, and optimise the user experience Continue Reading