News
Antivirus, firewall and IDS products
-
October 17, 2017
17
Oct'17
RSA’s Middle East cyber security conference gains its own identity
RSA Abu Dhabi conference focuses on region’s cyber security needs as digital technology deployments expand
-
September 05, 2017
05
Sep'17
People with non-IT backgrounds could help fill cyber security skills gap
Organisations should look to fill cyber security roles with people who are curious and have work experience rather than focusing solely on graduates
-
June 30, 2017
30
Jun'17
Danish shipping giant Maersk recovering from major Petya cyber attack
Company confirms attack took down its IT system across multiple sites and business units, but has now been contained
-
June 28, 2017
28
Jun'17
Singapore authorities issue alert on Petya ransomware
The country’s emergency response team has called for users to boost their cyber defences as the Petya ransomware rages through IT systems in Asia and Australia
-
June 21, 2017
21
Jun'17
Microsoft admits Windows 10 disables third-party security software
Microsoft has admitted Windows 10 disables some third-party security software, but claims this is purely because of compatibility issues
-
April 11, 2017
11
Apr'17
Security as a service on the rise in the UAE
Organisations in the United Arab Emirates are increasingly turning to security services
-
April 06, 2017
06
Apr'17
Interview: F-Secure’s Mikko Hyppönen on the Nordics, Russia and the internet of insecure things
Computer Weekly sat down with Finnish cyber security expert Mikko Hyppönen to talk about security in the Nordics, Russia and the trouble with connected devices
-
March 31, 2017
31
Mar'17
How IT can be more defensible
A renowned Google engineer calls for the IT industry to build devices capable of being defended and for enterprises to take a balance sheet approach in managing risks
-
March 28, 2017
28
Mar'17
Threats grow in Saudi Arabia’s cyber sector
Saudi Arabia's wealth makes it an attractive target for cyber criminals, but what have been the recent trends in cyber crime?
-
March 03, 2017
03
Mar'17
Cyber attack on Barts NHS trust exploited zero-day vulnerability
A cyber attack that forced parts of Barts NHS trust offline in January 2017 has been blamed on previously unknown malware that was able to bypass the antivirus systems, highlighting a common weakness in cyber defences
-
January 26, 2017
26
Jan'17
Security spending leaving data vulnerable, study finds
Cyber breaches are increasing despite increased security spending, a study shows, highlighting that security investment decisions are not aligned with actual cyber threats
-
December 21, 2016
21
Dec'16
Top 10 IT security stories of 2016
Here are Computer Weekly’s top 10 IT security stories of 2016:
-
December 05, 2016
05
Dec'16
Top 10 ANZ enterprise IT stories of 2016
Here is a rundown of Computer Weekly’s most popular ANZ enterprise IT articles for 2016
-
July 12, 2016
12
Jul'16
IBM sets up security centre in Canberra
IBM leads the charge as large private businesses invest heavily in security resources across Australia in an attempt to close the security gap
-
July 06, 2016
06
Jul'16
UK's Darktrace aims to lead the way to automatic cyber security
Darktrace hopes to be a leader in the move to automated cyber security to free up security professionals to focus on business risk and innovation
-
June 29, 2016
29
Jun'16
Most cyber security strategies ignore the way attackers really work
Cyber attackers use more legitimate software than malware, which means most organisations are incapable of detecting much of the malicious activity in their networks, a report reveals
-
June 29, 2016
29
Jun'16
Lauri Love may be faking mental illness claims lawyer for US
Prosecution lawyer Peter Caldwell questions whether activist Lauri Love is exaggerating mental health problems to avoid extradition to face hacking charges in the US
-
June 12, 2016
12
Jun'16
Philippines government data breach is a warning to Asean region
Security is a rising concern in the Asean region, with fears fuelled by incidents such as the recent hacking incident in Manila
-
June 01, 2016
01
Jun'16
MPs’ private emails are routinely accessed by GCHQ
Computer Weekly investigation reveals the extent of interception of MPs’ and peers’ email communications and data
-
January 29, 2016
29
Jan'16
HSBC online services hit by DDoS attack
HSBC was hit by a distributed denial of service (DDoS) attack, which targeted its online personal banking services.
-
December 24, 2015
24
Dec'15
Top 10 IT security stories of 2015
Computer Weekly looks back at the most significant stories on IT security in the past 12 months
-
December 07, 2015
07
Dec'15
Cyber attacks an increasing concern for Asean countries
Organisations in the Association of Southeast Asian Nations are increasingly the targets for cyber criminals, according to a report focused on the region
-
December 01, 2015
01
Dec'15
Security analytics needs practical approach, says Fico Ciso Vickie Miller
Analytics must form part of a comprehensive defence-in-depth strategy, according to chief information security officer (Ciso) Vickie Miller at software firm Fico
-
August 03, 2015
03
Aug'15
Why the time is ripe for security behaviour analytics
Recent months have seen an uptick in announcements by security suppliers around behavioural analytics, but what is driving this trend?
-
July 14, 2015
14
Jul'15
Symantec bets on simplicity, cloud and mobile
Symantec is not trying to be all things to all people, but is instead focusing on threats and protecting information in the mobile and cloud environments
-
June 03, 2015
03
Jun'15
VMware puts network virtualisation to work in McAfee environments
VMware announces an integrated system to automate distribution and enforcement of McAfee’s network security platform using its NSX network virtualisation system
-
April 14, 2015
14
Apr'15
Security risk potential linked to young, mobile users
A study conducted by wireless supplier Aruba Networks has identified a distinct cohort of high-risk, security-agnostic workers
-
February 27, 2015
27
Feb'15
Case study: Norwegian insurer invests in Darktrace machine-learning cyber defence
Shipping insurance company DNK hopes to inspire the rest of the shipping industry to adopt Darktrace’s cyber defence system
-
February 12, 2015
12
Feb'15
Damballa report highlights the limitations of prevention-centric security
Anti-virus (AV) suppliers can take more than six months to create signatures for malware, according to a report from security firm Damballa
-
December 17, 2014
17
Dec'14
Cabinet Office begins procurement for next stage of Gov.uk Verify
The Cabinet Office has submitted a tender notice for a £150m three-year framework for the provision of identity assurance services
-
November 28, 2014
28
Nov'14
CGI secures communications between pilots and air traffic control
Satellite communications firm Inmarsat has outsourced the provision of security IT and services to CGI
-
November 11, 2014
11
Nov'14
Network firewalls as relevant to data security as ever, says industry pioneer Gil Shwed
Network firewalls are as relevant to data security today as they were 20 years ago, says industry pioneer Gil Shwed
-
October 16, 2014
16
Oct'14
Security key to Bank of Maharashtra payments platform
The Bank of Maharashtra (BOM) is using software from FIS for a card management and card fraud and risk monitoring system as it modernizes its payments platform
-
October 10, 2014
10
Oct'14
Symantec splits storage and security
Symantec is splitting its storage and security business, following just days after HP announced its split
-
October 09, 2014
09
Oct'14
WordPress most attacked application
Websites that run the WordPress content management system are attacked 24% more often than those using other systems
-
October 08, 2014
08
Oct'14
Malware being used to steal cash from ATMs
Criminals are using malware to steal cash from ATMs without debit and credit cards
-
September 22, 2014
22
Sep'14
Conficker infections an indictment of IT security, says CWG
Conficker worm infections reflect the “sad state of affairs of IT security”, says the Conficker Working Group
-
August 11, 2014
11
Aug'14
USB-connected devices present cyber vulnerabilities
Connecting devices to computers using a USB port could lead to security breaches, say Berlin-based researchers
-
July 04, 2014
04
Jul'14
Barclays passes government’s ‘internet-born threat’ test
Barclays Bank has been awarded the government’s cyber security certificate for digital banking services after independent tests of services such as Pingit
-
February 05, 2014
05
Feb'14
Bank of England publishes Waking Shark II cyber security exercise results
Bank of England publishes the results of its Waking Shark II security exercise, which tested financial institutions' contingency plans for cyber attack
-
October 02, 2013
02
Oct'13
McAfee Focus 2013: McAfee leadership upbeat about Stonesoft acquisition
Intel-owned security firm McAfee is upbeat about its acquisition of Stonesoft and its future capability to tackle security differently
-
June 10, 2013
10
Jun'13
Telefonica Digital forms security group Eleven Paths
The business division of mobile operator Telefonica launches Eleven Paths, an independent company working on security issues in the workplace
-
April 22, 2013
22
Apr'13
Infosec 2013: University research challenges reliability of IPS
Research shows intrusion prevention systems (IPS) are not as effective at detecting malicious activity as some might think
-
April 19, 2013
19
Apr'13
Conficker makes way for web-based attacks, says Microsoft
Web attacks emerge as top threat as businesses finally begin to win the battle against Conficker and other worms, says Microsoft
-
April 11, 2013
11
Apr'13
Bots and web apps among top threats to data security, says Check Point
Bots, viruses, breaches and attacks are a constant and real threat to the information security of organisations
-
March 06, 2013
06
Mar'13
What is RSA's build, buy, partner strategy?
Computer Weekly takes a closer look at RSA's build, buy, partner strategy
-
January 22, 2013
22
Jan'13
BYOD: People pay for devices to use for work
Over half of employees buy their own devices for work use, according to new report from mobile device management specialist Good Technology
-
January 22, 2013
22
Jan'13
Why has DLP never taken off?
Why is data loss prevention (DLP) technology not being adopted if it provides the very protection most businesses need?
-
October 16, 2012
16
Oct'12
Organisations need alternative data protection as security models fail
Organisations' security models are failing - so could it be time to adopt an intelligence-led approach to data protection and fighting cyber crime?
-
October 05, 2012
05
Oct'12
Security firm warns against Samsung Galaxy Tab for enterprise use
Security specialist Context Information Security says vulnerabilities in the Samsung Galaxy Tab make it unsuitable for use in the enterprise