News
IT for consulting and business services
-
March 11, 2013
11
Mar'13
AstraZeneca opts for co-operation after IBM falls out
AstraZeneca has changed its approach to outsourcing to encourage co-operation with suppliers after its deal with IBM failed to deliver
-
March 06, 2013
06
Mar'13
What is RSA's build, buy, partner strategy?
Computer Weekly takes a closer look at RSA's build, buy, partner strategy
-
February 28, 2013
28
Feb'13
RSA 2013: Suppliers need to prepare for new security vulnerability handling standards
Software makers and online service providers need to prepare for two ISO standards on vulnerability handling processes due by the end of 2013
-
February 26, 2013
26
Feb'13
RSA 2013: Obama cyber order will have significant effect, says DoHS
President Barack Obama’s executive order on cybersecurity is a “very big deal” says Mark Weatherford, deputy under-secretary for cybersecurity at the US Department of Homeland Security (DoHS).
-
February 22, 2013
22
Feb'13
Music companies critical of Google’s anti-piracy efforts
Music companies have accused Google of failing to fulfil a pledge not to give prominent rankings in search results to websites offering illegal music downloads.
-
February 15, 2013
15
Feb'13
Bad outsourcing decisions cause 63% of data breaches
Bad outsourcing decisions nearly two-thirds of data breaches investigated by security firm Trustwave in the past year
-
February 06, 2013
06
Feb'13
EU cyber strategy aimed at boosting preparedness and cooperation
The European cyber security strategy addresses insufficient national preparedness and boosting co-operation in the region, says the EC
-
February 06, 2013
06
Feb'13
Business avoids cloud over fear of government snooping
Almost half of IT professionals are deterred from keeping sensitive data in the cloud because of fear of government intervention and possible legal action, a survey has revealed
-
February 06, 2013
06
Feb'13
Twitter strengthens login security after hacker attack
Days after a hacking attack, it has emerged that Twitter plans to strengthen its login security with two-factor authentication
-
January 28, 2013
28
Jan'13
Why has NAC, like DLP, failed to take off?
Why are organisations not investing in systems that are designed to keep malicious actors out of their networks?
-
January 25, 2013
25
Jan'13
Encryption is safe bet, says SafeNet
Encryption is the only thing that can give peace of mind to CIOs and CISOs, says Dave Hansen, president and CEO of security firm SafeNet
-
January 24, 2013
24
Jan'13
ICO hits Sony with £250,000 data breach penalty
The Information Commissioner’s office (ICO) has fined Sony Computer Entertainment Europe £250,000 for breaching the Data Protection Act
-
January 22, 2013
22
Jan'13
Why has DLP never taken off?
Why is data loss prevention (DLP) technology not being adopted if it provides the very protection most businesses need?
-
January 14, 2013
14
Jan'13
Oracle rushes out patches for Java zero days
Oracle has released two out-of-band security updates for the latest zero day vulnerabilities in Java
-
January 11, 2013
11
Jan'13
Disable Java to protect from latest zero-day
Security researchers are warning of a zero-day vulnerability in all versions of Java, including the latest Java 7 update 10
-
January 10, 2013
10
Jan'13
Software piracy international in scope, says Fast
The scale of software piracy is both international in scope and military in its execution, says the Federation Against Software Theft (Fast)
-
January 07, 2013
07
Jan'13
Ernst & Young email keyword analysis identifies fraudsters
Fraud investigators have revealed the most common words used in email conversations by employees engaged in rogue trading and fraud
-
January 03, 2013
03
Jan'13
Immigrants wrongly told to leave UK due to inaccurate data
Some immigrants have been accidentally contacted by Capita and told to leave the UK as a result of inaccurate data used in a government push to remove thousands of illegal immigrants
-
December 28, 2012
28
Dec'12
Top 10 cyber crime stories of 2012
Ten articles that illustrate some of the major trends in cyber crime in 2012
-
December 24, 2012
24
Dec'12
Top 10 IT outsourcing stories of 2012
Research into the UK outsourcing sector in 2010 found that 7.4% of the UK’s total production came from outsourcing, and about a third of that – some £38.7bn – was IT outsourcing
-
December 14, 2012
14
Dec'12
Mazars outsources access management
Global accountancy firm Mazars has outsourced the management of access to Oracle and Sharepoint applications for 6000 global staff
-
December 14, 2012
14
Dec'12
CIO interview: Kevin O’Connor, Carlson Wagonlit Travel
As the new CIO at Carlson Wagonlit Travel, Kevin O’Connor is looking to bring in a new approach to the company’s IT strategy
-
December 12, 2012
12
Dec'12
Ghost Shell hacktivists publish over a million credentials
The Ghost Shell group, an offshoot of the Anonymous hacking collective has published the log-in details from 1.6 million accounts
-
December 10, 2012
10
Dec'12
UK CIOs see EU regulation as key
A third of UK CIOs are more concerned with EU regulation, such as the data protection directive, than their own local laws, a study has revealed.
-
December 07, 2012
07
Dec'12
UK government jobs website exploited by hackers
Hackers have been able to exploit security flaws in a new government jobs website to steal personal information about job applicants
-
November 28, 2012
28
Nov'12
Capita set to win £1.7bn Staffordshire outsourcing deal
Capita has been named preferred bidder in an educational support services joint venture with Staffordshire County Council, in a deal worth £1.7bn over 20 years.
-
November 27, 2012
27
Nov'12
Zero-day exploit for Yahoo Mail goes on sale
Hacker sells $700 zero-day exploit for Yahoo Mail that allows attacker to use cross-site scripting vulnerability to steal cookies and hijack accounts
-
November 19, 2012
19
Nov'12
Cyber criminals target Skype, Facebook and Windows users
Cyber criminals targeted users of Skype, Facebook and Windows using multiple Blackhole exploits in October, according to security firm GFI Software
-
November 16, 2012
16
Nov'12
Nasa to encrypt data after latest breach
Nasa is to encrypt all its mobile computers after the loss of a laptop containing personal information about more than 10,000 staff
-
November 13, 2012
13
Nov'12
Many UK firms underestimate cost of data breaches, study finds
Many UK organisations are still failing to understand the implications and costs of data breaches, a study has revealed
-
November 12, 2012
12
Nov'12
Hacking attempts to top one billion in Q4, predicts NCC Group
One billion hacking attempts will be made globally in the final quarter of 2012, according to information assurance firm NCC Group
-
November 09, 2012
09
Nov'12
Twitter apologises for unnecessary hacking warnings
Twitter has apologised after telling members their accounts had been hacked and forcing them to reset their passwords
-
November 09, 2012
09
Nov'12
Stuxnet hit Chevron’s systems, the energy giant admits
US energy giant Chevron has revealed that it was hit by the Stuxnet virus in 2010
-
November 07, 2012
07
Nov'12
Police arrest man for DDoS attacks on Theresa May sites
Police have arrested a 41-year-old man in connection with a cyber attack on websites connected to home secretary Theresa May
-
November 01, 2012
01
Nov'12
Parliamentary committee joins criticism of draft communications data bill
Home secretary Theresa May faced stern criticism before a Parliamentary committee hearing evidence on the Draft Communications Data Bill
-
October 31, 2012
31
Oct'12
Free mobile apps a threat to privacy, study finds
Free mobile apps pose a serious threat to privacy because of their ability to capture large amounts of user information
-
October 30, 2012
30
Oct'12
IT security budgets mismatched to hacker targets, study shows
IT security budgets are not being used to provide defence technologies in some areas most likely to be targeted by hackers, a study shows
-
October 26, 2012
26
Oct'12
Cloud HR pivotal to Direct Line share offering
Cloud HR proved pivotal to insurance group Direct Line separating from the Royal Bank of Scotland (RBS) before it launched on the stock market
-
October 16, 2012
16
Oct'12
Organisations need alternative data protection as security models fail
Organisations' security models are failing - so could it be time to adopt an intelligence-led approach to data protection and fighting cyber crime?
-
October 12, 2012
12
Oct'12
CIO interview: Frank Modruson, Accenture
Accenture’s CIO Frank Modruson on providing IT to 250,000 people who think they could do your job and why video is the next big thing
-
October 11, 2012
11
Oct'12
RSA Europe: Thousands of unprotected virtual servers exposed to the web
Organisations are failing to protect data in virtual environments, says Jason Hart, vice-president cloud solutions, SafeNet
-
October 11, 2012
11
Oct'12
RSA Europe: Security concerns whole supply chain, says Misha Glenny
Targeted attacks affect the whole supply chain, not just big corporations, author Misha Glenny tells RSA Conference Europe 2012 attendees
-
October 10, 2012
10
Oct'12
RSA Europe: Cloud key to future information security, says Qualys
Cloud computing is an opportunity information security professionals should not miss, says Philippe Courtot, CEO of security firm Qualys
-
October 09, 2012
09
Oct'12
Case study: Syngenta multi-sourcing key to business growth
Agri-business giant Syngenta has put multi-sourced IT at the heart of its ambitious plan to double its revenues in the next 8 years
-
September 25, 2012
25
Sep'12
Security concerns hold back mobile banking adoption
More than two-thirds of smartphone owners have not yet adopted mobile banking apps because of security concerns, a survey has revealed
-
September 18, 2012
18
Sep'12
Microsoft investigates IE zero-day flaw
Microsoft says it is investigating reports of a vulnerability in Internet Explorer 6, 7, 8, and 9
-
September 17, 2012
17
Sep'12
Fujitsu blacklisting part of tighter government policy
Government policy flags up suppliers that perform poorly but, with so few, how far can government practically address failed outsourcing contracts?
-
September 17, 2012
17
Sep'12
IT security awareness needs to be company-wide, says (ISC)²
Information security awareness needs to be more robust, started as early as possible, continually reinforced and organisation-wide, says Julie Peeler, director, (ISC)² Foundation
-
September 11, 2012
11
Sep'12
Skills shortage means no unemployment in IT security, says (ISC)2
Zero unemployment in IT security shows a huge shortage of skills in the profession, says Hord Tipton, executive director of (ISC)2
-
September 11, 2012
11
Sep'12
Cabinet Office blacklists Fujitsu from government IT contract tenders
The Cabinet Office has banned Fujitsu and another IT supplier from tendering for public sector IT contracts as they constitute too high a risk