News
IT for manufacturing
-
February 22, 2023
22
Feb'23
Half of cyber leaders to switch jobs by 2025, citing stress
A substantial number of cyber security leaders are plotting their great escape, saying the industry is leaving them too stressed to go on, according to a study
-
February 21, 2023
21
Feb'23
US government Strike Force aims to prevent adversaries from accessing disruptive tech
The US Strike Force law enforcement initiative will target rogue nation-states that pose a national security threat
-
February 15, 2023
15
Feb'23
Multi-purpose malwares can use more than 20 MITRE ATT&CK TTPs
Report warns of the development of increasingly sophisticated, multi-purpose malwares, and calls on defenders to play close attention to the MITRE ATT&CK framework to ward them off
-
February 15, 2023
15
Feb'23
Microsoft fixes three zero-days in February update
February’s Patch Tuesday update contains fixes for three previously unpublicised zero-days in Microsoft Office, Windows Graphics Component and Windows Common Log File System Driver
-
February 14, 2023
14
Feb'23
Vidar, nJRAT re-emerge as prominent malware threats in January
Trojans and infostealers once again dominate the list of most commonly observed threats, according to Check Point’s latest telemetry
-
February 13, 2023
13
Feb'23
KPMG launches metaverse and digital twin hub in Saudi Arabia
The Saudi Arabian government’s commitment to investing in metaverse technology has attracted a KPMG centre of excellence to its shores
-
February 13, 2023
13
Feb'23
Security buyers lack insight into threats, attackers, report finds
The majority of cyber security purchasing decisions are made without proper insight into the attackers organisations are facing, according to a Mandiant report
-
February 13, 2023
13
Feb'23
Porsche revs up Formula E team with NetApp hybrid cloud
Porsche’s electric car racing team has to set up on city street courses in short order, and does it with a portable server setup and hybrid cloud storage managed by NetApp GFC
-
February 08, 2023
08
Feb'23
Cisco unveils toolkit for greater network visibility and control
Tech giant introduces cloud services in Operations Dashboard to increase industrial asset visibility and provide industrial IoT customers with path to cloud automation for Operational Technology
-
February 08, 2023
08
Feb'23
Rakuten targets big edge deployments with Symworld Cloud
Japanese giant Rakuten bought Kubernetes management platform Robin.io and put it in 50,000-plus telco antennas. Now it aims Symworld Cloud at enterprise edge deployments
-
February 07, 2023
07
Feb'23
Benelux CIO interview: Marijn Grevink, leader of digital transformation, Mars
In an interview with Computer Weekly, the digital head at Mars, Marijn Grevink, takes the wrapper off digital transformation at the company in the Netherlands
-
February 06, 2023
06
Feb'23
The Security Interviews: How to overcome data protection compliance challenges
Complying with the vast swathe of data protection legislation around the world is complex, especially for smaller organisations without the necessary expertise. Could the compliance process be simplified, and if so, how?
-
February 02, 2023
02
Feb'23
North Korea’s Lazarus gang exposes itself in opsec failure
WithSecure researchers linked a campaign of cyber attacks targeting medical research and energy firms to North Korea’s infamous Lazarus APT after a group member accidentally screwed up
-
February 01, 2023
01
Feb'23
Cloud security top risk to enterprises in 2023, says study
A PwC study finds senior executives expect cyber attacks on cloud services to increase significantly this year
-
February 01, 2023
01
Feb'23
UK Cyber Council and ISACA launch audit, assurance programme
The UK Cyber Security Council has teamed up with ISACA to partner on a new audit and assurance programme for security pros
-
January 27, 2023
27
Jan'23
Hive ransomware gang taken down after FBI hacks back
The FBI hacked into Hive’s servers, stole its decryption keys and then took down its servers in a major action that has successfully disrupted a prolific and dangerous ransomware operation
-
January 25, 2023
25
Jan'23
Boards struggle to resolve cyber risk in digital supply chains
Accelerated digitisation of supply chains is introducing more cyber risk for which many organisations seem unprepared, according to the BSI’s annual report on supply chain risk
-
January 24, 2023
24
Jan'23
UK insurers need to up their game on cyber gaps, says PRA
Gaps and limitations in how insurers respond to cyber risk need to be addressed, according to the Bank of England regulator, the Prudential Regulation Authority
-
January 24, 2023
24
Jan'23
SSRF attacks hit 100,000 businesses globally since November
There has been a dramatic increase in attacks exploiting the ProxyNotShell/OWASSRF exploit chains to target Microsoft Exchange servers
-
January 20, 2023
20
Jan'23
DataCore software-defined storage helps car firm avoid breakdowns
Bontaz used to face regular IT outages that took too long to recover from. Then it got DataCore software-defined storage and the ability to rapidly recover from downtime
-
January 17, 2023
17
Jan'23
Crest throws support behind CyberUp CMA reform campaign
Cyber accreditation association Crest International has lent its support to the CyberUp campaign for reform to the Computer Misuse Act of 1990
-
January 11, 2023
11
Jan'23
Microsoft fixes EoP zero-day on January Patch Tuesday
On the first Patch Tuesday of 2023, Microsoft fixed an elevation of privilege vulnerability in Windows Advanced Local Procedure Call, which has been actively exploited in the wild and may be co-opted into ransomware campaigns
-
January 10, 2023
10
Jan'23
Insurer Beazley introduces catastrophe bond to ease cyber risk
Insurance company Beazley says that its $45m cyber catastrophe bond will help to protect its balance sheet and enable it to offer more cyber insurance cover
-
January 09, 2023
09
Jan'23
JPMorgan ordered to face lawsuit over cyber attack on Ray-Ban maker
US banking giant JPMorgan forced to respond to accusations that it failed to inform a business customer about suspicious transactions
-
December 29, 2022
29
Dec'22
CIO interview: David Schwartz, vice-president, PepsiCo Labs
The food and drinks giant actively seeks out innovative tech startups and runs a programme to find creative ways to use their products to benefit the business
-
December 29, 2022
29
Dec'22
Top 10 Nordic IT stories of 2022
Here are Computer Weekly's top 10 Nordic IT articles of 2022
-
December 22, 2022
22
Dec'22
Top 10 cyber security stories of 2022
The war in Ukraine loomed large over the cyber security news agenda, but 2022 also saw growing awareness of open source security, discussion around cyber insurance, and more besides
-
December 22, 2022
22
Dec'22
Top 10 cyber crime stories of 2022
Cyber crime continued to hit the headlines in 2022, with impactful cyber attacks abounding, digitally enabled fraud ever more widespread and plenty of ransomware incidents
-
December 20, 2022
20
Dec'22
Four-day working week set to stay at Atom bank
Challenger bank Atom has formalised a four-day working week policy after a successful trial
-
December 16, 2022
16
Dec'22
CIO interview: Steve Capper, CIO, SNC-Lavalin
Engineering and construction giant SNC-Lavalin has consolidated its global datacentre estate and implemented private cloud to support the unique demands of its business
-
December 16, 2022
16
Dec'22
Shiseido data breach victims plan legal action over fake companies
Employees and former employees of cosmetics firm Shiseido whose data was stolen in a recent breach are planning group legal action after their information was used to establish fraudulent companies in their names
-
December 14, 2022
14
Dec'22
Ethical hackers flex their muscles in 2022
Ethical hackers working through HackerOne programmes found 21% more vulnerabilities in 2022 than in 2021
-
December 14, 2022
14
Dec'22
Microsoft fixes two zero-days in final Patch Tuesday of 2022
December’s Patch Tuesday is typically a light month for Microsoft, and this year proved no exception, but there are still several critical issues worth addressing, and two zero-days for defenders to pore over
-
December 13, 2022
13
Dec'22
EU issues draft data adequacy decision in favour of US
The European Commission has concluded that the United States does ensure an adequate level of protection for personal data transferred from the European Union and will now launch the process towards the adoption of an adequacy decision
-
December 13, 2022
13
Dec'22
The nature of the CISO role will be in flux in 2023
As cyber risk outpaces organisational defences, and cyber attacks and breaches cause more and more damage, the nature of the CISO role is entering a state of flux, according to a report
-
December 09, 2022
09
Dec'22
Iranian APT seen exploiting GitHub repository as C2 mechanism
A subgroup of the Iran-linked Cobalt Mirage APT group has been caught taking advantage of the GitHub open source project as a means to operate its latest custom malware
-
December 08, 2022
08
Dec'22
Apple to tap third party for physical security keys
Apple is launching a number of new security protections, including the addition of third-party-provided hardware security keys
-
December 07, 2022
07
Dec'22
Google, MS, Oracle vulnerabilities make November ’22 a big month for patching
Vulnerabilities affecting the likes of Google, Microsoft and Oracle proved particularly troublesome in November
-
December 06, 2022
06
Dec'22
Industrial IoT focus of next NCSC startup challenge
The NCSC for Startups programme is looking for innovative ideas to encrypt and secure the industrial internet of things
-
December 06, 2022
06
Dec'22
Don’t become an unwitting tool in Russia’s cyber war
Researchers have turned up evidence that enterprise networks are being co-opted by Russian threat actors to launch attacks against targets in Ukraine. How can you avoid becoming an unwitting tool in a state-backed attack?
-
December 05, 2022
05
Dec'22
DCMS to assess UK semiconductor industry
The ongoing global chip crisis, geopolitician tension with China and deal-blocking are the backdrop to this latest assessment
-
November 30, 2022
30
Nov'22
Latest LockBit ransomware versions have wormable capabilities
Sophos researchers have reverse-engineered the Lockbit 3.0 ransomware, shedding new light on its evolving capabilities and firming up links with BlackMatter
-
November 25, 2022
25
Nov'22
Data management, backup becoming the CISO's responsibility
More and more CISOs are taking on responsibility for wider data management strategies, and this trend looks set to grow next year
-
November 22, 2022
22
Nov'22
Ducktail spins new tales to hijack Facebook Business accounts
The increasingly active Ducktail cyber crime operation is refining its operations, seeking new methods to compromise its victims’ Facebook Business accounts
-
November 22, 2022
22
Nov'22
Killnet DDoS hacktivists target Royal Family and others
Russia-aligned hacktivists targeted multiple UK websites, including those of the Royal Family, in a new campaign of DDoS attacks
-
November 22, 2022
22
Nov'22
C-suite mystified by cyber security jargon
Malware, supply chain attack, zero-day, IoC, TTP and Mitre ATT&CK are just some of the everyday terms that security pros use that risk making the world of cyber incomprehensible to outsiders
-
November 18, 2022
18
Nov'22
Is Elon Musk’s Twitter safe, and should you stop using it?
With a litany of security and compliance issues exposed and in many cases caused by Elon Musk’s takeover of social media platform Twitter, some may be asking if it’s still safe or appropriate to use
-
November 17, 2022
17
Nov'22
Brexit deregulation will make UK next Silicon Valley, vows Hunt
Chancellor vows to revolutionise how the IT industry is regulated to spur competition, investment and innovation in a technological ‘Big Bang’
-
November 17, 2022
17
Nov'22
Another Log4Shell warning after Iranian attack on US government
The breach of a US federal body by an Iranian threat actor exploiting the Adobe Log4j Log4Shell vulnerability has prompted a fresh flurry of patching
-
November 16, 2022
16
Nov'22
Global network fragmentation a source of increasing risk
Risk consultancy’s report says the weaponisation of cyber space and geopolitical clashes herald a breakdown of global networks into distinct regional or national architectures