News
IT risk management
- 
				July 19, 2017
				
					19
					Jul'17
				
Newcastle council data leak shows need for security automation
Leak of child adoption information by Newcastle City Council resulted from accidental email attachment by employee
 - 
				July 17, 2017
				
					17
					Jul'17
				
IBM claims breakthrough in mainframe encryption
IBM says its new mainframe ushers in a new era of data protection in response to a call to action from chief information security officers and security experts worldwide
 - 
				July 13, 2017
				
					13
					Jul'17
				
Encryption keys too predictable, warn security researchers
Encryption keys are not as random as most people think, which means encrypting data is often not as secure as it could be, according to security researchers
 - 
				July 13, 2017
				
					13
					Jul'17
				
Verizon denies data loss but admits potentially huge breach
Verizon has responded to reports of millions of customer records being exposed to the internet by saying no data was accessed by malicious third parties, but the incident raises thorny issues
 
- 
			July 13, 2017
			
				13
				Jul'17
			
What Singapore can learn from Israel’s cyber security playbook
A former Unit 8200 captain from the Israel Defense Forces shares what Singapore can learn from Israel’s approach to cyber security
 - 
			July 06, 2017
			
				06
				Jul'17
			
Kaspersky researcher in Asia develops cyber forensics tool
The open source tool lets cyber forensics investigators access infected machines remotely to collect malware artefacts without compromising system integrity
 - 
			June 30, 2017
			
				30
				Jun'17
			
Danish shipping giant Maersk recovering from major Petya cyber attack
Company confirms attack took down its IT system across multiple sites and business units, but has now been contained
 - 
			June 29, 2017
			
				29
				Jun'17
			
Key lessons from ‘Petya’ ransomware attack
While the cyber security community is still working to understand the latest ransomware attack that has reportedly hit 60 countries, there are key lessons to be learned
 - 
			June 28, 2017
			
				28
				Jun'17
			
Singapore authorities issue alert on Petya ransomware
The country’s emergency response team has called for users to boost their cyber defences as the Petya ransomware rages through IT systems in Asia and Australia
 - 
			June 21, 2017
			
				21
				Jun'17
			
Microsoft admits Windows 10 disables third-party security software
Microsoft has admitted Windows 10 disables some third-party security software, but claims this is purely because of compatibility issues
 
- 
			June 21, 2017
			
				21
				Jun'17
			
Pirated software used to spread malware in APAC
A regional study by a Singapore university has found that counterfeit software distributed through discs and file-sharing networks is plagued by malware
 - 
			June 20, 2017
			
				20
				Jun'17
			
Web hosting firm agrees to pay $1m ransomware demand
South Korean hosting firm Nayana agrees to pay more than $1m to restore data that was encrypted by a ransomware attack on its Linux servers on 10 June 2017
 - 
			June 19, 2017
			
				19
				Jun'17
			
Abu Dhabi uses surveillance tech to protect Grand Prix
Police use surveillance technology and monitoring software to ensure public safety when Formula One visits the UAE each year
 - 
			June 16, 2017
			
				16
				Jun'17
			
Australia’s decryption plan seen as untenable
Experts say efforts to get technology and social media firms to cooperate with the authorities in decrypting communications will be hard to achieve
 - 
			June 16, 2017
			
				16
				Jun'17
			
10 ways to prevent breaches and minimise impact
Attackers are continually adapting to security technologies to fly under the radar, but taking action in 10 key areas can reduce the risk of breaches and minimise their impact, according to a resilience expert
 - 
			June 14, 2017
			
				14
				Jun'17
			
SAP users look to software suppliers to help with fast-approaching GDPR
An SAP UK and Ireland user group survey has found user organisations crying out for help as GDPR approaches, with cloud delivery a special concern
 - 
			June 14, 2017
			
				14
				Jun'17
			
Microchips implanted in hands could be in use for payments in 20 years
UK consumers are becoming more accepting that biometric authentication will become the norm for payments
 - 
			June 09, 2017
			
				09
				Jun'17
			
Infosec17: Society needs to address encryption dilemma
There needs to be a discussion about how to balance the interests of privacy, security and the tech industry, says Infosecurity Europe Hall of Fame inductee
 - 
			June 08, 2017
			
				08
				Jun'17
			
Islamic State supporters shun Tails and Tor encryption for Telegram
Confidential communications show terror group’s supporters are turning to simple mobile phone messaging apps to exchange messages and distribute propaganda
 - 
			June 06, 2017
			
				06
				Jun'17
			
Mainframe blindspots expose companies to insider threats
More than three-quarters of CIOs say their mainframe is more secure than other systems, but most admit they are still exposed to insider threats
 - 
			June 06, 2017
			
				06
				Jun'17
			
UK firms stockpiling bitcoins for ransomware attacks
Large UK firms are prepared to pay out more than £136,000 on average to cyber criminals who launch ransomware attacks, a survey has revealed
 - 
			June 01, 2017
			
				01
				Jun'17
			
Enterprises struggle with emergency patching
Companies are struggling to maintain emergency patch cycles, despite the fact that enterprise reliance on legacy systems often means emergency patches are an everyday fact of life, a survey shows
 - 
			May 31, 2017
			
				31
				May'17
			
WannaCry shows validity of risk-based security, says RSA head
WannaCry and other recent cyber attacks underline the importance of adopting a risk-based approach to security, says RSA president
 - 
			May 31, 2017
			
				31
				May'17
			
Shadow Brokers prepares zero-day subscription service
Businesses may face an onslaught of zero-day attacks soon as the group that leaked the NSA exploits used in the WannaCry ransomware attacks prepares to release more stolen code
 - 
			May 26, 2017
			
				26
				May'17
			
People can be strongest link in cyber security, says NCSC
People are often seen as the weakest link when it comes to cyber security, but that must change, says the National Cyber Security Centre
 - 
			May 26, 2017
			
				26
				May'17
			
EternalRocks author throws in the towel after media attention
Security researcher who discovered worm that could have bigger impact than WannaCry says the author seems to have given up
 - 
			May 24, 2017
			
				24
				May'17
			
Singapore government to spend S$2.4bn on technology initiatives
Funding will go towards building a national sensor platform, boosting the government’s cyber security capabilities and driving the use of robots
 - 
			May 24, 2017
			
				24
				May'17
			
Interview: Nick Bleech, head of information security, Travis Perkins
Last year, Travis Perkins implemented Splunk to help it to respond more quickly to security threats. Now, the business is looking into machine learning and a single customer view
 - 
			May 23, 2017
			
				23
				May'17
			
Economic and political uncertainty drives organisations to rethink IT strategies
CIO job satisfaction reaches a three-year high as organisations hire more IT staff and invest in innovative digital technology
 - 
			May 23, 2017
			
				23
				May'17
			
EternalRocks worm combines seven leaked NSA attack tools
Hard on the heels of the WannaCry ransomware attacks, a researcher has found a worm that combines four NSA exploits and associated attack tools, including EternalBlue used by WannaCry
 - 
			May 22, 2017
			
				22
				May'17
			
Windows 7 accounts for most WannaCry infections
Statistics show that computers running Windows 7 accounted for the biggest proportion of machines infected with the WannaCry ransomware, while NHS suppliers are blamed for hampering patching by NHS trusts
 - 
			May 19, 2017
			
				19
				May'17
			
Command and control communications key to detecting threats
Malware command and control (C&C) communications are key to detecting advanced threats, according to a security researcher
 - 
			May 18, 2017
			
				18
				May'17
			
Strong cyber security posture reduces impact of breaches
There is a direct correlation between data breaches and falls in stock prices, but the impact is lighter on companies with good cyber security, a study has revealed
 - 
			May 12, 2017
			
				12
				May'17
			
Five cyber security imperatives for all companies
There are five things all companies should ensure they are doing in terms of cyber security
 - 
			May 09, 2017
			
				09
				May'17
			
Cognitive security is the future, says Martin Kuppinger
Modern computing capabilities combined with cognitive technology has huge potential for tackling unknown attack patterns and addressing the security skills shortage, says Martin Kuppinger
 - 
			May 04, 2017
			
				04
				May'17
			
Testing is key to IoT security, says researcher
Building an effective testing process across all elements associated with a product is key to securing the internet of things, according to a researcher in the field
 - 
			May 02, 2017
			
				02
				May'17
			
UBS applies data protection for compliance and competitive advantage
Swiss bank UBS aims to get greater value out of investments in sensitive data protection systems by using its security capabilities as a differentiator
 - 
			May 02, 2017
			
				02
				May'17
			
Intel urges business to patch critical remote-execution flaw
Intel advises business customers to apply a security update for some versions of its administration firmware for vPro processors to fix a remote execution flaw
 - 
			April 20, 2017
			
				20
				Apr'17
			
Mastercard integrates biometric technology into cards
MasterCard tests out biometric technology embedded into payment cards, with further trials in Europe planned
 - 
			April 20, 2017
			
				20
				Apr'17
			
Banks suffer average of 85 attempted serious cyber attacks a year, and one-third are successful
Banks face daily cyber attacks, many of which succeed in stealing data, research finds
 - 
			April 20, 2017
			
				20
				Apr'17
			
Human interaction still key to cyber attacks, study reveals
An analysis of threats faced by organisations in the first quarter of 2017 reveals that cyber attackers still rely heavily on user interaction
 - 
			April 19, 2017
			
				19
				Apr'17
			
Skype most popular communication channel for cyber criminals
The cyber criminal network is truly global and collaborative, making use of popular messaging services, a study has revealed
 - 
			April 13, 2017
			
				13
				Apr'17
			
Enterprise adoption of encryption accelerating, study shows
Cloud adoption and escalating threats are accelerating adoption of encryption, a study has revealed
 - 
			April 13, 2017
			
				13
				Apr'17
			
Six key security weaknesses in industrial systems
Organisations should mitigate six key vulnerabilities in industrial control systems to reduce the risk of cyber attack, warns security firm FireEye
 - 
			April 11, 2017
			
				11
				Apr'17
			
Security as a service on the rise in the UAE
Organisations in the United Arab Emirates are increasingly turning to security services
 - 
			April 10, 2017
			
				10
				Apr'17
			
IAM a core building block for GDPR compliance
Identity and access management is key to enabling organisations to become compliant with the GDPR, increase security and improve customer relationships, according to a senior analyst at KuppingerCole
 - 
			April 10, 2017
			
				10
				Apr'17
			
Outsourcing service left Scottrade Bank customer data exposed
Mistake by outsourcing service provider left the details of 20,000 Scottrade Bank customers vulnerable to theft
 - 
			April 06, 2017
			
				06
				Apr'17
			
Interview: F-Secure’s Mikko Hyppönen on the Nordics, Russia and the internet of insecure things
Computer Weekly sat down with Finnish cyber security expert Mikko Hyppönen to talk about security in the Nordics, Russia and the trouble with connected devices
 - 
			April 04, 2017
			
				04
				Apr'17
			
Chinese hacking group targeted firms through IT MSPs
Security researchers have uncovered a China-based cyber espionage campaign that targeted IT services firms and their customers, underlining the need for supply chain security
 - 
			March 31, 2017
			
				31
				Mar'17
			
How IT can be more defensible
A renowned Google engineer calls for the IT industry to build devices capable of being defended and for enterprises to take a balance sheet approach in managing risks
 
