News
IT risk management
-
July 17, 2015
17
Jul'15
United Airlines begins bug bounty payouts
United Airlines has paid out the maximum award to two hackers, which means the flaws are likely to be remote code execution vulnerabilities
-
July 14, 2015
14
Jul'15
Symantec bets on simplicity, cloud and mobile
Symantec is not trying to be all things to all people, but is instead focusing on threats and protecting information in the mobile and cloud environments
-
July 03, 2015
03
Jul'15
Wi-Fi enhances guest experience and profitability for Belgian theme park
Bobbejaanland, one of the largest theme parks in Belgium, is using a Fortinet Wi-Fi network to offer visitors access on the go, and improve its management capabilities
-
July 02, 2015
02
Jul'15
How Deutsche Telekom plans to challenge AWS and Google in the cloud
German telco Deutsche Telekom wants to evolve into the public cloud and plans to beat sector giants such as Amazon and Google at their own game
-
June 17, 2015
17
Jun'15
DD4B cyber extortion gang ramps up operations
Cyber criminals using DDoS attacks to extort funds from victims are carrying out more attacks despite a $26,000 bounty
-
May 20, 2015
20
May'15
BT Openreach turns to Crimestoppers to catch cable thieves
Openreach extends its partnership with crime-fighting charity Crimestoppers to tackle cable theft
-
May 11, 2015
11
May'15
PSNGB rebrands to drive information sharing across PSN
PSNGB, the trade association set up to promote the Public Services Network, rebrands itself as Innopsis and says its work is far from over
-
May 07, 2015
07
May'15
Businesses should prepare for black swans, says resiliency consultant
While black swan events are random and unexpected, businesses can still prepare for them, according to a resiliency consultant
-
May 07, 2015
07
May'15
Future IAM will need to be broader, says Martin Kuppinger
Identity and access management systems need to look at all forms of identity, not just employees or users, says KuppingerCole analyst
-
April 29, 2015
29
Apr'15
Vodafone sends network in a backpack to Nepal earthquake zone
Vodafone’s charitable arm, the Vodafone Foundation, deploys instant mini networks to help restore communications in quake-hit Nepal
-
April 23, 2015
23
Apr'15
Mobile malware overhyped, says security company Damballa
Mobile internet users are 1.3 times more likely to get struck by lightning than infected by mobile malware, research by security firm Damballa finds
-
April 22, 2015
22
Apr'15
Destructive cyber attacks making security a business concern, says Microsoft
Destructive cyber attacks are driving a fundamental shift in the information security market, according to Microsoft
-
April 14, 2015
14
Apr'15
Security risk potential linked to young, mobile users
A study conducted by wireless supplier Aruba Networks has identified a distinct cohort of high-risk, security-agnostic workers
-
April 08, 2015
08
Apr'15
Alleged White House hack highlights typical security failings, say experts
The alleged penetration of sensitive White House computer networks highlights typical security failings, say information security experts
-
March 31, 2015
31
Mar'15
DDoS losses potentially £100k an hour, survey shows
DDoS attacks could expose 40% of businesses to losses of £100,000 or more an hour at peak times, a survey shows
-
March 26, 2015
26
Mar'15
Samsung targets business with Microsoft tools integration
Samsung has pre-installed Microsoft OneNote, OneDrive, and Skype on the new Galaxy S6 and Galaxy S6 edge, as it expands into business
-
March 26, 2015
26
Mar'15
UK attacks on crypto keys and digital certificates endemic
All UK security professionals polled in a global survey have responded to attacks on keys and certificates in past two years
-
March 20, 2015
20
Mar'15
Home devices threaten enterprise data security, warn researchers
Poor or lacking security on ADSL routers and other devices used by teleworkers a threat to global enterprise information security
-
March 13, 2015
13
Mar'15
Lookout bets on big data analytics to secure enterprise mobiles
Mobile security SaaS provider Lookout is betting on its cloud-based big data analytics capability to attract enterprise customers
-
March 11, 2015
11
Mar'15
Why IAM is topping security investments in 2015
It is not surprising identity and access management (IAM) is set to move to the fore in 2015
-
March 06, 2015
06
Mar'15
How to ensure your hot-desking colleagues keep their data secure
Once hot-desking is implemented, data security suddenly demands greater attention
-
February 27, 2015
27
Feb'15
Case study: Norwegian insurer invests in Darktrace machine-learning cyber defence
Shipping insurance company DNK hopes to inspire the rest of the shipping industry to adopt Darktrace’s cyber defence system
-
February 26, 2015
26
Feb'15
Cloud security still needs a lot more work, say European experts
Security and privacy remain a stumbling block for cloud computing, according to information experts at the Trust in the Digital World conference
-
February 19, 2015
19
Feb'15
Intel Security warns of six social engineering techniques targeting businesses
An Intel Security report encourages businesses to address and educate employees on “six levers of influence” used by hackers
-
February 12, 2015
12
Feb'15
Damballa report highlights the limitations of prevention-centric security
Anti-virus (AV) suppliers can take more than six months to create signatures for malware, according to a report from security firm Damballa
-
January 16, 2015
16
Jan'15
Security Think Tank: How to deal with wiper malware
How much should businesses worry about destructive, computer-killing malware, and what steps should they take to mitigate attacks?
-
January 16, 2015
16
Jan'15
FTSE 350 firms still have long way to go on cyber risk
Many FTSE 350 firms still have a long way to go to manage the risks of a cyber attack, a government-backed cyber governance health check has revealed
-
January 12, 2015
12
Jan'15
Attackers bypass conventional security, says FireEye study
Hackers breach most conventional, signature-based security technologies, with 27% involving advanced threats
-
January 06, 2015
06
Jan'15
Online money transfer provider Xoom suffers multimillion-dollar fraud
Digital money transfer provider Xoom has admitted to suffering a $30.8m loss at the hands of fraudsters
-
December 18, 2014
18
Dec'14
CIO interview: Mercedes AMG Petronas IT director on the need for speed in IT
When Matt Harris became IT director for F1 team Mercedes AMG Petronas in 2009, IT costs needed to be slashed
-
December 17, 2014
17
Dec'14
Cabinet Office begins procurement for next stage of Gov.uk Verify
The Cabinet Office has submitted a tender notice for a £150m three-year framework for the provision of identity assurance services
-
December 04, 2014
04
Dec'14
Sony hack exposes poor security practices
Sony Pictures Entertainment remains tight-lipped about its recent cyber attack, but security lessons can be drawn from what is known
-
November 28, 2014
28
Nov'14
CGI secures communications between pilots and air traffic control
Satellite communications firm Inmarsat has outsourced the provision of security IT and services to CGI
-
November 27, 2014
27
Nov'14
BSI urges UK businesses to bolster cyber security
UK businesses are at risk of reputational damage due to lack of awareness on how to protect their data assets, BSI research shows
-
November 21, 2014
21
Nov'14
Russian webcam-spying site highlights common security failing
A Russian website collecting images from internet-connected cameras highlights a common security failing, say security professionals
-
November 19, 2014
19
Nov'14
Microsoft releases emergency security patch for Windows and Windows Server
Microsoft emergency patch fixes a Windows and Windows Server vulnerability hackers are exploiting to compromise networks
-
November 11, 2014
11
Nov'14
Network firewalls as relevant to data security as ever, says industry pioneer Gil Shwed
Network firewalls are as relevant to data security today as they were 20 years ago, says industry pioneer Gil Shwed
-
November 07, 2014
07
Nov'14
Home Depot traces credit card data hack to supplier compromise
US retailer Home Depot reveals its recent data breach was linked to a compromised supplier’s credentials
-
October 30, 2014
30
Oct'14
Many firms still unprepared for cyber attack, EY survey shows
More than a third of organisastions have no real-time insight on cyber risks necessary to combat rising threats, a survey has shown
-
October 30, 2014
30
Oct'14
Firms at serious risk of data loss through file sharing, study shows
Businesses are at serious risk of data loss and compliance violations due to risky file-sharing practices, a study has shown
-
October 28, 2014
28
Oct'14
Most businesses do not understand risks of data breaches, study finds
More than 70% of businesses do not understand fully the risks associated with data breaches, a study shows
-
October 27, 2014
27
Oct'14
Incident response: a common failing
Organisations hit by cyber attacks often lack an effective incident response plan. Why are so many unprepared?
-
October 27, 2014
27
Oct'14
Cloud providers rush to build European datacentres over data sovereignty
Cloud providers IBM and Google build datacentres in the EU as enterprises insist on keeping their data in Europe
-
October 16, 2014
16
Oct'14
UK is prime target for cyber attacks, says FireEye
The UK has been greatest target of advanced cyber attacks in Europe, the Middle East or Africa in the first half of 2014, report shows
-
October 15, 2014
15
Oct'14
Industrial control systems: What are the security challenges?
Targeted attacks on industrial control systems are the biggest threat to critical national infrastructure, says Kaspersky Lab
-
October 10, 2014
10
Oct'14
Azure CTO Mark Russinovich's top ten public cloud security risks
Microsoft Azure cloud CTO Mark Russinovich identified ten key security risks of public cloud services
-
October 09, 2014
09
Oct'14
WordPress most attacked application
Websites that run the WordPress content management system are attacked 24% more often than those using other systems
-
October 08, 2014
08
Oct'14
Malware being used to steal cash from ATMs
Criminals are using malware to steal cash from ATMs without debit and credit cards
-
October 07, 2014
07
Oct'14
Engineering company rolls out talent management software across 17 countries
Meggitt is deploying cloud-based HR technology as it seeks to integrate 60 diverse business units into a multinational operation
-
October 01, 2014
01
Oct'14
European firms far from ready for new data rules, study shows
As European authorities aim to ratify revised data protection rules by 2015, many firms have a lot to do to comply