News
IT risk management
-
April 02, 2012
02
Apr'12
UK business fears impact of new EU data protection framework
More than half of senior UK IT managers in large enterprises believe the proposed new EU data protection framework will cost their business more money, a survey has revealed
-
March 30, 2012
30
Mar'12
SIEM deployment case study shows patience is required
Williams Lea’s SIEM is already helping reduce manual log reviews. But there’s still a lot of work to be done before the SIEM can be fully deployed.
-
March 27, 2012
27
Mar'12
Warwickshire-based company to revamp data protection following breach
A Warwickshire-based company has committed to taking action to protect personal data, following a breach of the Data Protection Act
-
March 26, 2012
26
Mar'12
Department for Work and Pensions outsources IT for universal credit welfare to India
The government is outsourcing IT development for the universal credit welfare programme to India despite promises to keep data projects in the UK
-
March 23, 2012
23
Mar'12
Information management: lessons from the public sector
Freeform Dynamics identifies the lessons organisations can learn from the public sector's approach to information management
-
March 21, 2012
21
Mar'12
Half of education institutions victims of mobile IT theft
According to research, 45% of UK education establishments claim to have had mobile IT equipment stolen during the last three years.
-
March 19, 2012
19
Mar'12
UK hacktivist cases should spur business to action, says lawyer
The last of four alleged UK members of hacktivist group LulzSec has appeared in Westminster magistrates court in London
-
March 15, 2012
15
Mar'12
BBC cyber attacks highlight difficulty of attribution
The BBC has said it is was targeted by cyber attacks following a campaign by Iran against its Persian service, but stopped short of accusing Tehran of ordering the cyber attacks
-
March 13, 2012
13
Mar'12
Hackers expose weak security on Digital Playground porn site
A hacking group claims to have stolen the details of more than 70,000 users of the Digital Playground porn site
-
March 07, 2012
07
Mar'12
NIST releases SP 800-153 WLAN security guidelines
The recently released NIST SP 800-153 addresses security of WLANS. Join us, as we take a closer look at the document’s recommendations.
-
March 05, 2012
05
Mar'12
Rogue IT manager jailed for two years after £123k procurement scam
A rogue IT procurement manager has been jailed for two years after he colluded with two IT suppliers to defraud grocer Nisa Today out of £123,000
-
March 01, 2012
01
Mar'12
RSA 2012: IT security experts urge enterprises to ban smartphone BYOD schemes
Enterprises should ban employees from using their own smartphones for work, a panel of IT security practitioners told the RSA Conference 2012
-
February 29, 2012
29
Feb'12
IT departments risk losing responsibility for IT security
IT security professionals can no longer take it for granted that IT security will continue as part of the IT function
-
February 23, 2012
23
Feb'12
OSSIM update enables cyber threat intelligence sharing
The latest update to the Open Source Security Information Management (OSSIM) base system includes a mechanism for sharing cyber threat intelligence.
-
February 21, 2012
21
Feb'12
Google bypassed IE too, says Microsoft
Microsoft has accused Google of bypassing the privacy settings of Internet Explorer users after Safari faux pas
-
February 17, 2012
17
Feb'12
UK regulator PhonepayPlus fines Dutch typosquatting companies
UK phone regulator PhonepayPlus fines two Dutch firms £100,000 for exploiting well-known websites Wikipedia, Twitter and YouTube
-
February 13, 2012
13
Feb'12
IE update top priority for Patch Tuesday
Microsoft releases nine bulletins addressing 21 vulnerabilities in its monthly Patch Tuesday security update on 14 February
-
February 08, 2012
08
Feb'12
Web application vulnerability statistics show security losing ground
New Web application vulnerability statistics show the number of vulnerabilities is rising, despite the use of Web application development frameworks.
-
February 06, 2012
06
Feb'12
FBI investigates Anonymous intercept of call with Scotland Yard
The US Federal Bureau of Investigation (FBI) is looking into how a conference call with Scotland Yard was intercepted by a member of the activist hacking group Anonymous.
-
February 01, 2012
01
Feb'12
Fewer than a third of UK organisations plan mobile security projects
Despite the media hype around the adoption of mobile technologies and the need to secure them, relatively few UK organisations are planning mobile security projects, a survey has revealed
-
January 30, 2012
30
Jan'12
MEP quits as thousands protest ACTA signing
A European MP has resigned after thousands of people in Poland protested against the international anti-counterfeiting trade agreement (ACTA)
-
January 16, 2012
16
Jan'12
Rupert Murdoch attacks Barack Obama over online piracy legislation
News Corp chief Rupert Murdoch has accused Barack Obama's administration of siding with "Silicon Valley paymasters" as two anti-piracy bills go through US Congress.
-
January 13, 2012
13
Jan'12
NHS Trust to appeal £375k data loss penalty
An NHS Trust is to appeal against a proposed monetary penalty of £375,000 after after patient records were stolen from a hospital and sold on eBay.
-
January 06, 2012
06
Jan'12
Ramnit worm steals 45,000 Facebook passwords
A computer worm has begun targeting Facebook accounts and has stolen at least 45,000 login credentials from users, say security researchers.
-
December 16, 2011
16
Dec'11
CIOs must trade off innovation and maintenance in 2012
CIOs face major challenges in trading off stretched budgets between innovative projects and keeping the business running as usual in 2012.
-
December 12, 2011
12
Dec'11
Cloud leaves many firewalls wanting – but could automation prove the silver bullet?
Most companies rely on firewalls, but the IT landscape is changing and so must approaches to security. Is there a silver bullet?
-
December 08, 2011
08
Dec'11
Adobe to release out-of-cycle patch for latest vulnerability
Adobe has issued a security advisory about a newly discovered and still unpatched vulnerability in Adobe Reader and Adobe Acrobat which is being used in "limited, targeted attacks in the wild".
-
December 06, 2011
06
Dec'11
Four things the 2012 CIO will need to focus on
As 2011 winds to a close, CIOs will already have turned their attention to 2012. What will you be doing?
-
December 05, 2011
05
Dec'11
One in four IT security staff abuse admin rights, survey shows
At least one in four IT security staff use their privileged login rights to look at confidential information, a survey has revealed.
-
November 30, 2011
30
Nov'11
United Nations Development Programme investigates hacking claims
The United Nations Development Programme (UNDP) is investigating claims from hacker group Team Poison that it extracted over 100 e-mail addresses and login details belonging to UN staff.
-
November 29, 2011
29
Nov'11
Framework accelerates safety-critical defence systems development
Manufacturers and academics are collaborating in a 3.5 million project to create a software modelling framework that will speed up the development and certification of safety-critical systems used in aerospace and defence.
-
November 17, 2011
17
Nov'11
Forensics key to effective info security, says E&Y
Intelligence-led security strategies are the most effective in eliminating vulnerabilities and preventing IP theft through enabling informed change, says consultancy firm Ernst & Young.
-
November 17, 2011
17
Nov'11
IT security not always part of cloud decision, says IDC
Cloud adoption is outstripping security concerns, says Eric Domage, programme manager for IDC in Europe.
-
November 11, 2011
11
Nov'11
EDF fined £1.3m for hacking into Greenpeace computers
A Paris court has fined French energy firm EDF £1.3m for hacking into Greenpeace computers to find out about the environmental group’s plans to block four planned nuclear power plants in the UK.
-
November 07, 2011
07
Nov'11
Analysis: Intelligence key to security business case
Information security is becoming an increasingly important part of any business as the value of information assets continually grow, as do the threats from cyber crime and espionage.
-
October 31, 2011
31
Oct'11
Japan may be facing sustained cyber attack
Japan's mapping agency is the latest in a series of government agencies to be targeted by hackers, raising fears that the breaches are part of a series of sustained attacks.
-
October 10, 2011
10
Oct'11
Symantec uses visual maps to identify e-mail-based targeted attacks
Symantec has developed a way of detecting targeted attacks through mapping e-mail patterns to identify single gang activity.
-
October 07, 2011
07
Oct'11
85 sub-postmasters seek legal support in claims against Post Office computer system
Over 80 sub-postmasters are interested in taking legal action against the Post Office in relation to an allegedly faulty computer system.
-
October 06, 2011
06
Oct'11
UBS systems detected $2bn rogue trader fraud, admits CEO Sergio Ermotti
UBS interim CEO Sergio Ermotti has admitted systems in the banks IT infrastructure detected the unauthorised trading of the rogue trader who cost UBS over $2bn, but nothing was done about the warning signals.
-
October 04, 2011
04
Oct'11
Universal Credit deadline forced DWP to use “unproven” agile development
Tight deadlines left the Department for Work and Pensions with little choice but to use "unproven" agile methods to develop its £2bn Universal Credit (UC) system, said the Cabinet Office Major Projects Authority (MPA) in a confidential report ...
-
October 04, 2011
04
Oct'11
GPU cracks six-character password in four seconds
A £30 nVidia GeForce GT220 graphics card is capable of cracking strong passwords in a matter of hours.
-
October 03, 2011
03
Oct'11
Identifying the business value of SAM best practice frameworks and standards
Businesses are cautious when it comes to taking up best practice frameworks and standards that could help them manage their software assets more effectively.
-
September 29, 2011
29
Sep'11
IBM signs £525m DWP contract to provide Universal Credit systems
The Department for Work and Pensions (DWP) has signed a seven-year contract with IBM worth £75m per year to provide systems, which will include the delivery of its flagship Universal Credit programme.
-
September 27, 2011
27
Sep'11
How BP made its supplier ecosystem work
Oil and gas giant BP spent 65% of its $3bn annual IT budget with 3,000 suppliers in 2008, but now it outsources to only seven and has reduced its annual IT budget by $800m as a result.
-
September 23, 2011
23
Sep'11
Police IT not fit for purpose, police-led ICT company needs a lot of work, says Home Office report
A Home Office report into policing has labelled police IT as not being fit for purpose and made recommendations to shake up a mess of different IT systems across 43 forces which is hindering police attempts to fight crime.
-
September 23, 2011
23
Sep'11
Anti-piracy group FAST applauds government business guide to navigating UK IP law
The government has published a guide to UK intellectual property law for businesses, providing information on IP policies; procurement of goods and services; reporting IP crime; and auditing IP. The Federation Against Software Theft (FAST) said it ...
-
September 22, 2011
22
Sep'11
Government pulls plug on ailing £11bn NHS IT programme
The troubled £11bn NHS National Programme for IT is to be axed, the government is expected to announce later today.
-
September 22, 2011
22
Sep'11
Researchers claim to have broken SSL/TLS encryption
Two security researchers claim to have found a way of breaking the SSL/TLS encryption that is widely used to guarantee the reliability and privacy of data exchanged between web browsers and servers.
-
September 22, 2011
22
Sep'11
SQL injection attacks increasing in number, sophistication and potency, researchers find
The prevalence and intensity of SQL injection attacks are increasing, according to Imperva.
-
September 21, 2011
21
Sep'11
Gartner: Best defence against social media threats is monitoring and education
Blocking social media in the enterprise encourages bad behaviour by employees but does not prevent access, warns Gartner.