News
IT risk management
-
January 12, 2015
12
Jan'15
Attackers bypass conventional security, says FireEye study
Hackers breach most conventional, signature-based security technologies, with 27% involving advanced threats
-
January 06, 2015
06
Jan'15
Online money transfer provider Xoom suffers multimillion-dollar fraud
Digital money transfer provider Xoom has admitted to suffering a $30.8m loss at the hands of fraudsters
-
December 18, 2014
18
Dec'14
CIO interview: Mercedes AMG Petronas IT director on the need for speed in IT
When Matt Harris became IT director for F1 team Mercedes AMG Petronas in 2009, IT costs needed to be slashed
-
December 17, 2014
17
Dec'14
Cabinet Office begins procurement for next stage of Gov.uk Verify
The Cabinet Office has submitted a tender notice for a £150m three-year framework for the provision of identity assurance services
-
December 04, 2014
04
Dec'14
Sony hack exposes poor security practices
Sony Pictures Entertainment remains tight-lipped about its recent cyber attack, but security lessons can be drawn from what is known
-
November 28, 2014
28
Nov'14
CGI secures communications between pilots and air traffic control
Satellite communications firm Inmarsat has outsourced the provision of security IT and services to CGI
-
November 27, 2014
27
Nov'14
BSI urges UK businesses to bolster cyber security
UK businesses are at risk of reputational damage due to lack of awareness on how to protect their data assets, BSI research shows
-
November 21, 2014
21
Nov'14
Russian webcam-spying site highlights common security failing
A Russian website collecting images from internet-connected cameras highlights a common security failing, say security professionals
-
November 19, 2014
19
Nov'14
Microsoft releases emergency security patch for Windows and Windows Server
Microsoft emergency patch fixes a Windows and Windows Server vulnerability hackers are exploiting to compromise networks
-
November 11, 2014
11
Nov'14
Network firewalls as relevant to data security as ever, says industry pioneer Gil Shwed
Network firewalls are as relevant to data security today as they were 20 years ago, says industry pioneer Gil Shwed
-
November 07, 2014
07
Nov'14
Home Depot traces credit card data hack to supplier compromise
US retailer Home Depot reveals its recent data breach was linked to a compromised supplier’s credentials
-
October 30, 2014
30
Oct'14
Many firms still unprepared for cyber attack, EY survey shows
More than a third of organisastions have no real-time insight on cyber risks necessary to combat rising threats, a survey has shown
-
October 30, 2014
30
Oct'14
Firms at serious risk of data loss through file sharing, study shows
Businesses are at serious risk of data loss and compliance violations due to risky file-sharing practices, a study has shown
-
October 28, 2014
28
Oct'14
Most businesses do not understand risks of data breaches, study finds
More than 70% of businesses do not understand fully the risks associated with data breaches, a study shows
-
October 27, 2014
27
Oct'14
Incident response: a common failing
Organisations hit by cyber attacks often lack an effective incident response plan. Why are so many unprepared?
-
October 27, 2014
27
Oct'14
Cloud providers rush to build European datacentres over data sovereignty
Cloud providers IBM and Google build datacentres in the EU as enterprises insist on keeping their data in Europe
-
October 16, 2014
16
Oct'14
UK is prime target for cyber attacks, says FireEye
The UK has been greatest target of advanced cyber attacks in Europe, the Middle East or Africa in the first half of 2014, report shows
-
October 15, 2014
15
Oct'14
Industrial control systems: What are the security challenges?
Targeted attacks on industrial control systems are the biggest threat to critical national infrastructure, says Kaspersky Lab
-
October 10, 2014
10
Oct'14
Azure CTO Mark Russinovich's top ten public cloud security risks
Microsoft Azure cloud CTO Mark Russinovich identified ten key security risks of public cloud services
-
October 09, 2014
09
Oct'14
WordPress most attacked application
Websites that run the WordPress content management system are attacked 24% more often than those using other systems
-
October 08, 2014
08
Oct'14
Malware being used to steal cash from ATMs
Criminals are using malware to steal cash from ATMs without debit and credit cards
-
October 07, 2014
07
Oct'14
Engineering company rolls out talent management software across 17 countries
Meggitt is deploying cloud-based HR technology as it seeks to integrate 60 diverse business units into a multinational operation
-
October 01, 2014
01
Oct'14
European firms far from ready for new data rules, study shows
As European authorities aim to ratify revised data protection rules by 2015, many firms have a lot to do to comply
-
September 30, 2014
30
Sep'14
Cyber Essentials for public sector IT suppliers: pros and cons
What are the pros and cons of the Cyber Essentials Scheme certification mandated for public sector IT suppliers?
-
September 25, 2014
25
Sep'14
Bash bug could be bigger threat than Heartbleed
A bug in the Bash command prompt software used by many Unix computers could be a greater threat than Heartbleed.
-
September 22, 2014
22
Sep'14
Conficker infections an indictment of IT security, says CWG
Conficker worm infections reflect the “sad state of affairs of IT security”, says the Conficker Working Group
-
September 17, 2014
17
Sep'14
Risk management key to cyber strategy, says BP
Cyber attacks constitute a group-level risk that is managed as part of BP’s standard set of risk management processes, says group chief
-
September 08, 2014
08
Sep'14
Ransomware on the rise, warns cyber threat report
The first half of 2014 saw an increase in online attacks that lock up user data and hold it for ransom, reports F-Secure Labs
-
August 28, 2014
28
Aug'14
Microsoft re-releases security bulletin MS14-045
Microsoft has re-released a software security update that was withdrawn because it put some computers in endless reboot loops
-
August 27, 2014
27
Aug'14
Security experts identify top 10 software design flaws
The IEEE Center for Secure Design has published a report on how to avoid the top 10 software security design flaws
-
August 21, 2014
21
Aug'14
Load balancing supports Kent County Council's VDI project
Kent County Council picks Kemp Technologies load balancers to support a deployment of VMware Horizon View and Workspace across its estate
-
August 11, 2014
11
Aug'14
USB-connected devices present cyber vulnerabilities
Connecting devices to computers using a USB port could lead to security breaches, say Berlin-based researchers
-
August 05, 2014
05
Aug'14
Cyber Security Challenge UK takes on the internet of things
The latest level of the Cyber Security Challenge will involve participants hacking devices connected to the internet of things
-
July 29, 2014
29
Jul'14
Tackle IAM with a risk-based approach, says KPMG
A risk-based approach is the best way to tackle identity and access management, says KPMG
-
July 16, 2014
16
Jul'14
Total internet failure: are you prepared?
A total internet failure could stop any business in its tracks, yet few are preparing for this possibility, KPMG has warned
-
July 09, 2014
09
Jul'14
Why using voice biometrics is a good idea
Banks and other organisations are turning to voice biometrics, but why do they believe the technology is good idea?
-
July 07, 2014
07
Jul'14
Smart light bulbs get security update
Smart light bulb maker LIFX has issued a firmware update after security researchers exposed a security weakness
-
July 04, 2014
04
Jul'14
Barclays passes government’s ‘internet-born threat’ test
Barclays Bank has been awarded the government’s cyber security certificate for digital banking services after independent tests of services such as Pingit
-
July 04, 2014
04
Jul'14
Security Think Tank: The dos and don’ts of a good incident response plan
What does a good information security incident response plan look like?
-
July 02, 2014
02
Jul'14
ISPs take legal action against GCHQ over mass network infrastructure surveillance
Six global internet service providers (ISPs) have filed a legal complaint calling for a halt to GCHQ’s use of network infrastructure for surveillance
-
July 01, 2014
01
Jul'14
Industrial control systems increasingly under attack, says Kaspersky
Targeted attacks on industrial control systems take place on a regular and increasing basis, says Kaspersky Lab
-
June 17, 2014
17
Jun'14
Domino’s breach underlines value of personal data, say experts
The latest cyber breach to hit a high-profile brand underlines the high value of personal data, say security experts
-
June 16, 2014
16
Jun'14
Microsoft admits running out of IP addresses for Azure
Microsoft has assured US Azure customers data remains in the US, despite running out of US-registered IP addresses at times
-
June 09, 2014
09
Jun'14
IT departments unprepared for internet of things
Only 41% of IT professionals are working on projects to prepare their business for the internet of things
-
June 09, 2014
09
Jun'14
Turing Test 2014 marks historic milestone in artificial intelligence
A computer program has made history by passing the artificial intelligence test set by computer science pioneer Alan Turing
-
June 02, 2014
02
Jun'14
Cyber threats hiding in plain sight, says Palo Alto Networks
Cyber attackers exploit commonly used business applications to bypass security controls, research shows
-
May 30, 2014
30
May'14
UK shoe retailer Office hit by data breach
Data breach at UK shoe retailer Office prompts calls for online firms to beef up security around customer details
-
May 27, 2014
27
May'14
Android Outlook app has privacy issues, warn researchers
Microsoft’s Outlook.com app for Android is exposing users' data, warn security researchers
-
May 16, 2014
16
May'14
Internet of things security is relevant to business, says researcher
Internet of things is relevant to enterprise information security professionals, says researcher
-
May 09, 2014
09
May'14
Orange data breach underlines need for encryption, say experts
The theft of 1.3 million customer records from Orange, France underlines the need for encryption, say experts
