News
Identity and access management products
-
November 18, 2016
18
Nov'16
Three breach highlights several security issues, says (ISC)2
Customer data breaches continue to demonstrate that companies are still not treating cyber risk like every other business risk, says Adrian Davis of (ISC)2
-
November 16, 2016
16
Nov'16
Digital transformation not a finite process, says Martin Kuppinger
Security, privacy and identity are key to digital transformation, which is an evolutionary process, according to Martin Kuppinger
-
November 15, 2016
15
Nov'16
Online identity needs to be fixed, says Microsoft’s Kim Cameron
Software giant’s identity architect calls on enterprises to professionalise the way they relate to customers to help replace online identity infrastructure that is not fit for purpose
-
November 11, 2016
11
Nov'16
GDS aiming for 25 million users of Gov.uk Verify by 2020
Early draft of new GDS strategy reveals an ambitious target for its identity assurance service
-
November 01, 2016
01
Nov'16
UK government re-announces £1.9bn cyber security spend
Five-year spending increase - announced by Chancellor Philip Hammond 12 months after George Osborne did so - will support new UK cyber security strategy
-
October 18, 2016
18
Oct'16
Saving Lauri Love: activists plan their next move
An eclectic bunch of activists, charity workers and reformed hackers spent a rainy Sunday afternoon plotting their next move in a campaign to save Lauri Love from extradition to the US on hacking charges
-
September 19, 2016
19
Sep'16
Consumers trust banks more than government for biometric security
UK citizens think banks are the best organisations to provide biometric authentication for payments
-
September 05, 2016
05
Sep'16
Mobile device use feeds card fraud in Asean region
Card fraud is rising in Asean countries, with the high use of mobile devices a contributing factor.
-
August 30, 2016
30
Aug'16
Westpac bank launches Databank data protection service
Australia's Westpac bank is offering organisations that share customer data a service that it says securely locks down personal information
-
July 26, 2016
26
Jul'16
Government tests use of social media accounts for verifying online user identity
Online public service users may be asked to allow access to their Facebook, LinkedIn or Twitter accounts to help prove they are who they say they are
-
July 12, 2016
12
Jul'16
IBM sets up security centre in Canberra
IBM leads the charge as large private businesses invest heavily in security resources across Australia in an attempt to close the security gap
-
June 21, 2016
21
Jun'16
Enterprises urged not to view security as a barrier to internet of things adoption
The Lower Colorado River Authority’s chief administrative officer urges enterprises to balance the risks of using the internet of things with the benefits connected devices can bring
-
June 20, 2016
20
Jun'16
Lower average cost of Australian data breaches is not a sign of comfort
The average cost of a data breach to Australian organisations dropped in 2015, according to research
-
June 13, 2016
13
Jun'16
Singapore banks adopt voice biometrics for user authentication
Banks in Singapore are rolling out biometric technology to improve customer services by speeding up the authentication process
-
June 12, 2016
12
Jun'16
Philippines government data breach is a warning to Asean region
Security is a rising concern in the Asean region, with fears fuelled by incidents such as the recent hacking incident in Manila
-
May 19, 2016
19
May'16
Gov.uk Verify to go live 24 May 2016
On 24 May 2016, the government’s identity assurance platform will move from beta to “fully live”, after missing its original April go-live target
-
May 12, 2016
12
May'16
IAM central to Deutsche Bank’s digital transformation
Deutsche Bank is using a centralised identity and access management (IAM) system and an application program interface (API) architecture for digital transformation
-
May 09, 2016
09
May'16
Australian health sector an easy target for cyber criminals, says IBM
A push to encourage greater adoption of electronic health records has raised the spectre of online record theft
-
May 03, 2016
03
May'16
Gov.uk Verify misses April go-live target
The Government Digital Service didn’t meet its target of taking identity assurance service Verify out of beta by the end of April, but is “nearly there”, according to programme director Janet Hughes
-
April 15, 2016
15
Apr'16
BBC turns micro:bit computers into IoT devices
The BBC and Nominet demonstrate a new use case for the micro:bit computer and hope to turn Britain’s schoolchildren into internet of things pioneers
-
March 23, 2016
23
Mar'16
Gov.uk Verify not secure enough for NHS, says HSCIC
The government’s Verify identity verification platform isn’t secure enough for the NHS, so Liverpool Clinical Commissioning Group and HSCIC are working to add extra levels of security
-
March 18, 2016
18
Mar'16
Australian girls believe online harassment is endemic
There are clear signals that online threats against women and attempts to invade their privacy are becoming societal norms in Australia
-
March 11, 2016
11
Mar'16
Royal Mail becomes eighth accredited Gov.uk Verify provider
The Royal Mail is the latest provider to be accredited to support the government’s Gov.uk Verify identity assurance service
-
February 18, 2016
18
Feb'16
Mobile innovation shifts to smartphone services
As smartphone sales continue to stagnate, suppliers are looking to innovate in more novel ways
-
February 10, 2016
10
Feb'16
Gov.uk Verify identity system targets 50 government services for April go-live
Government identity assurance system is set to move from beta to live in April, three years after its original target date
-
January 29, 2016
29
Jan'16
HSBC online services hit by DDoS attack
HSBC was hit by a distributed denial of service (DDoS) attack, which targeted its online personal banking services.
-
January 21, 2016
21
Jan'16
Candy Crush maker King secures mobile access through cloud
Candy Crush maker King.com uses cloud-based Duo Security authentication for access to cloud services, customised apps and remote VPNs
-
January 19, 2016
19
Jan'16
Most Android devices running outdated versions
Nearly a third of Android devices in enterprises today are running version 4.0 or older of the operating system, leaving them highly susceptible to vulnerabilities, a study shows
-
December 24, 2015
24
Dec'15
Top 10 IT security stories of 2015
Computer Weekly looks back at the most significant stories on IT security in the past 12 months
-
November 27, 2015
27
Nov'15
Word ‘smart’ being abused by IoT advocates
Speakers at an event hosted by Cambridge Wireless say the term ‘smart’ is overused to describe connected devices on the internet of things
-
October 29, 2015
29
Oct'15
M&S data breach forces retailer to temporarily suspend service
A glitch that allowed online customers to see each others' details forced retailer Mark & Spencer to take its website offline while it resolved the issue
-
October 09, 2015
09
Oct'15
Lack of trust for banks causes NHS rethink over government online identity scheme
NHS trials of the Verify ID assurance system found patients concerned over using banks to allow access to medical data
-
October 08, 2015
08
Oct'15
Estonian government IT initiative increases virtual population
Estonia is leading the way when it comes to providing easy and secure access to government services for citizens and foreigners alike
-
September 14, 2015
14
Sep'15
RSA Group flags ID theft risk to Lloyds Bank customers following datacentre storage theft
International insurance group has seen 500 customers take up offer of identity theft protection in wake of datacentre theft
-
September 09, 2015
09
Sep'15
Conventional security measures hit productivity, study shows
Most IT professionals say context-aware security would improve productivity without compromising security, a survey from Dell reveals
-
August 16, 2015
16
Aug'15
Mobile phone users at risk as hackers bug and track victims
An investigation by Australian TV show 60 Minutes demonstrates how hackers based thousands of miles away in Germany were able to record the calls of an Australian senator and track his movements
-
August 03, 2015
03
Aug'15
Why the time is ripe for security behaviour analytics
Recent months have seen an uptick in announcements by security suppliers around behavioural analytics, but what is driving this trend?
-
July 24, 2015
24
Jul'15
GDS targets three million new users of Gov.uk Verify service in next 12 months
Roll-out of the system for logging in to digital public services is taking longer than expected, but user numbers are expected to grow significantly in 2015
-
July 07, 2015
07
Jul'15
Dashlane bullish about the future despite LastPass hack
Password management firm Dashlane is confident its business model will evolve and continue to be relevant even if passwords eventually disappear
-
June 23, 2015
23
Jun'15
Pharmaceutical companies use BPM to cut cost of clinical trial drugs
Pharmaceutical companies have developed an IT system to secure the supply of medicines they need for clinical studies, saving hundreds of thousands on their drugs bill in the process
-
June 22, 2015
22
Jun'15
Government Digital Service insists Verify safe despite claims of vulnerabilities
An academic paper suggests the Gov.uk Verify system could be used as a spy network, but the Government Digital Service (GDS) insists this is not the case
-
June 12, 2015
12
Jun'15
Government preparing to let private sector companies use its Verify identity scheme
The Cabinet Office is talking to banks, insurers and retailers to establish Gov.uk Verify identity assurance as a national scheme
-
June 03, 2015
03
Jun'15
VMware puts network virtualisation to work in McAfee environments
VMware announces an integrated system to automate distribution and enforcement of McAfee’s network security platform using its NSX network virtualisation system
-
May 29, 2015
29
May'15
Data classification key to IP protection, says Titus
Data classification can help organisations get more value out of encryption and data loss prevention systems
-
May 29, 2015
29
May'15
Google announces security features for Android
Google announces better app permission controls and other Android security changes at its Google I/O developer conference
-
May 18, 2015
18
May'15
Wi-Fi Global Congress: Hotspot 2.0 standard addresses wireless security holes
At Wi-Fi Global Congress, Ruckus Wireless announces it will be first to market with the second release of Hotspot 2.0
-
May 11, 2015
11
May'15
PSNGB rebrands to drive information sharing across PSN
PSNGB, the trade association set up to promote the Public Services Network, rebrands itself as Innopsis and says its work is far from over
-
May 07, 2015
07
May'15
Future IAM will need to be broader, says Martin Kuppinger
Identity and access management systems need to look at all forms of identity, not just employees or users, says KuppingerCole analyst
-
April 29, 2015
29
Apr'15
Time to embrace a new level of IAM, says Martin Kuppinger
A new level of identity and access management is at hand, yet many businesses still rely on usernames and passwords
-
April 08, 2015
08
Apr'15
Exit checks system for UK borders finally goes live
The Home Office launches a system for making exit checks of travellers at UK borders, following the scrapped e-Borders programme