News
Network security management
-
January 22, 2013
22
Jan'13
Why has DLP never taken off?
Why is data loss prevention (DLP) technology not being adopted if it provides the very protection most businesses need?
-
January 17, 2013
17
Jan'13
Malware hits US power plants
Malware infected two US power plants via corrupted USB sticks in recent months, the US Cyber Emergency Readiness Team (CERT) has revealed
-
January 14, 2013
14
Jan'13
Researchers uncover advanced cyber espionage campaign
An elusive cyber espionage campaign has been targeting diplomatic, governmental and scientific research organisations for several years, analysis by Kaspersky Lab has revealed
-
January 09, 2013
09
Jan'13
US military gets new software testing rules
The US has introduced new policies for military software engineers aimed at pre-empting software supply chain attacks
-
December 05, 2012
05
Dec'12
Computer Weekly European User Awards Criteria and Information
Read the entry criteria and general information about entering the Computer Weekly European User Awards.
-
November 29, 2012
29
Nov'12
Cybergeddon unlikely, say experts
Cybergeddon, a complete takedown of the internet, is within the power of some nation states, but unlikely, say security industry experts
-
November 27, 2012
27
Nov'12
Google among firms hit in Pakistan hack
Technology firms including Google, Apple, eBay and Yahoo were among almost 300 companies whose websites were hit by Pakistan hack attack
-
November 23, 2012
23
Nov'12
GCHQ aims to tackle open source security clearance problem
UK security services have begun bridging the gap that has stopped open source software getting security clearance for use in government
-
November 16, 2012
16
Nov'12
Evasion threat to critical systems goes ignored, says Stonesoft
Many organisations continue to rely on ineffective intrusion prevention systems (IPS), says security firm Stonesoft
-
November 15, 2012
15
Nov'12
Cyber security will change ideas of the nation state, says Stonesoft
The lack of cyber security is a major threat to the civilised world and will change how people see the nation state, says security firm Stonesoft
-
November 13, 2012
13
Nov'12
UK citizens back pre-emptive cyber strikes, poll shows
Nearly two-thirds of UK citizens back pre-emptive cyber strikes on states that pose a credible threat to national security, a survey has revealed
-
November 13, 2012
13
Nov'12
Many UK firms underestimate cost of data breaches, study finds
Many UK organisations are still failing to understand the implications and costs of data breaches, a study has revealed
-
November 12, 2012
12
Nov'12
Hacking attempts to top one billion in Q4, predicts NCC Group
One billion hacking attempts will be made globally in the final quarter of 2012, according to information assurance firm NCC Group
-
November 12, 2012
12
Nov'12
Millions worldwide use insecure browsers, says Kaspersky
Nearly a quarter of all internet users worldwide are running outdated browsers, creating huge gaps in online security, says Kaspersky
-
November 07, 2012
07
Nov'12
Police arrest man for DDoS attacks on Theresa May sites
Police have arrested a 41-year-old man in connection with a cyber attack on websites connected to home secretary Theresa May
-
October 31, 2012
31
Oct'12
‘VM-aware’ viruses on the rise
Viruses targeting virtual machines (VM) are growing in numbers and will soon be the dominant force in the world of cyber crime, says Kaspersky
-
October 31, 2012
31
Oct'12
Security data exchange: if McAfee builds it, will they come?
McAfee has announced its Security Connected Plaform for security data exchange, but will other suppliers come to the party?
-
October 30, 2012
30
Oct'12
IT security budgets mismatched to hacker targets, study shows
IT security budgets are not being used to provide defence technologies in some areas most likely to be targeted by hackers, a study shows
-
October 25, 2012
25
Oct'12
ICO hits Stoke-on-Trent City Council with £120,000 fine
Stoke City Council has breached the Data Protection Act, for the second time in two years, after details of a child protection legal case were emailed to the wrong person.
-
October 24, 2012
24
Oct'12
McAfee Focus 2012: McAfee to help secure nuclear plants
Westinghouse Electric Company and McAfee have announced a partnership around information security for nuclear power plants
-
October 24, 2012
24
Oct'12
McAfee Focus 2012: McAfee evolves to enable orchestrated defence
Today’s security systems are not ready for an always-on, always-connected world, says McAfee CTO Michael Fey
-
October 24, 2012
24
Oct'12
McAfee Focus 2012: Xerox, McAfee partner on embedded security threat
Only around 13% of organisations are aware that printers and multi-function devices represent a threat to information security, says Xerox
-
October 24, 2012
24
Oct'12
McAfee Focus 2012: Brighter future for cyber defenders, says DeCesare
The security industry looks to the future with a sense of hope, says Michael DeCesare, co-president of Intel-owned security firm McAfee
-
October 24, 2012
24
Oct'12
McAfee Focus 2012: NAC supplier ForeScout joins McAfee SIA scheme
McAfee does not want to be all things to all people when it comes to security, but its leadership is aiming to provide the platform that will enable better data protection
-
October 18, 2012
18
Oct'12
The Pirate Bay continues operations in the cloud
Swedish file sharing website, The Pirate Bay (TPB), has moved into the cloud to improve services, lower costs and evade authorities
-
October 17, 2012
17
Oct'12
ZTE targets local government for UK growth
Despite security controversy, Chinese firm ZTE’s UK head of sales tells Computer Weekly one of its first targets will be local government
-
October 16, 2012
16
Oct'12
Organisations need alternative data protection as security models fail
Organisations' security models are failing - so could it be time to adopt an intelligence-led approach to data protection and fighting cyber crime?
-
October 11, 2012
11
Oct'12
Parliament to look at UK involvement of Huawei
A parliamentary select committee is looking into Huawei’s operations in the UK following controversy around the safety of using the firm’s technology
-
October 11, 2012
11
Oct'12
RSA Europe: Thousands of unprotected virtual servers exposed to the web
Organisations are failing to protect data in virtual environments, says Jason Hart, vice-president cloud solutions, SafeNet
-
October 11, 2012
11
Oct'12
RSA Europe: Security must take human factor into account
Security needs to start taking into account the differences in users, says Hugh Thompson, RSA Conference programme committee chair
-
October 11, 2012
11
Oct'12
RSA Europe: Security concerns whole supply chain, says Misha Glenny
Targeted attacks affect the whole supply chain, not just big corporations, author Misha Glenny tells RSA Conference Europe 2012 attendees
-
October 08, 2012
08
Oct'12
Swedish government sites targeted by Anonymous
The websites of several Swedish government agencies were knocked offline on Friday after being targeted by hacktivist collective Anonymous
-
October 05, 2012
05
Oct'12
Security firm warns against Samsung Galaxy Tab for enterprise use
Security specialist Context Information Security says vulnerabilities in the Samsung Galaxy Tab make it unsuitable for use in the enterprise
-
October 02, 2012
02
Oct'12
Hackers target White House military network
Hackers using computers in China have infiltrated an “unclassified” network in the US White House, believed to be used for issuing nuclear commands.
-
October 02, 2012
02
Oct'12
BT does deal to manage British American Tobacco network
BT will provide remote access, network security and supplier management for British American Tobacco’s wide area network
-
September 28, 2012
28
Sep'12
BT and Yahoo block UK2 IP addresses
Customers of ISP UK2 have received no emails from Yahoo/BT Internet accounts for over a week after their IP addresses were blocked
-
September 27, 2012
27
Sep'12
Izz ad-Din al-Qassam hackers launch cyber attack on US bank Wells Fargo
A hacker group connected to Hamas says it attacked US bank Wells Fargo in reaction to the video 'Innocence of Muslims' posted on YouTube
-
September 20, 2012
20
Sep'12
Dell SecureWorks uncovers cyber espionage targeting energy firms
Security researchers have discovered a new cyber espionage campaign targeting several large companies, including two in the energy sector
-
September 19, 2012
19
Sep'12
GCHQ challenges UK amateurs to defend government from cyber attacks
GCHQ's national Cyber Security Challenge competition tests the ability of amateur cyber defenders to protect a simulated government IT system
-
September 18, 2012
18
Sep'12
RSA Europe 2012 to focus on big data
Big data and intelligence-driven security are to be the focus of the RSA Conference Europe 2012 in London next month
-
September 17, 2012
17
Sep'12
ITU denies ‘internet control’ accusations
The UN agency claims it will be down to member states to decide how the organisation’s proposals are implemented after it meets at the WCIT conference in December
-
May 18, 2012
18
May'12
MDM, security vendors scramble to address BYOD security issues
Organisations are looking beyond NAC and MDM to resolve BYOD security issues; MDM, security and hybrid vendors are responding with new products.
-
March 30, 2012
30
Mar'12
SIEM deployment case study shows patience is required
Williams Lea’s SIEM is already helping reduce manual log reviews. But there’s still a lot of work to be done before the SIEM can be fully deployed.
-
March 14, 2012
14
Mar'12
Getting serious about tablet security risks and user training
With increasing tablet security risks, the time has come to get serious about user education. UK Bureau Chief Ron Condon prescribes a new mindset.
-
March 14, 2012
14
Mar'12
Taking control of smartphone proliferation while avoiding user anarchy
With smartphone proliferation raging through companies, IT teams are turning to MDMs to keep corporate data safe. Are current MDMs up to the task?
-
December 14, 2011
14
Dec'11
New Sourcefire firewall with content filtering promises more control
Sourcefire has announced its new firewall with content filtering, which it says will let administrators control users’ activities at a business level.
-
December 02, 2011
02
Dec'11
Swiss bank balances tablet security issues with performance, cost
When a Swiss bank needed solve its tablet security issues, it found a way to secure its devices without sacrificing performance by using virtualisation.
-
November 16, 2011
16
Nov'11
London firm offers fixed-price cloud DDoS protection
One company has launched a fixed-price cloud DDoS-protection service for mitigating the ever-present threat of DDoS attacks.
-
October 27, 2011
27
Oct'11
University IT security pros thwart content piracy with traffic shaping
A traffic-shaping system installed at the University of Exeter quickly yielded huge dividends by blocking illegal piracy of music and films.
-
October 24, 2011
24
Oct'11
Firewall solution supports growth and fast deployment
Tourism Australia needed a robust firewall solution to support its growing needs for expansion and rapid deployment
-
October 12, 2011
12
Oct'11
New batch of IDS, IPS evasion techniques are hitting their targets
Stonesoft has discovered 163 new advanced evasion techniques (AET), claiming these AETs can pass below the radar of some IDS, IPS products.
-
July 11, 2011
11
Jul'11
With UTM system, Blackpool Council trims network security costs
Faced with a network ravaged by Conficker and a dwindling budget, the Blackpool Council implemented a UTM system to cut costs and bolster security.
-
June 13, 2011
13
Jun'11
World IPv6 Day a success, but IPv6 security problems only beginning
While World IPv6 Day caused no catastrophic Internet outages, some researchers predict that transition-related IPv6 security problems could threaten security.
-
February 02, 2011
02
Feb'11
PCI PTS aims to stop retail IT security breaches, but progress is slow
The new PCI PTS requirements are intended to help stores shore up insecure point-of-sale systems and other common retail IT security weaknesses.
-
January 27, 2011
27
Jan'11
CHECK penetration testing consultants still hard to find, says report
The dearth of government qualified pen testers is likely due to the difficulty of acquiring CHECK certification and infosec pros' view of pen testing as a stepping stone career move, speculates a new report.
-
December 17, 2010
17
Dec'10
Twitter virus scam: Tweets lead users to fake antivirus popup
Twitter users are the latest to be targeted by rogue antimalware distributors.
-
November 29, 2010
29
Nov'10
Opinion: Apply computer quarantine via network access control policy
Quarantining infected PCs from the Internet may be a long way off, but Mike Cobb argues that the same principle works well for corporate networks in the form of NAC.
-
October 25, 2010
25
Oct'10
Organisations unaware of Good Practice Guide 13 monitoring guidelines
A recent survey reveals that only 38% of public-sector organisations are aware that CESG's Good Practice Guide 13 exists. Ron Condon reports.
-
October 11, 2010
11
Oct'10
UK company launches tool to monitor other network security audit tools
Idappcom Ltd. says its new tool can gauge the effectiveness of other network security audit tools or monitoring devices.
-
October 07, 2010
07
Oct'10
Spamhaus launches antispam whitelist to end spam false positives
With the coming of IPv6 and the prospect of billions more IPs that could drown any hopes of spam blacklisting, the Spamhaus Project has launched a whitelist campaign for the most trusted organisations.
-
September 15, 2010
15
Sep'10
Sourcefire and Qualys combine IPS, vulnerability management tools
Sourcefire and Qualys tout the importance of interoperability between small vendors, announcing the integration of their intrusion prevention and vulnerability management tools.
-
September 03, 2010
03
Sep'10
In schools, free online Web proxies thwart enterprise Web filtering
New survey results show security managers in education struggle to control student use of services that bypass enterprise Web filtering systems.
-
August 12, 2010
12
Aug'10
Adobe vulnerability: Pen test firm finds ColdFusion admin page flaw
A vulnerability in Adobe's ColdFusion admin page discovered by London-based pen testing firm ProCheckUp Ltd. could leave millions of companies open to attack.
-
July 19, 2010
19
Jul'10
First of data loss prevention vendors touts downloadable DLP software
Many information security pros fear the amount of work they think goes into a DLP deployment, but Websense Inc. claims that doesn't have to be the case with its new downloadable DLP. UK Bureau Chief Ron Condon reports.
-
July 02, 2010
02
Jul'10
Law firm security gets positive verdict with UTM device
Deploying a UTM device, while not a panacea, can aid information security efforts from many angles, according to one law firm security officer.
-
May 16, 2010
16
May'10
Security event log management streamlines netsec for call centre
Although there is room for improvement, IT security manager Mark Wityszyn now uses a log management tool to help him with his many clients' networks and services.
-
April 30, 2010
30
Apr'10
Single sign-on technology for health care helps medics roam securely
Imprivata Inc. has announced a new single sign-on technology designed for health care organisations, along with two other product announcements at InfoSecurity Europe 2010.
-
April 19, 2010
19
Apr'10
Outsourcing security: Is it the answer for tight budgets?
Outsourcing security can be a good option for companies experiencing a budget crunch. According to a new survey, there are a few specific areas of security that lend themselves to outsourcing.
-
April 19, 2010
19
Apr'10
Amid high network security cost, organisations explore internal savings
Information security budgets still aren't back up to pre-recession levels. Organisations therefore need to look for ways to reduce their network security costs internally.
-
April 07, 2010
07
Apr'10
OPINION: Calling Conroy an idiot won't stop the filter
Opponents of Australia's proposed Internet filter will get nowhere with personal attacks on Stephen Conroy, writes Richard Chirgwin.
-
April 05, 2010
05
Apr'10
New cloud VPN service improves application acceleration, security
A new cloud VPN service offered by Aruba Networks Inc., called VBN 2.0, promises to make it easier and more secure for remote users to connect to the VPN.
-
February 25, 2010
25
Feb'10
Probes and profiles not working, says Cisco
Cisco says common approaches to prevent incoming attacks by analysing files are not as powerful as analysing the source of traffic.
-
February 15, 2010
15
Feb'10
New Community Security Policy aims to reduce computer misuse
The ACPO has unveiled a Community Security Policy, which aims to reduce computer misuse in the police force. Learn how one police force has met the new compliance standard.
-
February 04, 2010
04
Feb'10
Security attitudes lag behind attacks: F5's Kurt Hansen
Attacks on corporate networks are becming more sophisticated, but defences are not.
-
February 01, 2010
01
Feb'10
Thin-client technologies surge thanks to easier security, says Deloitte
Thin-client technologies are on the rise as a result of the simplified security procedures they provide, according to a Deloitte report. Find out what security aspects are made simpler by thin-client technologies.
-
January 11, 2010
11
Jan'10
College learns lessons in choosing the right NAC appliance
After deciding to open up the wireless network to students, Tim Hanks of Stroud College realized he would need to install a NAC appliance to make sure the network stayed secure. Find out what he chose and why he chose his particular NAC appliance.
-
November 30, 2009
30
Nov'09
Facebook and YouTube consume corporate network bandwidth
After analyzing Web traffic from thousands of business end users, a security firm discovered that more that 12% of corporate network resources are taken up by employees using Facebook and YouTube.
-
November 10, 2009
10
Nov'09
ArcSight boosts system log management capabilities
A new log management tool from ArcSight Inc. has an impressive free-form search capability that may make life easier for forensics experts.
-
October 06, 2009
06
Oct'09
Sourcefire sensors improve college's network security
A technical resources director at Halesowen College in the West Midlands found a way to get network security on a tight budget.
-
September 28, 2009
28
Sep'09
Research aims to fight crime with network processor technology
A five-year research project based in Belfast aims to take on criminals and offload much of the security load from companies and users.
-
August 21, 2009
21
Aug'09
NCC raises doubts about thin client security
According to new research, there are a surprising number of weaknesses in thin clients that could lead to 'mass denial of service' attacks.
-
August 14, 2009
14
Aug'09
Mobile device encryption a must, says Information Commissioner
For the first time, the ICO spelled out the need for encryption on mobile devices. Many companies looking to protect their data, however, may not have the budget for it.
-
August 06, 2009
06
Aug'09
Dynamic business world needs intelligent LAN switches, says report
Because of a growing 'virtualization' of corporate employees, a Yankee Group researcher says access control needs to be enforced continuously rather than just once at the network gateway.
-
July 21, 2009
21
Jul'09
WLAN Security Learning Guide
Discover how to secure wireless networks in our comprehensive guide to locking down your WLAN.
-
April 09, 2009
09
Apr'09
Hospital initiates secure wireless transmission of medical data
A hospital in northwest England recently faced a classic security challenge when it used wireless networks to better manage electronic patient information.
-
February 17, 2009
17
Feb'09
Companies tackle iPhone security with remote access features
Secure remote access and better management could turn the popular toy into a true business tool.
-
December 11, 2008
11
Dec'08
Net filtration 101 - and why it can't protect Australia
Richard Chirgwin explores the technology behind the Net filtering debate and explains why it can work for your business, but may struggle to protect a nation.
-
October 14, 2008
14
Oct'08
Using Wireshark to monitor and secure your network
Learn how to use packet analyser, Wireshark, in this illustrated tutorial.
-
September 29, 2008
29
Sep'08
What's happening with the DNS bug?
This week's edition of our networking podcast, "A Series of Tubes," interviews APNIC's Geoff Houston to see what's up with the DNS bug.
-
September 19, 2008
19
Sep'08
Q&A: Paul Dorey on DLP, deperimeterisation
Paul Dorey is one of the pioneers of information security as a profession. He worked on early security measures at the investment bank Barclays PLC and has most recently been director of digital security for global oil company BP Corp., a role that ...
-
September 08, 2008
08
Sep'08
All about Vista and Windows Server 2008's Network Access Protection policy options
Windows Vista and Windows Server 2008 allow their users to create tailored policies to validate a computer's security before allowing access or communication. Known as Network Access Protection (NAP). This piece explains NAP's relevance to 802.1x, ...
-
September 05, 2008
05
Sep'08
Outbound email monitoring, filtering to prevent data leakage, breaches
Using a variety of email security management products and content filtering, companies have recently begun monitoring outbound messages in effort to reduce breaches, data loss and leakage.
-
August 17, 2008
17
Aug'08
What network security threat does a QM FSM error pose in IPsec VPNs?
Learn how to solve a QM FSM error when working on a LAN-to-LAN VPN from a network security expert.
-
July 15, 2008
15
Jul'08
Server virtualisation and NAC
Server virtualisation has a ton of benefits - but makes network access control much more difficult. This tip explains how to overcome these issues to achieve better compliance.
-
June 20, 2008
20
Jun'08
How to secure your IP PBX when you have teleworking staff using IP handsets at home
This tutorial explains how a Fortinet FortiGate product can be used to lock down a VoIP implemenation to secure voice for teleworkers.
-
June 06, 2008
06
Jun'08
Securing the new network
Securing a network's edge is no longer enough. Today, greater control of users rights is a greater priority.
-
May 23, 2008
23
May'08
When talk turns to data loss prevention, network pros must get a seat at the table
Data loss prevention is the security's industry's latest hot button, but network pros can make the technique work with their unique skills.
-
May 21, 2008
21
May'08
Distrust of employees drives email monitoring
The rising use of mobile devices and the fear that sensitive data is escaping through outbound email has some firms adding employees to monitor messages.
-
April 18, 2008
18
Apr'08
How to keep tabs on BitTorrent
The latest in our series of articles from MSc students at Royal Holloway examines the security impliacations of BitTorrent, the peer-to-peer file sharing protocol.
-
April 17, 2008
17
Apr'08
Network telescopes are vital to beating security threats
The latest article in our Royal Holloway series describes how network telescopes operate by searching the dark areas of the internet where no legitimate traffic needs to go.