News
Network security management
-
June 10, 2013
10
Jun'13
Telefonica Digital forms security group Eleven Paths
The business division of mobile operator Telefonica launches Eleven Paths, an independent company working on security issues in the workplace
-
May 21, 2013
21
May'13
Privileged accounts key to most APT attacks, says Cyber-Ark
The theft, misuse and exploitation of privileged accounts is becoming an increasingly key tactic in advanced persistent threat attacks
-
May 01, 2013
01
May'13
What’s to be done about data breach discovery?
The time from first contact by cyber attackers to the victim learning of it is still measured in months and years, not hours and days
-
April 29, 2013
29
Apr'13
Another online firm hit by data breach
Online deals service LivingSocial is the latest company to report a breach of its computer systems that may mean attackers accessed customer details
-
April 25, 2013
25
Apr'13
Spam SMS messages drop following ICO penalty
The number of spam SMS messages has significantly reduced since government regulator ICO issued £440,000 fines last year
-
April 22, 2013
22
Apr'13
Infosec 2013: University research challenges reliability of IPS
Research shows intrusion prevention systems (IPS) are not as effective at detecting malicious activity as some might think
-
April 19, 2013
19
Apr'13
Conficker makes way for web-based attacks, says Microsoft
Web attacks emerge as top threat as businesses finally begin to win the battle against Conficker and other worms, says Microsoft
-
April 11, 2013
11
Apr'13
Bots and web apps among top threats to data security, says Check Point
Bots, viruses, breaches and attacks are a constant and real threat to the information security of organisations
-
April 11, 2013
11
Apr'13
Porn websites pose malware risk, says researcher
Browsing popular pornography internet sites pose a growing risk of malware infection, according to a security researcher
-
April 03, 2013
03
Apr'13
Anonymous threatens to declare cyber war on North Korea
Anonymous hacktivist collective has threatened North Korea with cyber war if leader Kim Jong-un does not resign and install free democracy
-
March 27, 2013
27
Mar'13
UK government sets up cyber security fusion cell
A cyber security “fusion cell” for cross-sector threat data sharing aims to put government, industry and information security analysts side-by-side
-
March 26, 2013
26
Mar'13
Employees ignore security rules, say infosec pros
Most information security professionals believe corporate employees wilfully ignore security rules, survey at RSA Conference 2013 reveals
-
March 20, 2013
20
Mar'13
Case study: Hamilton Fraser embraces BYOD with MobileIron
How insurance firm Hamilton Fraser is using MobileIron to enable employees to bring their own devices while following company policy
-
March 06, 2013
06
Mar'13
What is RSA's build, buy, partner strategy?
Computer Weekly takes a closer look at RSA's build, buy, partner strategy
-
January 28, 2013
28
Jan'13
Why has NAC, like DLP, failed to take off?
Why are organisations not investing in systems that are designed to keep malicious actors out of their networks?
-
January 24, 2013
24
Jan'13
ICO hits Sony with £250,000 data breach penalty
The Information Commissioner’s office (ICO) has fined Sony Computer Entertainment Europe £250,000 for breaching the Data Protection Act
-
January 22, 2013
22
Jan'13
Why has DLP never taken off?
Why is data loss prevention (DLP) technology not being adopted if it provides the very protection most businesses need?
-
November 13, 2012
13
Nov'12
Many UK firms underestimate cost of data breaches, study finds
Many UK organisations are still failing to understand the implications and costs of data breaches, a study has revealed
-
November 12, 2012
12
Nov'12
Hacking attempts to top one billion in Q4, predicts NCC Group
One billion hacking attempts will be made globally in the final quarter of 2012, according to information assurance firm NCC Group
-
November 07, 2012
07
Nov'12
Police arrest man for DDoS attacks on Theresa May sites
Police have arrested a 41-year-old man in connection with a cyber attack on websites connected to home secretary Theresa May
-
October 31, 2012
31
Oct'12
‘VM-aware’ viruses on the rise
Viruses targeting virtual machines (VM) are growing in numbers and will soon be the dominant force in the world of cyber crime, says Kaspersky
-
October 30, 2012
30
Oct'12
IT security budgets mismatched to hacker targets, study shows
IT security budgets are not being used to provide defence technologies in some areas most likely to be targeted by hackers, a study shows
-
October 25, 2012
25
Oct'12
ICO hits Stoke-on-Trent City Council with £120,000 fine
Stoke City Council has breached the Data Protection Act, for the second time in two years, after details of a child protection legal case were emailed to the wrong person.
-
October 17, 2012
17
Oct'12
ZTE targets local government for UK growth
Despite security controversy, Chinese firm ZTE’s UK head of sales tells Computer Weekly one of its first targets will be local government
-
October 16, 2012
16
Oct'12
Organisations need alternative data protection as security models fail
Organisations' security models are failing - so could it be time to adopt an intelligence-led approach to data protection and fighting cyber crime?
-
October 11, 2012
11
Oct'12
RSA Europe: Thousands of unprotected virtual servers exposed to the web
Organisations are failing to protect data in virtual environments, says Jason Hart, vice-president cloud solutions, SafeNet
-
October 11, 2012
11
Oct'12
RSA Europe: Security concerns whole supply chain, says Misha Glenny
Targeted attacks affect the whole supply chain, not just big corporations, author Misha Glenny tells RSA Conference Europe 2012 attendees
-
October 05, 2012
05
Oct'12
Security firm warns against Samsung Galaxy Tab for enterprise use
Security specialist Context Information Security says vulnerabilities in the Samsung Galaxy Tab make it unsuitable for use in the enterprise
-
October 02, 2012
02
Oct'12
Hackers target White House military network
Hackers using computers in China have infiltrated an “unclassified” network in the US White House, believed to be used for issuing nuclear commands.
-
September 27, 2012
27
Sep'12
Izz ad-Din al-Qassam hackers launch cyber attack on US bank Wells Fargo
A hacker group connected to Hamas says it attacked US bank Wells Fargo in reaction to the video 'Innocence of Muslims' posted on YouTube
-
May 18, 2012
18
May'12
MDM, security vendors scramble to address BYOD security issues
Organisations are looking beyond NAC and MDM to resolve BYOD security issues; MDM, security and hybrid vendors are responding with new products.
-
March 30, 2012
30
Mar'12
SIEM deployment case study shows patience is required
Williams Lea’s SIEM is already helping reduce manual log reviews. But there’s still a lot of work to be done before the SIEM can be fully deployed.
-
October 12, 2011
12
Oct'11
New batch of IDS, IPS evasion techniques are hitting their targets
Stonesoft has discovered 163 new advanced evasion techniques (AET), claiming these AETs can pass below the radar of some IDS, IPS products.
-
October 14, 2008
14
Oct'08
Using Wireshark to monitor and secure your network
Learn how to use packet analyser, Wireshark, in this illustrated tutorial.
-
March 27, 2008
27
Mar'08
Getting the best bargain on network vulnerability scanning
When it comes to enterprise network analysis, is it best to use a commercial vulnerability scanner or an open source product? Mike Chapple explains.
-
March 06, 2008
06
Mar'08
Losing the war to lock down networks might help enterprises innovate
While security concerns cannot be set aside, users unwilling to leave their own applications at home might bring some innovation to the office.
-
January 17, 2008
17
Jan'08
Wireless network security made easy - from "The Book of PF"
How to get wireless networks running and some options for making your wireless network more secure, including encryption for IEEE 802.11 wireless networks.
-
January 13, 2008
13
Jan'08
Holidays are over; now beware the gadgets
The post-holiday influx of consumer devices poses increased risk of data leakage and other threats to network security.
-
December 11, 2007
11
Dec'07
Cisco Trusted Security to boost network security, management
Cisco's Trusted Security (TrustSec) hardens network security while easing some management.
-
November 06, 2007
06
Nov'07
Cisco upgrades Catalyst 4500 and 6500 switches
Cisco today released updates to its modular Catalyst 4500 and 6500 switch series to add more capacity, scalability and redundancy.
-
October 11, 2007
11
Oct'07
Juniper updates network access control
Juniper has updated its Unified Access Control NAC products to include better pre- and post-admission, identity and role awareness and other new features.
-
October 10, 2007
10
Oct'07
Researchers warn of new attack methods against Cisco IOS
Several new attack methods against Cisco IOS were uncovered during an analysis conducted by researchers at Information Risk Management.
-
September 16, 2007
16
Sep'07
NAC switches, appliances help track users, malware
Some vendors are offering switches and appliances to monitor traffic for malware and unauthorized access, as the NAC market sorts itself out.
-
August 30, 2007
30
Aug'07
Network access control vendors: Attraction vs. retention
Network access control (NAC) vendors were evaluated based on attractiveness and customer retention in a recent survey by Current Analysis.
-
August 13, 2007
13
Aug'07
VoIP vulnerability threatens data
VoIP vulnerabilities have now reached a level of sophistication that allows hackers to steal, view or delete data.
-
August 09, 2007
09
Aug'07
Cisco warns of critical IOS flaws
Attackers could exploit multiple flaws in Cisco's IOS to cause a denial of service or remotely execute arbitrary code.
-
August 01, 2007
01
Aug'07
Black Hat 2007: Researchers highlight new database attack method
At this week's hacker confab, expert penetration testers will demonstrate how cyberthieves can reach into corporate databases -- without exploiting a specific software flaw -- to steal credit card and Social Security numbers.
-
July 26, 2007
26
Jul'07
Stop simultaneous connections to corporate LANs and external Wi-Fi networks
How can you stop simultaneous connections to corporate LANs and external Wi-Fi networks? Find out from expert Lisa Phifer.
-
July 22, 2007
22
Jul'07
NAC growth sluggish as companies consider network security options
Companies are taking a wait-and-see approach, hoping the technology's maturity will make it more cost effective.
-
June 28, 2007
28
Jun'07
Network security: Overlay versus perimeter security model debated at Catalyst
Traditional network perimeter security -- firewalls, and even network access control -- may soon be pushed out in favour of using VPNs for network security, which could ease the security burden for networking staff, according to Dave Passmore. The ...