Data breach incident management and recovery
-
News
28 Oct 2025
Effective cyber sanctions require a joined-up approach, says Rusi
Calling out and sanctioning cyber threat actors can be an effective tool, but is not a universal panacea, and needs to be considered as part of a wider, strategic approach, say Rusi think tank analysts Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
28 Oct 2025
Pulling the plug: A way to halt a cyber attacker in your network?
Rumours of an organisation taking its systems offline during a cyber attack spurred conversation on the consequences of simply pulling the power, or internet access, to stop intruders. We consider the ethics and practicality Continue Reading
By
-
News
18 Nov 2015
Cyber security mindset needs to change, says report
Government organisations are prime targets for cyber attacks, leading to increased importance on robust information security, according to a report by Intel Security and the Digital Government Security Forum Continue Reading
By -
E-Zine
05 Nov 2015
CW Europe – November 2015
Cloud computing has huge benefits to businesses in Europe, but data protection rules have been different for organisations in different parts of Europe. This is about to change with the final version of the General Data Protection Regulation (GDPR) expected soon. All 28 EU member states will have one set of rules to follow. Continue Reading
-
News
02 Nov 2015
000Webhost blames PHP exploit for breach of 13.5 million records
Unencrypted passwords for a free web hosting firm were on sale for five months before customers were notified their records had been leaked, according to a security researcher Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Oct 2015
Infosec pros should start preparing for the future, say experts
Information security professionals need to grow their skills, engage with the business, increase security awareness, set business goals and tailor their messages, says a panel of experts Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
15 Oct 2015
The true cost of a cyber security breach in Australia
The costs of cyber security breaches can quickly add up with fines, reputational damage and overhauls to network security all hitting the coffers. The case of one Australian firm shows why paying a ransom to a hacker might be tempting. Continue Reading
-
News
12 Oct 2015
NHS Health Apps Library to close
The NHS Health Apps Library is shutting down after a two-year tenure, shortly after NHS-approved apps were found to leak data Continue Reading
By -
E-Zine
05 Oct 2015
CW Europe – October 2015
Access to vast amounts of educational resources via the cloud promises much for education. But like in the business world there are fears associated with the cloud. Read the issue now. Continue Reading
-
News
22 Sep 2015
Is Microsoft Office 2016 reliable enough for business?
A day after a major Skype outage, Microsoft unveils Office 2016, which, ironically, offers tight integration with Skype Continue Reading
By- Cliff Saran, Managing Editor
-
News
18 Sep 2015
Public-private co-operation in the Nordics tackles growing cyber crime threat
Nordic governments and businesses are putting cyber security at the centre of their planning as threats increase Continue Reading
By -
News
16 Sep 2015
BT launches ethical hacking service for bankers
BT introduces a certified Crest Star ethical hacking test service for financial services customers Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Sep 2015
RSA Group flags ID theft risk to Lloyds Bank customers following datacentre storage theft
International insurance group has seen 500 customers take up offer of identity theft protection in wake of datacentre theft Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
04 Sep 2015
US State Department plans cyber security playbook
The US State Department issues a request for information to determine the capabilities of commercial industry to provide and maintain a cyber security playbook Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
25 Aug 2015
Life’s a breach: How to handle the press after a hacking attack
Emily Dent, specialist in crisis PR, offers some advice to organisations that unexpectedly find themselves in the headlines Continue Reading
By- Emily Dent
-
News
10 Aug 2015
Carphone Warehouse data breach hits 2.4 million UK customers
Carphone Warehouse confirms the authorities have been notified about the breach, and urges customers to take steps to protect themselves Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
E-Zine
05 Aug 2015
CW Europe – August 2015
Data is a valuable thing nowadays, and more businesses are collecting it for exactly that reason. However, with the collection of data also comes concern for consumers and governments over where the data is stored and what companies will do with it. This issue of CW Europe investigates the different cultural attitudes towards data management ethics. Continue Reading
-
News
14 Jul 2015
Anyone still running Windows Server 2003 is now at risk
Businesses still running Windows server 2003 are vulnerable to attack from hackers looking to exploit security holes Continue Reading
By- Cliff Saran, Managing Editor
-
News
11 Jun 2015
Kaspersky Lab praised for handling of Duqu 2.0 cyber attack
Kaspersky Lab determined the best approach to cyber attack was to not only admit that it had been hacked, but also to provide extensive information on the malware Continue Reading
By- Warwick Ashford, Senior analyst
-
News
02 Jun 2015
The drivers and inhibitors of cyber security evolution
A study shows a shift in IT security spending to detection and response – but why are most organisations falling way behind the more enlightened front runners? Continue Reading
By- Warwick Ashford, Senior analyst
- Guide 30 May 2015
-
News
30 Apr 2015
Ryanair remains tight-lipped over £3.3m hacker theft
Ryanair provided no details of how hackers took £3.3m from one of its bank accounts, as industry pundits call for greater collaboration Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
25 Apr 2015
Bill Binney, the ‘original’ NSA whistleblower, on Snowden, 9/11 and illegal surveillance
Always a patriot: Computer Weekly talks to Bill Binney, the senior NSA official who blew the whistle before Edward Snowden Continue Reading
-
News
17 Apr 2015
Cyber security boot camp launched to boost skills
Sans Cyber Academy unveils eight-week security boot camp after businesses demand more cyber security specialists Continue Reading
By- Kayleigh Bateman, Computer Weekly
-
News
15 Apr 2015
Banks hide cyber crime losses, says City of London Police
Banks obscure the amount of money lost to cyber fraudsters – preferring to write off cyber theft as operating losses – says the City of London Police Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
14 Apr 2015
Security risk potential linked to young, mobile users
A study conducted by wireless supplier Aruba Networks has identified a distinct cohort of high-risk, security-agnostic workers Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
13 Apr 2015
Taking stock of e-commerce systems
In this week's Computer Weekly, the first of our three-part buyer's guide to next generation e-commerce looks at managing inventory in multi-channel retailers. We highlight the six technology companies that are threats to the dominance of high-street banks. And we examine the top five issues in virtual machine backup. Read the issue now. Continue Reading
-
News
19 Mar 2015
Target agrees to $10m breach compensation
US retailer Target has agreed to a $10m compensation package for victims of its 2013 data breach Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Mar 2015
Premera hack exposes 11 million financial and medical records
US health insurance firm Premera Blue Cross reveals an IT systems breach, exposing financial and medical records of 11 million customers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Mar 2015
2015 IT priorities: SDN yet to prove itself, fear of network hacks growing
In Computer Weekly’s 2015 IT priorities study, software-defined networking is still behind management and monitoring as a networking priority Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Feb 2015
Case study: Norwegian insurer invests in Darktrace machine-learning cyber defence
Shipping insurance company DNK hopes to inspire the rest of the shipping industry to adopt Darktrace’s cyber defence system Continue Reading
-
Tip
19 Feb 2015
Five ways to prepare a company board for a cyber breach
Five key things that boards need to do to stop their businesses leaking like sieves and potentially going to the wall Continue Reading
By- Neil Hare-Brown
-
News
12 Feb 2015
Damballa report highlights the limitations of prevention-centric security
Anti-virus (AV) suppliers can take more than six months to create signatures for malware, according to a report from security firm Damballa Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Jan 2015
Online money transfer provider Xoom suffers multimillion-dollar fraud
Digital money transfer provider Xoom has admitted to suffering a $30.8m loss at the hands of fraudsters Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
23 Dec 2014
What might North Korea v US cyberwarfare over Sony mean for other corporates?
North Korea behind Sony attack and US counter-penetration -- what now, asks SearchCIO's Francesca Sales. Continue Reading
— SearchCIO.com -
News
17 Dec 2014
Fears over the IT security of new banks are overblown
Challenger banks such as PayPal are perceived to be less secure than traditional banks when protecting personal data. But is this the case? Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
17 Dec 2014
Cabinet Office begins procurement for next stage of Gov.uk Verify
The Cabinet Office has submitted a tender notice for a £150m three-year framework for the provision of identity assurance services Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
17 Dec 2014
US interception in the EU faces new legal challenges
US government orders against Microsoft to hand over email data 'infringes privacy legislation' in other countries Continue Reading
By- Fiona O’Cleirigh
-
News
28 Nov 2014
CGI secures communications between pilots and air traffic control
Satellite communications firm Inmarsat has outsourced the provision of security IT and services to CGI Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
17 Nov 2014
US State Department bolsters email security after suspected breach
The US State Department took its unclassified email system offline to bolster security after a suspected breach in October 2014 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Nov 2014
US Postal Service latest government target for cyber attack
Hackers breach the networks of the US Postal Service in the latest of a series of attacks on US government agencies Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Oct 2014
Many firms still unprepared for cyber attack, EY survey shows
More than a third of organisastions have no real-time insight on cyber risks necessary to combat rising threats, a survey has shown Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 Oct 2014
Most businesses do not understand risks of data breaches, study finds
More than 70% of businesses do not understand fully the risks associated with data breaches, a study shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Oct 2014
Incident response: a common failing
Organisations hit by cyber attacks often lack an effective incident response plan. Why are so many unprepared? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Oct 2014
Cloud providers rush to build European datacentres over data sovereignty
Cloud providers IBM and Google build datacentres in the EU as enterprises insist on keeping their data in Europe Continue Reading
By- Archana Venkatraman, Datacentre Editor
-
News
10 Oct 2014
Azure CTO Mark Russinovich's top ten public cloud security risks
Microsoft Azure cloud CTO Mark Russinovich identified ten key security risks of public cloud services Continue Reading
By- Archana Venkatraman, Datacentre Editor
-
News
09 Oct 2014
WordPress most attacked application
Websites that run the WordPress content management system are attacked 24% more often than those using other systems Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
08 Oct 2014
Malware being used to steal cash from ATMs
Criminals are using malware to steal cash from ATMs without debit and credit cards Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
22 Sep 2014
Home Depot under fire for data breach notification
US retailer Home Depot criticised for delays in telling customers their payment card details may have been compromised Continue Reading
By- Warwick Ashford, Senior analyst
-
News
17 Sep 2014
KPMG: IoT, 3D printing and healthcare IT to have most impact
Internet of things (IoT), 3D printing and biotech or healthcare IT are among the IT trends that will change the way people work and live Continue Reading
By- Archana Venkatraman, Datacentre Editor
-
News
15 Sep 2014
Salesforce issues advice on avoiding Dyreza attack
Salesforce has issued a set of guidelines on tightening security after a number of its customers were targeted by the Dyreza email virus Continue Reading
By- Cliff Saran, Managing Editor
-
News
09 Sep 2014
EY seeks tech startups to address challenges of right to be forgotten
Professional services firm Ernst & Young is looking for startups to find technology solutions to the ‘right to be forgotten’ regulation Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
11 Aug 2014
USB-connected devices present cyber vulnerabilities
Connecting devices to computers using a USB port could lead to security breaches, say Berlin-based researchers Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
05 Aug 2014
Cyber Security Challenge UK takes on the internet of things
The latest level of the Cyber Security Challenge will involve participants hacking devices connected to the internet of things Continue Reading
By- Clare McDonald, Business Editor
-
News
31 Jul 2014
Paddy Power hit by data breach in 2010
Gambling firm Paddy Power owns up to 2010 data breach after recovering a compromised dataset in Canada Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Jul 2014
Barclays passes government’s ‘internet-born threat’ test
Barclays Bank has been awarded the government’s cyber security certificate for digital banking services after independent tests of services such as Pingit Continue Reading
-
News
04 Jul 2014
Security Think Tank: The dos and don’ts of a good incident response plan
What does a good information security incident response plan look like? Continue Reading
By- Tim Holman, 2-sec
-
News
02 Jul 2014
ISPs take legal action against GCHQ over mass network infrastructure surveillance
Six global internet service providers (ISPs) have filed a legal complaint calling for a halt to GCHQ’s use of network infrastructure for surveillance Continue Reading
By- Alex Scroxton, Security Editor
-
News
17 Jun 2014
Domino’s breach underlines value of personal data, say experts
The latest cyber breach to hit a high-profile brand underlines the high value of personal data, say security experts Continue Reading
By- Warwick Ashford, Senior analyst
-
News
23 May 2014
eBay under fire over handling of data breach
eBay is coming under increasing criticism over its handling of the data breach that exposed millions of user records Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 May 2014
eBay reveals major security breach and urges users to change passwords
eBay has revealed it was hit by a major cyber attack earlier this year, and is urging users to change their site passwords. Continue Reading
-
News
20 May 2014
Shell thinks technology first in preparation for internet of everything
Shell is reshaping its business to think technology first as it uses the internet of everything to change its business processes Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
28 Apr 2014
US judge orders Microsoft to hand over email data held in Dublin
A US Judge has ordered Microsoft to give the District Court access to the contents of one of its customer’s emails stored on a server located in Dublin Continue Reading
By- Archana Venkatraman, Datacentre Editor
-
News
25 Apr 2014
Cyber threat detection paramount, says SANS fellow
Cyber threat prevention is ideal, but detection is a must, says Eric Cole, SANS Institute fellow Continue Reading
By- Warwick Ashford, Senior analyst
-
News
17 Apr 2014
Datacentre lessons learnt from Heartbleed bug
The Heartbleed bug, an OpenSSL flaw affecting millions of websites, has some lessons for datacentre providers and operators Continue Reading
By- Archana Venkatraman, Datacentre Editor
-
News
08 Apr 2014
Law Society advises legal industry's IT teams over cloud
The Law Society has published best-practice advice for legal firms' IT teams that are considering using cloud computing, following increased use of the cloud to store data Continue Reading
-
Photo Story
17 Mar 2014
The Cyber Security Challenge UK 2014
The Cyber Security Challenge UK is a series of events designed to test the ability of thousands of amateur applicants who have skills in the cyber security space. Continue Reading
By- Clare McDonald, Business Editor
-
Feature
14 Mar 2014
Hacktivism: good or evil?
IT lawyer Dai Davis looks at the rise of hacktivism and its impact on business and international politics Continue Reading
By- Dai Davis, Percy Crow Davis & Co
-
News
04 Mar 2014
Governance, Risk Management and Compliance (GRC)
Ensuring that all the stakeholders' information needs are met requires a holistic approach to managing information – the creation of a GRC platform, say analysts Clive Longbottom and Rob Bamforth. Continue Reading
— computerweekly.com -
News
03 Mar 2014
Legal briefing: The Draft EU General Data Protection Regulation
This report from law firm Morrison & Foerster, sets out some of the most important changes for private sector organisations in the draft EU Data Protection Regulation. Continue Reading
— computerweekly.com -
News
05 Feb 2014
Bank of England publishes Waking Shark II cyber security exercise results
Bank of England publishes the results of its Waking Shark II security exercise, which tested financial institutions' contingency plans for cyber attack Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
22 Jan 2014
CERT-UK to drive international cyber security collaboration
The UK’s new national computer emergency response team (CERT-UK) is set to drive international cyber security collaboration once it becomes operational Continue Reading
By- Warwick Ashford, Senior analyst
-
News
17 Jan 2014
Internet at risk of 'cybergeddon' says WEF
Internet is at risk of fragmenting amid concerns over spying and cyber crime, says World Economic Forum Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
15 Jan 2014
NSA uses secret radio tech to spy on offline computers
The US National Security Agency (NSA) has the capacity to monitor, enter and alter data on computers even if the machines are not connected to the internet, it has emerged Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Jan 2014
More than 1,100 DWP workers disciplined over benefits snooping
More than 1,100 employees at the Department for Work and Pensions have received official warnings since 2008 for prying into benefits records Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
10 Jan 2014
Security considerations for UK enterprises
This Research Snapshot from Vanson Bourne looks at IT security spending trends, awareness of cyber-threats, and the factors perceived as the biggest security risks for organisations. Continue Reading
— Computer Weekly -
News
05 Dec 2013
UK citizen sues Microsoft over Prism private data leak to NSA
A court action brought in the UK will test Microsoft's legal right to disclose private data on UK citizens to US intelligence services Continue Reading
By- Fiona O’Cleirigh
-
News
05 Dec 2013
Cybercrime and warfare: All that matters
Peter Warren and Michael Streeter assess the history, scale and importance of cyber crime in this chapter from their book, Cybercrime and warfare: All That Matters. Continue Reading
— Computer Weekly -
News
19 Nov 2013
Investec CISO warns that legacy tapes will fail on new hardware
Many organisations may find that years of irreplaceable tape backups are inaccessible because modern machines cannot handle legacy format Continue Reading
By- Cliff Saran, Managing Editor
-
News
12 Nov 2013
Mass surveillance a bad idea, says Information Commissioner Christopher Graham
Information Commissioner Christopher Graham says issues of national security must not overshadow concerns of legitimate public interest Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Nov 2013
Global profiles of the fraudster
Computers, rather than conmen, are set to be the future face of fraud, as criminals turn to robotics in an effort to avoid detection, this report from KPMG reveals. Continue Reading
— ComputerWeekly.com -
News
29 Oct 2013
Analysis: RSA says security needs to change, but what does that mean?
RSA executive chairman Art Coviello has issued a call to action to the security industry to improve technology and collaboration Continue Reading
-
E-Zine
08 Oct 2013
High street retailers fight back with multi-channel IT
In this week’s Computer Weekly, we examine how high street retailers are fighting back against online rivals by using IT to support multi-channel customers – and Tesco’s marketing chief explains how it works at the UK’s biggest supermarket chain. Also, we ask how recent revelations about government internet surveillance affect the protection of corporate information. Read the issue now. Continue Reading
-
News
30 Sep 2013
MoD announces specialist programme to fend off cyber attacks
The Ministry of Defence (MoD) has announced a strategy to defend UK national security from the threat of cyber attacks Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
27 Sep 2013
Ex-hackers best qualified to improve cyber security say 70% of IT firms
Over half of businesses are not taking IT security seriously enough and almost three quarters of IT professionals think ex-hackers could be the right people to help businesses improve cyber-security. Continue Reading
-
News
26 Sep 2013
Small businesses must encrypt customer data, says ICO
The Information Commissioner’s Office (ICO) urges small businesses to encrypt customer data after a sole trader was fined for failing to do so Continue Reading
-
News
06 Sep 2013
NSA and GCHQ unlock online privacy encryption
UK and US intelligence agencies have unlocked the technology used to encrypt online services, including email, online banking and medical records. Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
05 Sep 2013
Windows 2012 Server Network Security
This book chapter offers an introduction to Windows 8 and Windows Server 2012 network security and IPv6. It includes a 30% discount code for Computer Weekly readers. Continue Reading
— ComputerWeekly.com -
News
05 Sep 2013
Windows Server 2012 Security from End to Edge and Beyond
This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask. Continue Reading
— ComputerWeekly.com -
News
05 Sep 2013
Printing: a false sense of security?
Louella Fernandes and Bob Tarzey show how secure printing technology can provide authentication, authorisation and accounting capabilities, helping businesses improve document security and meet compliance regulations. Continue Reading
— ComputerWeekly.com -
News
03 Sep 2013
Disinfecting PCs false security, says security expert
Many companies proud of their ability to identify and clean malware infected machines are missing a trick, says veteran security expert Continue Reading
By- Warwick Ashford, Senior analyst
-
Photo Story
29 Aug 2013
Rapid7 United 2013 Security Summit
View the pics from Rapid7’s recent security summit in Boston. Continue Reading
By- Kayleigh Bateman, Computer Weekly
-
News
23 Aug 2013
Box.com forges new cloud security model
Service providers and consumers need to move to a security model better suited to the cloud computing, says Box.com Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Aug 2013
Case study: Keeping it private at Beth Israel Deaconess after the Boston Marathon Attacks
Doctor and healthcare CIO shares his lessons learned from the Boston Marathon attacks and how to protect patient data Continue Reading
By- Kayleigh Bateman, Computer Weekly
-
News
20 Aug 2013
Targeted attacks and how to defend against them
Analysts Bob Tarzey and Louella Fernandes assess the scale and real impact of targeted attacks the measures being taken to defend against them. Continue Reading
— ComputerWeekly.com -
Feature
29 Jul 2013
An introduction to cyber liability insurance cover
Cyber liability insurance cover has been around for 10 years, but most security professionals seem to have not heard of it or know that it exists Continue Reading
By -
News
19 Jul 2013
IT security case studies
Four critical IT security case-studies selected from the winners of Computer Weekly's European User Awards for security Continue Reading
— ComputerWeekly.com -
News
18 Jul 2013
Needle in a Datastack: The rise of big security data
This research from McAfee investigates how well organisations are positioned to address the challenges of managing security in a world of ever increasing amounts and types of data. Continue Reading
— ComputerWeekly.com -
News
17 Jul 2013
2013 Cost of Data Breach Study: UK
The cost of data breaches has risen for UK organisations over the past year, the Ponemon Institute reveals. Continue Reading
— computerweekly.com -
News
17 Jul 2013
Security Think Tank Download: Bring your own device
Downloadable guide. How to make your company secure when you introduce BYOD. Continue Reading
— computerweekly.com -
News
17 Jul 2013
IT Security Case Studies
Warwick Ashford presents 4 essential IT security case-studies selected from the winners of Computer Weekly's European User Awards. Continue Reading
— computerweekly.com -
News
10 Jun 2013
2013 Cost of Data Breach Study: UK
The cost of data breaches has risen for UK organisations over the past year, but companies that appoint chief information security officers with enterprise-wide responsibilities can reduce their costs, this report from the Ponemon Institute reveals Continue Reading
— Computer Weekly
