Endpoint security
-
News
25 Apr 2024
Zero trust is a strategy, not a technology
Zero-trust security should be seen as a strategy to protect high-value assets and is not tied to a specific technology or product, says the model’s creator John Kindervag Continue Reading
-
News
24 Apr 2024
Cyber training leader KnowBe4 to buy email security firm Egress
Security awareness training and phishing simulation specialist KnowBe4 is to buy email security expert Egress Continue Reading
-
Opinion
13 Aug 2013
The dangers of internet cafés
Businesses need clear computer use policies and need to ensure staff are properly trained in data protection, writes Garry Mackay Continue Reading
-
Feature
30 Jul 2013
Big data journalism exposes offshore tax dodgers
How journalists harnessed big data to challenge offshore financial secrecy Continue Reading
-
News
19 Jul 2013
IT security case studies
Four critical IT security case-studies selected from the winners of Computer Weekly's European User Awards for security Continue Reading
-
News
18 Jul 2013
Needle in a Datastack: The rise of big security data
This research from McAfee investigates how well organisations are positioned to address the challenges of managing security in a world of ever increasing amounts and types of data. Continue Reading
-
News
17 Jul 2013
IT Security Case Studies
Warwick Ashford presents 4 essential IT security case-studies selected from the winners of Computer Weekly's European User Awards. Continue Reading
-
News
04 Jul 2013
FBI warns of increased spear phishing attacks
The FBI has issued a warning about an increase in spear-phishing attacks targeting multiple industry sectors Continue Reading
-
News
25 Jun 2013
BES extends MDM to Android and iPhones
Aiming to rekindle interest in the Blackberry Enterprise Server (BES), Blackberry has extended the platform to support Android and iOS Continue Reading
-
News
10 Jun 2013
Telefonica Digital forms security group Eleven Paths
The business division of mobile operator Telefonica launches Eleven Paths, an independent company working on security issues in the workplace Continue Reading
-
News
03 Jun 2013
Information Governance
This research from AIIM looks at the risk profile around electronic records, the keep-all versus delete-all options, e-discovery, and the implications of social, mobile and cloud on risk management policies. Continue Reading
-
News
07 May 2013
Symantec helps NHS trust cut security costs by a quarter
The Royal Liverpool and Broadgreen University Hospitals NHS Trust cut security costs by 25% in its partnership with security supplier Symantec Continue Reading
-
News
01 May 2013
CW buyer's guide: context-aware security
This 11-page Computer Weekly buyer's guide looks at how organisations should approach context-aware security technologies and what business benefits they can deliver. Continue Reading
-
News
01 May 2013
CW Special Report on CSC
This 16-page report from Computer Weekly analyses the challenges facing CSC, its financial performance, the services it offers, its place in the IT market and its future strategy. Continue Reading
-
News
25 Apr 2013
Spam SMS messages drop following ICO penalty
The number of spam SMS messages has significantly reduced since government regulator ICO issued £440,000 fines last year Continue Reading
-
Feature
22 Apr 2013
The internet of things is set to change security priorities
IT leaders must protect against the security risks introduced by the growing interaction between technology and the physical world. Continue Reading
-
News
19 Apr 2013
Conficker makes way for web-based attacks, says Microsoft
Web attacks emerge as top threat as businesses finally begin to win the battle against Conficker and other worms, says Microsoft Continue Reading
-
News
11 Apr 2013
Bots and web apps among top threats to data security, says Check Point
Bots, viruses, breaches and attacks are a constant and real threat to the information security of organisations Continue Reading
-
News
11 Apr 2013
Porn websites pose malware risk, says researcher
Browsing popular pornography internet sites pose a growing risk of malware infection, according to a security researcher Continue Reading
-
News
03 Apr 2013
US Army practises poor data security on mobile devices
Pentagon inspector general finds smartphones and tablets the US Army buys are not configured to protect sensitive data and allow remote wipe Continue Reading
-
News
20 Mar 2013
Case study: Hamilton Fraser embraces BYOD with MobileIron
How insurance firm Hamilton Fraser is using MobileIron to enable employees to bring their own devices while following company policy Continue Reading
-
News
06 Mar 2013
What is RSA's build, buy, partner strategy?
Computer Weekly takes a closer look at RSA's build, buy, partner strategy Continue Reading
-
News
05 Mar 2013
Enterprise Security Architecture – an outsourcer's view
Alan Jenkins, chief security officer of outsourcing specialist, T Systems, explains the company's approach to enterprise security architecture. Continue Reading
-
News
05 Mar 2013
Enterprise Security Architecture
Mark Brown, Director for Advisory Risk & Information Security at Ernst & Young offers advice to security leaders on developing a robust Enterprise Security Architecture. Continue Reading
-
News
05 Mar 2013
Security the future: Keeping up with the business
Gareth Lindahl-Wise, group information security manager at British American Tobacco, explains the company's approach to enterprise security architecture. Continue Reading
-
Photo Story
04 Mar 2013
How to configure Mac OS X Server
How to secure Mac OS X Server using global password policies and data loss prevention Continue Reading
-
News
27 Feb 2013
350,000 different types of spam SMS messages were targeted at mobile users in 2012
350,000 different variants of unsolicited spam SMS messages were accounted for in 2012, with 53,000 variants logged for December alone Continue Reading
-
News
27 Feb 2013
Health records should be protected like bank details, says BCS
The BCS and NHS say people should protect their online medical records in the same way they look after their bank details Continue Reading
-
News
26 Feb 2013
Virtualization Security: Protecting Virtualized Environments
This extract from the book Virtualization Security, includes a 30% discount for Computer Weekly readers. Continue Reading
-
News
18 Feb 2013
The Demise in Effectiveness of Signature and Heuristic Based Antivirus
Anti-virus technology is failing to protect organisations from malicious attacks. Security professionals should look at alternative strategies, the NNC group argues in this report. Continue Reading
-
Feature
07 Jan 2013
Business priorities: what to protect, monitor and test
How information security professionals can prioritise what to protect, monitor and test in the light of current budget and resource constraints Continue Reading
-
Feature
17 Dec 2012
Shore up your organisation’s fleet with the right MDM
There are many mobile device management products, but approaches vary. We outline how to choose the right one for your business Continue Reading
-
Photo Story
13 Dec 2012
Securing Macs in the enterprise
A Mac can be more secure than Windows, yet just as insecure; it is harder to configure, easier to use; will not fit in the enterprise, but does not need to. Continue Reading
-
Feature
06 Dec 2012
How to secure Macs in the enterprise
Apple computers are becoming increasingly used in the enterprise - we look at how to securely introduce Macs in the corporate network Continue Reading
-
News
06 Dec 2012
2012 Cost of Cyber Crime Study: UK
The 2012 Cost of Cyber Crime Study: United Kingdom is independently conducted by Ponemon Institute. The benchmark study, sponsored by HP Enterprise Security is based on a representative sample of 38 organisations in various industry sectors. Continue Reading
-
News
03 Dec 2012
IT Security Purchasing Intentions 2013
This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe. Continue Reading
-
News
19 Nov 2012
Cyber criminals target Skype, Facebook and Windows users
Cyber criminals targeted users of Skype, Facebook and Windows using multiple Blackhole exploits in October, according to security firm GFI Software Continue Reading
-
News
16 Nov 2012
Nasa to encrypt data after latest breach
Nasa is to encrypt all its mobile computers after the loss of a laptop containing personal information about more than 10,000 staff Continue Reading
-
News
13 Nov 2012
Many UK firms underestimate cost of data breaches, study finds
Many UK organisations are still failing to understand the implications and costs of data breaches, a study has revealed Continue Reading
-
News
13 Nov 2012
Mobile Security Strategies
This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise. Continue Reading
-
News
13 Nov 2012
Secure your data – protect your business
This guide for C-level executives explains the risks faced by businesses and the practical solutions they can take to secure their data. Continue Reading
-
News
13 Nov 2012
The Global State of Information Security Survey 2013: Key Findings
This global study examines the state of cyber-security and the impact of cyber crime and offers advice to businesses on reducing the risks. Continue Reading
-
Tutorial
07 Nov 2012
Maltego and advanced exploit writing: The PDF tutorial collection
Right from how to write advanced custom exploits to perform reconnaissance using Maltego, you can find it all in this comprehensive PDF tutorial collection. Continue Reading
-
News
31 Oct 2012
Apple squashes BlackBerry as Brent Borough deploys iPads
Brent Borough Council replaces BlackBerry and deploys MobileIron to securely manage almost 3,000 iPads and iPhones Continue Reading
-
News
31 Oct 2012
Free mobile apps a threat to privacy, study finds
Free mobile apps pose a serious threat to privacy because of their ability to capture large amounts of user information Continue Reading
-
News
30 Oct 2012
IT security budgets mismatched to hacker targets, study shows
IT security budgets are not being used to provide defence technologies in some areas most likely to be targeted by hackers, a study shows Continue Reading
-
News
10 Oct 2012
RSA Europe: Cloud key to future information security, says Qualys
Cloud computing is an opportunity information security professionals should not miss, says Philippe Courtot, CEO of security firm Qualys Continue Reading
-
Feature
10 Oct 2012
CW500: Managing the mobile workforce (part 1)
Mobile working has transformed Colt Telecommunications beyond recognition over the past three years Continue Reading
-
News
25 Sep 2012
BYOD: IT must tackle printer security
With more staff bringing their own devices to work, IT needs to rethink its printing and scanning policies Continue Reading
-
News
25 Sep 2012
Security concerns hold back mobile banking adoption
More than two-thirds of smartphone owners have not yet adopted mobile banking apps because of security concerns, a survey has revealed Continue Reading
-
Photo Story
01 Jun 2012
13 Android security apps
Keep your Android mobile device secure with our recommendations for Android security apps. Use these must-have 13 Android security apps and sleep easy. Continue Reading
-
News
18 May 2012
MDM, security vendors scramble to address BYOD security issues
Organisations are looking beyond NAC and MDM to resolve BYOD security issues; MDM, security and hybrid vendors are responding with new products. Continue Reading
-
Photo Story
03 May 2012
11 security audit essentials
IT security audit tools automate the IT security audit process, making it more efficient and effective. Here are 11 must-have IT security audit tools. Continue Reading
-
Tutorial
16 Apr 2012
Exploit development tutorial - Part Deux
In our exploit development tutorial’s second part, we examine how you can write exploits in PERL. Then we see how to port exploits by scripting in Ruby. Continue Reading
-
Photo Story
14 Mar 2012
10 Wi-Fi security tools for your arsenal
With Wi-Fi’s growth, security administrators and pen testers alike have their hands full. Here’s a list of essential Wi-Fi security tools to ease the stress. Continue Reading
-
Tutorial
14 Feb 2012
Burp Suite training tutorial: Part 3 – Sequencer, decoder and composer
In the third installment of our Burp Suite training tutorial, learn how to analyze tokens, decode requests and compare responses using Burp Suite tools. Continue Reading
-
Tip
17 Jan 2012
10 Linux security tools for system administrators
Linux-based tools for security are a boon to system admins for monitoring network security. Here are 10 popular and useful Linux-based security tools. Continue Reading
-
Tutorial
11 Jan 2012
Burp Suite Guide: Part I – Basic tools
Our Burp Suite guide series explains how to use Burp Suite for security testing of Web apps. For a start, we look at proxy, spider, site scope and sitemap. Continue Reading
-
News
29 Dec 2011
Emerging 2012 security trends demand information security policy changes
2012 security trends involving cookies, fines, devices and threats will demand more skills -- and a little finesse -- from security professionals. Continue Reading
-
Tip
16 Dec 2011
Sslstrip tutorial for penetration testers
Sslstrip is a powerful tool to extract sensitive credentials using HTTPS stripping. This sslstrip tutorial explains the working of sslstrip in-depth. Continue Reading
-
News
05 Dec 2011
Concerned about tablet security issues? Some are, others not so much
Users love their tablets, but security pros are concerned about tablet security issues. However, though tablets bring new threats, not everyone is ringing the alarm. Continue Reading
-
Tip
30 Nov 2011
BackTrack 5 guide 4: How to perform stealth actions
With BackTrack 5, how to include stealth into attacks is a necessary skill for penetration testers. Our BackTrack 5 how to tutorial shows you the way Continue Reading
-
Tip
04 Oct 2011
BackTrack 5 tutorial Part I: Information gathering and VA tools
Our BackTrack 5 tutorial covers information gathering and vulnerability assessment using BackTrack 5. Continue Reading
-
Tip
15 Sep 2011
Step-by-step aircrack tutorial for Wi-Fi penetration testing
Aircrack-ng is a simple tool for cracking WEP keys as part of pen tests. In this aircrack tutorial, we outline the steps involved in cracking WEP keys. Continue Reading
-
Tutorial
13 Sep 2011
Metasploit guide 4: Armitage cyber attack management GUI
In part four of our Metasploit guide we look at Armitage, the GUI-based cyber attack management tool. This completes the Metasploit guide series. Continue Reading
-
Tutorial
23 Aug 2011
A handy Nessus tutorial
A powerful vulnerability scanner, Nessus is a utility that infosec pros swear by. If you plan to adopt this tool, our Nessus tutorial has all the details. Continue Reading
-
Tutorial
19 Aug 2011
Social Engineer Toolkit (SET) tutorial for penetration testers
A social engineering toolkit helps address the human element aspect of penetration testing. Learn how to use Social Engineer Toolkit with this tutorial. Continue Reading
-
News
27 Jul 2011
Metasploit Pro 4.0 adds support for cloud, SIEM systems
Rapid7 releases Metasploit Pro version 4 with improved automation features and new SIEM and cloud-based pen-testing support. Continue Reading
-
Tip
26 Jul 2011
Metasploit tutorial part 2: Using meterpreter
Part two of our Metasploit tutorial covers usage details of the meterpreter post-exploitation tool in Metasploit to create exploits that evade detection. Continue Reading
-
News
13 Jul 2011
Managing iPads in enterprise networks
These days users expect to be able to use their iPads inside the business and as thousands of software vendors release applications for the iOS platform which provide data mobility and usability benefits to employees, the prospect of the iPad as a business device is becoming a forced reality. Continue Reading
-
Tip
12 Jul 2011
Metasploit tutorial part 1: Inside the Metasploit framework
In part one of our Metasploit tutorial, learn the framework’s basics, to use it for vulnerability scans and create a simple exploit on a target system. Continue Reading
-
News
06 Jul 2011
Network security case study: College’s NAC virtual appliance makes grade
Wellington College’s network security case study explains how a NAC virtualization appliance blocks malware and provides increased capacity on demand. Continue Reading
-
News
30 Jun 2011
Apple fixes 39 bugs in Snow Leopard, preps for Lion release
Releases final non-security update - v10.6.8- for Snow Leopard OS, which fixes 39 flaws. More details inside. Continue Reading
-
News
23 Jun 2011
Cisco introduces AnyConnect to mobile devices
The benefits of enabling your workforce with mobile access to enterprise applications, regardless of whether those applications are in the cloud or in the corporate data centre, are clearly recognised. The ease of providing secure remote access to employees, and the ability to maintain corporate data security policies is, however, not simple. Continue Reading
-
News
22 Jun 2011
McAfee releases Android end point security solution
McAfee have announced McAfee Mobile Security software, available for both smartphones and tablets, which according to a recent press release provides a comprehensive mobile security solution by combining three leading McAfee mobile security products: WaveSecure, VirusScan Mobile and SiteAdvisor® for Android. Continue Reading
-
News
09 Jun 2011
Nessus Android application extends vulnerability scanner’s mobile reach
Free Android app for Nessus Vulnerability scanner released by developers, Tenable Network Security Inc; extends Nessus’s existing support for iOS devices. Continue Reading
-
Tip
13 May 2011
VA/PT technical report writing best practices for pen testers
A good technical report is indispensible to vulnerability analysis/penetration testing (VA/PT) exercises. Guidelines on how to write concise VA/PT reports. Continue Reading
-
Tip
04 May 2011
Demystifying wardriving: An overview
With companies like Google being criticized for wardriving, this tip aims at decoding the concept and the associated legal implications. Continue Reading
-
Podcast
16 Sep 2010
PODCAST: McAfee's endpoint chief on mobile internet security
Candace Worley, Senior Vice President and General Manager for Endpoint Security at McAfee explains how new endpoints like tablets and mobile phones are changing the requirements for internet security. Continue Reading
-
Tip
26 Oct 2009
Develop a unified communication security plan
Here is a handy guide to help you develop a comprehensive unified communication (UC) security strategy which covers UC infrastructure and applications. Continue Reading
-
Tip
03 Jun 2009
How to manage firewall testing using Nmap
Nmap includes many features that can be used to circumvent poorly implemented firewalls. Learn how the freely available tool can test your network devices. Continue Reading