Hackers and cybercrime prevention
-
News
14 May 2025
Scattered Spider retail attacks spreading to US, says Google
Google’s threat intel analysts are aware of a number of in-progress cyber attacks against US retailers linked to the same Scattered Spider gang that supposedly attacked M&S and Co-op in the UK Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 May 2025
Why we must reform the Computer Misuse Act: A cyber pro speaks out
Britain’s outdated hacking laws are leaving the UK’s cyber practitioners hamstrung and afraid. Security professional Simon Whittaker reveals how he nearly ran afoul of the Computer Misuse Act, and why he’s speaking out for reform Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Jul 2018
Cyber criminals use fake domains to scam businesses
UK police are warning businesses that cyber criminals are using fake domains to scam businesses out of hundreds of thousands of pounds Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Jul 2018
CNI sector lacks cyber security skills, government warned
The UK’s critical national infrastructure sector is being negatively impacted by the lack of cyber security skills, a report warns Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Jul 2018
Collaborative alliance to advance UK’s cyber security profession
Leading UK organisations in cyber security have united to develop a national professional body in the field Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
18 Jul 2018
CW ASEAN: Defend against disruption
The security of industrial control systems (ICS) has come under the spotlight with several high-profile incidents affecting power plants and other critical infrastructure in recent years. What are the threats to these systems in ASEAN, and what is the common approach to securing ICS systems? In this month’s issue of CW ASEAN, we take a closer look at how ICS operators are improving the visibility of ICS environments without jeopardizing operations, addressing security vulnerabilities and enhancing cooperation between IT and operational technology teams. Read the issue now. Continue Reading
-
News
18 Jul 2018
Retail cyber security spending ineffective as breaches rise
Cyber attacks on the retail sector are increasing, and although most retailers plan to increase cyber security spending, planned investments are unlikely to be effective, a report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Jul 2018
Deloitte launches EMEA-wide initiative to close cyber security gender gap
Professional services organisation Deloitte expands its UK efforts to encourage more women into cyber security to cover the EMEA area Continue Reading
By- Clare McDonald, Business Editor
-
News
18 Jul 2018
Cyber security top priority for aircraft makers, says Airbus
There is a high level of collaboration in the aircraft industry on cyber security, but not all other industries are at the same level, according to an industry veteran at multinational aerospace and defence firm Airbus Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Jul 2018
Singapore to bolster threat intelligence sharing in financial sector
Singapore’s Cyber Security Agency has partnered the Financial Services Information Sharing and Analysis Centre to glean cyber threat intelligence for the country’s financial industry Continue Reading
By- Aaron Tan, TechTarget
-
News
18 Jul 2018
Spectre variant gives buffer overflow a new twist
New variants of the Spectre microprocessor bugs use buffer overflow-style attacks to run malicious code Continue Reading
By- Cliff Saran, Managing Editor
-
17 Jul 2018
Most airports not protected from cyber threats
The chairman of the Israel Airports Authority paints a dismal picture of the state of cyber security in aviation, and offers advice on what can be done to avert the next disaster. Continue Reading
-
17 Jul 2018
How Australia is keeping pace with ICS threats
Besides bridging the security gap between IT and operational technology teams, Australia is driving efforts to bolster the security of IoT devices Continue Reading
-
Feature
17 Jul 2018
An insider’s look into the dark web
A principal research scientist at Sophos offers a glimpse into the abysses of the dark web in a bid to uncover what cyber crooks are up to Continue Reading
By- Aaron Tan, TechTarget
-
News
17 Jul 2018
Cryptominers plateau while backdoors shoot up
Illicit cryptocurrency mining appears to be slowing down, but backdoors increased rapidly in the second quarter of the year, a report warns Continue Reading
By- Warwick Ashford, Senior analyst
-
17 Jul 2018
Cyber resilience key to securing industrial control systems
Operators of industrial control systems can build greater cyber resilience by getting IT and operational technology teams to work more closely together and improving the visibility of their infrastructure, among other security measures. Continue Reading
-
17 Jul 2018
Most airports not protected from cyber threats
The chairman of the Israel Airports Authority paints a dismal picture of the state of cyber security in aviation, and offers advice on what can be done to avert the next disaster. Continue Reading
-
17 Jul 2018
APAC organisations could lose $1.75tn from cyber attacks
A study by Frost and Sullivan has found that losses from cyber security incidents could account for 7% of the region’s GDP in 2017 Continue Reading
-
News
17 Jul 2018
A third of organisations do not have a security expert, survey shows
Around a third of organisations are vulnerable to cyber attacks due to a lack of dedicated in-house cyber security experts, finds Gartner survey Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
16 Jul 2018
Mobile devices lost in London underline security risk
The security risk of lost mobile devices is underlined by the fact that almost 26,000 mobile phones and computing devices were lost in London in the past year alone Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 Jul 2018
Russian cyber attacks show need for international rules
Russian cyber attacks aimed at influencing foreign elections highlight the need for the international community to agree on rules of conduct and punitive consequences Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
13 Jul 2018
Matching disaster recovery to cyber threats
While it is important to take steps to prevent cyber attacks, they can still happen. That is why disaster recovery practices are equally critical Continue Reading
-
News
13 Jul 2018
Hackers increasingly targeting cloud infrastructure
Cloud infrastructure is a growing target for cyber attackers because of available computing resources, as well as the repositories of valuable data, a report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
12 Jul 2018
Security Think Tank: A good password policy alone is not enough
In light of the fact that complex passwords are not as strong as most people think and that most password strategies inevitably lead to people following them blindly, what actually makes a good password and when is a password alone not enough? Continue Reading
By- Bruce Beam , (ISC)²
-
News
12 Jul 2018
Cyber attackers cashing in on ‘hidden’ attack surface
Cyber attackers are cashing in on organisations’ lack of visibility into all online interactions that can involve multiple third parties, a report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
12 Jul 2018
An exciting time to be in cyber security innovation
Cyber security innovation has received a £1.35m shot in the arm from the UK government with the opening of a new innovation centre in London. Computer Weekly looks at why now is a good time to be working and innovating in this industry Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Jul 2018
White-hat hackers find record number of vulnerabilities
White-hat hackers are finding more vulnerabilities than ever before, with crowdsourced security testing continuing to gain popularity, a report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
11 Jul 2018
Security Think Tank: Cracking the code – what makes a good password?
In light of the fact complex passwords are not as strong as most people think, and that most password strategies inevitably lead to people following them blindly, what actually makes a good password and when is a password alone not enough? Continue Reading
By- Ramsés Gallego, Isaca
-
News
11 Jul 2018
UK firms too confident about cyber security
Three-quarters of UK companies say their cyber protection is above average, and nearly half think they are a “top performer” despite the growth in data breaches Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Jul 2018
Hidden costs of data breaches difficult to manage, study finds
The full cost of “mega breaches” can be up to £264m, with the average UK data breach costing £2.69m, a study has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Jul 2018
Corporate networks vulnerable to insider attacks, report finds
Researchers found that 100% of corporate networks tested in 2017 were vulnerable to insider attacks, with Wi-Fi networks and employees among the top areas of weakness Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
10 Jul 2018
Cyber crime: why business should report it as soon as possible
Cyber crime is affecting a growing number of businesses, yet few are reporting it. Computer Weekly lifts the veil on cyber crime reporting, looking at the who, what, when, where, how and why Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
10 Jul 2018
Security Think Tank: Some basic password guidelines
In light of the fact that complex passwords are not as strong as most people think and that most password strategies inevitably lead to people following them blindly, what actually makes a good password and when is a password alone not enough? Continue Reading
By -
News
09 Jul 2018
Collaborative taskforce launches security intelligence network
BAE Systems, Vodafone, cyber security incubator CyLon and other partners have joined forces in unveiling a manifesto for safeguarding society in the digital age Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
09 Jul 2018
Security Think Tank: Passwords alone are not good enough
In the light of the fact that complex passwords are not as strong as most people think, and that most password strategies inevitably lead to people following them blindly, what actually makes a good password and when is a password alone not enough? Continue Reading
By- Emma Bickerstaffe, Information Security Forum (ISF)
-
News
09 Jul 2018
Inside one of the world’s largest bug bounty programmes
Trend Micro’s Zero Day Initiative may be the top external supplier of software bug reporting for Microsoft and Adobe, but that does not mean it purchases every type of bug Continue Reading
By- Aaron Tan, TechTarget
-
News
06 Jul 2018
Infosec community welcomes bank sector focus on cyber resilience
The information security community has welcomed regulators’ call on the banking industry to demonstrate their capability to respond to cyber attacks because it highlights the importance of cyber resilience for all businesses Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
06 Jul 2018
Security Think Tank: Firms need to support good password practices
In the light of the fact that complex passwords are not as strong as most people think and that most password strategies inevitably lead to people following them blindly, what actually makes a good password and when is a password alone not enough? Continue Reading
-
News
06 Jul 2018
How changes in retail law could affect customer experience
New payments regulations could increase the amount of times customers will need to use two-factor authentication to make a purchase, potentially putting a strain on customer experience, according to MasterCard Continue Reading
By- Clare McDonald, Business Editor
-
Opinion
05 Jul 2018
Security Think Tank: How to create good passwords and add security layers
In light of the fact complex passwords are not as strong as most people think and most password strategies inevitably lead to people following them blindly, what actually makes a good password - and when is a password alone not enough? Continue Reading
By- Simon Persin, Turnkey Consulting
-
News
05 Jul 2018
Beware blockchain security blindspots, warns RSA
Companies need to ensure that rushed blockchain and other new technology projects are not introducing security vulnerabilities by gaining granular visibility of network activity, according to RSA Security Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
04 Jul 2018
Security Think Tank: Complex passwords provide a false sense of security
In the light of the fact that complex passwords are not as strong as most people think, and that most password strategies inevitably lead to people following them blindly, what actually makes a good password and when is a password alone not enough? Continue Reading
By- Tim Holman, 2-sec
-
News
04 Jul 2018
Israel accuses Hamas of using spy apps to target soldiers
Israel has accused Hamas of using apps to hijack soldiers’ phones to spy on them, and UK defence secretary demonstrates how effective that could be Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
03 Jul 2018
Security Think Tank: Use pass phrases and 2FA to beef up access control
In light of the fact complex passwords are not as strong as most people think, and that most password strategies inevitably lead to people following them blindly, what actually makes a good password – and when is a password alone not enough? Continue Reading
-
Opinion
02 Jul 2018
Security Think Tank: Put more layers around passwords to up security
In light of the fact that complex passwords are not as strong as most people think and most password strategies inevitably lead to people following them blindly, what actually makes a good password and when is a password alone not enough? Continue Reading
By- Maxine Holt, Omdia
-
News
02 Jul 2018
Linux targeted by illicit cryptocurrency miners
Cryptojacking is increasingly being used by cyber criminals to raise funds, Watchguard report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
02 Jul 2018
HMRC deactivates record number of fake websites
HM Revenue & Customs has removed more than 20,000 malicious websites in the past year, but warns people to stay alert to the threat from online fraudsters Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Jun 2018
UK government cyber security standard welcomed
The information security community has welcomed the publication of the government’s minimum cyber security standard, which could be used by any organisation to improve its cyber defences Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Jun 2018
NHS Digital signs three-year cyber security partnership with IBM
Partnership with IBM aims to bolster cyber security responses and defences, including expanding NHS Digital’s Cyber Security and Operations Centre Continue Reading
By -
News
29 Jun 2018
British Muslim considers appeal after court rules repeated terrorism stops are legal
Muzaffar Abdullah, a 37-year-old gas engineer who has been stopped and questioned by police at airports at least 10 times, is considering an appeal after being found guilty of wilful obstruction for refusing to answer questions under controversial terrorism legislation. He received a conditional discharge. Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
28 Jun 2018
First Lorca cohort to focus on security orchestration
The first companies to benefit from the new London cyber innovation centre will focus on cyber security orchestration and automation Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 Jun 2018
Ticketmaster warns of third-party data breach
Ticketmaster has warned of a potential data breach through malware found in a third-party customer support service, underlining the importance of supply chain security Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Jun 2018
Lorca will help drive UK cyber exports, says ex-GCHQ boss
New London cyber security innovation centre will help to boost exports of UK cyber security expertise, says former GCHQ director Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Jun 2018
Brexit a greater risk to UK financial system than cyber attack
While Brexit is seen as the biggest risk to the stability of the UK financial system, cyber attack is the most difficult risk to manage for over half of firms Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
27 Jun 2018
Cyber criminals 'infect and collect' in cryptojacking surge
Illicit cryptocurrency mining offers cyber criminals lower risk, higher efficacy and greater ease of making money, adding passive exploitation to ransomware extortion, data breach theft and fraud, a report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Jun 2018
AI and other tech key to post-Brexit success, says Matt Hancock
Digital secretary Matt Hancock highlights the importance of emerging technologies to the future of the UK at the opening of London’s cyber security innovation centre Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Jun 2018
Global IoT security standard remains elusive
Despite the lack of a global internet of things security standard, existing security frameworks are on the same page in areas such as device upgradability and data stewardship Continue Reading
By- Aaron Tan, TechTarget
-
News
26 Jun 2018
High-Tech Bridge bets on machine learning capabilities
Machine learning has a great potential to drive the automation of some security tasks to free up information security professionals to do more strategic work, says High-Tech Bridge founder Continue Reading
By- Warwick Ashford, Senior analyst
-
Tip
26 Jun 2018
How studying the black hat community can help enterprises
White hat hackers often assimilate themselves into the black hat community to track the latest threats. Discover how this behavior actually benefits the enterprise with David Geer. Continue Reading
By- David Geer, Geer Communications
-
News
26 Jun 2018
Hospitality industry under siege from botnets
The hospitality industry, including hotels, airlines and cruise lines, is the biggest target for cyber criminal botnet attacks that abuse credentials and overwhelm online systems, a report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Jun 2018
Norway’s National Security Agency warns IT industry about security obligations
IT service providers serving organisations in Norway have received a timely reminder about their security obligations. Continue Reading
By- Gerard O'Dwyer
-
News
25 Jun 2018
London cyber innovation centre opens
The government-funded London cyber innovation centre is set to open today and welcome the first cyber security businesses as a study reveals that a quarter of UK firms lack the right security technology Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Jun 2018
Most infosec pros would trust hacker-tested products
Information security professionals are more likely to trust a product or company tested by hackers and most would respond to security reports from this community, a survey has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Jun 2018
Apple rejects claim of iPhone brute force hack
Apple has rejected claims by a security researcher that he was able to bypass the iPhone defences against brute force passcode hacks Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Jun 2018
UK cyber skills in demand, says Dorset firm C3IA Solutions
UK cyber security skills are in demand and there is a bright future in exporting them, according to Dorset-based firm C3IA Solutions Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Jun 2018
Firms look to automation for cloud security
In the face of increasingly sophisticated and nation-state-sponsored cyber attacks, organisations are looking to managed security services and automation for security in the cloud and on-premise Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Jun 2018
Infosec pros expect increase in nation state cyber attacks
Most information security professionals expect a rise in nation state cyber attacks, with more than two-thirds preparing to defend against them Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Jun 2018
Government sponsors diversity cyber academy
The UK government has awarded a grant for the establishment of a cyber academy to promote neurodiversity in the industry Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Jun 2018
Younger employees 'main culprits' for security breaches
UK senior decision makers believe younger workers are the biggest risk to cyber security, but are doing little to support them and reduce that risk, a report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Jun 2018
Palo Alto Networks opens cyber range in Australia
The first of its kind in Asia-Pacific, the cyber range training facility will let Australian IT and security teams hone their skills through cyber security exercises Continue Reading
By- Aaron Tan, TechTarget
-
E-Zine
20 Jun 2018
CW ANZ: Object storage hits a sweet spot
Enterprises in Australia are only getting started on object storage, which does away with the traditional file directories, making it easier to access and move data in a heterogeneous IT environment. In this issue of CW ANZ, we look at how Australian companies are dipping their toes into object storage, the challenges they are facing and the state of the market. Read the issue now. Continue Reading
-
News
20 Jun 2018
Dutch organisations must unite to fight DDoS attacks
Experts in the Netherlands call on Dutch corporations and institutions to work together to help prevent distributed denial of service attacks Continue Reading
By -
News
20 Jun 2018
Most small businesses fail to act after a cyber attack
Nearly half of small businesses have suffered at least one cyber attack in the past year, yet most fail to take action afterwards, citing lack of budget at the biggest challenge Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Jun 2018
Singapore remains hotbed for cyber threats
Singapore was a victim of advanced persistent threats, phishing and website defacements in 2017, according to the latest threat landscape report by the Cyber Security Agency Continue Reading
By- Aaron Tan, TechTarget
-
News
19 Jun 2018
Surface web used in private data sales
The surface web plays an integral role in the selling of personal information, a report on identify fraud has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
Tip
19 Jun 2018
How white hat hackers can tell you more than threat intelligence
White hat hackers can play a key role in assessing threats lurking on the dark web. Discover what traditional threat intelligence isn't telling you and how white hats can help. Continue Reading
By- David Geer, Geer Communications
-
News
19 Jun 2018
MPs see risk to critical infrastructure as top threat
A majority of MPs are concerned about the cyber threat to critical national infrastructure, a survey has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Jun 2018
Singapore faced cyber attacks during Trump-Kim summit
Russian attackers allegedly scanned IP phones in the city-state for vulnerabilities, although it was unclear what they were after or whether they were successful Continue Reading
By- Aaron Tan, TechTarget
-
News
14 Jun 2018
Encryption is under attack, says Venafi CEO Jeff Hudson
Encryption is one of the fundamental principles on which the internet is built, but this vital technology is under threat from criminals and ill-advised government policies, says Venafi CEO Jeff Hudson Continue Reading
-
News
14 Jun 2018
Cyber attack warnings highlight need to be prepared
Fresh warnings about the vulnerability of national infrastructure to cyber attacks show the need for securing and monitoring associated control systems connected to the internet Continue Reading
By- Warwick Ashford, Senior analyst
-
News
14 Jun 2018
NCSC urges action after Dixons Carphone breach
The National Cyber Security Centre (NCSC) is urging UK business to improve data protection capabilities after Dixons Carphone revealed that millions of payment card and personal data records may have been compromised in a cyber breach Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 Jun 2018
Dixons Carphone admits 'falling short' on data protection
Dixons Carphone has warned that millions of credit card and personal data records may have been compromised in a cyber breach Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Jun 2018
Insurer Beazley meets global challenge to secure mobile workforce
Beazley has stolen a march on other London-market insurers by implementing a versatile global digital workspace with improved security Continue Reading
-
Opinion
12 Jun 2018
Security Think Tank: GDPR requires unprecedented view of data flows
Why is it important to know where data flows, with whom it's shared and where it lives at rest, and what is the best way of achieving this? Continue Reading
By- Yves Le Roux, (ISC)2
-
News
12 Jun 2018
Investigators close Nokia extortion probe without finding a motive or making an arrest
New details of €2m blackmail of Nokia in 2007 emerge as Finland’s NBI calls a halt to its investigation Continue Reading
By- Gerard O'Dwyer
-
News
12 Jun 2018
BT announces “unhackable” quantum-secured network
In the face of the threat that quantum computers could crack many of the encryption methods used to protect highly sensitive data, BT has developed a “quantum-secured” network Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Jun 2018
Email-based cyber attacks gathering momentum
Email-based cyber attacks are gathering momentum and the cost of these attacks are rising, with several hidden costs, a survey of IT professionals in Europe, Middle East and Africa reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Jun 2018
Singapore career website hit by PageUp malware scare
A Singapore government career website was among others affected by a malware attack on an Australian recruitment technology supplier Continue Reading
By- Aaron Tan, TechTarget
-
News
11 Jun 2018
Industry must do more to open up cyber security profession
Talented and successful cyber security researcher and passionate advocate for the profession, James Lyne reveals that he fell into security more by accident than design, and says training and recruitment must change to find and develop talented individuals Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
11 Jun 2018
How Australia is keeping pace with ICS threats
Besides bridging the security gap between IT and operational technology teams, Australia is driving efforts to bolster the security of IoT devices Continue Reading
-
News
11 Jun 2018
Security Think Tank: Data flow visibility is essential to security
Why is it important to know where data flows, with whom it is shared and where it lives at rest, and what is the best way of achieving this? Continue Reading
By- Elisabetta Zaccaria, Secure Chorus
-
News
11 Jun 2018
Coinrail cyber heist highlights need for exchange security
A cyber heist at South Korea’s Coinrail has prompted fresh calls for industry regulations to drive better cyber security at cryptocurrency exchanges Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Jun 2018
APAC remains a hotbed for software piracy
The Asia-Pacific region is still seeing the highest use of unlicensed software installations globally, making enterprises more susceptible to cyber attacks from malware Continue Reading
By- Kimberly Chua
-
News
08 Jun 2018
Parliamentary computers at risk after staff targeted by phone phishing
Police are investigating phone phishing attacks targeted against Parliament. Staff warned not to disclose details of their computers to fraudulent callers. Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
08 Jun 2018
BYOD for mobile ‘a year away’ for Williams F1
Companies in the Williams Group – the Formula One racing operation Williams Grand Prix Engineering and its high-growth sister operation Williams Advanced Engineering – are investing with mobile security front-of-mind to enable more agile working practices within 12 months Continue Reading
-
Opinion
08 Jun 2018
Security Think Tank: Focus on data protection, but do not rely on DLP alone
Why is it important to know where data flows, with whom it's shared and where it lives at rest – and what is the best way of achieving this? Continue Reading
By- Emma Bickerstaffe, Information Security Forum (ISF)
-
News
08 Jun 2018
Businesses must report cyber crime, panel urges
By reporting cyber crimes, private enterprise can help improve national and international cyber defences and bring criminals to justice, according to an expert panel Continue Reading
By- Warwick Ashford, Senior analyst
-
News
07 Jun 2018
Cyber security focus too much on tech, says Domino’s CISO
Many organisations are still focusing only on technology and compliance, which means their cyber defences are not as solid as they think, according to Domino’s Pizza chief information security officer Continue Reading
By- Warwick Ashford, Senior analyst
-
News
07 Jun 2018
IT spending reaches 10-year high as CIOs struggle with digital technology strategy
IT leaders have seen their budgets and headcounts rise for the first time in 10 years, but face challenges implementing their digital strategies Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
07 Jun 2018
Nation state cyber attacks affect all, says former GCHQ boss
Cyber attacks by nation states used to be a small part of the problem for state authorities to address, but now all organisations are potential targets of nation state attacks, according to former GCHQ head Continue Reading
By- Warwick Ashford, Senior analyst
-
News
07 Jun 2018
Business not learning from past cyber security incidents
Businesses are still not getting the basics right and they are not learning from past security incidents, according to world-renowned security blogger and trainer Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
07 Jun 2018
Security Think Tank: Understand data for risk-based protection
Why is it important to know where data flows, with whom it is shared and where it lives at rest, and what is the best way of achieving this? Continue Reading
By- Simon Persin, Turnkey Consulting