IT security
-
News
25 Oct 2024
Dutch critical infrastructure at risk despite high leadership confidence
Stark paradox in Dutch cyber security landscape has business leaders expressing high confidence in their IT infrastructure as cyber attacks rise Continue Reading
-
News
11 Jul 2024
Dutch research firm TNO pictures the SOC of the future
In only a few years, security operations centres will have a different design and layout, and far fewer will remain Continue Reading
-
Definition
21 Jul 2023
invitation to tender (ITT)
An invitation to tender (ITT) is a formal document that is issued by a company or an organization inviting suppliers or contractors to submit a bid for a project or service. Continue Reading
-
Feature
21 Jul 2023
What the Product Security and Telecommunications Infrastructure Act means for UK industry
For years, many network-connected devices have lacked adequate security, putting their users and others at risk of cyber attacks. The UK’s PSTI Act aims to prevent this by mandating minimum security requirements, but what impact will this have on industry? Continue Reading
-
News
21 Jul 2023
Government boosts protection for encryption in Online Safety Bill but civil society groups concerned
House of Lords adopts amendment to require Ofcom to commission a report before requiring technology companies to scan encrypted messages, but drops proposals for judicial oversight Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
20 Jul 2023
Online Safety Bill screening measures amount to ‘prior restraint’
The Open Rights Group is calling on Parliament to reform the Online Safety Bill, on the basis that its content-screening measures would amount to “prior restraint” on freedom of expression Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
20 Jul 2023
Renowned hacker and social engineer Kevin Mitnick dead at 59
Famed hacker and social engineer Kevin Mitnick, who was at one time one of the most wanted cyber criminals in the world, has died peacefully at the age of 59 from complications arising from pancreatic cancer, following a 14-month illness Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Jul 2023
How the DSMA balances security and privacy with press freedom
In a world of information sharing and 24-hour news cycles, the Defence and Security Media Advisory committee have to balance national security and data privacy with freedom of the press Continue Reading
-
News
20 Jul 2023
Attention-seeking KillNet hacktivists becoming more dangerous
The KillNet DDoS gang seems to be becoming more dangerous, but its primary goal remains to create a lot of noise and draw media attention, according to latest analysis Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
20 Jul 2023
Enterprise communication security a growing risk, priority
Enterprise Strategy Group's Dave Gruber discusses survey results on security threats related to the use of email and other communication and collaboration tools. Continue Reading
By- Craig Stedman, Industry Editor
-
Opinion
19 Jul 2023
At the gates – How to survive the era of cyber insecurity
Businesses face more legal risks, a mine field of regulation, and individual liability for failures. Getting the basis right is more important than ever. Continue Reading
By- Alex Cravero, senior associate and Andrew Moir, partner, Herbert Smith Freehills
-
Tip
19 Jul 2023
How to fit customer experience security into your strategy
Most organizations overlook security in their CX strategies. However, with collaboration, personalization, CIAM controls and more, organizations can offer a secure and positive CX. Continue Reading
By- Jessica Groopman, Kaleido Insights
-
Opinion
19 Jul 2023
We have lift off… The opportunities and risks of generative AI
How you can use AI to benefit your business while navigating the risks Continue Reading
By- Melanie Hayes, Nash Squared, and Bill Boorman, Technology & Talent Advisor
-
News
19 Jul 2023
BlackCat and Clop gangs both claim cyber attack on Estée Lauder
Cosmetics conglomerate Estée Lauder is experiencing operational disruption in the wake of a cyber attack that seems to involve two different cyber crime gangs Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Jul 2023
Half of cyber pros engage in risky behaviour at work, report claims
Approximately 55% of security professionals say they have engaged in behaviours they would more usually advise against in the workplace, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Jul 2023
Cyber criminal AI tool WormGPT produces ‘unsettling’ results
A newly discovered generative AI tool dubbed WormGPT is being sold to the cyber criminal underground via the dark web, and poses a significant danger, researchers warn Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
19 Jul 2023
Prepare for quantum to fundamentally change PKI effectiveness
Encryption has always been a fundamental aspect of Public Key Infrastructure but the rise of quantum computing poses a significant threat to this. Thales' John Cullen says post-quantum cryptography may hold the key to safeguarding the future. Continue Reading
By- John Cullen
-
Blog Post
18 Jul 2023
Holidays and Awards – The Perfect Summer Marriage...
Well, it might be 2023, a world of geo-dispersed user bases, flexible working hours and networks that can be accessed and managed from anywhere, anytime but… still half the world of IT disappears ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
News
18 Jul 2023
NATO membership to drive Nordic cyber security sector growth
The Nordic cyber security sector will see increasing demand as Finland and Sweden joint NATO Continue Reading
By- Gerard O'Dwyer
-
News
18 Jul 2023
Critical Adobe ColdFusion flaws chained in ongoing cyber attacks
Two vulnerabilities in Adobe ColdFusion have been chained by threat actors to target victim systems, apparently after one of them was accidentally disclosed Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
17 Jul 2023
Improving the Cyber Resilience of London
The London Cyber Resilience Centre is an umbrella for partnerships to deliver support and services for micro-businesses and sole traders at scale and help address the on-line safety, safeguarding, ... Continue Reading
By- Philip Virgo, Winsafe Ltd
-
Opinion
17 Jul 2023
The essential role of PETs in unlocking the trillion dollar SaaS market
Ahead of the Eyes-Off Data Summit in Dublin, Jack Fitzsimons of Oblivious AI explains why so-called Privacy Enhancing Technologies or PETs may hold the key to unlocking the full potential of SaaS in the enterprise Continue Reading
By- Jack Fitzsimons, Oblivious AI
-
News
17 Jul 2023
Police Scotland use cloud for biometric data despite clear risks
Police Scotland confirms it has stored significant volumes of biometric data on a cloud-based digital evidence sharing system despite major ongoing data protection concerns, bringing into question the effectiveness of the current regulatory approach and the overall legality of using hyperscale public cloud technologies in a policing context Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
17 Jul 2023
AI in cyber security: Distinguishing hype from reality
We know that malicious actors are starting to use artificial intelligence (AI) tools to facilitate attacks, but on the other hand, AI can also be a powerful tool within the hands of cyber security professionals Continue Reading
By- Dhairya Mehta, PA Consulting
-
News
17 Jul 2023
Shift towards ‘smarter’ digital life as broadband security, sustainability become key needs
Cisco survey finds consumer expectations will reshape the needs and economics of the internet Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Opinion
14 Jul 2023
Improve business outcomes by managing data and analytics risk
An effective data and analytics risk and control environment requires a full understanding of data, analytics and AI risks, related risk decisions and their impact on business outcomes Continue Reading
By- Saul Judah
-
News
13 Jul 2023
Civil society groups call on EU to put human rights at centre of AI Act
Dozens of civil society groups are calling on EU institutions to prioritise people and human rights in AI legislation as secretive negotiations begin Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
13 Jul 2023
Microsoft issues new warning over Chinese cyber espionage
A newly uncovered Chinese espionage campaign exploited forged authentication tokens to access its victims’ email accounts, says Microsoft Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Jul 2023
One month after MOVEit: New vulnerabilities found as more victims are named
Five weeks after the mass MOVEit breach, new vulnerabilities in the file transfer tool are coming to light as the Clop cyber crime group continues to terrorise victims. But has the gang bitten off more than it can chew? Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Jul 2023
MPs launch inquiry into government use of data
The Public Administration and Constitutional Affairs Committee is to investigate the possibility of reforming the way government collects and analyses data, and whether the UK census could be scrapped Continue Reading
By -
E-Zine
13 Jul 2023
CW EMEA: Can we trust AI?
Artificial intelligence and the opportunities and dangers it introduces into society has been a hotly debated subject in tech circles for many years, but today with the increased use of platforms such as ChatGPT, these debates include a wider section of the public. The fact that schoolchildren are even asking ChatGPT for help with their homework brings home the importance of these debates and the responses to them by national policy-makers. Continue Reading
- 12 Jul 2023
-
News
12 Jul 2023
Forensic Institute provides Hansken viewing method for Dutch lawyers
Dutch lawyers can now view crypto communication in criminal cases from their own workplace via digital search engine Hansken. Previously, this had to be done at an external location Continue Reading
By- Kim Loohuis
-
News
12 Jul 2023
Ofcom’s online safety preparedness efforts hobbled by government
Despite Ofcom’s progress so far, UK government changes to the scope and timetable of the Online Safety Bill are hobbling the ability of the regulator to successfully prepare for the new regime Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
12 Jul 2023
Cozy Bear lures victims with used BMW 5 Series
A recent Cozy Bear campaign saw the Russian APT group pivot to exploiting an advert for a used car as it targeted diplomatic missions in Kyiv Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Jul 2023
Whistleblower contacts NatWest customers affected by a decade-old data breach
Former worker says contacting the people affected by the data breach is her last resort after the bank and regulators appear satisfied that the sensitive data file is safe stored under her bed Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
12 Jul 2023
Hackers: We won’t let artificial intelligence get the better of us
AI is changing how ethical hackers go about their work, and will continue to do so, but the community is convinced the technology will never be able to replicate the creativity of a flesh-and-blood hacker Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Jul 2023
Microsoft users on high alert over dangerous RCE zero-day
A serious RCE vulnerability in Microsoft Office and Windows is among several zero-days disclosed in Redmond’s July Patch Tuesday update, but this one does not have a patch yet Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
12 Jul 2023
Why we need to research the cybersecurity needs of Micro-Businesses?
Current government policy, from digital inclusion to cyber security is based on allegation, not evidence with regard to the five million microbusinesses and sole traders who account for 30% of the ... Continue Reading
By- Philip Virgo, Winsafe Ltd
-
News
11 Jul 2023
EU formally grants data adequacy to US
The European Commission has formally granted the US data adequacy, allowing companies and organisations to freely transfer personal data across the Atlantic via the EU-US Data Privacy Framework. But privacy activist Max Schrems has already committed to legally challenging the decision Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
11 Jul 2023
Malicious URL volumes soar as cyber criminals pull on Threads
Malicious actors have been quick to exploit the buzz around Meta’s newly launched Threads platform, with thousands of new suspicious domains registered exploiting its branding Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Jul 2023
Apple pushes Rapid Response patch to fix WebKit zero-day
Apple deployed an emergency patch under its Rapid Security Response update programme, but had to temporarily suspend delivery after it caused problems for users of the Safari browser Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
11 Jul 2023
Norwegian data privacy experts sound alarm over generative AI
Hundreds of millions of people embrace generative artificial intelligence, blissfully ignorant of what it’s doing to data privacy. Continue Reading
By- Pat Brans, Pat Brans Associates/Grenoble Ecole de Management
-
Definition
07 Jul 2023
ransomware as a service (RaaS)
Ransomware as a service (RaaS) is a subscription-based business model that enables affiliates to launch ransomware attacks by accessing and using pre-developed ransomware tools. Continue Reading
By- Kinza Yasar, Technical Writer
- Sean Michael Kerner
-
Definition
07 Jul 2023
network intrusion protection system (NIPS)
A network intrusion protection system (NIPS) is an umbrella term for a combination of hardware and software systems that protect computer networks from unauthorized access and malicious activity. Continue Reading
By -
News
07 Jul 2023
Suspicious email reported every five seconds in UK
National Cyber Security Centre report reveals a suspicious email was reported by UK citizens and organisations every five seconds last year Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
07 Jul 2023
JumpCloud issues notice to customers to refresh API keys
JumpCloud has asked its customers to update their API cryptographic keys following a security incident Continue Reading
By- Cliff Saran, Managing Editor
-
News
06 Jul 2023
VMware ramps up on sovereign cloud in APAC
VMware is working with local partners to deliver sovereign cloud services in the region, amid growing sovereignty interests among governments and the need maintain business continuity Continue Reading
By- Aaron Tan, TechTarget
-
News
06 Jul 2023
Vodafone tests quantum-safe business network solutions
Telco announces initiative looking at transition to a quantum safe world, exploring and trialling new algorithms with upgraded smartphones to provide protection against possible quantum-empowered attackers in the future Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
06 Jul 2023
Biometrics watchdog calls for public space surveillance review
The biometrics and surveillance camera commissioner is calling for a review of public space surveillance to gain a clearer picture about the proliferation of Chinese surveillance technology across the public sector, but warns against applying double standards on companies just because they are from China Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
06 Jul 2023
Meta’s Threads hits app stores, but no EU launch in sight
Meta’s Twitter competitor makes its debut and signs up millions of users in just 12 hours, but concerns over compliance with the EU’s Digital Markets Act have sunk a pan-European launch for now Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Jul 2023
Germany: European Court of Justice hears arguments on lawfulness of EncroChat cryptophone evidence
The European Court of Justice will decide whether the collection and sharing of data intercepted by law enforcement from EncroChat crypto phone network is compatible with European law Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
05 Jul 2023
HSBC explores quantum-safe comms to AWS edge
Banking group HSBC is looking at how to secure transactions and the benefits of quantum computing in finance Continue Reading
By- Cliff Saran, Managing Editor
-
News
05 Jul 2023
UK public increasingly concerned over NHS data sovereignty
Amid security concerns and AI advances, a majority of the British public still trusts the NHS to store and analyse their health data, but would prefer it remains domiciled in the UK Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
05 Jul 2023
Dodd-Frank Act
The Dodd-Frank Act (fully known as the Dodd-Frank Wall Street Reform and Consumer Protection Act) is a United States federal law that places regulation of the financial industry in the hands of the government. Continue Reading
-
News
04 Jul 2023
EU judgment sinks Meta’s argument for targeted ads
The EU Court of Justice has issued a significant judgment against Meta, ruling that national anti-trust bodies can investigate GDPR breaches, disrupting the platform’s entire basis for carrying out targeted advertising Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Jul 2023
How Maxeon is forging the path to SASE
Maxeon Solar Technologies is building out its security service edge capabilities with an eye on a SASE implementation that combines best of breed offerings from different suppliers Continue Reading
By- Aaron Tan, TechTarget
-
E-Zine
04 Jul 2023
How data is beating heart disease
In this week’s Computer Weekly, we find out how a new data strategy is helping the British Heart Foundation to raise money and support medical research. We examine the benefits of using AI in advanced malware detection. And we reveal why the Information Commissioner is under fire for weak responses to serious data breaches. Read the issue now. Continue Reading
-
News
03 Jul 2023
Over half of ANZ organisations hit by ransomware
Amid the rising ransomware threat, almost four in five organisations in ANZ expect to pay a ransom if they could recover data and business processes Continue Reading
By- Aaron Tan, TechTarget
- 03 Jul 2023
-
Blog Post
03 Jul 2023
SASE Delivery - Is A PoP always a PoP? What to look for...
In my previous blogs I spoke of the delivery-related problems when there are no local PoPs, or the equivalent technology in place to successfully deliver those services, and how this potentially ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
Blog Post
03 Jul 2023
Top Of The SASE PoPs
In my previous blog I noted how themes occur seemingly from nowhere, that are common among vendors from different spheres of IT. In this particular case it is various vendors I’m working with who ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
News
03 Jul 2023
BlackCat gang claims cyber attack on Barts NHS Trust
Investigations continue into a claim by the ALPHV/BlackCat ransomware gang that it has stolen 7TB of data from Barts NHS Trust in London Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Jun 2023
AI can never be given control over combat decisions, Lords told
Artificial intelligence is technically incapable of distinguishing between the complex contextual factors of combat situations, and will likely never be able to, according to legal and software experts Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Definition
30 Jun 2023
security token
A security token is a physical or wireless device that provides two-factor authentication (2FA) for users to prove their identity in a login process. Continue Reading
By -
News
30 Jun 2023
NHS data stolen in Manchester Uni ransomware attack
The ransomware gang behind the cyber attack on the University of Manchester appears to have got its hands on an NHS dataset being used by the university for research purposes Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
30 Jun 2023
The time to implement an internal AI usage policy is now
As with any emerging technology, AI’s growth in popularity establishes a new attack surface for malicious actors to exploit, thereby introducing new risks and vulnerabilities to an increasingly complex computing landscape. Continue Reading
By- Shailendra Parihar, Turnkey Consulting
-
Opinion
29 Jun 2023
Navigating cyber security under ChatGPT
Balancing the risk and reward of ChatGPT – as a large language model (LLM) and an example of generative AI – begins by performing a risk assessment of the potential of such a powerful tool to cause harm Continue Reading
By- Guy Pearce, ISACA
-
News
29 Jun 2023
‘Shadow’ AI use becoming a driver of insider cyber risk
Off-the-books use of generative AI tools will inevitably lead to a costly, high-profile data breach for someone, but a little attention paid to appropriate data management policy can help mitigate the risk Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
29 Jun 2023
How real and present is the malware threat from AI?
One of the most talked about concerns regarding generative AI is that it could be used to create malicious code. But how real and present is this threat? Continue Reading
By- Rob Dartnall, SecAlliance
-
News
28 Jun 2023
Charity demands transparency in digital universal credit system
The digital universal credit system needs overhauling to ensure greater transparency over benefit claims and more effective means of redress when things go wrong, says child poverty charity Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
28 Jun 2023
GDPR tax reclaim scheme preys on fears of SMEs
IT suppliers are a target of companies offering a tax reclaim scheme that preys on small businesses’ fears around General Data Protection Regulation compliance Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
28 Jun 2023
Stolt-Nielsen SASE looks to optimise global connectivity, security for hybrid workers
Bulk liquid logistics and sustainable land-based aquaculture expert advances secure digital transformation plans and operational efficiency Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
27 Jun 2023
Three years on, EncroChat cryptophone hack nets 6,500 arrests and seizures of €900m
French and Dutch prosecutors say three years after they infiltrated the EncroChat cryptophone network in a novel hacking operation, Europe’s courts are opening the way for more collaboration and data sharing between law enforcement agencies Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
27 Jun 2023
One Login’s Gov.uk ID check apps downloaded over two million times
The One Login digital identity system is being used by eight government services, and GDS has issued more than 1.5 million verified identities since summer 2022, while its ID check apps are proving popular Continue Reading
By -
News
27 Jun 2023
WithSecure forges ahead with green coding initiative
WithSecure’s W/Sustainability programme kickstarts a number of initiatives, including a commitment to green coding the security supplier hopes will set an example for others to follow Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Jun 2023
3,600 potential cyber security experts apply to government scheme
The UK government’s Upskill in Cyber programme is reporting great success just a month after launch, with almost half of applicants women Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Jun 2023
A tenth of kids claim they could hack you
More and more young people are at risk of being drawn into cyber criminality, and parents must shoulder some of the blame, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
26 Jun 2023
Could social media revolutionise war crimes trials?
Computer Weekly speaks with open source investigators about how they use social media to gather evidence of war crimes, and the trouble with using such evidence in legal proceedings Continue Reading
-
Podcast
26 Jun 2023
AI cyber monitoring: A Computer Weekly Downtime Upload podcast
In this podcast, Darktrace’s Max Heinemeyer discusses the good – and the bad – to come out of artificial intelligence in IT security Continue Reading
By- Cliff Saran, Managing Editor
-
Opinion
26 Jun 2023
ChatGPT’s phishing ‘problem’ may not be overstated
Some data now suggests that threat actors are indeed using ChatGPT to craft malicious phishing emails, but the industry is doing its best to get out in front of this trend, according to the threat intelligence team at Egress Continue Reading
By- Jack Chapman
-
News
23 Jun 2023
ICO under fire for taking limited action over serious data breaches
The ICO has come under fire from lawyers and data protection specialists for just issuing written warnings to two public bodies over serious data breaches that placed people’s lives at risk Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Feature
23 Jun 2023
Generative AI: Data privacy, backup and compliance
We look at generative AI and the risks it poses to data privacy for the enterprise, implications for backup, and potentially dangerous impacts on compliance Continue Reading
-
News
23 Jun 2023
Phishing and ransomware dominate Singapore’s cyber threat landscape
Phishing and ransomware attacks continued apace in Singapore last year amid signs of improving cyber hygiene Continue Reading
By- Aaron Tan, TechTarget
-
News
22 Jun 2023
Lancaster University launches trailblazing cyber MBA
MBA programme at Lancaster University designed to deliver security leadership education to business leaders has received NCSC backing Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Jun 2023
Manchester University students threatened by ransomware gang
Students and staff members at the University of Manchester are being pressurised by an unnamed ransomware gang Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Jun 2023
Orange Business leads team to deliver cloud-native managed SASE to enterprises
Enterprise division of the global telco taps in-house cyber security practice and leading cyber security technology provider to offer simpler operational model for customers with end-to-end accountability, improved agility, efficiency and performance Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
21 Jun 2023
Nearly quarter of a million malicious websites reported and removed through NCSC service
A suspicious email and text message reporting service in the UK has directly led to a quarter of a million malicious websites being removed Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Definition
21 Jun 2023
Nessus
Nessus is a platform developed by Tenable that scans for security vulnerabilities in devices, applications, operating systems, cloud services and other network resources. Continue Reading
By -
Podcast
21 Jun 2023
Podcast: Cloud security, compliance and data classification
The rise of cloud has led to a proliferation of enterprise data and a rise in risk. We talk to Vigitrust CEO Mathieu Gorge about how to ensure compliance in a multicloud world Continue Reading
By- Antony Adshead, Storage Editor
-
News
21 Jun 2023
The security interviews: Exploiting AI for good and for bad
The chief product officer of AI security firm Darktrace explains how large language AI models are making it harder for people to spot email attacks Continue Reading
By- Cliff Saran, Managing Editor
-
Feature
20 Jun 2023
ChatGPT is creating a legal and compliance headache for business
ChatGPT’s increased use in the workplace has led many to question its legal and compliance implications for businesses. Experts warn that the software poses major security and copyright risks Continue Reading
-
Definition
19 Jun 2023
PCI compliance
PCI compliance is adherence to the set of policies and procedures developed to protect credit, debit and cash card transactions and prevent the misuse of cardholders' personal information. Continue Reading
By- Nick Barney, Technology Writer
- Ben Cole, Executive Editor
-
News
19 Jun 2023
Prime minister Rishi Sunak faces pressure from banks to force tech firms to pay for online fraud
The UK’s major banks have told the prime minister to force tech firms to do more to prevent fraud that the banks end up paying for Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
19 Jun 2023
How Fastly thinks differently about CDNs and the edge
Fastly is counting on its developer chops and different approaches towards security and other areas to compete with its rivals Continue Reading
By- Aaron Tan, TechTarget
-
News
19 Jun 2023
Early June Microsoft outages were result of large-scale DDoS hit
Investigations into recent outages on Microsoft Azure and Outlook services have turned up evidence of a massive distributed denial-of-service attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Jun 2023
Nakivo adds ransomware scanning and new restore options
Backup maker adds malware scanning with big names in security to immutable backup copy functionality. “Tape’s not dead” either, with restore from the venerable medium now possible Continue Reading
By- Antony Adshead, Storage Editor
-
News
19 Jun 2023
UK to contribute up to £25m to Ukraine cyber defences
Prime minister Rishi Sunak announces an expansion to the Ukraine Cyber Programme, with a cash boost of up to £25m over the next two years Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Jun 2023
Exploitation of Barracuda ESG appliances linked to Chinese spies
Intelligence from Mandiant links exploitation of a flaw in a subset of Barracuda ESG appliances to a previously untracked China-nexus threat actor Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Jun 2023
NCSC warns over ‘enduring’ LockBit threat
Although its activity volumes have been lower of late, LockBit is still a highly dangerous ransomware gang and is now the subject of a new international cyber advisory Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Jun 2023
Clop begins naming alleged MOVEit victims
Clop uploaded details of 12 new victims to its dark web leak site late on 14 June, many of them likely linked to the ongoing MOVEit cyber attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Jun 2023
Ransomware-stricken Capita to run Action Fraud successor
A £50m deal to replace the Action Fraud service has been handed to PwC and Capita, which is facing investigations over its handling of customer data in a ransomware incident Continue Reading
By- Alex Scroxton, Security Editor