IT security
-
News
08 Aug 2025
OpenAI closes gap to artificial general intelligence with GPT-5
As OpenAI’s latest large language model delivers smarter AI, experts are wary of the risks GPT-5 poses to human creativity Continue Reading
By- Cliff Saran, Managing Editor
-
News
06 Aug 2025
Black Hat USA: Startup breaks secrets management tools
Researchers at Cyata, an agentic identity specialist that has just emerged from stealth, found 14 CVEs in the widely used CyberArk Conjur and HashiCorp Vault enterprise secrets management platforms Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
05 Dec 2023
offensive security
Offensive security is the practice of actively seeking out vulnerabilities in an organization's cybersecurity. Continue Reading
By -
Feature
05 Dec 2023
How to recover systems in the event of a cyber attack
Recovering compromised systems after a cyber attack isn’t easy, but understanding industry best practice offers a template for the key processes to follow Continue Reading
-
News
05 Dec 2023
Operator of Sellafield nuclear facility denies hacking claims
The operator of the Sellafield nuclear site has denied allegations that senior managers covered up a series of cyber security lapses that enabled Chinese and Russian threat actors to compromise its networks Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
05 Dec 2023
Technologies to support hybrid working
In this week’s Computer Weekly, our latest buyer’s guide looks at technologies to support hybrid working – even when your business is as unique as farming. We examine the new guidelines on AI cyber security published by G7 government security chiefs. And we find out how the Jaguar Formula E racing team is using digital twins to improve electric vehicle performance. Read the issue now. Continue Reading
-
Definition
04 Dec 2023
PCAOB (Public Company Accounting Oversight Board)
The Public Company Accounting Oversight Board (PCAOB) is a congressionally established nonprofit that assesses audits of public companies in the United States to protect investors' interests. Continue Reading
By- Ben Cole, Executive Editor
-
News
04 Dec 2023
Rhysida ransomware gang hits hospital holding royal family’s data
Ransomware gang boasts of having stolen data on the royal family in an attack on a private London hospital Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
04 Dec 2023
Cyber and remote working: How Covid moved the cursor
Remote working has enabled people to work from almost anywhere but has piled pressure on cyber pros. Three years after Covid, how are best practices evolving and what can we expect going forward? Continue Reading
By- Lionel Garacotche
-
04 Dec 2023
What are the cyber risks from the latest Middle Eastern conflict?
The outbreak of war between Hamas and Israel in October 2023 has seen a wide variety of accompanying cyber attacks from hacktivists and other groups. We look at the risks to organisations Continue Reading
-
News
01 Dec 2023
Human augmentation tech requires dual use oversight
Researchers investigating human augmentation technologies must acknowledge the potential military applications of their work, and military bodies cannot be allowed to dismiss ethical concerns in their pursuit of national security interests, says NGO Drone Wars UK Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
01 Dec 2023
National Cyber Security Centre publishes landmark guidelines on AI cyber security
The NCSC and its US counterpart CISA have brought together tech companies and governments to agree new guidelines to promote a secure-by-design culture in artificial intelligence development. Continue Reading
-
01 Dec 2023
Supporting a hybrid workforce
The now permanent shift to cloud services and the necessity of dealing with a hybrid workforce have changed modern IT Continue Reading
-
News
01 Dec 2023
Report reveals sorry state of cyber security at UK football clubs
Football clubs up and down the country are putting staff, players and fans alike at risk through outdated attitudes to cyber security, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
News
01 Dec 2023
Lords committee urges caution on UK use of autonomous weapons
UK government must ensure proper democratic oversight of its development and use of AI-powered weapon systems, says Lords committee Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
01 Dec 2023
The Security Interviews: Mark McClain, SailPoint Technologies
SailPoint founder and CEO Mark McClain reflects on how the concept of identity has evolved over the past 20 years, and points to rapid evolution still to come Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
01 Dec 2023
Security Think Tank: Four steps to secure remote workers
Remote working has enabled people to work from almost anywhere but has piled pressure on cyber pros. Three years after Covid, how are best practices evolving and what can we expect going forward? Continue Reading
By- Olivia Rofe
-
Definition
30 Nov 2023
privacy policy
A privacy policy is a legal document that explains how an organization handles any customer, client or employee information gathered in its operations. Continue Reading
By -
Opinion
30 Nov 2023
Prepare for your worst day: How to create a cyber incident response plan
What goes into a good incident response plan, and what steps should security professionals take to ensure they are appropriately prepared for the almost inevitable attack, and secure buy-in from organisational leadership? Continue Reading
By- James Allman-Talbot
-
News
30 Nov 2023
Government’s Online Fraud Charter welcomed
The government has corralled 11 of the largest tech platforms in the world to commit to its Online Fraud Charter, designed to tackle online scams, fake adverts, and more Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Nov 2023
Rhysida gang stole hundreds of gigabytes of British Library data
The Rhysida ransomware gang behind the cyber attack on the British Library has published almost 600GB of stolen data to its dark web leak site Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Nov 2023
Law enforcement dismembers major ransomware operation in Ukraine
A joint law enforcement operation between the Ukrainian authorities, Europol and Eurojust has seem five ransomware operators taken into custody Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Nov 2023
Scope of Okta helpdesk breach widens to impact all users
Okta has widened the scope of the October breach of its systems to include every customer that has used its helpdesk service, after new information came to light Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
28 Nov 2023
timing attack
A timing attack is a type of side-channel attack that exploits the amount of time a computer process runs to gain knowledge about or access a system. Continue Reading
By -
News
28 Nov 2023
Meta faces GDPR complaint over processing personal data without 'free consent'
Paid-for service means data protection is only available to those who can afford it, privacy group argues in data protection complaint Continue Reading
By- Bill Goodwin, Investigations Editor
-
Definition
28 Nov 2023
privileged identity management (PIM)
Privileged identity management (PIM) is the monitoring and protection of superuser accounts that hold expanded access to an organization's IT environments. Continue Reading
By -
News
28 Nov 2023
Scope of British Library data breach widens
Personal data on British Library users has appeared for sale on the dark web following a Rhysida ransomware attack, as the scope of the still-developing incident widens again Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Nov 2023
Volume of unique malware samples threatens to overwhelm defenders
A massive increase in malware volumes could cause problems for security teams tasked with adapting their defences against them Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
27 Nov 2023
How passwordless authentication aids identity security
Enterprise Strategy Group's Jack Poller discusses survey results on user authentication practices and explains the security benefits of passwordless methods. Continue Reading
By- Craig Stedman, Industry Editor
-
News
27 Nov 2023
The Security Interviews: Zeki Turedi, field CTO Europe, CrowdStrike
Organisations are racing to keep their security up to date against the latest threats. CrowdStrike’s Zeki Turedi explains how to protect against novel and innovative cyber attacks Continue Reading
-
News
27 Nov 2023
NCSC publishes landmark guidelines on AI cyber security
The NCSC and its US counterpart CISA have brought together tech companies and governments to countersign a new set of guidelines aimed at promoting a secure-by-design culture in AI development Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
24 Nov 2023
DORA raises the stakes for cloud use in financial services
The EU's DORA regulations will raise the stakes for cloud in financial services but resilience is more than just a tech issue, says NetApp's Steve Rackham Continue Reading
By- Steve Rackham
-
News
24 Nov 2023
UK police plan national roll-out of facial-recognition phone app
UK police chiefs plan to expand use of facial-recognition technology through a nationwide roll-out of mobile-based tools and increases in retrospective facial-recognition, but oversight problems persist Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Blog Post
24 Nov 2023
Was the devil's greatest trick making you think tech CEOs are just people?
It’s been one of those weeks where tech makes headlines for all the wrong reasons. (Sadly, the wrong reasons are often the only reasons tech makes national headlines, but anyway…) There was much ... Continue Reading
By- Bryan Glick, Editor in chief
-
News
24 Nov 2023
APAC organisations warm to microsegmentation
Nearly two-thirds of organisations in the APAC region see microsegmentation as a way to protect their IT assets, but lack the skills to deploy the technology Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
23 Nov 2023
MOVEit incident spurred UK decision makers to spend big on cyber
The MOVEit cyber attacks that unfolded in the spring and summer of 2023 seem to have driven an increase in both ransomware awareness and spend, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Nov 2023
Expereo on tap for Carlsberg to deliver connectivity in 40 countries
SD-WAN/SASE and internet provider brings brewing giant ‘unrivalled’ connectivity in global network Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Opinion
23 Nov 2023
Navigating the DPDI Bill: A transformative shift ahead
The Data Protection and Digital Information (No. 2) Bill, or DPDI, is set to reshape the UK’s data protection framework. Louise Brooks of DQM GRC considers the implications Continue Reading
By- Louise Brooks, DQM GRC
-
News
23 Nov 2023
North Korean APTs go all in on supply chain attacks, warns NCSC
Threat actors linked to the North Korean regime are becoming more adept at targeting software supply chains in the service of their cyber attacks Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Nov 2023
Australia ups ante on cyber security
Australia’s new cyber security strategy will focus on building threat-blocking capabilities, protecting critical infrastructure and improving the cyber workforce, among other priorities Continue Reading
-
News
22 Nov 2023
An inside look at a Scattered Spider cyber attack
Threat researchers at ReliaQuest share the inside track on a Scattered Spider cyber attack they investigated Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Nov 2023
Palantir awarded NHS FDP data contract
NHS England has awarded a £330m, seven-year contract to US data specialist Palantir, prompting concerns from data privacy practitioners Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Nov 2023
CISA reveals how LockBit hacked Boeing via Citrix Bleed
As alarm grows around the world about the impact of the so-called Citrix Bleed vulnerability, Boeing has shared details of its experience at the hands of the LockBit ransomware crew Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
21 Nov 2023
possession factor
The possession factor, in a security context, is a category of user authentication credentials based on items that the user has with them, typically a hardware device such as a security token or a mobile phone used in conjunction with a software token. Continue Reading
By -
News
21 Nov 2023
Over half of SME cyber incidents now ‘malware-free’
The age of malware-driven cyber attacks may have peaked, at least when it comes to incidents affecting small and medium sized enterprises Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Nov 2023
Canada’s Mounties among government employees hit by LockBit
A LockBit attack on a specialist supplier of relocation services has engulfed multiple government agencies in Canada Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Nov 2023
The ‘application generation’ demands more from developers
The latest Cisco AppDynamics poll of consumers has identified a new breed of app user that has emerged post-pandemic Continue Reading
By- Cliff Saran, Managing Editor
-
Opinion
21 Nov 2023
Why transparency and accountability are important in cyber security
If we accept that the humans who build technology and systems are naturally fallible and mistakes inevitable, and then deal with that with good grace, we could do much to improve cyber standards, writes Bugcrowd's Casey Ellis Continue Reading
By- Casey Ellis
-
News
21 Nov 2023
Internal documents leaked as Rhysida claims responsibility for British Library ransomware attack
Ransomware group Rhysida threatens to sell documents stolen from the British Library to the highest bidder Continue Reading
By- Bill Goodwin, Investigations Editor
-
E-Zine
21 Nov 2023
Can AI take education to a new level?
In this week’s Computer Weekly, we examine how large language models are being used to teach, support and assess students, enhancing education rather than impairing it. We look at how the AI revolution is impacting the semiconductor sector as the big tech companies put off server upgrades. And we find out how generative AI is changing the way enterprise software works. Read the issue now. Continue Reading
-
News
20 Nov 2023
Kingfisher develops AI-agnostic platform to power DIY assistant
The platform provides a framework for security and compliance and enables developers to test different large language models Continue Reading
By- Cliff Saran, Managing Editor
-
News
20 Nov 2023
Cubbit DS3 Composer brings DIY cloud to object storage pool
Cubbit customers can now build and configure S3-compatible clouds from unused capacity and offer MSP-grade services with high levels of resilience, security and data sovereignty Continue Reading
By- Antony Adshead, Storage Editor
-
News
20 Nov 2023
IT not ready for AI, Pure Storage survey finds
Storage, compute and networking hardware won’t cope without upgrades, and that often means total IT infrastructure overhaul Continue Reading
By- Antony Adshead, Storage Editor
-
News
20 Nov 2023
Defence lawyers seek appeal of tribunal ruling on police EncroChat cryptophone hack
Defence lawyers are seeking leave to appeal against a tribunal ruling that found the National Crime Agency had lawfully obtained warrants to access messages from 9,000 cryptophones used in the UK Continue Reading
By- Bill Goodwin, Investigations Editor
-
Opinion
20 Nov 2023
Security incident response teams are human, too
What goes into a good incident response plan, and what steps should security professionals take to ensure they are appropriately prepared for the almost inevitable attack, and secure buy-in from organisational leadership? Continue Reading
By- Mandy Andress, Elastic
-
Podcast
17 Nov 2023
Walmart’s enterprise software: A Computer Weekly Downtime Upload podcast
We speak to Walmart’s David Glick about the build/buy debate and how the retailer works with large language models Continue Reading
By- Cliff Saran, Managing Editor
-
News
17 Nov 2023
Microsoft and Meta quizzed on AI copyright
Large language models are trained using vast amounts of public data – but do the hyperscalers comply with copyright laws? Continue Reading
By- Cliff Saran, Managing Editor
-
Definition
16 Nov 2023
Automated Clearing House fraud (ACH fraud)
ACH fraud is the theft of funds through the U.S. Department of the Treasury's Automated Clearing House financial transaction network. Continue Reading
By -
News
16 Nov 2023
Royal Mail spent £10m on cyber measures after LockBit attack
Royal Mail has spent approximately £10m on recovery and improved cyber resilience measures in the wake of the January 2023 LockBit ransomware attack Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
16 Nov 2023
Custom chatbots and model gardens: putting Private AI to work
Part 2: More to think about It’s essential to decide where to run your Private AI - or who you will get to run it for you, in some cases - but that is just the start. Assuming that you also want ... Continue Reading
By- Bryan Betts, Freeform Dynamics
-
News
16 Nov 2023
Outgoing police tech watchdog warns of declining oversight
The outgoing biometrics and surveillance camera commissioner for England and Wales discusses police deployment of powerful new surveillance technologies, and the declining state of oversight in this area Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
16 Nov 2023
Ransomware gang grasses up uncooperative victim to US regulator
The ALPHV/BlackCat ransomware gang has added a new tactic to its playbook, going to ever more extreme lengths in search of a pay-off Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 Nov 2023
British Library’s Halloween cyber scare was ransomware
The British Library has provided an update on an ongoing cyber incident affecting its systems, confirming it to be the result of a ransomware attack Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
16 Nov 2023
Understanding the rise and role of Private AI
Part 1: AI hype vs fear and doubt The leakage of proprietary IP and other data has been one of the biggest corporate fears around generative AI since the launch of ChatGPT. Some companies even ... Continue Reading
By- Bryan Betts, Freeform Dynamics
-
News
15 Nov 2023
BlackCat affiliate seen using malvertising to spread ransomware
Researchers at eSentire identified a wave activity from an ALPHV/BlackCat ransomware affiliate which has adopted a somewhat unusual approach to delivering its locker Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Nov 2023
Russian cyber criminal pleads guilty to running IPStorm botnet
Sergey Manikin faces years in jail after his illicit proxy botnet service was taken down by US law enforcement Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Nov 2023
November Patch Tuesday heralds five new MS zero-days
Microsoft pushes fixes for five new zero-days in its latest monthly update Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Nov 2023
US government reinforces ICBC hack link to Citrix Bleed
US Treasury adds weight to reports that a ransomware gang gained access to the systems of Chinese bank ICBC by exploiting a critical Citrix flaw Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Nov 2023
How Gigamon is making its mark in deep observability
Gigamon CEO Shane Buckley talks up the company’s ability to inspect encrypted network traffic for malicious activity, how it stands out with its deep observability capabilities and the tailwinds that are fuelling its growth Continue Reading
By- Aaron Tan, Informa TechTarget
-
Definition
14 Nov 2023
cardholder data environment (CDE)
A cardholder data environment (CDE) is a computer system or networked group of IT systems that processes, stores or transmits cardholder data or sensitive payment authentication data. Continue Reading
By- Rahul Awati
- Sharon Shea, Executive Editor
-
News
14 Nov 2023
Fast-acting cyber gangs increasingly disabling telemetry logs
Sophos guidance for security practitioners and defenders highlights a growing trend for threat actors to disable or wipe telemetry logs to cover their tracks Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
14 Nov 2023
The UK AI Safety Summit – what did it achieve?
In this week’s Computer Weekly, we look back at the UK government’s AI Safety Summit and assess what it achieved – and what it didn’t. Our latest buyer’s guide examines the future of business software and modernising legacy applications. And we find out how the UK Product Security and Telecommunications Infrastructure Act aims to protect your smart devices. Read the issue now. Continue Reading
-
News
13 Nov 2023
Rogue state-aligned actors are most critical cyber threat to UK
The prospect of rogue nation-state-aligned attackers bringing down the UK’s critical infrastructure is keeping the NCSC up at night Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Nov 2023
Lloyds Bank warns over rising threat of crypto scams
Report by Lloyds Banking Group finds there has been a 23% increase in cryptocurrency scams in 2023 compared with last year, targeting mostly younger investors Continue Reading
By- Scarlet Charles
-
News
13 Nov 2023
Encrypted mail service Tuta says it was wrongly accused of being a front for intelligence services
German encrypted email service Tuta, formerly known as Tutanota, has denied claims by a former Canadian police intelligence officer accused of passing secrets to criminals that it was compromised by intelligence services Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
13 Nov 2023
Victims’ legal action over 2015 Carphone Warehouse breach moves forward
A class action against Currys Retail over the 2015 data breach of Carphone Warehouse customers has been granted permission to move forward in the courts Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Nov 2023
ICO alerted after technical ‘issue’ exposed college files to student barristers
A training college for barristers has reported a data breach that left sensitive data on hundreds of current and former students accessible to other trainees Continue Reading
By -
Opinion
10 Nov 2023
Breached? Don't panic… if you created a robust IR plan
What goes into a good incident response plan, and what steps should security professionals take to ensure they are appropriately prepared for the almost inevitable attack, and secure buy-in from organisational leadership? Continue Reading
By- Paul Lewis, Nominet
-
News
10 Nov 2023
UN disarmament body calls for global action on autonomous weapons
UN draft resolution highlighting the dangers of autonomous weapons passes with overwhelming majority Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
10 Nov 2023
How the Online Safety Act will impact businesses beyond Big Tech
The Online Safety Act will impact an estimated 100,000 online services in the UK and overseas Continue Reading
By- Ria Moody, Linklaters
-
News
10 Nov 2023
Ransomware attack on major Chinese lender disrupts financial markets
The financial services arm of one of the world’s largest banks was taken offline by a supposed LockBit ransomware attack, causing problems for US markets Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Nov 2023
APAC cyber security workforce hits record high
The cyber security workforce in Asia-Pacific now stands at just under a million people, but demand for cyber security talent in the region continues to outpace supply Continue Reading
By- Aaron Tan, Informa TechTarget
-
Definition
09 Nov 2023
crisis communication
Crisis communication is a strategic approach to corresponding with people and organizations during a disruptive event. Continue Reading
By- Rahul Awati
- Paul Crocetti, Editorial Director
-
Definition
09 Nov 2023
emergency communications plan (EC plan)
An emergency communications plan (EC plan) is a document that provides guidelines, contact information and procedures for how information should be shared during all phases of an unexpected occurrence that requires immediate action. Continue Reading
By- Rahul Awati
- Paul Crocetti, Editorial Director
-
News
09 Nov 2023
Revealed: How Russia’s Sandworm ramped up attacks on Ukraine’s critical infrastructure
New Mandiant intelligence reveals how the APT known as Sandworm has been evolving its playbook, twisting legitimate executables known as LoLBins into malicious tools as it seeks to disrupt daily life in Ukraine Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
09 Nov 2023
mandatory access control (MAC)
Mandatory access control (MAC) is a security strategy that restricts the ability individual resource owners have to grant or deny access to resource objects in a file system. Continue Reading
By -
Opinion
09 Nov 2023
The best IR plans are well-revised and deeply familiar
What goes into a good incident response plan, and what steps should security professionals take to ensure they are appropriately prepared for the almost inevitable attack, and secure buy-in from organisational leadership? Continue Reading
By- Elliott Wilkes
-
News
09 Nov 2023
NCSC makes annual Black Friday plea to consumers
Ahead of the annual festival of retail avarice, the NCSC is once again asking consumers to do the bare minimum to avoid falling victim to scams Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Nov 2023
Suspected ransomware attack hits Scottish council
Systems at Comhairle nan Eilean Siar were downed on 7 November in a suspected ransomware attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Nov 2023
UK government does not see need for specific AI legislation
The UK government does not currently see the need for new artificial intelligence legislation, as many regulators are already dealing effectively with AI-related harms Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
09 Nov 2023
The Security Interviews: Why cyber needs to integrate better
Cyber security is an intensely technical field, but we shouldn’t ignore the soft skills of communication and collaboration. Wipro’s Tony Buffomante explains why a robust security posture is dependent on a security team engaging with the wider organisation Continue Reading
-
News
09 Nov 2023
Why IT governance is a coding issue
Two new pieces of research point to benefits of policy as code Continue Reading
By- Cliff Saran, Managing Editor
-
E-Zine
09 Nov 2023
Heineken lets the data flow
In this month’s CW EMEA ezine, we find out about Heineken’s mission to make the most out of the data it holds through an enterprise-wide data ecosystem. We also look at how the UK has turned its back on the German government-funded Gaia-X data platform, why cyber experts are urging the EU to rethink vulnerability disclosure plans, and how the IT industry is responding to the software developer skills shortfall. Read the issue now. Continue Reading
-
News
08 Nov 2023
Data-sharing management gap highlights cyber risk, says report
Organisations are struggling to secure their use of communications tools to share data with third-party partners and suppliers, and in the process are exposing themselves to heightened levels of risk, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
08 Nov 2023
The plan for the inevitable cyber attack: Get the gist of NIST
What goes into a good incident response plan, and what steps should security professionals take to ensure they are appropriately prepared for the almost inevitable attack, and secure buy-in from organisational leadership? Continue Reading
By- Theodore Wiggins, Airbus Protect
-
News
08 Nov 2023
Iconic Singapore hotel caught up in major data breach
The Marina Bay Sands resort in Singapore uncovered a data breach of its guest loyalty programme last month Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Nov 2023
King’s Speech misses the mark on cyber law reform, says campaign
A group of activists who want to reform the UK’s computer misuse laws to protect bona fide cyber pros from prosecution have been left disappointed by a lack of legislative progress Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Nov 2023
The Security Interviews: ISC2’s Clar Rosso on cyber diversity and policy
Computer Weekly catches up with ISC2 CEO Clar Rosso to talk about diversifying the cyber workforce and supporting cyber pros as they keep up with growing compliance and security policy demands Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
08 Nov 2023
call tree
A call tree is a layered hierarchical communication model used to notify specific individuals of an event and coordinate recovery if necessary. Continue Reading
By- Rahul Awati
- Paul Crocetti, Editorial Director
-
Definition
07 Nov 2023
dark web monitoring
Dark web monitoring is the process of searching for and continuously tracking information on the dark web. Continue Reading
By- Ben Lutkevich, Site Editor
-
News
07 Nov 2023
Researchers ‘break’ rule designed to guard against Barracuda vulnerability
Vectra AI researchers found that a Suricata rule designed to detect exploitation of a dangerous Barracuda Email Security Gateway flaw was not entirely effective Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
07 Nov 2023
Enhancing security: The crucial role of incident response plans
What goes into a good incident response plan, and what steps should security professionals take to ensure they are appropriately prepared for the almost inevitable attack, and secure buy-in from organisational leadership? Continue Reading
By- Chris McGowan