IT security
-
News
12 Jun 2025
UKtech50 2025: the longlist of the UK’s influential tech leaders
Each year, Computer Weekly launches a search for the most influential people in UK IT, asking the tech community who it thinks should be in the top 50 – here is the longlist of everyone nominated for 2025 Continue Reading
By -
News
12 Jun 2025
Apple encryption row: Does law enforcement need to use Technical Capability Notices?
History shows that law enforcement can bring successful prosecutions without the need for the Home Office to introduce ‘backdoors’ into end-to-end encryption Continue Reading
-
News
22 Dec 2022
Top 10 cyber crime stories of 2022
Cyber crime continued to hit the headlines in 2022, with impactful cyber attacks abounding, digitally enabled fraud ever more widespread and plenty of ransomware incidents Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Dec 2022
Top 10 ANZ IT stories of 2022
We recap the top 10 stories in Australia and New Zealand, including the opportunities and challenges that organisations in the region have faced over the past year Continue Reading
By- Aaron Tan, Informa TechTarget
-
Definition
21 Dec 2022
hotfix
A hotfix is code -- sometimes called a patch -- that fixes a bug in a product. Continue Reading
By- Ben Lutkevich, Site Editor
-
Feature
21 Dec 2022
A sticky story: How, and why, hackers love stickers on laptops
We’ve all seen laptops adorned with security stickers and in-jokes, but how did this cyber community trend get started, what does it signify, and what does it say about the humans behind the screens? Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
21 Dec 2022
Post-Brexit cyber dynamics in the UK and Europe: diverging paradigms?
The UK faces a choice in terms of its ongoing cyber security relationship with the EU – to preserve its collaboration with the EU by adopting an aligned approach or to adopt a divergent approach Continue Reading
By- Quentin Toussaint and Dominic Trott
-
Definition
20 Dec 2022
surveillance capitalism
Surveillance capitalism is an economic theory proposed by Harvard Business School Professor Emerita Shoshana Zuboff in 2014 that describes the modern, mass monetization of individuals' raw personal data in order to predict and modify their behavior. Continue Reading
By- Nick Barney, Technology Writer
- Ivy Wigmore
-
News
20 Dec 2022
Top 10 software development stories of 2022
We look at how software development has adapted to the changing economic climate over the past 12 months Continue Reading
By- Cliff Saran, Managing Editor
-
Opinion
19 Dec 2022
Security Think Tank: 2022 brought plenty of learning opportunities in cyber
At the end of another busy 12 months, Turnkey Consulting’s Andrew Morris sums up some of the most important takeaways for cyber pros Continue Reading
By- Andrew Morris, Turnkey Consulting
-
Definition
19 Dec 2022
cyberbullying
Cyberbullying is a type of bullying in which one or more individuals use digital technologies to intentionally and repeatedly cause harm to another person. Continue Reading
-
News
16 Dec 2022
Shiseido data breach victims plan legal action over fake companies
Employees and former employees of cosmetics firm Shiseido whose data was stolen in a recent breach are planning group legal action after their information was used to establish fraudulent companies in their names Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 Dec 2022
Defence lawyers claim NCA witness gave unreliable evidence on EncroChat hacking operation
National Crime Agency argues that the lawfulness of surveillance warrants issued to hack the EncroChat phone network should only be considered in the light of facts and assessments known at the time Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
16 Dec 2022
UK unis implement new IP traffic policies to combat ransomware
Jisc will introduce new measures to protect UK universities and research institutions from ransomware attacks that exploit the Remote Desktop Protocol remote-access feature Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Dec 2022
Lego fixes dangerous API vulnerability in BrickLink service
The Lego Group has remediated two potentially serious API vulnerabilities in its BrickLink digital resale platform, just in time for Christmas Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Dec 2022
Cops dismantle 48 DDoS-for-hire websites
An operation combining law enforcement from the UK, US, Netherlands and Europol has disrupted 48 of the world’s most popular DDoS booter websites Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Dec 2022
NCA officer questioned in Investigatory Powers Tribunal over failure to disclose EncroChat notes
EncroChat hacking warrant was unlawful and in breach of human rights law, the Investigatory Powers Tribunal hears Continue Reading
By- Bill Goodwin, Computer Weekly
- Sebastian Klovig Skelton, Data & ethics editor
-
News
14 Dec 2022
Private health provider data could be shared with NHS England
Plans are advancing to create a single source of healthcare data in England combining both private providers and the NHS to avoid a repeat of the Ian Paterson scandal Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Dec 2022
Advanced Azov data wiper likely to become active threat
Check Point deep dives into an emergent data wiper strain known as Azov, which is making waves with hundreds of new samples being submitted to VirusTotal daily Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Dec 2022
NHS gets new guidance on public benefits of data sharing
NHS national data guardian Nicola Byrne has published new guidance on how health and social care bodies should approach the task of evaluating public benefit when using data for purposes beyond individual care Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Dec 2022
Ethical hackers flex their muscles in 2022
Ethical hackers working through HackerOne programmes found 21% more vulnerabilities in 2022 than in 2021 Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Dec 2022
Microsoft fixes two zero-days in final Patch Tuesday of 2022
December’s Patch Tuesday is typically a light month for Microsoft, and this year proved no exception, but there are still several critical issues worth addressing, and two zero-days for defenders to pore over Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Dec 2022
New cyber approaches ease Registers of Scotland’s AWS migration
As the holder of the oldest national public land register in the world, Registers of Scotland has a storied history dating back centuries. Find out how Palo Alto Networks is keeping its processes and data secure as it goes all-in on Amazon Web Services Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
14 Dec 2022
Security Think Tank: How much digital trust can you place on zero-trust?
The events of the past couple of years have highlighted many considerations that should be taken into consideration when pursuing a zero-trust strategy, says ISACA’s Steven Sim Kok Leong Continue Reading
By- Steven Sim Kok Leong
-
News
13 Dec 2022
Crime Stoppers Tasmania debuts new reporting portal
Reporting tool will enable the public to share crime-related information with law enforcement agencies to support policing in Tasmania Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
13 Dec 2022
EU issues draft data adequacy decision in favour of US
The European Commission has concluded that the United States does ensure an adequate level of protection for personal data transferred from the European Union and will now launch the process towards the adoption of an adequacy decision Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Dec 2022
The nature of the CISO role will be in flux in 2023
As cyber risk outpaces organisational defences, and cyber attacks and breaches cause more and more damage, the nature of the CISO role is entering a state of flux, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Dec 2022
Finnish government launches information security voucher scheme
Finland’s government is offering businesses financial support to help them improve their cyber security Continue Reading
By- Gerard O'Dwyer
-
News
13 Dec 2022
More Uber data exposed in possible supply chain attack
A second incident affecting ride-sharing app Uber appears to have originated through a third party in a supply chain attack Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
13 Dec 2022
AI experts question tech industry’s ethical commitments
In this week’s Computer Weekly, the proliferation of ethical frameworks has done little to change how artificial intelligence is developed – we look at the challenges. We examine the future of the UK semiconductor sector as the government launches a review. And we hear how NatWest has put data at the heart of customer strategy. Read the issue now. Continue Reading
-
News
13 Dec 2022
Customer frustrations mount as Rackspace investigation proceeds
Rackspace says it is making progress on restoring services following a ransomware attack on its Hosted Exchange business, but customers are becoming frustrated with a lack of communication Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Dec 2022
Top IT predictions in APAC in 2023
Robotics, cross-cloud data mobility and cyber insurance are some of the key trends that will shape Asia-Pacific’s technology landscape in 2023 Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
12 Dec 2022
Cloud-based fingerprint system for UK police nears completion
Police Digital Service announces that a new cloud-based fingerprint system developed under its Transforming Forensics programme is nearly complete, but data protection concerns around the use of US-based cloud providers remain Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
12 Dec 2022
Security Think Tank: Embrace prioritisation, people, imperfections
Security and IT professionals should try to make peace with their imperfections in 2023, says Nominet CISO Paul Lewis Continue Reading
By- Paul Lewis, Nominet
-
News
11 Dec 2022
How Zscaler is cracking APAC’s cloud security market
Zscaler’s head in Asia-Pacific and Japan talks up the company’s growth momentum in the region and what it is doing to address areas where it can do better Continue Reading
By- Aaron Tan, Informa TechTarget
-
Blog Post
09 Dec 2022
When IT Meets Christmas: The Massacre of the Innocents Updated
But Joseph had installed Anti-Spyware on Mary's phone, after she became pregnant and not by him. So they cashed in their bitcoin, dropped their mobiles down a well and departed for Egypt. Continue Reading
By- Philip Virgo, Winsafe Ltd
-
News
09 Dec 2022
CIISec, DCMS to fund vocational cyber courses for A-level students
The Chartered Institute of Information Security and the Department for Digital, Culture, Media and Sport plan to fund vocational cyber qualifications for 300 teenagers Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Dec 2022
Iranian APT seen exploiting GitHub repository as C2 mechanism
A subgroup of the Iran-linked Cobalt Mirage APT group has been caught taking advantage of the GitHub open source project as a means to operate its latest custom malware Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Dec 2022
Online Safety Bill returns to Parliament
MPs and online safety experts have expressed concern about encryption-breaking measures contained in the Online Safety Bill as it returns to Parliament for the first time since its passage was paused in July Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
09 Dec 2022
IT system limitations a factor in passport delays
Limitations in the UK’s passport office IT system led to delays in applicants receiving their documents during a recent period of high demand Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Opinion
09 Dec 2022
Security Think Tank: 2022 changed how we thought about resilience
Increasing cyber resilience is at the heart of the people-processes-technology triangle, and 2022 saw shifts in all three of these aspects, says PA Consulting’s Sharon Shochat Continue Reading
By- Sharon Shochat
-
News
08 Dec 2022
Consumers to get new protections against dodgy apps
Government’s new code of practice will impose new privacy and security measures on app store operators and developers Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
08 Dec 2022
Too many secrets: What can today’s cyber teams learn from a 30-year-old film?
Despite being 30 years old, Sneakers remains a classic hacker film. The technology may have dated, but the underlying themes remain relevant and remind us about the threats lurking online Continue Reading
-
News
08 Dec 2022
Apple to tap third party for physical security keys
Apple is launching a number of new security protections, including the addition of third-party-provided hardware security keys Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
08 Dec 2022
CW Europe: Finland prepares for drone technology take-off
Finland is preparing for a future where it could rely on flying drone technology. Read about its plans in this issue. Also find out how a PhD student in the Netherlands is helping to detect hidden messages on the internet by using steganography. Continue Reading
- 08 Dec 2022
-
News
08 Dec 2022
Australia to develop new cyber security strategy
New strategy to be developed by top cyber security experts aims to turn Australia into a global cyber leader, among other goals Continue Reading
-
News
07 Dec 2022
Rackspace email outage confirmed as ransomware attack
An ongoing outage affecting Rackspace email customers is the result of a ransomware attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Dec 2022
Google, MS, Oracle vulnerabilities make November ’22 a big month for patching
Vulnerabilities affecting the likes of Google, Microsoft and Oracle proved particularly troublesome in November Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
07 Dec 2022
Security Think Tank: As cyber pros, we need to articulate our needs better
There is always a lot to learn about security, but one of the most important lessons may not relate to technology at all, says Petra Wenham Continue Reading
By -
News
06 Dec 2022
Legacy IT magnifies cyber risk for Defra, says NAO
Some 30% of Defra’s applications are currently unsupported, magnifying cyber risk as the government department struggles to make progress on a digital transformation programme Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Dec 2022
Industrial IoT focus of next NCSC startup challenge
The NCSC for Startups programme is looking for innovative ideas to encrypt and secure the industrial internet of things Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Dec 2022
EU fails to protect human rights in surveillance tech transfers
Transfers of surveillance technology from the European Union to African governments are carried out without due regard for the human rights impacts, the European Ombudsman has found after a year-long investigation into the European Commission’s management of an aid fund Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
06 Dec 2022
Don’t become an unwitting tool in Russia’s cyber war
Researchers have turned up evidence that enterprise networks are being co-opted by Russian threat actors to launch attacks against targets in Ukraine. How can you avoid becoming an unwitting tool in a state-backed attack? Continue Reading
By- Alex Scroxton, Security Editor
-
Podcast
06 Dec 2022
AWS mutes trash talk at Re:Invent – Computer Weekly Downtime Upload podcast
The team chats through the AWS Re:Invent conference, as well as an initiative for getting young women into cyber security, and how SAP Build travelled from Vegas to SAP users in Birmingham Continue Reading
By- Caroline Donnelly, Senior Editor, UK
- Brian McKenna, Enterprise Applications Editor
- Clare McDonald, Business Editor
-
06 Dec 2022
Is Elon Musk’s Twitter still safe, and should you stop using the platform?
With a litany of security and compliance issues exposed and in many cases caused by Elon Musk’s takeover of social media platform Twitter, some may be asking if it’s still safe or appropriate to use. Continue Reading
-
E-Zine
06 Dec 2022
Is Twitter still safe, and should you stop using the platform?
In this week’s Computer Weekly, with a litany of security and compliance issues caused by Elon Musk’s takeover of Twitter, we ask if it’s still safe for enterprises. Our latest buyer’s guide examines the technologies and best practices behind data visualisation. And we look at the emerging devices for accessing the metaverse. Read the issue now. Continue Reading
-
News
05 Dec 2022
Fake investment ads persist on Meta’s social networks
Online adverts for investment scams relating to property and crypto assets are still getting past measures designed to stop them Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Dec 2022
Cohesity doubles down on cyber-defence failings via backup
Datahawk service and Data Security Alliance bring clean data restores, ransomware artefact detection, data vaulting and data audit for a clearer understanding of attack impact Continue Reading
By- Antony Adshead, Storage Editor
-
News
05 Dec 2022
French cyber consultancy Hackuity sets up UK operation
Risk-based vulnerability management company is to establish a UK base of operations in the hope of expanding its enterprise client base Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
05 Dec 2022
Security Think Tank: The more you buy, the less you protect
The most important lesson learned this year is that the more controls you have in place, the less secure you become, argues 2-sec’s Tim Holman Continue Reading
By- Tim Holman, 2-sec
-
Definition
02 Dec 2022
User Principal Name (UPN)
In Microsoft Active Directory, a User Principal Name (UPN) is a username and domain in an email address format. Continue Reading
By -
News
02 Dec 2022
Twitter ‘replacement’ Hive Social shuts off service in privacy alert
Hive Social, a recently established social media network, has temporarily closed its servers to address deep structural privacy issues identified by ethical hackers Continue Reading
By- Alex Scroxton, Security Editor
-
News
01 Dec 2022
MI6 chief’s hacked emails attacked MI5 and betrayed British spy operations in China
Former UK spy boss Richard Dearlove leaked names of MI6 secret agent recruiters in China to back an aggressive right-wing US campaign against tech company Huawei. His emails were hacked and then leaked – probably by Russian intelligence Continue Reading
By- Duncan Campbell , 2QQ Ltd, Sussex University
- Bill Goodwin, Computer Weekly
- Meike Eijsberg
-
News
01 Dec 2022
LastPass probes new cyber incident related to August attack
The August 2022 cyber attack on LastPass seems to have begat another incident, according to company CEO Karim Toubba Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
01 Dec 2022
Ransomware: Is there hope beyond the overhyped?
Up-and-coming cyber concepts attack surface management and security mesh architectures seem to hold some promise in tackling ransomware, but they are a little way off maturity Continue Reading
By- Paul Lewis, Nominet
-
News
30 Nov 2022
Microsoft 365 banned in German schools over privacy concerns
German schools cannot legally use Microsoft Office 365 over lack of clarity about how data is collected, shared and used, as well as the potential for unlawful transfer of European citizens’ personal data to the US Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
30 Nov 2022
South Staffs Water customer data leaked after ransomware attack
Personal data of water utility’s direct debit customers exposed on the dark web following a Clop ransomware attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Nov 2022
Latest LockBit ransomware versions have wormable capabilities
Sophos researchers have reverse-engineered the Lockbit 3.0 ransomware, shedding new light on its evolving capabilities and firming up links with BlackMatter Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Nov 2022
NIS regulations to be extended to cover MSPs
The UK government is moving ahead with plans to update the Network and Information Systems regulations to bring outsourcers and MSPs into scope Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
30 Nov 2022
Think technology, process, human risk to manage ransomware
Effective ransomware handling boils down to three core areas – technology, process and human risk Continue Reading
By- Andrew Morris, Turnkey Consulting
-
News
29 Nov 2022
AWS doubles down on data management
Cloud giant Amazon Web Services declares a bold vision to eliminate the need to extract, transform and load data alongside other efforts to address business problems in domains like cyber security and logistics Continue Reading
By- Aaron Tan, Informa TechTarget
-
Opinion
29 Nov 2022
Chartered status and aligned standards are crucial for the UK's cyber sector
As the UK moves closer to ushering in the world’s first chartered cyber professionals, the UK Cyber Security Council’s Simon Hepburn outlines the sector’s defining moment Continue Reading
By- Simon Hepburn, UK Cyber Security Council
-
News
29 Nov 2022
Cyber criminals exploiting naked TikTok ‘challenge’
Malware operators lured targets by promising them they would be able to view nude videos of TikTok users Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Nov 2022
‘Legal but harmful’ clause dropped from Online Safety Bill
Online Safety Bill’s ‘legal but harmful’ provision will be dropped by the UK government in favour of public risk assessments, tools to help users control the content they consume, and new criminal offences around self-harm Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Feature
29 Nov 2022
How gamifying cyber training can improve your defences
Security training is the cornerstone of any cyber defence strategy. With ever-escalating online threats, it is now more important than ever that this training is an engaging experience Continue Reading
-
29 Nov 2022
Trustpilot gets agile to build trust online
Consumer reviews website Trustpilot has built and scaled its IT security team and is now turning to agile methods and DevSecOps to further enhance its cyber capabilities, as CISO Stu Hirst explains. Continue Reading
-
E-Zine
29 Nov 2022
How to stop data retention from killing the planet
In this week’s Computer Weekly, there’s a hidden environmental cost to the vast volumes of data being generated – we examine what can be done to address it. We talk to the CISO of consumer reviews site Trustpilot, about building trust in IT security. And we look at what IT leaders can do if they inherit a toxic team environment. Read the issue now. Continue Reading
-
Opinion
28 Nov 2022
Protecting children as they spend years in virtual worlds
To protect children online, we must now focus on pre-emptive and robust regulation around immersive technologies Continue Reading
By- Patrick Cronin
-
News
28 Nov 2022
Panzura partners with AWS on ransomware counter-measures
Panzura might have slipped beneath the waves, but it’s come back reinvigorated, and now boasts integration with AWS with ransomware protection and Outposts hardware Continue Reading
By- Yann Serra, LeMagIT
-
Feature
28 Nov 2022
Ransomware: Practical tips to improve resiliency
With ransomware attacks on organisations increasing, the question is not if an attack will happen, but when. We look at ways to minimise the impact of such an attack Continue Reading
By- Cliff Saran, Managing Editor
-
News
27 Nov 2022
Plexal inducts six into cyber leadership scheme
Tech innovation hub Plexal is expanding its Cyber Runway programme with a new Ignite strand dedicated to supporting high-potential security leaders Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Nov 2022
Data management, backup becoming the CISO's responsibility
More and more CISOs are taking on responsibility for wider data management strategies, and this trend looks set to grow next year Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Nov 2022
Not-for-profit aims to encourage 1,300 girls into cyber careers
CyNam, a not-for-profit cyber security initiative, is collaborating with industry, education providers and government to encourage young women into cyber Continue Reading
By- Clare McDonald, Business Editor
-
E-Zine
24 Nov 2022
CW Nordics: Icelandic datacentres point way to greener IT
Iceland may soon become even more attractive to firms wanting to minimise their carbon footprint while using high-performance computing services. Read more about it in this issue. Also find out how a robo investment company, Nord Investments, is harnessing open banking to make thing easier for its clients. Continue Reading
- 24 Nov 2022
-
Opinion
24 Nov 2022
Your staff are the frontline in your ransomware fight
As part of a solid cyber defence plan, the CISO must make sure that the frontline within the organisation is prepared for an attack, says Theodore Wiggins of Airbus Protect Continue Reading
By- Theodore Wiggins, Airbus Protect
-
News
23 Nov 2022
How APAC organisations are hiring cyber security pros
Hiring managers in cyber security are turning to existing employees in non-IT roles and providing professional development for junior-level staff to plug the talent gap Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
23 Nov 2022
UK police arrest 120 in largest-ever cyber fraud crackdown
The administrator and more than 100 users of the iSpoof.cc cyber fraud website have been arrested in a major counter-fraud operation led by the Metropolitan Police Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Nov 2022
South Korea data adequacy pact brings £15m Brexit bonus
UK government finalises a data adequacy agreement with South Korea, saying it will unlock a post-Brexit business bonus of just under £15m Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Nov 2022
Red team tool developer slams ‘irresponsible’ disclosure
UK security firm MDSec defends its Nighthawk command and control penetration testing framework after suggestions were made that it could be appropriated by threat actors Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Nov 2022
Dutch national cyber security strategy aims to protect digital society
Cabinet sets up national cyber security strategy to make the Netherlands digitally secure Continue Reading
By- Kim Loohuis
-
News
22 Nov 2022
Ducktail spins new tales to hijack Facebook Business accounts
The increasingly active Ducktail cyber crime operation is refining its operations, seeking new methods to compromise its victims’ Facebook Business accounts Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Nov 2022
Killnet DDoS hacktivists target Royal Family and others
Russia-aligned hacktivists targeted multiple UK websites, including those of the Royal Family, in a new campaign of DDoS attacks Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Nov 2022
C-suite mystified by cyber security jargon
Malware, supply chain attack, zero-day, IoC, TTP and Mitre ATT&CK are just some of the everyday terms that security pros use that risk making the world of cyber incomprehensible to outsiders Continue Reading
By- Alex Scroxton, Security Editor
-
22 Nov 2022
Cyber criminals have World Cup Qatar in their sights as tournament kicks off
Malicious cyber activity around the FIFA World Cup was ticking upwards even before the opening game, with threats likely to present themselves in great numbers and many forms throughout the event. Continue Reading
-
E-Zine
22 Nov 2022
Cyber criminals target World Cup Qatar 2022
In this week’s Computer Weekly, as the FIFA World Cup opens in Qatar, we examine the cyber security threats from criminals targeting the event. We report from the Gartner Symposium on the latest predictions for enterprise software development. And we talk to the CIO of Kyiv City Council about managing IT in the shadow of war. Read the issue now. Continue Reading
-
Opinion
21 Nov 2022
Ransomware preparedness: The long road ahead
Is your organization ready for ransomware? A recent survey shows that businesses in a variety of industries are all struggling with ransomware prevention and recovery. Continue Reading
By- Christophe Bertrand
-
Enterprise Strategy Group
We provide market insights, research and advisory, and technical validations for tech buyers.
-
News
21 Nov 2022
Bug Bounty Calculator helps organisations fine-tune their payouts
Newly launched comparison tool will supposedly help operators of vulnerability disclosure or bug bounty programmes to ensure their payments match market rates and expectations, and attract the right sort of attention Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Nov 2022
NHS federated data platform must avoid repeating Care.data mistakes, says national data guardian
UK’s national data guardian agrees with the ambitions of the platform, but warns that the programme must avoid ‘common pitfalls around trust and transparency’ Continue Reading
By -
News
21 Nov 2022
NHS trust that deleted up to 90,000 emails cleared of deliberately concealing evidence
A tribunal found in a high-profile case brought by whistleblower Chris Day that an NHS trust had not deliberately concealed evidence when a director deleted up to 90,000 emails before he was due to testify Continue Reading
By -
Feature
21 Nov 2022
Ransomware, storage and backup: Impacts, limits and capabilities
We look at the impact of ransomware on storage and backup, how storage and data protection can best be used to combat ransomware, and how they fit in the fight against it Continue Reading