IT security
-
News
13 Sep 2024
UN-backed cyber security report highlights global shortfalls in preparedness
In the three years since the UN-backed cyber security report was published, countries have been making a concerted effort to protect themselves from cyber threats, but there’s more to do Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
13 Sep 2024
Cyber workforce must almost double to meet global talent need
Research from ISC2 finds global cyber workforce needs additional 4.8 million people to fully secure businesses Continue Reading
By- Clare McDonald, Business Editor
-
Opinion
08 Nov 2021
Watching me, watching you – challenging the rise of digital surveillance at work
Unprecedented levels of digital monitoring at work is embedding a culture of surveillance, despite workers’ opposition to the practices, says Prospect Union Continue Reading
By- Andrew Pakes, Prospect Union
-
News
08 Nov 2021
How cosmetics retailer Lush made over its approach to authentication
Evolving approaches to IT at cosmetics retailer Lush meant the organisation’s previous approach to authentication was no longer up to scratch. Find out how it overcame this hurdle Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
08 Nov 2021
Shock horror... Humans used for security validation instead of AI/M-L!
As a judge on the Tech Trailblazers awards, I can assure you of two security-related actuality wotsits: The onslaught of security start-ups is anything but slowing down; this year has seen a record ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
News
08 Nov 2021
Splunk’s cloud shift is paying off in APAC
Splunk’s Asia-Pacific business is growing faster than the rest of the company, but it’s not resting on its laurels Continue Reading
By- Aaron Tan, TechTarget
-
News
07 Nov 2021
Technology spending reaches record levels, fuelling jobs boom
Spending on IT has reached its highest levels for a decade but a shortage of skilled IT professionals could dampen growth Continue Reading
By- Bill Goodwin, Computer Weekly
-
Feature
05 Nov 2021
Immutable snapshots aim to neutralise ransomware
Snapshots – usually immutable anyway – get functionality to stop ransomware intruders moving or deleting snapshots, so customers know they have clean copies of data to restore from Continue Reading
By- Antony Adshead, Storage Editor
-
Definition
05 Nov 2021
cross-site scripting (XSS)
Cross-site scripting (XSS) is a type of injection attack in which a threat actor inserts data, such as a malicious script, into content from otherwise trusted websites. Continue Reading
By- Ben Lutkevich, Site Editor
- Linda Rosencrance
-
Definition
05 Nov 2021
cache poisoning
Cache poisoning is a type of cyber attack in which attackers insert fake information into a domain name system (DNS) cache or web cache for the purpose of harming users. Continue Reading
By -
News
05 Nov 2021
US offers $10m reward for intel on DarkSide ransomware gang
US government puts up a $10m reward for information on the DarkSide ransomware gang, the group that attacked Colonial Pipeline six months ago Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
04 Nov 2021
Managing supply chain risk requires new priorities, tools
Understanding that cost may not be the top driver in supply chain risk management is critical in the new normal. Learn why and what technologies can help. Continue Reading
By- Diann Daniel, Executive Editor
-
Definition
04 Nov 2021
vulnerability disclosure
Vulnerability disclosure is the practice of reporting security flaws in computer software or hardware. Continue Reading
-
News
04 Nov 2021
The Netherlands works on resilience with large-scale national cyber exercise
For the Netherlands, the biggest challenge in a large-scale cyber crisis is to maintain speed while exercising due care Continue Reading
By- Kim Loohuis
-
Blog Post
04 Nov 2021
A For Automation
You might think that 3+ decades into the life of dedicated IT security products that said security landscape would be clearly defined and managed. In reality, it is anything but. The problem is not ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
News
03 Nov 2021
Spyware firm NSO and others added to US banned Entity List
US government bans target Israeli spyware makers and cyber firms in Russia and Singapore Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Nov 2021
Facebook self-imposes facial recognition moratorium
Facebook and Meta have committed to halting their use of facial recognition technology and deleting the biometric data of more than a billion people by the end of 2021, but will retain the underlying algorithms and software for potential use in future products Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
03 Nov 2021
UK’s Labour Party hit by third-party data breach
Data on Labour Party members was recently compromised in an apparent cyber attack on a third-party data processor Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
03 Nov 2021
Security Think Tank: SASE – marketing buzz or the future of security?
SASE architectures promise to prevent multiple types of cyber attacks, but deciding whether SASE is right for your organisation will require understanding whether SASE is a fit for your use cases in IT Continue Reading
By- Martin Kuppinger, KuppingerCole
-
Definition
03 Nov 2021
Report on Compliance (ROC)
A Report on Compliance (ROC) is a form that must be completed by all Level 1 Visa merchants undergoing a PCI DSS (Payment Card Industry Data Security Standard) audit. Continue Reading
By -
News
03 Nov 2021
BlackMatter ransomware crew shuts down, leaves victims in a bind
The BlackMatter ransomware gang appears to be winding down its activities, possibly due to pressure from law enforcement Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Nov 2021
Adelaide healthcare network digitises manual processes
The Central Adelaide Local Health Network has digitised manual processes in more than 20 speciality areas to improve patient experience and alleviate the workloads of frontline staff Continue Reading
By- Aaron Tan, TechTarget
-
News
02 Nov 2021
Electronic waste excluded from COP26 agenda
Data sanitation industry group calls on UK government to add electronic waste to the climate summit’s agenda Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
02 Nov 2021
Convicted Silk Road admin stripped of £500k in crypto earnings
Jailed Silk Road administrator Thomas White, aka Cthulhu, has been ordered to hand over more than £490,000 of illicit earnings Continue Reading
By- Alex Scroxton, Security Editor
-
02 Nov 2021
Security Think Tank: Optimising privacy, post-GDPR
Airbus CyberSecurity CTO Paddy Francis explores the impact of regulation on data protection, and how it has changed how one goes about optimising data privacy in the enterprise Continue Reading
-
E-Zine
02 Nov 2021
What the Budget means for UK technology
In this week’s Computer Weekly, we look through the Chancellor’s Autumn Budget and Spending Review to find what it means for the UK tech sector. As COP26 starts, we assess the green credentials of the IT industry. And we hear one CTO’s experiences of learning the privacy lessons of GDPR. Read the issue now. Continue Reading
-
News
01 Nov 2021
Businesses and governments urged to take action over Trojan Source supply chain attacks
Businesses and governments have been put on alert to guard against Trojan Source hacking attacks Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
01 Nov 2021
MPs and Lords grill Facebook over online safety efforts
Facebook answers British lawmakers’ questions about the social media giant’s efforts to ensure the safety of its users, as part of legislative security of the government's proposed online safety bill Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
01 Nov 2021
Is SASE mere vendor hype? It’s more nuanced than that
There’s no doubt that SASE is being overhyped, but nevertheless the concept holds value that security teams should not discount, according to PA Consulting analysts Continue Reading
By- Toby Sibley, William Blackwell, Farrukh Ahmad
-
Definition
29 Oct 2021
shoulder surfing
Shoulder surfing is using direct observation techniques, such as looking over someone's shoulder, to get information. Continue Reading
-
News
29 Oct 2021
GDS secures up to £400m funding for One Login digital identity project
HM Treasury agrees to spending review bid from Cabinet Office to create the new single sign-on system for government over the next three years Continue Reading
By- Bryan Glick, Editor in chief
-
Feature
29 Oct 2021
Online Safety Bill puts user protection onus on platform providers
The Online Safety Bill will place new duties and responsibilities on online platforms accessible from the UK, but as it currently stands, it contains several grey areas Continue Reading
-
News
29 Oct 2021
Facebook rebrands to Meta amid continuing controversies
Facebook has changed its corporate name to Meta to support its work on the next generation of “social technologies”, but concerns around trust and privacy persist Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Definition
29 Oct 2021
data at rest
Data at rest is a term that is sometimes used to refer to all data in computer storage while excluding data that is traversing a network or temporarily residing in computer memory to be read or updated. Continue Reading
By- Ben Lutkevich, Site Editor
-
Opinion
29 Oct 2021
Changing the rules against cyber attacks
UKRI’s John Goodacre reveals how projects supported by the Digital Security by Design Challenge aim to improve cyber security resilience, beginning with the very fundamentals of computing Continue Reading
By- John Goodacre
-
News
28 Oct 2021
CIA sought revenge against Julian Assange over hacking tool leaks, court hears
The CIA discussed kidnapping Julian Assange after WikiLeaks published thousands of documents revealing its arsenal of hacking tools, defence lawyers tell a London court Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
28 Oct 2021
Illegal state surveillance in Africa ‘carried out with impunity’
Analysis of surveillance laws and practices in six African countries finds that existing privacy laws are failing to protect citizens from illegal digital surveillance, which is being facilitated and enabled by global tech companies Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
28 Oct 2021
How ransomware crews pile on the pressure to get victims to pay
Sophos researchers share some of the more common tactics ransomware gangs use to pressurise their victims into paying up Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Oct 2021
‘No-one extradited from UK to US has committed suicide,’ US tells court in Assange appeal
US government claims that a district judge has given WikiLeaks founder Julian Assange a ‘trump card’ to avoid extradition Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
27 Oct 2021
Government commits millions to security investment
Spending Review adds more than £750m of funding to improve cyber security resilience across government Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Oct 2021
Cyber sector growth exacerbating skills shortage
Data from security association (ISC)² shows demand for cyber pros is still outpacing supply as the sector continues an upward growth trajectory Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Oct 2021
DarkMarket takedown results in 150 arrests
A coordinated operation by law enforcement has seen 150 taken into custody amid allegations of buying or selling illicit goods on the dark web Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Oct 2021
Cyber experts on how to nobble a Nobelium attack
A recent spate of attempted Nobelium cyber attacks were mostly unsuccessful, but serve as a reminder to pay attention to some more fundamental aspects of security Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
26 Oct 2021
encryption key
In cryptography, an encryption key is a variable value that is applied using an algorithm to a string or block of unencrypted text to produce encrypted text or to decrypt encrypted text. Continue Reading
By- Peter Loshin, Former Senior Technology Editor
-
E-Zine
26 Oct 2021
Managing cyber risk by integrating supply chains
In this week’s Computer Weekly, our latest Buyer’s Guide examines the security and IT integration challenges of modern supply chains, especially post-pandemic – while we also talk to the CEO of software provider SolarWinds about how the company overcame its huge supply chain attack. And we look at how a small town in Lancashire was chosen as the HQ for the UK’s new National Cyber Force. Read the issue now. Continue Reading
-
News
26 Oct 2021
Lacework expands into ANZ, eyes APAC market
DevSecOps supplier Lacework’s expansion into Australia and New Zealand will pave the way for a broader move into the Asia-Pacific region Continue Reading
By- Aaron Tan, TechTarget
- 25 Oct 2021
- 25 Oct 2021
- 25 Oct 2021
-
Blog Post
25 Oct 2021
At last, the UK has a mass-market digital identity system - now let's use it
Great news for all those who have followed the troubles and travails of digital identity in the UK for the past couple of decades. Finally, we have a digital ID system, developed in the public ... Continue Reading
By- Bryan Glick, Editor in chief
-
News
25 Oct 2021
Attempted hack causes Tesco website outage
Retailer’s website and app back after attempted hack caused problems over the weekend Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
22 Oct 2021
Multi-government operation targets REvil ransomware group
REvil has been forced offline by a multi-government hacking operation, marking the second time in 2021 that the group has gone dark Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
22 Oct 2021
MEPs vote to expand Europol data mandate
The European Parliament has voted in favour of expanding Europol’s mandate to process data and develop AI tools, but critics claim it contradicts a previous vote which opposed using new technologies to predict crime Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
21 Oct 2021
Airport operator MAG boosts threat visibility with hybrid SOC
With budget concerns weighing heavy during the pandemic, Manchester Airports Group ditched an impending capex-heavy cyber investment in favour of a hybrid managed/in-house approach. Learn more about its experience Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
21 Oct 2021
script kiddie
Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of internet security weaknesses. Continue Reading
By- Ben Lutkevich, Site Editor
-
News
21 Oct 2021
APAC organisations warm to zero trust
Two-thirds of APAC organisations have a zero-trust strategy even as they grapple with the lack of skills and other organisational challenges, study finds Continue Reading
By- Aaron Tan, TechTarget
-
News
20 Oct 2021
US intelligence agencies issue advisory on BlackMatter gang
Joint advisory on ransomware gang warns about potential of further attacks on critical infrastructure providers Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
20 Oct 2021
LightBasin hackers breach 13 telcos in two years
Hackers have obtained an undisclosed volume of subscriber information and call metadata in a sustained campaign against telecommunications firms Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
20 Oct 2021
Police IT buyers should compel suppliers to prove AI claims
House of Lords told that UK law enforcement bodies should use their position as buyers to compel private sector suppliers to divulge more information about how their AI-powered technologies work Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Feature
19 Oct 2021
Back on the office network: What are the risks for mobile users?
Many people are returning to offices and bringing their mobile devices with them. What are the cyber security implications of this? Continue Reading
-
Blog Post
18 Oct 2021
Time to take a step back on police use of facial recognition
We’ve all seen the detective shows on TV. The cops find a CCTV picture of the likely “perp”. The put-upon junior detective is tasked with wading through a database of photos in the hope of finding ... Continue Reading
By- Bryan Glick, Editor in chief
-
News
18 Oct 2021
How Samlesbury, Lancashire became the home of the National Cyber Force
The National Cyber Force, a new branch of the military, is gearing up to fight battles in cyber space from the fields of Lancashire. Its presence is expected to bring a high-tech renaissance to the region Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
18 Oct 2021
DCMS appoints Plexal to drive telecoms diversity strategy
Government chooses UK innovation company to understand and develop the role of SMEs in the telecoms market with particular reference to how to create a diverse market that supports the creation of home-grown, sovereign technology Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Opinion
18 Oct 2021
No easy fix for vulnerability exploitation, so be prepared
Vulnerability management and disclosure is a tricky business with ethical and business ramifications for software vendors, CISOs and ethical hackers alike – and CISOs sit right in the middle of this Continue Reading
By- Andrew Morris, Turnkey Consulting
-
Definition
15 Oct 2021
Uniform Resource Identifier (URI)
A Uniform Resource Identifier (URI) is a character sequence that identifies a logical (abstract) or physical resource -- usually, but not always, connected to the internet. A URI distinguishes one resource from another. Continue Reading
By- Rahul Awati
- Fred Churchville, TechTarget
-
Opinion
15 Oct 2021
Doing the right thing: How CISOs should approach responsible disclosure
Owen Wright, responsible for penetration testing and adversary simulation at Context, part of Accenture Security, advises how CISOs should approach responsible disclosure Continue Reading
By- Owen Wright, Accenture Security
-
News
14 Oct 2021
Apple scheme to detect child abuse creates serious privacy and security risks, say scientists
Apple’s plan to automatically scan photos to detect child abuse would unduly risk the privacy and security of law-abiding citizens and could open up the way to surveillance, say the world’s top cryptographic experts Continue Reading
By- Duncan Campbell , 2QQ Ltd, Sussex University
-
E-Zine
14 Oct 2021
CW APAC, October 2021: Tech Career Guide
Despite marked improvements, tech still faces a diversity problem. In this handbook, focused on cyber security’s gender gap in the Asia-Pacific region, Computer Weekly looks at the mentoring programmes aiming to combat the issue, the career path of IAG’s Elaine Muir, how hacking won Claudean Zheng a job and what else needs to be done to tackle the ongoing gender imbalance Continue Reading
-
News
14 Oct 2021
NHS Digital enhances in-house cyber awareness drive
Keep IT Confidential campaign aims to help NHS staff understand more about security threats and learn how to reduce risk Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
14 Oct 2021
Encryption protects the marginalised – and it’s under threat
Encryption keeps marginalised groups connected and safe, but new regulatory attempts to break it put them at risk Continue Reading
By- Callum Voge
-
News
14 Oct 2021
Generation Novel hybrid workers bring new demands and risks
Aruba survey warns business leaders that they must strike a balance between flexibility and security to address risky behaviours and evolving expectations of today’s tech-savvy workforce Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
13 Oct 2021
Google Cybersecurity Action Team springs into life
Google has announced a new Cybersecurity Action Team, with a mission to support security and digital transformation in governments, critical infrastructure, enterprises and small businesses Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Oct 2021
FCA warns over future hybrid working security risks
Earlier this week, the Financial Conduct Authority issued fresh guidance to regulated organisations on keeping hybrid workers safe and secure Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Oct 2021
Microsoft warns of MysterySnail on October Patch Tuesday
Microsoft has fixed a zero-day that is being actively exploited to deliver a new remote access trojan dubbed MysterySnail to targets Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Oct 2021
Former signals intel leader named godfather of UK security
Sixth annual Security Serious Unsung Heroes Awards honours former Royal Corps of Signals colonel and infosec pioneer John Doody Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Oct 2021
Australia unveils ransomware action plan
The Australian government has established a task force to address the ransomware menace and is proposing legislation to mandate reporting of ransomware incidents by businesses Continue Reading
-
News
12 Oct 2021
BCS calls on government to retain protections against AI
BCS, the Chartered Institute for IT, wants the government to retain protections that allow people to have decisions about them made by an AI reviewed by humans if needed Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Oct 2021
Ban UK police use of facial-recognition, House of Lords told
Experts giving evidence to the House of Lords have said that UK police use of facial-recognition technology is disproportionate and ineffective, and further questioned the utility of algorithmic crime ‘prediction’ tools Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
12 Oct 2021
Microsoft thwarts mega-DDoS attack on Azure platform
2.4Tbps DDoS attack on an undisclosed Microsoft Azure customer may have been the largest ever attempted against a single target Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Oct 2021
Malaysia’s highway authority improves DR capabilities
The Malaysian Highway Authority is now more resilient against cyber attacks through a local disaster-recovery-as-a-service offering powered by Veeam software Continue Reading
By -
News
11 Oct 2021
Covid-19 will loom over cyber strategy for years to come
In remarks delivered to a Chatham House conference, NCSC head Lindy Cameron reflects on the security challenges facing the UK, and sets out some plans for the future Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Oct 2021
Sensitive documents to stay with whistleblower after deadline for agreement for their return passes
A deadllne to agree the safe return of the sensitive banking details of former and current NatWest Group customers has passed without agreement Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
11 Oct 2021
Singapore refreshes cyber security strategy
The city-state updates its national cyber security strategy to shore up the security of critical infrastructure and enterprises while growing its cyber security industry, among other goals Continue Reading
By- Aaron Tan, TechTarget
-
News
08 Oct 2021
Craft beer specialist Brewdog fixes serious app vulnerability
Vulnerability in brewer’s mobile app could have resulted in serious consequences for its shareholders and customers Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Oct 2021
Fast-moving Ryuk campaign targets healthcare organisations
Newly designated FIN12 gang leverages the work of the cyber criminal ecosystem to conduct lightning-fast ransomware attacks Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Oct 2021
NatWest admits to weaknesses in anti-money laundering systems
Bank pleads guilty to failures concerning the laundering of hundreds of millions of pounds, but says it has since improved its anti-money laundering systems Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Opinion
07 Oct 2021
Addressing the backup dilemma to ransomware recovery
Everyone knows good backups are essential if one is to recover from a ransomware attack, but using them effectively poses challenges that IT teams need to know about Continue Reading
By- W Curtis Preston
-
News
07 Oct 2021
ICO expresses concerns over its future independence
In its response to the government’s data protection consultation, the Information Commissioner’s Office has raised worries over its future ability to function independently of government interference Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
07 Oct 2021
next-generation firewall (NGFW)
A next-generation firewall (NGFW) is part of the third generation of firewall technology that can be implemented in hardware or software. Continue Reading
By- Casey Clark, TechTarget
- Sharon Shea, Executive Editor
-
News
07 Oct 2021
Uber faces legal action over ‘racist’ facial verification system
Two UK-based unions are taking Uber to court, claiming their members have been unfairly dismissed as a result of misidentification by the company’s facial verification system Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
07 Oct 2021
Twitch data breach investigations continue
Investigations are ongoing into a 125GB data breach that hit livestreaming platform Twitch, apparently the work of hacktivists Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
07 Oct 2021
CW Middle East: Middle East hospitals accelerate take-up of healthcare technologies
The Middle East is accelerating its take-up of digital healthcare technologies following lessons learned during the Covid-19 pandemic, with regional government turning to technology to track disease trends and monitor treatment. Also read in this issue how the UAE’s National Program for Coders will offer ‘golden visas’ to 100,000 entrepreneurs, enterprise owners and startups. Continue Reading
-
News
06 Oct 2021
US lawmakers propose ransomware reporting rules
Former presidential candidate Elizabeth Warren lends her support to a bill that would require corporate ransomware victims to disclose more information about their attacks to the authorities Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
06 Oct 2021
Security Think Tank: Responsible vulnerability disclosure is a joint effort
By working hand-in-hand, developers and security researchers can both play a vital role in ensuring newly-discovered vulnerabilities are addressed appropriately, writes Paddy Francis of Airbus CyberSecurity Continue Reading
-
News
06 Oct 2021
Gaming service Twitch hacked, data leaked
Users of livestreaming platform Twitch may be at risk after a 125GB torrent of data was leaked Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Oct 2021
Apache web server users urged to patch immediately
New zero-day in Apache HTTP Server is already being actively exploited and must be addressed immediately Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Oct 2021
Auto-enrolment begins for Google multi-factor authentication
Google has started to turn on multi-factor authentication on consumer accounts by default, and aims to auto-enrol 150 million users by the end of 2021 Continue Reading
By- Alex Scroxton, Security Editor
-
Podcast
06 Oct 2021
Top women in UK tech, AI on puffin island – Computer Weekly Downtime Upload podcast
In this episode, Caroline Donnelly, Clare McDonald and Brian McKenna discuss CW’s annual programme to choose the most influential women in UK tech, as well as Newham Sparks, and puffin-counting AI Continue Reading
By- Caroline Donnelly, Senior Editor, UK
- Clare McDonald, Business Editor
- Brian McKenna, Senior Analyst, Business Applications
-
News
06 Oct 2021
Israeli Orca to invest in UK cyber scene
Tel Aviv-headquartered Orca Security wants to set up a new R&D centre in the UK Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
05 Oct 2021
New strategies needed to close the cyber security skills gap
Teaching cyber security in schools is a long-term solution to a present-day problem Continue Reading
By- Martin Smith, SASIG
-
News
05 Oct 2021
New Python-based ransomware attacks unfold in record time
Sophos researchers detail a new variety of Python-based ransomware attack targeting VMware ESXi-hosted VMs Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
05 Oct 2021
Invest in cyber security with confidence using a structured approach
Cyber security has never been more challenging or important in rapidly changing business, regulatory, IT and threat environments. There is a need for a more structured approach to investment Continue Reading
By- Warwick Ashford, Senior analyst