IT security
-
E-Zine
07 Dec 2023
CW EMEA: Prepare for cyber war
When the war between Hamas and Israel began in October, cyber security professionals and major government and private organisations braced for an inevitable accompanying online war. In this issue of CW EMEA, we outline cyber war, patterns of threat activity, and find out what security teams can do to protect their organisations. We also look at Finland’s advances in quantum computing, how Belgian researchers have developed technology to help datacentres process data faster, and the secrets of KPN’s successful business transformation. Read the issue now. Continue Reading
-
E-Zine
09 Nov 2023
Heineken lets the data flow
In this month’s CW EMEA ezine, we find out about Heineken’s mission to make the most out of the data it holds through an enterprise-wide data ecosystem. We also look at how the UK has turned its back on the German government-funded Gaia-X data platform, why cyber experts are urging the EU to rethink vulnerability disclosure plans, and how the IT industry is responding to the software developer skills shortfall. Read the issue now. Continue Reading
-
News
30 Sep 2021
NUS and Thales to develop quantum technologies
The National University of Singapore and Thales have joined hands to test quantum technologies for commercial applications in security and sensing Continue Reading
By- Aaron Tan, TechTarget
-
Definition
30 Sep 2021
Secure Electronic Transaction (SET)
Secure Electronic Transaction (SET) is a system and electronic protocol to ensure the integrity and security of transactions conducted over the internet. Continue Reading
By -
News
29 Sep 2021
Russia arrests prominent cyber security executive
Founder and CEO of cyber security firm Group-IB detained in Moscow on treason charges Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Sep 2021
FoggyWeb malware latest tool of dangerous Nobelium APT
Microsoft’s threat intelligence team warns of a new strain of malware being used by the Russia-linked Nobelium APT Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Sep 2021
Security boost in Windows 11 limits PC reuse
Microsoft has put a lot of emphasis on improving security in Windows 11, but this comes at a cost as old hardware is no longer supported Continue Reading
By- Cliff Saran, Managing Editor
-
News
29 Sep 2021
Dedicated number for victims of fraud launched amid national security threat
Consumers that suspect they are being targeted by fraudsters can call 159 to be directly linked to their bank, as part of a 12-month pilot Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
29 Sep 2021
The Security Interviews: How SolarWinds came through its darkest hour
In his first major UK press interview, SolarWinds CEO Sudhakar Ramakrishna tells Computer Weekly how a relentless focus on transparency saw the company safely through a nightmare cyber breach scenario Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Sep 2021
UK consumer trust in banks, retailers and telcos declines as scams increase
Consumers are blaming banks, retailers and social media for the huge increase in online scams, survey shows Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
28 Sep 2021
Digital regulators need discrete but cooperative remits
The UK’s information commissioner has told MPs that digital economy regulators need discrete remits backed up by strong information sharing powers to both provide clear focus as well as allow for greater cooperation between their disparate but interlinked regimes Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
28 Sep 2021
How one red team exercise averted a new SolarWinds-style attack
Palo Alto Networks shares details of how its red teamers found and sealed a customer vulnerability that could have led to another SolarWinds-style supply chain attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Sep 2021
Uber drivers strike over pay issues and unfair dismissal claims
Unionised Uber drivers take industrial action in response to ongoing disputes over pay and claims that drivers are being unfairly dismissed as a result of the company’s technologies Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
27 Sep 2021
Women and BAME people bear brunt of cyber crime impact
Cyber crime has a disproportionate impact on women and BAME people, according to a new report Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Sep 2021
Giant Umbrella contractors suffer salary payment delays following suspected ‘data breach’
Following the discovery of “suspicious network activity” in its systems, payroll processing firm Giant Umbrella has taken itself offline, leaving contractors to fume over missing salary payments Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
Definition
27 Sep 2021
brute-force attack
A brute-force attack is a trial-and-error method used by application programs to decode login information and encryption keys to use them to gain unauthorized access to systems. Continue Reading
-
News
27 Sep 2021
Dubai International Finance Centre’s data protection law to be boosted by new federal regulation
New UAE data protection regulation on the horizon a year after a Dubai-specific law came into force Continue Reading
By- Pat Brans, Pat Brans Associates/Grenoble Ecole de Management
-
News
26 Sep 2021
What it takes to attract and retain women in cyber security
The narrowing gender gap may be a cause for cheer, but more needs to be done to curb discrimination, and attract and retain women for cyber security roles in Asia-Pacific Continue Reading
By -
Video
24 Sep 2021
Empowering APAC women on the frontlines of cyber security
In this webinar, we discuss the issues facing women in cyber security, the challenges of breaking into the field and why it’s important to close the gender gap Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
24 Sep 2021
Facial recognition cannot be a standalone authentication method
As more organisations look to facial recognition to improve their digital identity practices, they must remember that it cannot stand in isolation Continue Reading
By- Amir Nooriala
-
News
24 Sep 2021
How Australia punches above its weight in cyber security
Australia is playing to its strengths in niche areas such as governance and deep tech to punch above its weight in the cyber security industry Continue Reading
By- Aaron Tan, TechTarget
-
News
23 Sep 2021
Fresh alert over Conti ransomware surge
Conti ransomware crew appears increasingly active, prompting fresh warnings from the US authorities Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Sep 2021
MoD in second leak of Afghan citizens’ data
A second breach of data relating to Afghan citizens at risk of Taliban reprisals has been reported by the Ministry of Defence Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Sep 2021
Threat actors target VMware vCenter Server users
Users of VMware vCenter Server are advised to patch a series of vulnerabilities post haste Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Sep 2021
Authorised push payment fraud sees huge increase as criminals switch tactics
Criminals tricking people into making payments through channels such as fake emails and websites have stolen more money than payment card fraudsters Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Blog Post
22 Sep 2021
Please protect us from our own stupidity
It seems like the simplest thing. Compose an email message and then CC colleagues. But,due to a Ministry of Defence blunder, this simple action, built into pretty much every piece of email client ... Continue Reading
By- Cliff Saran, Managing Editor
-
News
22 Sep 2021
AI cannot be regulated by technical measures alone
The regulation of artificial intelligence must address the power of tech companies, as technical measures alone will not be enough to prevent the harms caused by AI-driven technologies, says report Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
22 Sep 2021
UK data plans aim to boost growth but will they isolate the UK from its international friends?
The UK government has made strong statements about the nation’s post-Brexit data strategy but must be careful not to undermine its global credibility Continue Reading
By- Rita Flakoll and Herbert Swaniker
-
News
22 Sep 2021
UK government turns to Tim Berners-Lee startup for digital identity plan
As part of its new digital identity project, the Government Digital Service is using the Solid platform created by web inventor Berners-Lee, which helps users to manage their personal data better Continue Reading
By- Bryan Glick, Editor in chief
-
Opinion
21 Sep 2021
Managing cyber risk through integrated supply chains
High-profile supply chain cyber attacks have caused huge disruption this year. PA Consulting’s Carl Nightingale considers key questions business leaders should be asking of their organisations Continue Reading
By- Carl Nightingale
-
News
21 Sep 2021
US sanctions Suex crypto exchange over ransomware links
US Treasury cracks down on cryptocurrency exchange that supposedly facilitated proceeds from multiple ransomware gangs Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Sep 2021
Investigation launched after MoD email blunder
Exposure of PII on Afghan interpreters who worked with the UK may put hundreds at risk of Taliban reprisals Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
21 Sep 2021
key fob
A key fob is a small, programmable device that provides access to a physical object. Continue Reading
-
News
21 Sep 2021
Spanish police bust Mafia-linked phishing gang
A joint operation between European authorities has dismantled a cyber criminal gang with links to the Italian Mafia Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Sep 2021
BlackMatter gang ramps up attacks on multiple victims
A wave of new BlackMatter ransomware attacks is hitting organisations around the world, even as the US authorities mull new sanctions on ransom payment infrastructure Continue Reading
By- Alex Scroxton, Security Editor
-
21 Sep 2021
UK GDPR faces changes under planned reforms
DCMS is launching a major consultation on proposed changes to the UK’s data protection regime, under which several key elements of the GDPR are likely to change Continue Reading
-
E-Zine
21 Sep 2021
The cities planning for ethical use of AI
In this week’s Computer Weekly, we talk to tech leaders in Barcelona and London about a collaboration to ensure ethical use of AI in the era of smart cities. The UK government wants to reform data protection law – we assess the implications. And we examine the latest best practice in hybrid cloud. Read the issue now. Continue Reading
-
Definition
20 Sep 2021
runbook
Runbooks are a set of standardized written procedures for completing repetitive IT processes within a company. Continue Reading
-
Definition
17 Sep 2021
security policy
A security policy is a document that states in writing how a company plans to protect its physical and information technology (IT) assets. Continue Reading
By- Ben Lutkevich, Site Editor
-
Definition
17 Sep 2021
email spam
Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients. Continue Reading
-
Blog Post
17 Sep 2021
Do we really want a single digital identity system to access government services?
Is the UK government about to make a new announcement on its plans for a single digital identity for citizens to access online public services? On 22 September, two seemingly coordinated ... Continue Reading
By- Bryan Glick, Editor in chief
-
News
16 Sep 2021
Dutch education administrators underestimate threat of cyber crime
Research shows educational establishments in the Netherlands are becoming favoured targets of cyber criminals and administrators are underestimating the risks Continue Reading
By- Kim Loohuis
-
News
16 Sep 2021
Bitdefender launches free REvil ransomware decryptor
Working alongside law enforcement partners, Bitdefender has developed and released a tool to help REvil victims recover their data for free Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
16 Sep 2021
shadow password file
A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is accessible only to the root user, preventing unauthorized users or malicious actors from breaking into the system. Continue Reading
By -
Blog Post
16 Sep 2021
The UK government data protection reforms - good for business, but are they good for you?
This is a guest post by Computer Weekly security editor Alex Scroxton, which features in the 21 September issue of the Computer Weekly digital magazine as its leader column. It is hard to sum up ... Continue Reading
By- Bryan Glick, Editor in chief
-
News
16 Sep 2021
European president outlines tech vision to drive Europe
President of the European Commission has set out plans for a stronger European economy, with less reliance on US and Chinese tech giants Continue Reading
By- Cliff Saran, Managing Editor
-
News
16 Sep 2021
Travel-themed phishing lures spiked this summer
As people begin to take holidays again after more than a year of restrictions and lockdowns, opportunist cyber criminals have taken note, according to new data from Palo Alto’s Unit 42 Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Sep 2021
Interview: Chancellor of the Exchequer Rishi Sunak on supporting the UK tech sector
Computer Weekly talked to Sunak at a Treasury event in front of an audience of tech sector leaders, investors and startups, to discuss how the government can support the digital economy Continue Reading
By- Bryan Glick, Editor in chief
-
Definition
15 Sep 2021
Kerberos
Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the internet. Continue Reading
By- Peter Loshin, Former Senior Technology Editor
- Michael Cobb
-
News
15 Sep 2021
Microsoft patches 66 vulnerabilities in September update
Another lighter-than-usual Patch Tuesday update includes important fixes for recently disclosed vulnerabilities, including a dangerous zero-day, and an update in the PrintNightmare saga Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Sep 2021
Australia and Singapore have higher incidences of insecure databases
Five-year longitudinal study by Imperva shows the proportion of databases with at least one known vulnerability in Australia and Singapore are among the world’s highest Continue Reading
By- Aaron Tan, TechTarget
-
News
14 Sep 2021
Mass health tracker data breach has UK impact
The leak of a database of 61 million users of health-tracking devices includes records on individuals located in the UK Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Sep 2021
Cost of ransomware attack in financial sector exceeds $2m
Mid-sized financial services organisations worldwide spend an average of over $2m recovering from ransomware attacks Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Sep 2021
Apple patches ForcedEntry vulnerability used by spyware firm NSO
Apple patches ForcedEntry vulnerability that was used to target political activists with spyware Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Sep 2021
BT advances hollow core fibre research with world’s first trial of quantum-secure comms
Incumbent UK telco announces latest innovations in hollow core fibre by conducting trial of ultra-secure network communications using commercial equipment over a 6km long Lumenisity CoreSmart cable Continue Reading
By- Joe O’Halloran, Computer Weekly
-
E-Zine
14 Sep 2021
Is 3D printing about to hit the mainstream?
In this week’s Computer Weekly, we find out about the emerging consumer services using 3D printing and ask if the technology is about to go mainstream. Our latest buyer’s guide looks at the importance of sustainable datacentres. And we analyse the risks of increasing contactless card spending limits and whether tech could help. Read the issue now. Continue Reading
-
News
13 Sep 2021
Smishing attacks up sevenfold in six months
Scam text messages are reaching pandemic proportions, thanks in part to the pandemic Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Sep 2021
Olympus likely victim of BlackMatter ransomware
Key IT systems remain shut off at Olympus, five days after what seems to have been a BlackMatter ransomware attack Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
13 Sep 2021
promiscuous mode
In computer networking, promiscuous mode is a mode of operation, as well as a security, monitoring and administration technique. Continue Reading
By -
Definition
13 Sep 2021
deep packet inspection (DPI)
Deep packet inspection (DPI) is an advanced method of examining and managing network traffic. Continue Reading
-
News
13 Sep 2021
UK government’s new digital identity system to cost up to £400m
Cabinet Office is seeking £300m-£400m in funding to build its replacement for the failed Gov.uk Verify system, which itself cost over £220m Continue Reading
By- Bryan Glick, Editor in chief
-
News
09 Sep 2021
UK GDPR faces changes under planned reforms
DCMS is launching a major consultation on proposed changes to the UK’s data protection regime, under which several key elements of the GDPR are likely to change Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Sep 2021
Latest Microsoft zero-day being actively exploited
New Microsoft zero-day CVE-2021-40444 affects multiple versions of Windows and is probably being exploited through convincing phishing attacks Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
09 Sep 2021
CW Europe: Dutch researchers build security software to mimic human immune system
In this issue of CW Europe, find out how researchers in the Netherlands are attempting to help IT systems fight certain cyber attacks in a similar way to the human immune system works. One of the team at Dutch research institute TNO was originally an immunologist, and saw parallels with the human immune system in the field of cyber security. Also in this issue, find out about the so-called “Klarna academy” in Stockholm, which has created the next set of Nordic fintech entrepreneurs. Continue Reading
-
Blog Post
08 Sep 2021
Law enforcement: Question the tech sector's motives
Perhaps there are application areas where law enforcement technology should not be used, one of the witnesses at a recent Justice and Home Affairs Committee meeting warned. Experts from the US, New ... Continue Reading
By- Cliff Saran, Managing Editor
- 08 Sep 2021
-
News
08 Sep 2021
REvil reappearance may herald new ransom campaigns
The re-emergence of the infamous REvil ransomware gang is a likely sign that more high-profile attacks will unfold over the coming weeks Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Sep 2021
Covid positive for security market, but still a source of stress
CIISec’s latest “State of the profession report” highlights both positives and challenges for cyber pros arising from the past two years Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
08 Sep 2021
Marriages Are Back On The Agenda – Even In IT
Ah – the return of “normality” in the UK – i.e., people are still getting ill but the government admits it doesn’t care any longer, other than by increasing taxes… But enough of the ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
News
08 Sep 2021
Stolen credit card data worth about £13 on dark web, PayPal worth more
The average price of a stolen credit card on a dark web marketplace comes in at around $17.40, or £12.60, according to new data – but the real money for cyber criminals is in hacked PayPal accounts Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
08 Sep 2021
Security Think Tank: Optimising privacy, post-GDPR
Airbus CyberSecurity CTO Paddy Francis explores the impact of regulation on data protection, and how it has changed how one goes about optimising data privacy in the enterprise Continue Reading
-
Feature
08 Sep 2021
Bridging the gender gap in cyber security
Some professional groups and companies in Asia are working hard to improve awareness of the cyber security profession and mentoring talented women in a bid to bridge the gender gap Continue Reading
By- Aaron Tan, TechTarget
-
News
07 Sep 2021
Procuring law enforcement tech needs greater scrutiny
Tech firms are playing a high-stakes game to drive adoption of artificial intelligence and surveillance technology in law enforcement Continue Reading
By- Cliff Saran, Managing Editor
-
News
07 Sep 2021
OT security in APAC remains work in progress
Two operational technology security experts shed light on the state of OT security in the region, and what’s being done to address skills, competency and organisational challenges Continue Reading
By- Aaron Tan, TechTarget
-
News
07 Sep 2021
ICO in bid to end cookie pop-ups
Outgoing information commissioner Elizabeth Denham will call on her equivalents across the G7 group of countries to collaborate on an overhaul of cookie consent pop-ups Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Sep 2021
Banking anti-fraud scheme blocks 65% more fraud
Scheme designed to protect vulnerable people against banking fraud has been expanded to include online scams Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Opinion
07 Sep 2021
Security Think Tank: A response to planned data protection changes
The ISF’s Emma Bickerstaffe assesses how organisations might respond to proposed changes to the UK’s data protection regime Continue Reading
By- Emma Bickerstaffe, Information Security Forum (ISF)
-
E-Zine
07 Sep 2021
Highways England delivers a digital roadmap
In this week’s Computer Weekly, we talk to the CDIO of Highways England about her digital services and asset management plans. We explore SIEM and SOAR security tools. And we find out how McLaren Racing is using data analytics to build its cars more efficiently. Read the issue now. Continue Reading
-
07 Sep 2021
Are proposed data protection changes a threat to UK citizens’ privacy?
Though changes are as-yet undefined pending an upcoming consultation, concerns are already being expressed over the government’s plan to liberalise data protection laws in the service of innovation and growth Continue Reading
-
Opinion
06 Sep 2021
The rise of the chief risk officer
The impact of the Covid-19 pandemic has seen chief risk officers take their rightful place in the boardroom Continue Reading
By- Chris Lorigan
-
Opinion
06 Sep 2021
UK’s new data protection strategy risks costing business more than it gains
The apparent business benefits of pursuing data adequacy agreements around the world may not be as enticing as they at first appear Continue Reading
By- Ben Rapp
-
News
06 Sep 2021
How NZ schools are tapping managed network services
Using managed network services has freed up time and resources for New Zealand school teachers and alleviated the pressure and challenges of maintaining technology infrastructure Continue Reading
By- Aaron Tan, TechTarget
-
Feature
06 Sep 2021
How do SOAR and SIEM services fare in a rapidly changing cyber threat landscape?
Given that cyber risks are rapidly growing in sophistication and number, we look at whether SIEM and SOAR security tools are still effective Continue Reading
-
News
03 Sep 2021
Berlin court reverses ban on use of EncroChat evidence in criminal trials
Berlin Superior Court allows use of EncroChat evidence in criminal trials but lawyers say the question will ultimately need to be decided by the German Supreme Court Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
03 Sep 2021
Mandiant, Sophos detail dangerous ProxyShell attacks
Threat researchers and incident responders continue to track threat activity around the dangerous ProxyShell Microsoft Exchange vulnerabilities, including impactful ransomware hits Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Sep 2021
China accused of cyber attacks on Norwegian IT systems
China-based cyber attackers have been blamed for multiple assaults on IT systems in Norway Continue Reading
By- Gerard O'Dwyer
-
News
02 Sep 2021
How high can the contactless card limit go without two-factor authentication?
The spending limit for contactless cards has reached an eyebrow-raising triple-digit figure – £100 – raising questions about the need for user authentication Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
02 Sep 2021
WhatsApp fined €225m over GDPR breaches
Irish data protection watchdog has issued one of the largest GDPR fines to date against Facebook-owned WhatsApp Continue Reading
By- Alex Scroxton, Security Editor
-
News
02 Sep 2021
Finance firms faced up to £760,000 costs per DNS attack during pandemic
Financial services firms have been the focus of attacks by cyber criminals during the Covid-19 crisis Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Opinion
02 Sep 2021
Protecting children in the digital playground
The ICO’s Age Appropriate Design Code ushers in a new set of standards that advance children’s rights in the digital age Continue Reading
By- Rachel O’Connell
-
News
02 Sep 2021
Twitter tests auto-block feature for accounts at risk of abuse
Latest Twitter feature automatically blocks abusive users, and is intended to help victims regain control of their experience on the platform Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
02 Sep 2021
Security Think Tank: Managing data securely throughout its lifecycle
Managing data in a secure manner is key to ensuring its integrity and therefore its value to the organisation, as well as reducing risk from breaches and misinformation Continue Reading
By- Andrew Morris, Turnkey Consulting
-
News
01 Sep 2021
Experts warn on Office 365 phishing attacks
Newly observed campaign is particularly dangerous because it appears to neutralise one of the most widely known anti-phishing techniques Continue Reading
By- Alex Scroxton, Security Editor
-
News
01 Sep 2021
Remote workers routinely bypassed security tools during pandemic
New data from Palo Alto Networks reveals that over 25% of UK security leaders saw their employees circumventing or switching off security measures at the height of the pandemic Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
01 Sep 2021
Making a mark in cyber security
Claudean Zheng’s knack for hacking landed her a career in cyber security, one that has been dotted by stints in both public and private sectors Continue Reading
By- Aaron Tan, TechTarget
-
News
31 Aug 2021
GovTech launches vulnerability rewards programme
Vulnerability rewards programme will offer rewards ranging from $250 to $5,000 to white hat hackers who find vulnerabilities in critical government systems Continue Reading
By- Aaron Tan, TechTarget
-
Definition
30 Aug 2021
logic bomb
A logic bomb is a string of malicious code that is inserted intentionally into a program to harm a network when certain conditions are met. Continue Reading
-
Definition
27 Aug 2021
Electronic Code Book (ECB)
Electronic Code Book (ECB) is a simple mode of operation with a block cipher that's mostly used with symmetric key encryption. Continue Reading
By -
Opinion
27 Aug 2021
Supply chain cyber security is only as strong as the weakest link
A spate of high-profile cyber attacks has highlighted the criticality of supply chain security and put new pressures on security leaders. How can we ensure that cyber security remains robust down the full length of supply chains? Continue Reading
By- Martin Smith, SASIG
-
Opinion
27 Aug 2021
How the cyber security market is evolving
The cyber security market has gained even greater importance in the post-Covid era and continues to grow and evolve. But what factors are driving trends in that market and what should your organisation consider when making cyber security investments? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Aug 2021
Are proposed data protection changes a threat to UK citizens’ privacy?
Though changes are as-yet undefined pending an upcoming consultation, concerns are already being expressed over the government’s plan to liberalise data protection laws in the service of innovation and growth Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
26 Aug 2021
stateful inspection
Stateful inspection, also known as dynamic packet filtering, is a firewall technology that monitors the state of active connections and uses this information to determine which network packets to allow through the firewall. Continue Reading