IT security
-
News
25 Oct 2024
Dutch critical infrastructure at risk despite high leadership confidence
Stark paradox in Dutch cyber security landscape has business leaders expressing high confidence in their IT infrastructure as cyber attacks rise Continue Reading
-
News
11 Jul 2024
Dutch research firm TNO pictures the SOC of the future
In only a few years, security operations centres will have a different design and layout, and far fewer will remain Continue Reading
-
Blog Post
04 Nov 2021
A For Automation
You might think that 3+ decades into the life of dedicated IT security products that said security landscape would be clearly defined and managed. In reality, it is anything but. The problem is not ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
News
03 Nov 2021
Spyware firm NSO and others added to US banned Entity List
US government bans target Israeli spyware makers and cyber firms in Russia and Singapore Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Nov 2021
Facebook self-imposes facial recognition moratorium
Facebook and Meta have committed to halting their use of facial recognition technology and deleting the biometric data of more than a billion people by the end of 2021, but will retain the underlying algorithms and software for potential use in future products Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
03 Nov 2021
UK’s Labour Party hit by third-party data breach
Data on Labour Party members was recently compromised in an apparent cyber attack on a third-party data processor Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
03 Nov 2021
Security Think Tank: SASE – marketing buzz or the future of security?
SASE architectures promise to prevent multiple types of cyber attacks, but deciding whether SASE is right for your organisation will require understanding whether SASE is a fit for your use cases in IT Continue Reading
By- Martin Kuppinger, KuppingerCole
-
Definition
03 Nov 2021
Report on Compliance (ROC)
A Report on Compliance (ROC) is a form that must be completed by all Level 1 Visa merchants undergoing a PCI DSS (Payment Card Industry Data Security Standard) audit. Continue Reading
By -
News
03 Nov 2021
BlackMatter ransomware crew shuts down, leaves victims in a bind
The BlackMatter ransomware gang appears to be winding down its activities, possibly due to pressure from law enforcement Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Nov 2021
Adelaide healthcare network digitises manual processes
The Central Adelaide Local Health Network has digitised manual processes in more than 20 speciality areas to improve patient experience and alleviate the workloads of frontline staff Continue Reading
By- Aaron Tan, TechTarget
-
News
02 Nov 2021
Electronic waste excluded from COP26 agenda
Data sanitation industry group calls on UK government to add electronic waste to the climate summit’s agenda Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
02 Nov 2021
Convicted Silk Road admin stripped of £500k in crypto earnings
Jailed Silk Road administrator Thomas White, aka Cthulhu, has been ordered to hand over more than £490,000 of illicit earnings Continue Reading
By- Alex Scroxton, Security Editor
-
02 Nov 2021
Security Think Tank: Optimising privacy, post-GDPR
Airbus CyberSecurity CTO Paddy Francis explores the impact of regulation on data protection, and how it has changed how one goes about optimising data privacy in the enterprise Continue Reading
-
E-Zine
02 Nov 2021
What the Budget means for UK technology
In this week’s Computer Weekly, we look through the Chancellor’s Autumn Budget and Spending Review to find what it means for the UK tech sector. As COP26 starts, we assess the green credentials of the IT industry. And we hear one CTO’s experiences of learning the privacy lessons of GDPR. Read the issue now. Continue Reading
-
News
01 Nov 2021
Businesses and governments urged to take action over Trojan Source supply chain attacks
Businesses and governments have been put on alert to guard against Trojan Source hacking attacks Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
01 Nov 2021
MPs and Lords grill Facebook over online safety efforts
Facebook answers British lawmakers’ questions about the social media giant’s efforts to ensure the safety of its users, as part of legislative security of the government's proposed online safety bill Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
01 Nov 2021
Is SASE mere vendor hype? It’s more nuanced than that
There’s no doubt that SASE is being overhyped, but nevertheless the concept holds value that security teams should not discount, according to PA Consulting analysts Continue Reading
By- Toby Sibley, William Blackwell, Farrukh Ahmad
-
Definition
29 Oct 2021
shoulder surfing
Shoulder surfing is using direct observation techniques, such as looking over someone's shoulder, to get information. Continue Reading
-
News
29 Oct 2021
GDS secures up to £400m funding for One Login digital identity project
HM Treasury agrees to spending review bid from Cabinet Office to create the new single sign-on system for government over the next three years Continue Reading
By- Bryan Glick, Editor in chief
-
Feature
29 Oct 2021
Online Safety Bill puts user protection onus on platform providers
The Online Safety Bill will place new duties and responsibilities on online platforms accessible from the UK, but as it currently stands, it contains several grey areas Continue Reading
-
News
29 Oct 2021
Facebook rebrands to Meta amid continuing controversies
Facebook has changed its corporate name to Meta to support its work on the next generation of “social technologies”, but concerns around trust and privacy persist Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Definition
29 Oct 2021
data at rest
Data at rest is a term that is sometimes used to refer to all data in computer storage while excluding data that is traversing a network or temporarily residing in computer memory to be read or updated. Continue Reading
By- Ben Lutkevich, Site Editor
-
Opinion
29 Oct 2021
Changing the rules against cyber attacks
UKRI’s John Goodacre reveals how projects supported by the Digital Security by Design Challenge aim to improve cyber security resilience, beginning with the very fundamentals of computing Continue Reading
By- John Goodacre
-
News
28 Oct 2021
CIA sought revenge against Julian Assange over hacking tool leaks, court hears
The CIA discussed kidnapping Julian Assange after WikiLeaks published thousands of documents revealing its arsenal of hacking tools, defence lawyers tell a London court Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
28 Oct 2021
Illegal state surveillance in Africa ‘carried out with impunity’
Analysis of surveillance laws and practices in six African countries finds that existing privacy laws are failing to protect citizens from illegal digital surveillance, which is being facilitated and enabled by global tech companies Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
28 Oct 2021
How ransomware crews pile on the pressure to get victims to pay
Sophos researchers share some of the more common tactics ransomware gangs use to pressurise their victims into paying up Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Oct 2021
‘No-one extradited from UK to US has committed suicide,’ US tells court in Assange appeal
US government claims that a district judge has given WikiLeaks founder Julian Assange a ‘trump card’ to avoid extradition Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
27 Oct 2021
Government commits millions to security investment
Spending Review adds more than £750m of funding to improve cyber security resilience across government Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Oct 2021
Cyber sector growth exacerbating skills shortage
Data from security association (ISC)² shows demand for cyber pros is still outpacing supply as the sector continues an upward growth trajectory Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Oct 2021
DarkMarket takedown results in 150 arrests
A coordinated operation by law enforcement has seen 150 taken into custody amid allegations of buying or selling illicit goods on the dark web Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Oct 2021
Cyber experts on how to nobble a Nobelium attack
A recent spate of attempted Nobelium cyber attacks were mostly unsuccessful, but serve as a reminder to pay attention to some more fundamental aspects of security Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
26 Oct 2021
encryption key
In cryptography, an encryption key is a variable value that is applied using an algorithm to a string or block of unencrypted text to produce encrypted text or to decrypt encrypted text. Continue Reading
By- Peter Loshin, Former Senior Technology Editor
-
E-Zine
26 Oct 2021
Managing cyber risk by integrating supply chains
In this week’s Computer Weekly, our latest Buyer’s Guide examines the security and IT integration challenges of modern supply chains, especially post-pandemic – while we also talk to the CEO of software provider SolarWinds about how the company overcame its huge supply chain attack. And we look at how a small town in Lancashire was chosen as the HQ for the UK’s new National Cyber Force. Read the issue now. Continue Reading
-
News
26 Oct 2021
Lacework expands into ANZ, eyes APAC market
DevSecOps supplier Lacework’s expansion into Australia and New Zealand will pave the way for a broader move into the Asia-Pacific region Continue Reading
By- Aaron Tan, TechTarget
- 25 Oct 2021
- 25 Oct 2021
- 25 Oct 2021
-
Blog Post
25 Oct 2021
At last, the UK has a mass-market digital identity system - now let's use it
Great news for all those who have followed the troubles and travails of digital identity in the UK for the past couple of decades. Finally, we have a digital ID system, developed in the public ... Continue Reading
By- Bryan Glick, Editor in chief
-
News
25 Oct 2021
Attempted hack causes Tesco website outage
Retailer’s website and app back after attempted hack caused problems over the weekend Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
22 Oct 2021
Multi-government operation targets REvil ransomware group
REvil has been forced offline by a multi-government hacking operation, marking the second time in 2021 that the group has gone dark Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
22 Oct 2021
MEPs vote to expand Europol data mandate
The European Parliament has voted in favour of expanding Europol’s mandate to process data and develop AI tools, but critics claim it contradicts a previous vote which opposed using new technologies to predict crime Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
21 Oct 2021
Airport operator MAG boosts threat visibility with hybrid SOC
With budget concerns weighing heavy during the pandemic, Manchester Airports Group ditched an impending capex-heavy cyber investment in favour of a hybrid managed/in-house approach. Learn more about its experience Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
21 Oct 2021
script kiddie
Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of internet security weaknesses. Continue Reading
By- Ben Lutkevich, Site Editor
-
News
21 Oct 2021
APAC organisations warm to zero trust
Two-thirds of APAC organisations have a zero-trust strategy even as they grapple with the lack of skills and other organisational challenges, study finds Continue Reading
By- Aaron Tan, TechTarget
-
News
20 Oct 2021
US intelligence agencies issue advisory on BlackMatter gang
Joint advisory on ransomware gang warns about potential of further attacks on critical infrastructure providers Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
20 Oct 2021
LightBasin hackers breach 13 telcos in two years
Hackers have obtained an undisclosed volume of subscriber information and call metadata in a sustained campaign against telecommunications firms Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
20 Oct 2021
Police IT buyers should compel suppliers to prove AI claims
House of Lords told that UK law enforcement bodies should use their position as buyers to compel private sector suppliers to divulge more information about how their AI-powered technologies work Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Feature
19 Oct 2021
Back on the office network: What are the risks for mobile users?
Many people are returning to offices and bringing their mobile devices with them. What are the cyber security implications of this? Continue Reading
-
Blog Post
18 Oct 2021
Time to take a step back on police use of facial recognition
We’ve all seen the detective shows on TV. The cops find a CCTV picture of the likely “perp”. The put-upon junior detective is tasked with wading through a database of photos in the hope of finding ... Continue Reading
By- Bryan Glick, Editor in chief
-
News
18 Oct 2021
How Samlesbury, Lancashire became the home of the National Cyber Force
The National Cyber Force, a new branch of the military, is gearing up to fight battles in cyber space from the fields of Lancashire. Its presence is expected to bring a high-tech renaissance to the region Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
18 Oct 2021
DCMS appoints Plexal to drive telecoms diversity strategy
Government chooses UK innovation company to understand and develop the role of SMEs in the telecoms market with particular reference to how to create a diverse market that supports the creation of home-grown, sovereign technology Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Opinion
18 Oct 2021
No easy fix for vulnerability exploitation, so be prepared
Vulnerability management and disclosure is a tricky business with ethical and business ramifications for software vendors, CISOs and ethical hackers alike – and CISOs sit right in the middle of this Continue Reading
By- Andrew Morris, Turnkey Consulting
-
Definition
15 Oct 2021
Uniform Resource Identifier (URI)
A Uniform Resource Identifier (URI) is a character sequence that identifies a logical (abstract) or physical resource -- usually, but not always, connected to the internet. A URI distinguishes one resource from another. Continue Reading
By- Rahul Awati
- Fred Churchville, TechTarget
-
Opinion
15 Oct 2021
Doing the right thing: How CISOs should approach responsible disclosure
Owen Wright, responsible for penetration testing and adversary simulation at Context, part of Accenture Security, advises how CISOs should approach responsible disclosure Continue Reading
By- Owen Wright, Accenture Security
-
News
14 Oct 2021
Apple scheme to detect child abuse creates serious privacy and security risks, say scientists
Apple’s plan to automatically scan photos to detect child abuse would unduly risk the privacy and security of law-abiding citizens and could open up the way to surveillance, say the world’s top cryptographic experts Continue Reading
By- Duncan Campbell , 2QQ Ltd, Sussex University
-
E-Zine
14 Oct 2021
CW APAC, October 2021: Tech Career Guide
Despite marked improvements, tech still faces a diversity problem. In this handbook, focused on cyber security’s gender gap in the Asia-Pacific region, Computer Weekly looks at the mentoring programmes aiming to combat the issue, the career path of IAG’s Elaine Muir, how hacking won Claudean Zheng a job and what else needs to be done to tackle the ongoing gender imbalance Continue Reading
-
News
14 Oct 2021
NHS Digital enhances in-house cyber awareness drive
Keep IT Confidential campaign aims to help NHS staff understand more about security threats and learn how to reduce risk Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
14 Oct 2021
Encryption protects the marginalised – and it’s under threat
Encryption keeps marginalised groups connected and safe, but new regulatory attempts to break it put them at risk Continue Reading
By- Callum Voge
-
News
14 Oct 2021
Generation Novel hybrid workers bring new demands and risks
Aruba survey warns business leaders that they must strike a balance between flexibility and security to address risky behaviours and evolving expectations of today’s tech-savvy workforce Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
13 Oct 2021
Google Cybersecurity Action Team springs into life
Google has announced a new Cybersecurity Action Team, with a mission to support security and digital transformation in governments, critical infrastructure, enterprises and small businesses Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Oct 2021
FCA warns over future hybrid working security risks
Earlier this week, the Financial Conduct Authority issued fresh guidance to regulated organisations on keeping hybrid workers safe and secure Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Oct 2021
Microsoft warns of MysterySnail on October Patch Tuesday
Microsoft has fixed a zero-day that is being actively exploited to deliver a new remote access trojan dubbed MysterySnail to targets Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Oct 2021
Former signals intel leader named godfather of UK security
Sixth annual Security Serious Unsung Heroes Awards honours former Royal Corps of Signals colonel and infosec pioneer John Doody Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Oct 2021
Australia unveils ransomware action plan
The Australian government has established a task force to address the ransomware menace and is proposing legislation to mandate reporting of ransomware incidents by businesses Continue Reading
-
News
12 Oct 2021
BCS calls on government to retain protections against AI
BCS, the Chartered Institute for IT, wants the government to retain protections that allow people to have decisions about them made by an AI reviewed by humans if needed Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Oct 2021
Ban UK police use of facial-recognition, House of Lords told
Experts giving evidence to the House of Lords have said that UK police use of facial-recognition technology is disproportionate and ineffective, and further questioned the utility of algorithmic crime ‘prediction’ tools Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
12 Oct 2021
Microsoft thwarts mega-DDoS attack on Azure platform
2.4Tbps DDoS attack on an undisclosed Microsoft Azure customer may have been the largest ever attempted against a single target Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Oct 2021
Malaysia’s highway authority improves DR capabilities
The Malaysian Highway Authority is now more resilient against cyber attacks through a local disaster-recovery-as-a-service offering powered by Veeam software Continue Reading
By -
News
11 Oct 2021
Covid-19 will loom over cyber strategy for years to come
In remarks delivered to a Chatham House conference, NCSC head Lindy Cameron reflects on the security challenges facing the UK, and sets out some plans for the future Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Oct 2021
Sensitive documents to stay with whistleblower after deadline for agreement for their return passes
A deadllne to agree the safe return of the sensitive banking details of former and current NatWest Group customers has passed without agreement Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
11 Oct 2021
Singapore refreshes cyber security strategy
The city-state updates its national cyber security strategy to shore up the security of critical infrastructure and enterprises while growing its cyber security industry, among other goals Continue Reading
By- Aaron Tan, TechTarget
-
News
08 Oct 2021
Craft beer specialist Brewdog fixes serious app vulnerability
Vulnerability in brewer’s mobile app could have resulted in serious consequences for its shareholders and customers Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Oct 2021
Fast-moving Ryuk campaign targets healthcare organisations
Newly designated FIN12 gang leverages the work of the cyber criminal ecosystem to conduct lightning-fast ransomware attacks Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Oct 2021
NatWest admits to weaknesses in anti-money laundering systems
Bank pleads guilty to failures concerning the laundering of hundreds of millions of pounds, but says it has since improved its anti-money laundering systems Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Opinion
07 Oct 2021
Addressing the backup dilemma to ransomware recovery
Everyone knows good backups are essential if one is to recover from a ransomware attack, but using them effectively poses challenges that IT teams need to know about Continue Reading
By- W Curtis Preston
-
News
07 Oct 2021
ICO expresses concerns over its future independence
In its response to the government’s data protection consultation, the Information Commissioner’s Office has raised worries over its future ability to function independently of government interference Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
07 Oct 2021
What is a next-generation firewall (NGFW)?
A next-generation firewall (NGFW) is part of the third generation of firewall technology that can be implemented in hardware or software. Continue Reading
By- Casey Clark, TechTarget
- Sharon Shea, Executive Editor
-
News
07 Oct 2021
Uber faces legal action over ‘racist’ facial verification system
Two UK-based unions are taking Uber to court, claiming their members have been unfairly dismissed as a result of misidentification by the company’s facial verification system Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
07 Oct 2021
Twitch data breach investigations continue
Investigations are ongoing into a 125GB data breach that hit livestreaming platform Twitch, apparently the work of hacktivists Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
07 Oct 2021
CW Middle East: Middle East hospitals accelerate take-up of healthcare technologies
The Middle East is accelerating its take-up of digital healthcare technologies following lessons learned during the Covid-19 pandemic, with regional government turning to technology to track disease trends and monitor treatment. Also read in this issue how the UAE’s National Program for Coders will offer ‘golden visas’ to 100,000 entrepreneurs, enterprise owners and startups. Continue Reading
-
News
06 Oct 2021
US lawmakers propose ransomware reporting rules
Former presidential candidate Elizabeth Warren lends her support to a bill that would require corporate ransomware victims to disclose more information about their attacks to the authorities Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
06 Oct 2021
Security Think Tank: Responsible vulnerability disclosure is a joint effort
By working hand-in-hand, developers and security researchers can both play a vital role in ensuring newly-discovered vulnerabilities are addressed appropriately, writes Paddy Francis of Airbus CyberSecurity Continue Reading
-
News
06 Oct 2021
Gaming service Twitch hacked, data leaked
Users of livestreaming platform Twitch may be at risk after a 125GB torrent of data was leaked Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Oct 2021
Apache web server users urged to patch immediately
New zero-day in Apache HTTP Server is already being actively exploited and must be addressed immediately Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Oct 2021
Auto-enrolment begins for Google multi-factor authentication
Google has started to turn on multi-factor authentication on consumer accounts by default, and aims to auto-enrol 150 million users by the end of 2021 Continue Reading
By- Alex Scroxton, Security Editor
-
Podcast
06 Oct 2021
Top women in UK tech, AI on puffin island – Computer Weekly Downtime Upload podcast
In this episode, Caroline Donnelly, Clare McDonald and Brian McKenna discuss CW’s annual programme to choose the most influential women in UK tech, as well as Newham Sparks, and puffin-counting AI Continue Reading
By- Caroline Donnelly, Senior Editor, UK
- Clare McDonald, Business Editor
- Brian McKenna, Enterprise Applications Editor
-
News
06 Oct 2021
Israeli Orca to invest in UK cyber scene
Tel Aviv-headquartered Orca Security wants to set up a new R&D centre in the UK Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
05 Oct 2021
New strategies needed to close the cyber security skills gap
Teaching cyber security in schools is a long-term solution to a present-day problem Continue Reading
By- Martin Smith, SASIG
-
News
05 Oct 2021
New Python-based ransomware attacks unfold in record time
Sophos researchers detail a new variety of Python-based ransomware attack targeting VMware ESXi-hosted VMs Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
05 Oct 2021
Invest in cyber security with confidence using a structured approach
Cyber security has never been more challenging or important in rapidly changing business, regulatory, IT and threat environments. There is a need for a more structured approach to investment Continue Reading
By- Warwick Ashford, Senior analyst
-
Definition
05 Oct 2021
Layer Two Tunneling Protocol (L2TP)
Layer Two Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling Protocol (PPTP) used by an internet service provider (ISP) to enable the operation of a virtual private network (VPN) over the internet. Continue Reading
By -
Opinion
05 Oct 2021
Keeping the UK in the global race to adopt digital identity
The UK government’s proposed digital ID trust framework is a step in the right direction, but more is needed to ensure the successful adoption of digital identity across the economy Continue Reading
By- Nick Mothershaw, OIX
-
Opinion
05 Oct 2021
ICO cookie consent: How will the plan affect businesses?
A data privacy and compliance expert considers what the ICO’s proposals for an overhaul of cookie consent procedures could mean for businesses Continue Reading
By- Peter Borner
-
News
05 Oct 2021
Facebook unplugged for six hours due to configuration error
A configuration change effectively disconnected Facebook from the internet, with billions affected by loss of services Continue Reading
By- Cliff Saran, Managing Editor
-
News
05 Oct 2021
Australian organisations lack maturity in responsible AI
Most Australian organisations are still in the early stages of their responsible artificial intelligence efforts despite growing use of AI by businesses and consumers, study finds Continue Reading
By- Aaron Tan, TechTarget
-
News
04 Oct 2021
Mandiant name returns to fore ahead of FireEye sale
Mandiant has completed its corporate rebrand pending the imminent sale of the FireEye products business to a private equity group Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Oct 2021
One Identity buys OneLogin for access management expertise
Acquisition of OneLogin adds access management solutions to One Identity’s Unified Identity Security platform Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Oct 2021
Two arrests made in European ransomware investigation
Unnamed ransomware operation was disrupted last week in Kiev, Ukraine, following a coordinated investigation Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
04 Oct 2021
Security Think Tank: Embracing vulnerability management for the greater good
When it comes to vulnerability management, CISOs should define a responsible disclosure policy so that they can receive and manage identified vulnerabilities transparently, practically and collaboratively, says Paul Watts of the ISF Continue Reading
By- Paul Watts, Information Security Forum
-
News
04 Oct 2021
How GYG Singapore moved to paperless contracts
The Singapore franchisee of Mexican cuisine specialist Guzman y Gomez has turned to electronic agreements and digital signatures to ease the administrative burden on its HR team Continue Reading
By- Aaron Tan, TechTarget
-
News
01 Oct 2021
Met Police purchase new retrospective facial-recognition system
Retrospective facial-recognition software purchased for £3m by the Met Police will be deployed in coming months amid continuing controversy around the use of biometric technologies by law enforcement bodies Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
01 Oct 2021
Amnesty International exploited in malware campaign
According to new intelligence from Cisco Talos, Amnesty International’s branding and profile is being used as part of a new malware campaign that exploits people’s fears of the notorious Pegasus spyware app Continue Reading
By- Alex Scroxton, Security Editor