IT security
- 
				News
					30 Oct 2025
					
									
										  Yubico bolsters APAC presence, touts device subscriptionsYubico is moving beyond one-off product sales, hiring local teams in Singapore and pitching its subscription service to help enterprises secure employee access to corporate networks and applications Continue Reading By- Aaron Tan, Informa TechTarget
 
- 
				News
					30 Oct 2025
					
									
										  US senators seek to prohibit minors from using AI chatbotsTwo US senators have proposed legislation that would require AI chatbot companies to verify the ages of people using their chatbots, in attempt to limit their harmful effects on children Continue Reading 
- 
                News
                21 Jan 2022
                  ICO criticises government-backed campaign to delay end-to-end encryptionData protection watchdog warns that delaying end-to-end encryption will put children at risk Continue Reading By- Bill Goodwin, Investigations Editor
 
- 
                News
                21 Jan 2022
                  Cyber pros: Don’t revel in REvil’s downfall just yetThe arrests of REvil’s alleged kingpins is a welcome step, but as with any disruption to cyber criminal activity, it is never wise to assume law enforcement action means the threat has passed entirely Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                21 Jan 2022
                  New normal sees SASE, SD-WAN surge as MPLS is phased outResearch confirms that MPLS is ‘out’ and SD-WAN and SASE systems are the clear winners in enterprise networking as more and more European organisations are eliminating all on-prem datacentres, with cloud adoption steaming ahead Continue Reading By- Joe O’Halloran, Computer Weekly
 
- 
                News
                21 Jan 2022
                  Scam losses in Australia hit record highAustralians lost a record A$323.7m to scams last year, with investment and romance scams accounting for the bulk of their losses Continue Reading By- Aaron Tan, Informa TechTarget
 
- 
                News
                20 Jan 2022
                  Ransomware attacks dropped 37% in December, claims NCCLatest monthly data reveals a significant decline in ransomware attacks at the end of 2021, but a new, emergent gang is making waves Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                20 Jan 2022
                  Updated cyber security regulations proposed for managed services sectorThe Network and Information Systems regulations are to be updated to include MSPs and outsourcers, following a spate of supply chain attacks Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                20 Jan 2022
                  Data of 515,000 vulnerable people stolen in Red Cross attackThe International Committee of the Red Cross is probing a cyber attack that has already seen the personal data of hundreds of thousands of the world’s most vulnerable people compromised Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                20 Jan 2022
                  MoonBounce firmware bootkit shows advances in malicious implantsMoonBounce firmware bootkit shows evident technical improvements over others, making it a more dangerous threat to organisations. It is being used by Chinese state-backed actors Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                20 Jan 2022
                  Delayed pay: Umbrella company cyber attacks disrupt salary payments to thousands of contractorsThousands of contractors across the UK are anxiously waiting to see if their payroll cycles will be disrupted for a second week, after two of the umbrella industry's biggest players were targeted by cyber criminals Continue Reading By- Caroline Donnelly, Senior Editor, UK
 
- 
                Opinion
                20 Jan 2022
                  Security Think Tank: Cyber training is useless without staff empowermentIn-house or outsourced? What makes a good security training programme, and what questions should buyers ask when procuring training as a service? Continue Reading By- Tim Holman, 2-sec
 
- 
                News
                20 Jan 2022
                  NCSC for Startups programme seeks ransomware-bustersInnovative ideas for ransomware-busting technology are being sought by the UK’s National Cyber Security Centre and startup incubator Plexal Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                20 Jan 2022
                  Singapore to tighten digital banking securityBanks in Singapore will have to put in place more stringent measures to combat the rise in online phishing scams targeted at bank customers in the city-state Continue Reading By- Aaron Tan, Informa TechTarget
 
- 
                News
                19 Jan 2022
                  Government funds charity campaign to warn big tech over the risks of encryption to childrenBarnardo’s and other charities begin a government-backed PR campaign to warn of the dangers end-to-end encryption poses to child safety, which has been criticised as being ‘one-sided’ Continue Reading By- Bill Goodwin, Investigations Editor
 
- 
                News
                19 Jan 2022
                  Investigators find Beijing 2022 app riddled with security flawsSecurity flaws in Olympic app may put personal health data at risk of compromise in a man-in-the-middle attack Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Feature
                19 Jan 2022
                  Cloud-era disaster recovery planning: Assessing risk and business impactIn the first in a series on cloud-era disaster recovery, we provide a step-by-step guide to building firm foundations for the disaster recovery plan, with risk assessment and business impact analysis Continue Reading By
- 
                News
                19 Jan 2022
                  Chasm exists between ‘true’ and portfolio SASE approachesSurvey of enterprise IT leaders finds little difference between respondents without SASE and those who adopted SASE product portfolios regarding issues such as trade-offs between performance and security Continue Reading By- Joe O’Halloran, Computer Weekly
 
- 
                Blog Post
                19 Jan 2022
                  2022: Time to take algorithm-enhanced online abuse seriouslyThe algorithms used by dominant social media companies have compounded the risks to unsupervised children in their bedrooms by automating the processes predators use to find and groom potential ... Continue Reading By- Philip Virgo, Winsafe Ltd
 
- 
                News
                19 Jan 2022
                  Trellix looks to democratise access to XDR in APACThe company formed from the merger of FireEye Enterprise and McAfee will team up with managed service providers, among other efforts, to democratise access to extended detection and response capabilities in the region Continue Reading By- Aaron Tan, Informa TechTarget
 
- 
                News
                19 Jan 2022
                  Trellix XDR platform forged out of McAfee, FireEye unionThe private equity owners of McAfee Enterprise and FireEye are merging the companies into a new entity to ‘define the future’ of cyber security through XDR technology Continue Reading By- Alex Scroxton, Security Editor
 
- 
                18 Jan 2022
                  Cyber security failure one of biggest risks facing countries and businesses, warns WEFCyber risks are among the top five risks facing organisations and governments over the next two to five years. Digital inequality and the over-crowding of space with communication satellites present further risks Continue Reading 
- 
                E-Zine
                18 Jan 2022
                  The race to quantum computingIn this week’s Computer Weekly, researchers are racing to create the first commercially useful quantum computer – we look at one of the European candidates. Cyber security is one of the greatest risks facing the global economy, warns the World Economic Forum. And we examine the role of employee experience in hybrid working. Read the issue now. Continue Reading 
- 
                News
                18 Jan 2022
                  Exium, Teneo team to deliver digital experience, 5G-capable SASE platformWork-from-anywhere IT services company and cyber security provider enter into partnership to assist lean enterprise IT teams in their transition to a secure access service edge Continue Reading By- Joe O’Halloran, Computer Weekly
 
- 
                News
                18 Jan 2022
                  Police take down VPN linked to multiple ransomware hitsGerman police led a multinational effort to seize and take down the LabVPN service, which was allegedly used by cyber criminals to facilitate ransomware attacks Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                18 Jan 2022
                  Cobalt Strike still C2 infrastructure of choiceIts utility and ease of use, coupled with explosive growth in ransomware actions, makes Cobalt Strike Team Servers the C2 infrastructure of choice for malicious actors Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                17 Jan 2022
                  Test police algorithms in court rather than legislate, Lords toldPolice algorithms and their impacts should be tested and challenged in court, rather than controlled by new laws, says policing minister Continue Reading By- Sebastian Klovig Skelton, Data & ethics editor
 
- 
                News
                17 Jan 2022
                  ‘Russian-backed’ hackers defaced Ukrainian websites as cover for dangerous malware attackKiev claims that a hacking group in Belarus – a close ally of Russia – was responsible for hacking Ukrainian government websites amid threats of military action Continue Reading By- Bill Goodwin, Investigations Editor
 
- 
                News
                17 Jan 2022
                  Top three questions about the Log4j vulnerabilitySingapore’s Ensign Infosecurity answers the top three questions about the impact of the Log4j vulnerability Continue Reading By- Aaron Tan, Informa TechTarget
 
- 
                News
                17 Jan 2022
                  Umbrella firm Parasol confirms ‘malicious activity’ as root cause of ongoing systems outageUmbella company confirms a ‘malicious activity on its network’ as the root cause of a systems outage that has delayed salary payments to thousands of contractors across the UK Continue Reading By- Caroline Donnelly, Senior Editor, UK
 
- 
                News
                14 Jan 2022
                  Nato offers tech support after 'massive cyber attack' hits UkraineSpeculation mounts that Russia is behind a cyber attack which defaced Ukrainian government websites amid growing international tension Continue Reading By- Bill Goodwin, Investigations Editor
 
- 
                Podcast
                14 Jan 2022
                  Podcast: 2022 compliance preview – GDPR goes globalWe talk to Mathieu Gorge, CEO of VigiTrust, about what’s looming in compliance, with regulations based on the principles of the General Data Protection Regulation plus the concept of cyber accountability Continue Reading By- Antony Adshead, Storage Editor
 
- 
                News
                14 Jan 2022
                  Umbrella company Brookson self-refers to NCSC following cyber attack on its networkContractor payroll, accounting and compliance firm confirms its networks have been targeted by an ‘extremely aggressive’ cyber attack that has resulted in some of its systems being proactively taken offline Continue Reading By- Caroline Donnelly, Senior Editor, UK
 
- 
                News
                14 Jan 2022
                  Parasol systems outage leaves umbrella contractors facing late paymentsMulti-day outage leaves umbrella company contractors working for payroll processing firm Parasol facing late salary payments, with the firm remaining tight-lipped over the cause of its technical difficulties Continue Reading By- Caroline Donnelly, Senior Editor, UK
 
- 
                News
                13 Jan 2022
                  Nordic companies targeted in wave of cyber attacksAfter a slew of cyber attacks hit major companies in the Nordics at the end of last year, we look at how they were affected and how they have recovered Continue Reading By- Gerard O'Dwyer
 
- 
                News
                13 Jan 2022
                  NCSC sounds alarm over Russia-backed hacksThe UK’s National Cyber Security Centre joins US calls to be wary of Russian state interference in critical national infrastructure IT systems Continue Reading 
- 
                News
                13 Jan 2022
                  ICO investigates police use of app to covertly record calls from mobile phonesSurrey and Sussex police forces call in regulators after 1,000 police officers downloaded an app to covertly record phone calls on police-issued mobile phones Continue Reading By- Bill Goodwin, Investigations Editor
 
- 
                News
                12 Jan 2022
                  MEPs demand EU probe into Pegasus spyware abuseA group of European Parliament Members has called for an EU-wide investigation into NSO Group’s Pegasus spyware after it emerged EU member states may have used it Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                12 Jan 2022
                  UK government bodies challenged on secure identityPublic sector bodies in the UK recognise secure identity and access management as critical to the roll-out of digital services, but face challenges in addressing this Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                12 Jan 2022
                  Microsoft fixes six zero-days in January Patch Tuesday updateA larger than of late Patch Tuesday update from Microsoft comes as defenders continue to grapple with Log4Shell Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                12 Jan 2022
                  Dutch cyber volunteers receive major funding boostThe Dutch Institute for Vulnerability Disclosure has received a $100,000 donation to expand the scope of its work Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                12 Jan 2022
                  Macquarie joins NSW government’s cloud supplier panelNew South Wales state agencies will be able to access Macquarie’s sovereign cyber expertise and secure cloud, network and datacentre services Continue Reading By- Aaron Tan, Informa TechTarget
 
- 
                News
                11 Jan 2022
                  Almost half of Log4j downloads still dangerously exposedWhether by error or design is unclear, but a great many IT teams are still exposing themselves by downloading outdated, insecure versions of Apache Log4j Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Definition
                11 Jan 2022
                  RijndaelRijndael (pronounced rain-dahl) is an Advanced Encryption Standard (AES) algorithm. Continue Reading By
- 
                Definition
                11 Jan 2022
                  Public-Key Cryptography Standards (PKCS)Public-Key Cryptography Standards (PKCS) are a set of standard protocols, numbered from 1 to 15. Continue Reading By
- 
                News
                11 Jan 2022
                  Banks accused of neglecting customer security measuresWhich? singles out Metro Bank, Virgin Money and TSB over insecure online banking processes Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                11 Jan 2022
                  IT departments struggling to secure printer endpointsPrinters are at risk of attack, just as any other endpoint device, but many IT leaders are struggling to secure their print infrastructure Continue Reading By- Cliff Saran, Managing Editor
 
- 
                News
                11 Jan 2022
                  Companies propose scanning content pre-encryption to fight CSAMFirms working on the UK government’s Safety Tech Challenge have suggested that scanning content before encryption will help prevent the spread of child sexual abuse material – but privacy concerns remain Continue Reading By- Sebastian Klovig Skelton, Data & ethics editor
 
- 
                News
                11 Jan 2022
                  Cyber security failure one of biggest risks facing countries and businesses, warns WEFCyber risks are among the top five risks facing organisations and governments over the next two to five years. Digital inequality and the over-crowding of space with communication satellites present further risks Continue Reading By- Bill Goodwin, Investigations Editor
 
- 
                News
                11 Jan 2022
                  Proofpoint acquires Singapore data security startupProofpoint’s acquisition of Dathena will bolster its data loss prevention capabilities, enabling organisations to better understand information risk through the use of AI Continue Reading By- Aaron Tan, Informa TechTarget
 
- 
                Photo Story
                10 Jan 2022
                  Blackberry OS end of supportThe end of support for Blackberry's smartphone operating system represents the end of an era in mobile technology Continue Reading By- Cliff Saran, Managing Editor
 
- 
                Definition
                10 Jan 2022
                  honeynetA honeynet is a network set up with intentional vulnerabilities hosted on a decoy server to attract hackers. Continue Reading By
- 
                News
                10 Jan 2022
                  Ministry of Justice caught up in multiple cyber incidentsBesides multiple disclosed data breaches, department was also affected by two ransomware attacks Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Definition
                10 Jan 2022
                  trusted computing base (TCB)A trusted computing base (TCB) is everything in a computing system that provides a secure environment for operations. Continue Reading By
- 
                News
                09 Jan 2022
                  Singapore retailer hit by data breachThe personal data of OG’s basic and gold members stored in a database managed by a third-party service provider was reportedly compromised Continue Reading By- Aaron Tan, Informa TechTarget
 
- 
                News
                06 Jan 2022
                  France fines Facebook and Google over alleged cookie malpracticeFrench data protection authorities clamp down on tech platforms for purposely making it more burdensome for users to decline tracking cookies Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                05 Jan 2022
                  Judges to decide whether Assange can appeal against extradition as he reaches 1,000 days in jailMexican president Andrés Manuel López Obrador urges US to treat WikiLeaks founder Julian Assange with humanity and to consider Mexico’s offer to grant Assange asylum Continue Reading By- Bill Goodwin, Investigations Editor
 
- 
                News
                05 Jan 2022
                  Google buys Siemplify in first phase of cyber investmentOnce integrated into Google Cloud, Siemplify’s platform will serve as the basis for deeper security development at Google Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Definition
                04 Jan 2022
                  access logAn access log is a list of all requests for individual files -- such as Hypertext Markup Language files, their embedded graphic images and other associated files that get transmitted -- that people or bots have made from a website. Continue Reading By
- 
                News
                04 Jan 2022
                  Admins warned that Exchange date fix will take time to roll outAt the start of the New Year, Exchange 2016 and 2019 email servers started queuing email messages due to a date bug Continue Reading By- Cliff Saran, Managing Editor
 
- 
                News
                03 Jan 2022
                  How APAC firms can stay ahead of cyber threatsOrganisations will need to develop behavioural detection, machine learning and threat hunting capabilities to keep pace with the onslaught of cyber attacks Continue Reading By- Aaron Tan, Informa TechTarget
 
- 
                News
                31 Dec 2021
                  Top 10 crime, national security and law stories of 2021Here are Computer Weekly’s top 10 crime, national security and law stories of 2021 Continue Reading By- Bill Goodwin, Investigations Editor
 
- 
                News
                30 Dec 2021
                  Top 10 technology and ethics stories of 2021Here are Computer Weekly’s top 10 technology and ethics stories of 2021 Continue Reading By- Sebastian Klovig Skelton, Data & ethics editor
 
- 
                Definition
                29 Dec 2021
                  smart cardA smart card is a physical card that has an embedded integrated chip that acts as a security token. Continue Reading By- Ben Lutkevich, Site Editor
- Linda Rosencrance
- Michael Cobb
 
- 
                Feature
                29 Dec 2021
                  Everything you need to know about ProxyShell vulnerabilitiesOrganizations need to patch their Exchange Servers to protect against the ProxyShell exploit. Learn how to do that and more here. Continue Reading By
- 
                Opinion
                23 Dec 2021
                  Vulnerabilities to fraud are increasing across the boardAs the pandemic continues to affect how we work, socialise, shop and conduct business, so it has increased opportunities for digital fraud and cyber crime. Jason Lane-Sellers explores the latest LexisNexis Risk Solutions ‘Cybercrime report’ Continue Reading By- Jason Lane-Sellers, EMEA director of market planning, LexisNexis Risk Solutions
 
- 
                Definition
                23 Dec 2021
                  SPML (Services Provisioning Markup Language)Services Provisioning Markup Language (SPML) is an open source XML-based standard that facilitates the exchange of account provisioning information among applications, services and organizations. Continue Reading By
- 
                News
                23 Dec 2021
                  Top 10 cyber security stories of 2021Cyber security dominated the headlines in 2021, making it hard to gain a clear picture of what to pay attention to. What is an IT buyer to do? Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Feature
                22 Dec 2021
                  Is the IT sector beset by fear-mongering?The arms race between hackers and security teams has led to a plethora of new technologies, but it can be hard to differentiate between sensible cyber purchases and those that are promoted by exaggerating risk Continue Reading 
- 
                News
                22 Dec 2021
                  Top 10 cyber crime stories of 2021Cyber crime hit new heights and drew more attention than ever in 2021. We look back at the biggest stories of the year Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Opinion
                22 Dec 2021
                  How can you balance security with growth?As businesses focus on recovery and growth, CISOs must deal with today’s challenges while also planning for tomorrow - how can they achieve both safety and success? Continue Reading By- Gavin Cartwright
 
- 
                E-Zine
                21 Dec 2021
                  What is Log4Shell - and why the panic?In this week’s Computer Weekly, we assess the risks from Log4Shell, a new web software vulnerability described as “catastrophic”. We look at SASE – secure access service edge – which is set to be one of the networking priorities for 2022. And some victims of the Post Office IT scandal are still waiting for proper compensation. Read the issue now. Continue Reading 
- 
                News
                21 Dec 2021
                  IT Priorities 2022: Cloud-first mindset growing in IndiaNearly half of organisations in India are expected to spend more on cloud services, underscoring the growing cloud-first mindset that is taking root in the subcontinent Continue Reading By- Aaron Tan, Informa TechTarget
 
- 
                E-Zine
                20 Dec 2021
                  CW APAC: Expert guide to cloud migrationOrganisations are increasingly moving their workloads to public cloud. In this handbook, focused on cloud migration in the Asia-Pacific region, Computer Weekly looks at the key strategies to follow, how HPE has transitioned into an as-a-service company, the adoption of cloud in Australia and why VMWare’s chief technology officer endorses a cross-cloud approach Continue Reading 
- 20 Dec 2021
- 
                News
                20 Dec 2021
                  Top 10 artificial intelligence stories of 2021This year, artificial intelligence has moved to operationalisation, explainability and regulatory frameworks. Here are Computer Weekly’s top 10 artificial intelligence stories for 2021 Continue Reading By- Cliff Saran, Managing Editor
 
- 
                News
                20 Dec 2021
                  Top 10 ransomware and backup stories of 2021Key articles from 2021 that highlight the link between ransomware and snapshots and backup and their role in repelling attacks, plus effects of the pandemic on backup and recovery Continue Reading By- Antony Adshead, Storage Editor
 
- 
                Opinion
                20 Dec 2021
                  Security Think Tank: Reframing CISO-boardroom relationsSecurity learning is a career-long process, so as 2021 draws to a close, participants in the Computer Weekly Security Think Tank sum up the most important cyber lessons they’ve taken away from the past 12 months Continue Reading By- Emma Bickerstaffe, Information Security Forum (ISF)
 
- 
                Opinion
                17 Dec 2021
                  Security Think Tank: When will they ever learn?Security learning is a career-long process, so as 2021 draws to a close, participants in the Computer Weekly Security Think Tank sum up the most important cyber lessons they’ve taken away from the past 12 months Continue Reading By- Mark Raeburn, Accenture Security
 
- 
                News
                17 Dec 2021
                  HSBC fined £64m for automated transaction monitoring failuresBank hit by multimillion-pound fine for failures related to its transaction monitoring, which failed to spot potential money-laundering activity Continue Reading By- Karl Flinders, Chief reporter and senior editor EMEA
 
- 
                Opinion
                16 Dec 2021
                  Enabling secure remote working is once again a top priorityThe pandemic has bought many new security risks, particularly around remote working. As the UK government once again urges people to work from home under its Plan B restrictions, these risks must be tackled as a priority Continue Reading By- Warwick Ashford, Senior analyst
 
- 
                Definition
                15 Dec 2021
                  spam filterA spam filter is a program used to detect unsolicited, unwanted and virus-infected emails and prevent those messages from getting to a user's inbox. Continue Reading By
- 
                News
                15 Dec 2021
                  After Log4j, December Patch Tuesday piles on the pressureDecember’s Patch Tuesday update from Microsoft contains several critical CVEs, but this month all attention is focused on the fall-out from Log4Shell, and burn-out is becoming a real issue Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Opinion
                15 Dec 2021
                  Security Think Tank: Get to know your personal threat landscapeSecurity learning is a career-long process, so as 2021 draws to a close, participants in the Computer Weekly Security Think Tank sum up the most important cyber lessons they’ve taken away from the past 12 months Continue Reading By- Andrew Morris, Turnkey Consulting
 
- 
                News
                15 Dec 2021
                  UK government to take ‘whole-of-society’ approach to cyberSecond iteration of the UK’s National Cyber Strategy broadens its focus to build a ‘whole-of-society’ security posture Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Blog Post
                15 Dec 2021
                  Log4Shell: Why aren't we taking the security of the internet seriously?To be caught out once may be an oversight, and lessons can be learned. But twice over a seven year timespan, shows a laissez faire attitude to the stability of the internet. In 2014, Heartbleed ... Continue Reading By- Cliff Saran, Managing Editor
 
- 
                News
                14 Dec 2021
                  Almost half of networks probed for Log4Shell weaknessesClose to half of corporate networks have already been actively targeted by individuals seeking to exploit the critical Log4Shell Apache bug Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Opinion
                14 Dec 2021
                  Security Think Tank: We are failing to get the cyber message across to usersSecurity learning is a career-long process, so as 2021 draws to a close, participants in the Computer Weekly Security Think Tank sum up the most important cyber lessons they’ve taken away from the past 12 months Continue Reading By- Chris Cooper
 
- 
                14 Dec 2021
                  Recovering from ransomware: One organisation’s inside storyIn February 2021, French office equipment supplier Manutan fell victim to a DoppelPaymer ransomware hit. IT ops director Jérôme Marchandiau tells the inside story of the incident Continue Reading 
- 
                14 Dec 2021
                  Online Safety Bill puts user protection onus on platform providersThe Online Safety Bill will place new duties and responsibilities on online platforms accessible from the UK, but as it currently stands, it contains several grey areas Continue Reading 
- 
                E-Zine
                14 Dec 2021
                  The rules for a safer internetIn this week’s Computer Weekly, as the government publishes the Online Safety Bill, we look at what the laws mean for internet services. A ransomware victim shares the insider story of the trauma of losing their corporate IT systems. And we ask, what happens when quantum computers get too powerful to verify their output? Read the issue now. Continue Reading 
- 
                Definition
                14 Dec 2021
                  Chernobyl virusThe Chernobyl virus is a computer virus with a potentially devastating payload that destroys all computer data when an infected file is executed. Continue Reading 
- 
                Definition
                13 Dec 2021
                  password saltingPassword salting is a technique to protect passwords stored in databases by adding a string of 32 or more characters and then hashing them. Continue Reading By
- 
                News
                13 Dec 2021
                  What is Log4Shell, and why are we panicking about it?It’s been described as a ‘design failure of catastrophic proportions’ that threatens the very fabric of the digital world. Find out what the Log4j2 Log4Shell panic is all about, and what you should do about it Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Opinion
                13 Dec 2021
                  Security Think Tank: There’s much more to do to secure hybrid workersSecurity learning is a career-long process, so as 2021 draws to a close, participants in the Computer Weekly Security Think Tank sum up the most important cyber lessons they’ve taken away from the past 12 months Continue Reading By- Jack Chapman
 
- 
                News
                13 Dec 2021
                  Top IT predictions in APAC in 2022Operationalising zero trust, talent retention and containerisation are just some of the key trends that will shape Asia-Pacific’s technology landscape in 2022 Continue Reading By- Aaron Tan, Informa TechTarget
 
- 
                News
                10 Dec 2021
                  Julian Assange can be extradited to the US to face espionage and hacking charges, court rulesHigh Court overturns decision not to extradite WikiLeaks founder after US government gives assurances over his treatment Continue Reading By- Bill Goodwin, Investigations Editor
 
- 
                News
                10 Dec 2021
                  C-suite’s biggest ransomware fear: Post-attack regulatory sanctionsExposure to regulatory sanctions such as fines are the biggest worry for C-suite executives in the wake of a ransomware attack Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Definition
                09 Dec 2021
                  ISA ServerMicrosoft's ISA Server (Internet Security and Acceleration Server) was the successor to Microsoft's Proxy Server 2.0 and was part of Microsoft's .NET support. Continue Reading 
- 
                Definition
                09 Dec 2021
                  OCSP (Online Certificate Status Protocol)OCSP (Online Certificate Status Protocol) is one of two common schemes used to maintain the security of a server and other network resources. Continue Reading By
- 
                News
                09 Dec 2021
                  What are the challenges associated with the MITRE ATT&CK framework?Businesses sometimes struggle to use the MITRE ATT&CK framework effectively. Learn more about some of the challenges, and how to overcome them Continue Reading By- Shannon Flynn, ReHack Magazine
 
- 
                News
                09 Dec 2021
                  UK and US to collaborate on privacy innovation contestJoint UK-US innovation challenge contest centring on privacy-enhancing technology announced at Summit for Democracy in Washington DC Continue Reading By- Alex Scroxton, Security Editor
 

 
		 
	