IT security
-
News
25 Oct 2024
Dutch critical infrastructure at risk despite high leadership confidence
Stark paradox in Dutch cyber security landscape has business leaders expressing high confidence in their IT infrastructure as cyber attacks rise Continue Reading
-
News
11 Jul 2024
Dutch research firm TNO pictures the SOC of the future
In only a few years, security operations centres will have a different design and layout, and far fewer will remain Continue Reading
-
News
11 Jul 2024
Inside Israel’s cyber security operations
An emergency phone line allows cyber security analysts at the Israel Computer Emergency Response Team to map threats against national infrastructure Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
10 Jul 2024
The security interview: Managing the ‘no’ mindset
Matt Riley, data protection and information security officer at Sharp Europe, discusses balancing cyber risks with business leaders’ goals Continue Reading
By- Cliff Saran, Managing Editor
-
News
09 Jul 2024
Hyper-V zero-day stands out on a busy Patch Tuesday
Microsoft has fixed almost 140 vulnerabilities in its latest monthly update, with a Hyper-V zero-day singled out for urgent attention Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Jul 2024
Chinese spies target vulnerable home office kit to run cyber attacks
China’s APT40 is ramping up targeting of victims using vulnerable small and home office networking kit as command and control infrastructure, according to an international alert Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Jul 2024
Lessons from war: How Israel is fighting Iranian state-backed hacking
The general director of the Israel National Cyber Directorate talks about the rise in cyber attacks and what lessons the country has gleaned to defend against hacking from foreign parties Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
09 Jul 2024
Atos jumps on ‘moving train’ for Euro 2024
Atos provides the IT supporting major recurring sporting events including Uefa’s European Football Championship Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Opinion
09 Jul 2024
Automating public services - a careful approach
Automation is increasingly integrated into public services, promising enhanced efficiency, cost savings, and improved service quality Continue Reading
By- Anna Dent
-
E-Zine
09 Jul 2024
How data drives decisions at BAE Systems
In this week’s Computer Weekly, we talk to the chief data officer of one of the UK’s biggest manufacturers, BAE Systems, about data strategy and diversity. Microsoft’s claims over sovereign cloud for government IT are under scrutiny – we examine the issues. And our latest buyer’s guide looks at trends in cloud databases. Read the issue now. Continue Reading
-
News
08 Jul 2024
Synnovis attack highlights degraded, outdated state of NHS IT
More cyber attacks against the health service are likely, and will succeed if something isn’t done to address the increasingly elderly NHS IT estate, experts are warning Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
05 Jul 2024
How do cybercriminals steal credit card information?
Cybercriminals have various methods at their disposal to hack and exploit credit card information. Learn what they are, how to prevent them and what to do when hacked. Continue Reading
By- Andres Phillips
-
Opinion
04 Jul 2024
Safeguarding democracy from cyber threat peril
There has been an increase in disturbing activity emerging on the dark web involving the sale of public sector assets, including election data Continue Reading
By- Barry O’Connell
-
News
03 Jul 2024
NCA’s Operation Morpheus targets illicit Cobalt Strike use
International law enforcement operation targets cyber criminals using the Cobalt Strike penetration testing framework for dodgy purposes Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
03 Jul 2024
RSA security conference video roundup: 2024 perspectives
We chatted on camera with attendees and presenters at RSAC 2024. To get the highlights of one of the world's major cybersecurity conferences, check out this video collection. Continue Reading
By- Brenda L. Horrigan, Executive Managing Editor
-
Opinion
03 Jul 2024
Cyber Essentials at 10: Success or failure?
The Cyber Essentials scheme passed its 10th anniversary in June 2024. CyberSmart's Adam Pilton reflects on progress and argues that more needs to be done to raise security awareness among Britain's small business community Continue Reading
By- Adam Pilton
-
Blog Post
02 Jul 2024
Whatever you do, don't press the big red button...
I’m not sure if anyone has figures to hand (or the desire to find out) exactly how many cyber security vendors there are out there, but some rough stats suggest that there are verging on 6,000 in ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
Opinion
02 Jul 2024
Security Think Tank: Securing today's ubiquitous cloud environment
The Computer Weekly Security Think Tank considers how CISOs and security practitioners should ensure that the business can make use of public cloud services safely and securely and avoid accidental or deliberate data leakage Continue Reading
By- Kashil JagmohanSingh
-
Blog Post
02 Jul 2024
IT's a vulnerable world out there...
It was a pleasure to catch up t’other day with Rik “rock star” Ferguson, the former Trend Micro legend who is these days hanging out with Forescout as the company’s VP of Security Intelligence, ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
E-Zine
02 Jul 2024
UKtech50 2024: The most influential people in UK technology
In this week’s Computer Weekly, we reveal the 50 most influential people in UK technology for 2024, in our annual UKtech50 list. We talk to Post Office scandal campaigner Alan Bates, voted the most influential person in tech this year. Plus, we find out why a bunch of mobile app startups jumped into a freezing lake near the Arctic Circle. Read the issue now. Continue Reading
-
Opinion
01 Jul 2024
How Broadcom cemented its European cloud sovereignty credentials
The owner of VMware targets flexible deployment options for European public cloud sovereignty Continue Reading
By- Bola Rotibi
-
Feature
01 Jul 2024
Security in the public cloud explained: A guide for IT and security admins
In this guide, IT security and industry experts share their top recommendations for protecting public cloud deployments Continue Reading
By- Cliff Saran, Managing Editor
-
News
28 Jun 2024
How FWD is driving its digital strategy
FWD’s group chief technology and operations officer talks up how the pan-Asian insurer is driving change faster and putting technology at the heart of its services Continue Reading
By- Aaron Tan, TechTarget
-
News
28 Jun 2024
How Recorded Future is operationalising threat intelligence
Recorded Future is investing in APIs to enable automated security workflows, among other measures, to help organisations overcome the hurdles of operationalising threat intelligence Continue Reading
By- Aaron Tan, TechTarget
-
Podcast
28 Jun 2024
No cyber barriers: A Computer Weekly Downtime Upload podcast
We speak to Sharp Europe’s data protection and information security officer about how to balance cybersecurity with the needs of the business Continue Reading
By- Cliff Saran, Managing Editor
-
News
27 Jun 2024
Gulf Edge to operate Google Distributed Cloud in Thailand
The Gulf Energy subsidiary will offer Google’s sovereign cloud service in Thailand with a focus on air-gapped configurations Continue Reading
By- Aaron Tan, TechTarget
-
News
26 Jun 2024
Scottish Courts and Tribunal Service replaces legacy SD-WAN
Contract awarded for the deployment of cross-Scotland software-defined wide area network designed to ensure efficient, secure and reliable administrative services to the judiciaries of Scotland Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
26 Jun 2024
Israel’s cyber chief calls for international front against Iranian hackers
Israel’s cyber chief has called for international action against Iran over state-backed hacking Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
26 Jun 2024
Police Scotland did not consult ICO about high-risk cloud system
Police Scotland chose not to formally consult with the data regulator about the risks identified with a cloud-based digital evidence sharing system, while the regulator itself did not follow up for nearly three months Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Definition
25 Jun 2024
digital signature
A digital signature is a mathematical technique used to validate the authenticity and integrity of a digital document, message or software. Continue Reading
By- Cameron Hashemi-Pour, Site Editor
- Alexander S. Gillis, Technical Writer and Editor
- Ben Lutkevich, Site Editor
-
News
25 Jun 2024
WikiLeaks founder Julian Assange freed from prison
A deal reached with US authorities will end the WikiLeaks founder’s years-long legal saga, setting him free if he pleads guilty to a criminal conspiracy charge Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
25 Jun 2024
NHS experts raise warning over patient data breach risk in registries project
Clinicians warn that the NHS England Outcome Registries Platform has poor security and is vulnerable to cyber attack, putting critical patient data at risk of being exposed Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
25 Jun 2024
A revolution in space
In this week’s Computer Weekly, we talk to astronaut Tim Peake about the imminent revolution in space tech and what it means for IT leaders. AI is set to transform the movie industry – we hear from the producers of the latest Mad Max film about how it’s already changed the process for them. And we find out about plans for Neom, the Saudi Arabian smart city in the desert. Read the issue now. Continue Reading
-
News
24 Jun 2024
Sellafield pleads guilty to criminal charges over cyber security
Nuclear Decommissioning Authority-backed organisation Sellafield Ltd pleads guilty to criminal charges brought over significant cyber security failings that could have compromised sensitive nuclear information Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
24 Jun 2024
Hybrid work prompts spike in network security threats
Survey shows more than two-thirds of organisations have seen an increase in network security threats over the past 18 months, with remote and hybrid working the biggest contributor to heightened threat levels Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
24 Jun 2024
Tata Communications hosted SASE claims to redefine networking, security
Tata Communications claims world-first implementation of unified SASE solution to deliver unified visibility and control of network traffic with context-led insights and enhanced user experience Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
21 Jun 2024
Sellafield whistleblower ordered to pay costs after email tampering claims
A former consultant at Sellafield has been ordered to pay costs for having ‘acted unreasonably’ in claiming the nuclear facility tampered with metadata in letters used against her in court Continue Reading
By -
News
21 Jun 2024
Qilin ransomware gang publishes stolen NHS data online
The ransomware gang behind a major cyber attack on NHS supplier Synnovis has published a 400GB trove of private healthcare data online Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
21 Jun 2024
Executive interview: Open models pros and cons
We speak to Meta’s vice-president of AI research about recent publicly released research and models, and the role of closed AI models Continue Reading
By- Cliff Saran, Managing Editor
-
Definition
21 Jun 2024
personally identifiable information (PII)
Personally identifiable information (PII) is any data that could potentially identify a specific individual. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Corinne Bernstein
-
Definition
21 Jun 2024
OpenID (OpenID Connect)
OpenID Connect is an open specification for authentication and single sign-on (SSO). Continue Reading
By -
News
21 Jun 2024
Kaspersky says it can continue to sell cyber threat intelligence in spite of US ban
The US government is stopping Kaspersky Lab from offering its antivirus software and cyber security tools to US firms and citizens Continue Reading
By- Cliff Saran, Managing Editor
-
News
21 Jun 2024
ICO police cloud guidance released under FOI
Long-awaited guidance from the UK data regulator on police cloud deployments highlights some potential data transfer mechanisms it thinks can clear up ongoing legal issues, but tells forces it’s up to them to decide if the measures would work Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Definition
20 Jun 2024
software patch
A software patch or fix is a quick-repair job for a piece of programming designed to resolve functionality issues, improve security or add new features. Continue Reading
By- Cameron Hashemi-Pour, Site Editor
- Brien Posey
-
News
20 Jun 2024
Sir Alan Bates hits out at Post Office ‘incompetence’ after data breach
Victims of the scandal react with anger at news the Post Office published a document containing their names and addresses on its website Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
- Bryan Glick, Editor in chief
-
Blog Post
19 Jun 2024
How To Avoid Global RAGged AI Delivery Woes....
If Q1 of this year for me was the season of “newbies” – speaking to, and working with, new vendor clients, then Q2 has definitely been the season of “catch-ups”. The essence of “catch-ups” is the ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
Blog Post
19 Jun 2024
An industry-wide agreement is needed to identify AI-generated content
With the UK general election coming on July 4th, there is very real concern that this election and others around the world are being influenced by artificial intelligence-powered (AI) content ... Continue Reading
By- Cliff Saran, Managing Editor
-
Opinion
19 Jun 2024
Why AI is talking politics this year
AI is already playing a part in this year’s General Election - for good and bad Continue Reading
By- Resham Kotecha
-
News
19 Jun 2024
Microsoft admits no guarantee of sovereignty for UK policing data
Documents show Microsoft’s lawyers admitted to Scottish policing bodies that the company cannot guarantee sensitive law enforcement data will remain in the UK, despite long-standing public claims to the contrary Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Definition
18 Jun 2024
DNS attack
A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system. Continue Reading
By -
E-Zine
18 Jun 2024
General election 2024 – the digital policies examined
In this week’s Computer Weekly, we examine the digital policies revealed in the three main political parties’ general election manifestos. Our new buyer’s guide looks at the latest trends in cloud security. And we find out about the EU’s plans for a digital single market that could span the globe. Read the issue now. Continue Reading
-
Opinion
18 Jun 2024
We need a judge-led inquiry into police spying on journalists and lawyers
When journalists Barry McCaffrey and Trevor Birney were wrongly arrested in 2018, their case led to the discovery of a widespread police surveillance operation targeting journalists and lawyers in Northern Ireland. Barry McCaffrey tells the story Continue Reading
By- Barry McCaffrey
-
Opinion
17 Jun 2024
Cloud security: Finding the right provider to protect your data
This month, the Computer Weekly Security Think Tank considers how CISOs and security practitioners should ensure that the business can make use of public cloud services safely and securely and avoid accidental or deliberate data leakage. Continue Reading
By- Stephen McDermid
-
Feature
17 Jun 2024
Autonomous weapons systems defy rigid attempts at arms control
In an ever more dangerous world, the technology is outpacing diplomacy and holds clear strategic value. Retaining human control over its use will require embracing imperfect solutions Continue Reading
By- Kyle Hiebert, Computer Weekly
-
Opinion
17 Jun 2024
Gartner: Navigating incident response in the cloud
In the rapidly evolving landscape of cloud security, incident response strategies must be as dynamic and flexible as the environments they protect Continue Reading
By- Carlos De Sola Caraballo
-
16 Jun 2024
Securing the edge: A new battleground in mobile network security
Edge computing is changing approaches to mobile network infrastructure, but failure to secure it can expose networks and data to cyber threats. We look at the dangers and potential solutions. Continue Reading
-
Definition
14 Jun 2024
chief trust officer
A chief trust officer (CTrO) in the IT industry is an executive job title given to the person responsible for building confidence around the use of customer information. Continue Reading
By- Scott Robinson, New Era Technology
- Francesca Sales
-
Tip
13 Jun 2024
5 cybersecurity risks and challenges in supply chain
Supply chains have a range of connection points -- and vulnerabilities. Learn which vulnerabilities hackers look for first and how leaders can fend them off. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
News
13 Jun 2024
Black Basta ransomware crew may be exploiting Microsoft zero-day
A Microsoft vulnerability that was addressed without fanfare in March may in fact have been exploited as a zero-day by the notorious Black Basta ransomware gang, threat hunters warn Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
13 Jun 2024
Data leakage in the cloud – can data truly be safe in the cloud?
This month, the Computer Weekly Security Think Tank considers how CISOs and security practitioners should ensure that the business can make use of public cloud services safely and securely and avoid accidental or deliberate data leakage. Continue Reading
By- Scott Swalling
-
Definition
13 Jun 2024
secure access service edge (SASE)
Secure access service edge (SASE), pronounced sassy, is a cloud architecture model that bundles together network and cloud-native security technologies and delivers them as a single cloud service. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Kinza Yasar, Technical Writer
-
Definition
13 Jun 2024
cloud security
Cloud security, also known as 'cloud computing security,' is a set of policies, practices and controls deployed to protect cloud-based data, applications and infrastructure from cyberattacks and cyberthreats. Continue Reading
By- Kinza Yasar, Technical Writer
- Andrew Froehlich, West Gate Networks
- Sharon Shea, Executive Editor
-
Feature
13 Jun 2024
Best practices to beat container misconfiguration
How can organisations ensure containerised environments are configured correctly and adequately defended, without getting lost in the complexity? Continue Reading
By -
Definition
12 Jun 2024
privacy impact assessment (PIA)
A privacy impact assessment (PIA) is a method for identifying and assessing privacy risks throughout the development lifecycle of a program or system. Continue Reading
By- Cameron Hashemi-Pour, Site Editor
- Paul Kirvan
- Ben Cole, Executive Editor
-
Opinion
12 Jun 2024
How to ensure public cloud services are used safely and securely
This month, the Computer Weekly Security Think Tank considers how CISOs and security practitioners should ensure that the business can make use of public cloud services safely and securely and avoid accidental or deliberate data leakage. Continue Reading
By- Beji Jacob
-
News
12 Jun 2024
RCE flaw and DNS zero-day top list of Patch Tuesday bugs
An RCE vulnerability in a Microsoft messaging feature and a third-party flaw in a DNS authentication protocol are the most pressing issues to address in Microsoft’s latest Patch Tuesday Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Jun 2024
PSNI ran secret unit to monitor journalists’ and lawyers’ phones, claims former senior officer
The Police Service of Northern Ireland denies claims that its anti-corruption unit used a standalone computer to ‘avoid scrutiny and control’ Continue Reading
By- Bill Goodwin, Computer Weekly
-
Opinion
11 Jun 2024
True cloud security requires in-depth understanding
This month, the Computer Weekly Security Think Tank considers how CISOs and security practitioners should ensure that the business can make use of public cloud services safely and securely and avoid accidental or deliberate data leakage. Continue Reading
By- Elliott Wilkes
-
News
11 Jun 2024
Pure Storage hit by Snowflake credential hackers
Pure Storage emerges as the latest victim of a fast-spreading breach of Snowflake customers targeting users with lax credential security measures in place Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Jun 2024
More than 160 Snowflake customers hit in targeted data theft spree
Mandiant reports that more than 160 Snowflake customers have been hit in a broad data theft and extortion campaign targeting organisations that have failed to pay proper attention to securing valuable credentials Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
10 Jun 2024
communications intelligence (COMINT)
Communications intelligence (COMINT) is information gathered from the communications between individuals or groups of individuals, including telephone conversations, text messages, email conversations, radio calls and online interactions. Continue Reading
By -
News
10 Jun 2024
General election 2024: Liberal Democrats thread digital commitments throughout manifesto
The Lib Dems have promised a new industrial strategy and emphasised the importance of the digital sector, skills and regulating AI, as they lay out plans for the UK general election Continue Reading
By- Bryan Glick, Editor in chief
-
News
10 Jun 2024
NHS blood stocks running low after ransomware attack
The NHS is appealing for people with O Positive and O Negative blood types to come forward to donate as hospitals in London struggle to keep critical services running after ransomware attack Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
08 Jun 2024
The future of identity in print infrastructure management
The use of identity-centric infrastructure access management is set to play a critical role in fortifying the printing environment. Continue Reading
By- Louella Fernandes, Quocirca
-
Blog Post
08 Jun 2024
The future of identity in print infrastructure management
Identity-centric infrastructure access management is set to play a critical role in fortifying the printing environment. Continue Reading
By- Louella Fernandes, Quocirca
-
Definition
07 Jun 2024
electronic intelligence (ELINT)
Electronic intelligence (ELINT) is intelligence gathered using electronic sensors, usually used in military applications. Continue Reading
By -
News
07 Jun 2024
Northern Irish police used covert powers to monitor over 300 journalists
PSNI publishes report on police surveillance of journalists and lawyers, but Northern Ireland’s Policing Board says it does not give the assurances needed Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
07 Jun 2024
Juniper Networks claims first with AIOps to WAN routing
Juniper Networks announces industry leadership with enhancements to cloud-native Mist AI engine for all network domains, claiming to deliver insight for exceptional experiences Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
07 Jun 2024
DDoS gang threatens to disrupt European elections
Russian hacktivists are threatening to disrupt the European Parliament elections, while the BBC reports on new deepfake threats to the UK’s electoral process Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Jun 2024
Bitdefender makes MDR services free to NHS bodies hit by Qilin
Bitdefender offers NHS bodies affected by a major cyber incident free access to its product suite, as the health service continues to deal with the impact of the Qilin ransomware attack on partner Synnovis Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
07 Jun 2024
proof of concept (PoC) exploit
A proof of concept (PoC) exploit is a nonharmful attack against a computer or network. PoC exploits are not meant to cause harm, but to show security weaknesses within software. Continue Reading
By- Kinza Yasar, Technical Writer
-
News
07 Jun 2024
Sophos uncovers Chinese state-sponsored campaign in Southeast Asia
Sophos found three distinct clusters of activity targeted at a high-level government organisation that appeared to be tied to Chinese interests in the South China Sea Continue Reading
By- Aaron Tan, TechTarget
-
Feature
06 Jun 2024
Storage technology explained: Key questions about tape storage
We look at the benefits of tape storage – low cost, inherent security, excellent energy efficiency – the workloads it is best for, and how tape fits a wider storage strategy Continue Reading
By- Stephen Pritchard
- Antony Adshead, Storage Editor
-
News
06 Jun 2024
FBI finds 7,000 LockBit decryption keys in blow to criminal gang
The US authorities say they now have more than 7,000 LockBit decryption keys in their possession and are urging victims of the prolific ransomware gang to come forward Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Jun 2024
Qilin ransomware gang likely behind crippling NHS attack
Security experts investigating a major cyber attack on an NHS partner that has caused frontline services across South London to grind to a halt say the Qilin ransomware gang appears to be the culprit Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Jun 2024
OAIC files civil penalty action against Medibank
The OAIC alleges that Medibank failed to take reasonable steps to protect the personal information of 9.7 million Australians in the October 2022 data breach Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
04 Jun 2024
Security Think Tank: The cloud just got more complicated
This month, the Computer Weekly Security Think Tank considers how CISOs and security practitioners should ensure that the business can make use of public cloud services safely and securely and avoid accidental or deliberate data leakage. Continue Reading
By- Rob Dartnall, SecAlliance
-
News
04 Jun 2024
Invasive tracking ‘endemic’ on sensitive support websites
Websites set up by police, charities and universities to help people get support for sensitive issues like addiction and sexual harassment are deploying tracking technologies that harvest information without proper consent Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
04 Jun 2024
Building a more secure, and sustainable, open source ecosystem
In April 2024, the discovery of an intentionally-placed backdoor in the open source XZ Utils data compression caused concern. Sentry's Chad Whitacre says a more thoughtful approach is needed to balance the individual freedom and creativity of open source, with more rigorous security practice. Continue Reading
By- Chad Whitacre
-
News
04 Jun 2024
NHS services at major London hospitals disrupted by cyber attack
A major cyber attack at NHS services provider Synnovis is disrupting frontline care at hospitals across London Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Jun 2024
Haier Europe taps Orange Business to build responsive SD-WAN
Looking to offer a scalable, secure networking infrastructure to support its growth, Fortune 500 home appliances company works with business arm of telco to deploy cloud-first platform enhancing security, visibility and agility Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
04 Jun 2024
Russia used fake AI Tom Cruise in Olympic disinformation campaign
Microsoft threat researchers report a surge in Russian disinformation campaigns targeting the 2024 Summer Olympics, including AI-enhanced propaganda Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
04 Jun 2024
What is cloud security management? A strategic guide
This cloud security guide explains challenges enterprises face today; best practices for securing and managing SaaS, IaaS and PaaS; and comparisons of cloud-native security tools. Continue Reading
By- Phil Sweeney, Industry Editor
- Stephen J. Bigelow, Senior Technology Editor
-
News
03 Jun 2024
Police chief commissions ‘independent review’ of surveillance against journalists and lawyers
PNSI chief constable appoints lawyer to conduct review into police phone surveillance of journalists, lawyers and NGOs Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
03 Jun 2024
97 FTSE 100 firms exposed to supply chain breaches
Between March 2023 and March 2024, 97 out of 100 companies on the UK’s FTSE 100 list were put at risk of compromise following supply chain breaches at third-party suppliers Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Jun 2024
Major breaches allegedly caused by unsecured Snowflake accounts
Significant data breaches at Ticketmaster and Santander appear to have been orchestrated through careful targeting of the victims’ Snowflake cloud data management accounts Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Jun 2024
AI Seoul Summit review
Dozens of governments and tech companies attending the second global AI Safety Summit have committed themselves to the safe and inclusive development of the technology, but questions remain around whether the commitments made go far enough Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
03 Jun 2024
McLaren Formula 1 Team revs up network security with Cisco
Legendary motor racing team expands global partnership with networking giant to accelerate network security for on-premise hardware and cloud-based software, including secure firewall and XDR Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
03 Jun 2024
Sellafield local authority slammed over response to North Korean ransomware attack
The local authority for Europe’s biggest nuclear site has been slammed by auditors for its response to a North Korea-linked cyber attack that temporarily crippled its operations Continue Reading
By -
News
02 Jun 2024
Ticketek Australia hit by data breach
Customer names, dates of birth and email addresses of Ticketek Australia account holders reportedly impacted in latest data breach affecting event ticketing firm Continue Reading
By- Aaron Tan, TechTarget
-
News
31 May 2024
Law student ‘unfairly disciplined’ after reporting data breach blunder
A law student has accused a leading legal college of unethical behaviour and a “lack of integrity” after it brought misconduct proceedings against him when he reported a data security blunder Continue Reading
By -
News
30 May 2024
Europol sting operation smokes multiple botnets
Malware droppers including Bumblebee and Smokeloader were among those targeted in one of the largest ever joint operations against cyber criminal botnets Continue Reading
By- Alex Scroxton, Security Editor