IT security
-
Opinion
20 Sep 2024
CrowdStrike incident shows we need to rethink cyber
The Computer Weekly Security Think Tank panel considers incident response in the wake of the July CrowdStrike incident, sharing their views on what CrowdStrike got wrong, what it did right, and next steps Continue Reading
-
News
19 Sep 2024
HSBC tests post-quantum VPN tunnel for digital ledgers
Encryption required for post-quantum cryptography will have a material impact on the performance of distributed ledgers Continue Reading
By- Cliff Saran, Managing Editor
-
E-Zine
03 Mar 2020
What will points-based immigration mean for IT recruitment?
In this week’s Computer Weekly, we look at the government’s new points-based immigration rules and assess the implications for the tech sector. IR35 tax rules change in April – we find out how IT contractors need to prepare. And we examine whether the rise of cloud is really displacing the datacentre. Read the issue now. Continue Reading
-
News
03 Mar 2020
Singapore among world’s top sources of online threats
Singapore remained a hotspot for originating cyber attacks in 2019, with 11 million attacks launched from servers in the city-state Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
02 Mar 2020
Why ‘no breach’ is bad news for your compliance
You might think it’s a good thing if your organisation has a clean record when it comes to data breaches, but this is not necessarily the case Continue Reading
By- Byron Shirley
-
Feature
02 Mar 2020
How to find the right zero trust strategy
Large tech companies and the US Federal Government have adopted zero trust as their next-generation security model Continue Reading
-
News
02 Mar 2020
The Security Interviews: Inside the world of bug bounties
You may not make a million as a bug bounty hunter, but you might help remove some of the stigma that persists around cyber security, says HackerOne’s Shlomie Liberow Continue Reading
By- Alex Scroxton, Security Editor
-
News
01 Mar 2020
Data breaches in Australia showing no signs of abating
Compromised login credentials and human error were the most common causes of data breaches reported under Australia’s notifiable data breach regime from July to December 2019 Continue Reading
By- Aaron Tan, TechTarget
-
News
28 Feb 2020
NCSC makes ransomware attack guidance more accessible
Following a swathe of high-profile ransomware attacks, the UK’s National Cyber Security Centre has made changes to its guidance, emphasising the importance of offline backups Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Feb 2020
WikiLeaks founder Assange is well enough to participate in extradition proceedings, says judge
A judge dismissed claims that Julian Assange’s vulnerable psychological state would prevent him from taking part in his extradition hearing to face espionage and computer misuse charges in the US Continue Reading
By- Greg Wilford
-
News
27 Feb 2020
Gove warns EU that UK sovereignty is non-negotiable on eve of trade deal talks
The UK and the EU have published their divergent mandates for trade talks due to start on Monday 2 March 2020, and digital may emerge as a long-term terrain of dispute Continue Reading
By- Brian McKenna, Senior Analyst, Business Applications
-
News
27 Feb 2020
Clearview hack fuels debate over facial recognition
Customers of Clearview AI, a controversial startup that scrapes and sells billions of photos of people from social media to police forces, have found themselves at the centre of a major data breach Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Feb 2020
Oxbotica on board with Cisco to drive autonomous vehicle data challenge
Connected car technology firm hits pedal with Cisco to solve data challenges of future autonomous vehicles Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
27 Feb 2020
Redcar & Cleveland Council confirms ransomware attack
Local authority’s systems are still offline nearly three weeks after being attacked Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
27 Feb 2020
CW Nordics: Swedes lose faith in social media as data security fears increase
Swedish citizens are becoming more concerned about the activities of social media companies and are reducing their online interaction with them as a result. Also read about new mobility-as-a-service projects gaining traction across Denmark, Finland, Norway and Sweden, and why the Finnish government has committed resources to a cyber security project aimed at local authorities. Continue Reading
-
News
27 Feb 2020
Kr00k vulnerability compromises billions of Wi-Fi devices
Billions of Wi-Fi chips used in IoT devices, laptops, smartphones and tablets are vulnerable to a serious vulnerability Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Feb 2020
IT Priorities 2020: ASEAN firms on the frontline of digital transformation
Southeast Asian companies plan to spend more on infrastructure and cyber security, but the growth in IT budgets appears to be slowing down Continue Reading
By- Aaron Tan, TechTarget
-
News
26 Feb 2020
Fake CDNs obscuring credit card fraudsters
Fake content delivery networks and ngrok servers are being pressed into service to obscure credit card skimming activities Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Feb 2020
Cloud Snooper firewall bypass may be work of nation state
Cloud Snooper deploys a combination of specialised techniques to sneak past enterprise firewalls, warns Sophos Continue Reading
By- Alex Scroxton, Security Editor
- 26 Feb 2020
-
News
26 Feb 2020
WikiLeaks founder Julian Assange cannot be legally extradited for ‘political offences’, say lawyers
Lawyers for WikiLeaks founder Julian Assange argue that he has been charged with political offences and cannot be legally extradited to the US under the US-UK extradition treaty Continue Reading
By- Greg Wilford
-
News
26 Feb 2020
FCA data breach could happen to anybody, but easy to avoid
Minor data breach at the Financial Conduct Authority was the result of simple human error, and highlights the need for organisations to consider a wide range of potential threats Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Feb 2020
Met Police chief backs legislative framework for police tech
Met Police commissioner has called for legislative framework to govern police use of new technologies, while defending the decision to use live facial recognition technology operationally without it Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
26 Feb 2020
How tech suppliers are easing barriers to hybrid cloud adoption
The tech industry has risen to the challenge of helping enterprises ease their transition to hybrid cloud, but issues remain Continue Reading
By- Aaron Tan, TechTarget
-
News
25 Feb 2020
Julian Assange phoned White House to warn of risk to lives
Julian Assange phoned the White House to warn officials that unredacted cables published on the web posed a risk to lives, a court heard yesterday Continue Reading
By- Bill Goodwin, Computer Weekly
-
Opinion
25 Feb 2020
Is the EU better equipped than the US to supervise the use of facial recognition?
Clearview AI can be an indispensable tool to reinforce national security, but there are many risks associated with the use of facial recognition technology that the EU might be better equipped to deal with than the US Continue Reading
By- Mathilde Gérot, Signature Litigation
-
News
25 Feb 2020
Google warns users not to mess with Huawei devices
Google tells users of Huawei devices to try to avoid bypassing controls preventing them from loading its apps Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Feb 2020
Sports retailer Decathlon left employee data exposed
More than 123 million records were accidentally exposed on an unsecured ElasticSearch server Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Feb 2020
The Security Interviews: Gil Shwed’s 10-year vision for security
Check Point founder Gil Shwed discusses his new Infinity Next concept and how he plans to remodel the world of cyber security in the next 10 years Continue Reading
-
News
25 Feb 2020
Mastercard creates 1,500 tech jobs in Ireland
New roles at tech hub in Dublin will include professionals with expertise in artificial intelligence, cyber security, blockchain and user experience Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
25 Feb 2020
Cloud data leaks compounded by lack of automation tools
Data leaks caused by misconfigured clouds are being compounded because security teams lack appropriate automation and integration tools, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Feb 2020
Cyber criminals targeting UK motorists, warns DVLA
Cyber criminals are offering various services and tax refunds that purport to be from the DVLA Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
25 Feb 2020
Using meteorological data to prepare for the worst
In this week’s Computer Weekly, after the storms that swept across the UK, we look at the technology behind Weather Source’s meteorological data service. Oracle and SAP are battling over customers to upgrade their ERP systems to the cloud. And we report from the world’s biggest retail tech show. Read the issue now. Continue Reading
-
News
24 Feb 2020
McAfee buys Light Point to enhance web browser protection
Acquisition of Light Point Security will extend the capabilities of multiple McAfee products Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Feb 2020
Thai university to roll out data protection certification
Thailand’s National Institute of Development Administration is offering a certification programme to get organisations ready for the country’s data protection regime Continue Reading
By- Aaron Tan, TechTarget
-
News
24 Feb 2020
Assange extradition is a politically motivated ‘abuse of power’, court hears
US government’s attempt to extradite WikiLeaks founder Julian Assange to face espionage charges in the US is politically motivated and an abuse of process, court told Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
24 Feb 2020
WikiLeaks founder Assange ‘put lives at risk’ by disclosing names in leaked documents, court hears
WikiLeaks founder Julian Assange ‘put lives of US informants at risk’ by publishing unredacted documents, lawyers for the US argued at the first day of a week-long extradition hearing Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
24 Feb 2020
Open security group unveils common OpenDXL language
Open Cybersecurity Alliance announces the availability of OpenDXL Ontology, the first open source language for connecting disparate security tools through a common messaging framework Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
24 Feb 2020
Trusty methods to keep out intruders
Today’s hyper-connected world means trust can no longer be taken for granted to keep networks secure – enter the zero-trust model Continue Reading
By- Cliff Saran, Managing Editor
-
News
24 Feb 2020
Cisco goes all-in on security integration with SecureX platform
CISOs are struggling to stitch together disparate cyber security products and services – Cisco believes its cloud-native SecureX platform will change their working lives for the better Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Feb 2020
Labour condemns Google data plans
Shadow digital minister Chi Onwurah challenges the government to stop Google’s plans to move UK user data out of the EU Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Feb 2020
Malicious apps still getting past Google controls
Check Point researchers have found multiple malware-infected apps in the Google Play store, including a clicker called Haken, which has been downloaded more than 50,000 times Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Feb 2020
F-Secure’s AI reads mean tweets to fight abuse and trolls
Researchers working on F-Secure’s Project Blackfin have developed a model for clustering tweets to help pinpoint abuse and harassment Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
21 Feb 2020
The greatest contest ever – privacy versus security
Examining the technical, legal and ethical challenges around the privacy versus security debate Continue Reading
By- Elliot Rose, PA Consulting
-
Opinion
21 Feb 2020
Addressing the IoT security challenge
We consider how best to address some of the critical security challenges around the internet of things Continue Reading
By- Charaka Goonatilake, Panaseer
-
News
20 Feb 2020
UK and US accuse Russian spooks of Georgia cyber attacks
Foreign secretary describes 2019 campaign of cyber attacks as reckless, brazen and unacceptable Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Feb 2020
Google plans to send Brits’ data to US after Brexit
Move puts British user data beyond the reach of the EU’s GDPR, makes it more accessible to UK and US law enforcement agencies, and has prompted anger Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Feb 2020
Facilities firm ISS World crippled by ransomware attack
An apparent ransomware attack has compromised some IT and email systems at Danish facilities firm ISS World Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Feb 2020
Cost of cloud misconfigurations set at $5tn
Cloud security outfit DivvyCloud says more than 33 billion records have been exposed in cloud misconfiguration incidents in the past 24 months Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Feb 2020
Blasé directors put business data at risk
The higher up within a business you go, the more likely you are to find people intentionally leaking confidential data, says Egress Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Feb 2020
Questions raised over Office 365 shared content policy
Buried 300 words into Microsoft’s standard service level agreement is a clause that affects intellectual property and privacy Continue Reading
By- Cliff Saran, Managing Editor
-
News
18 Feb 2020
US ‘breached due process’ in spying operation against Julian Assange’s lawyers
Surveillance footage of Julian Assange’s meetings with lawyers and doctors in the Ecuadorian Embassy in London was an “abuse of process” Continue Reading
By- Bill Goodwin, Computer Weekly
- Sander Priston
-
News
18 Feb 2020
Girlguiding hosts interactive cyber security workshop
100 Guides from South West England took part in an NCSC event to learn more about security fundamentals Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Feb 2020
Untrusted security teams being left out of business decisions
Only a third of organisations are involving their cyber security function at the planning stage of business initiatives Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
18 Feb 2020
Is this Netflix-style thriller the future of security training?
Cyber awareness specialists at KnowBe4 reckon that bringing Netflix-style production values to corporate videos heralds a new approach to security training Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Feb 2020
Most CISOs ready to move jobs if something better comes along
The shortage of skilled security pros is creating an active recruitment market, with over 80% of CISOs saying they would consider a new role if approached Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Feb 2020
Veeam Availability Suite v10 adds NAS backup and cloud tiering
Availability Suite is mostly about consolidating the company’s data management platform idea, but it has added incremental forever NAS backup, cloud tiering and recovery to vSphere Continue Reading
By- Antony Adshead, Storage Editor
-
Opinion
18 Feb 2020
Security Think Tank: Zero trust strategies must start small, then grow
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs approach moving their organisations from traditional network security to a zero-trust architecture? Continue Reading
-
E-Zine
18 Feb 2020
Trust no one – the benefits of zero-trust security
In this week’s Computer Weekly, we take an in-depth look at zero-trust security and examine how it changes traditional IT risk models. After SAP extended the support deadline for its ECC ERP system, we find out the options for users. And we analyse explainable AI and the ethical importance of understanding algorithms. Read the issue now. Continue Reading
-
News
17 Feb 2020
Australians more savvy about cyber security
More Australians look out for signs of security features such as SSL encryption even as they remain sceptical of the data protection capabilities of small businesses Continue Reading
By- Aaron Tan, TechTarget
-
News
17 Feb 2020
Mastercard opens European security resilience unit
Mastercard’s European Cyber Resilience Centre will bring together its partners and other industry bodies to support enterprise resilience Continue Reading
By- Alex Scroxton, Security Editor
-
News
17 Feb 2020
Ex-soldiers to become ethical hackers
A new programme will give armed forces veterans in Scotland a grounding in cyber security skills, including penetration testing and ethical hacking Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
17 Feb 2020
Zero trust: Taking back control of IT security
Trust on the network is a crucial factor in security risk, and zero trust changes the traditional model of ‘trust but verify’ Continue Reading
By- Cliff Saran, Managing Editor
-
Opinion
17 Feb 2020
Security Think Tank: Ask yourself if zero trust is right for you
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero-trust architecture? Continue Reading
By- Simon Persin, Turnkey Consulting
-
Blog Post
14 Feb 2020
Want to hear the latest on Gov.uk Verify? Sorry, GDS still has nothing to say
The great and the good of the digital identity sector gathered in London yesterday (13 February) for the Think Digital Identity for Government conference – a popular bi-annual event that always ... Continue Reading
By- Bryan Glick, Editor in chief
-
News
14 Feb 2020
PM Johnson shuffles technology and digital ministers again
Boris Johnson has changed all the key Cabinet appointments responsible for tech and digital policy for the second time since becoming prime minister last year Continue Reading
By- Bryan Glick, Editor in chief
-
Opinion
14 Feb 2020
Security Think Tank: How zero trust lets you take back control
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero trust architecture? Continue Reading
By- James Walsh, Fieldfisher
-
News
13 Feb 2020
Cyber criminals spread coronavirus conspiracy theories
The latest email campaigns identified by Proofpoint are spreading conspiracy theories about the coronavirus outbreak Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
13 Feb 2020
CW Benelux: Ericsson helps driverless buses hit European streets
Ericsson has revealed its plans for new technologies including 5G, the internet of things and self-driving buses. Also read about the Dutch government lacking the knowledge and skills for its own IT strategy, and the Dutch government’s need to push for an electronic ID system for its citizens. Continue Reading
-
Opinion
13 Feb 2020
Security Think Tank: Practical steps to achieve zero trust
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero-trust architecture? Continue Reading
By - 12 Feb 2020
-
News
12 Feb 2020
Emotet evolving to exploit coronavirus fear
With coronavirus cases now reported across the world, Emotet campaigns are exploiting legitimate fears to compromise their targets Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Feb 2020
Internet Explorer zero day among 99 Patch Tuesday problems
After an eventful January Patch Tuesday that marked the end of support for Windows 7, the February 2020 update is another whopper, fixing close to 100 vulnerabilities Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
12 Feb 2020
Inside the SOC: the nerve centre of security operations
Security operations centres are the bedrock of any cyber defence strategy, but operating one is increasingly challenging, with mounting workloads and a shortage of skilled personnel Continue Reading
By- Aaron Tan, TechTarget
-
News
11 Feb 2020
MI5 failed to disclose failings in handling intercepted data, court hears
MI5 failed to disclose serious failures in the way it handled intelligence data to the Investigatory Powers Tribunal, the surveillance regulator and ministers. Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
11 Feb 2020
Mac-based security threats outpacing Windows
Security threats targeting Apple endpoints are growing more quickly than those targeting Windows machines, according to Malwarebytes Continue Reading
By- Alex Scroxton, Security Editor
-
Podcast
11 Feb 2020
Podcast: The Computer Weekly Downtime Upload – episode 46
In this week’s episode of the Computer Weekly Downtime Upload podcast, Caroline Donnelly, Clare McDonald and Brian McKenna are joined by special guest Hannah Foulds, head of marketing and membership at the Open Data Institute, who flags stories about humans tricking AI. The group then discusses the Women in Software Powerlist, the loan charge and online targeting Continue Reading
By- Brian McKenna, Senior Analyst, Business Applications
- Clare McDonald, Business Editor
- Caroline Donnelly, Senior Editor, UK
-
News
11 Feb 2020
Chinese military personnel accused of Equifax hack
A US federal grand jury has indicted four Chinese army personnel over the 2017 Equifax breach Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Feb 2020
Tencent Cloud gains multi-tier cloud security certification
China's Tencent Cloud joins major cloud suppliers in securing tier three of Singapore’s Multi-Tier Cloud Security standard in a bid to grow its presence in Asia Continue Reading
By- Aaron Tan, TechTarget
-
News
10 Feb 2020
Police use of facial recognition ‘unjustifiable’, says Scottish Justice Committee
Members of the Scottish Parliament have said police use of live facial recognition technology is “not fit for purpose” Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
10 Feb 2020
What should be in Australia’s next cyber security strategy
The Australian government is reviewing the nation’s cyber security strategy, but is it looking at the right issues? Continue Reading
-
News
10 Feb 2020
Norway braces for possible China backlash over 5G loss
Norway fears trading relationship with China will suffer as a result of Huawei losing 5G contract to Ericsson Continue Reading
By- Gerard O'Dwyer
-
News
10 Feb 2020
AI in public service must be accountable
Committee on Standards in Public Life recommends that government departments make ethics a top priority when tendering artificial intelligence systems Continue Reading
By- Cliff Saran, Managing Editor
-
Feature
10 Feb 2020
Choosing the right disaster recovery for your business
We look at the various options available when implementing disaster recovery, and how much they’re worth Continue Reading
By- Paul Rummery, SecureNet Consulting
-
Opinion
10 Feb 2020
Security Think Tank: Zero trust is complex, but has rich rewards
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero-trust architecture? Continue Reading
By- Bhanu Jagasia
-
News
07 Feb 2020
RobbinHood ransomware tricks Windows into deleting defences
By subverting kernel memory settings in Windows 7, Windows 8 and Windows 10, the RobbinHood ransomware can now delete cyber security defences from target systems Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Feb 2020
Joaquin Phoenix’s Joker is ‘most dangerous’ movie
Ahead of the 2020 Oscars, Kaspersky researchers say they found more than 300 files masquerading as the Joker movie Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
07 Feb 2020
Security Think Tank: No trust in zero trust need not be a problem
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero-trust architecture? Continue Reading
By- Silvano Sogus
-
News
06 Feb 2020
Maastricht University pays €200,000 to Russian hackers
A Dutch university has taken the difficult decision to pay hundreds of thousands of Euros to Russian hackers that compromised its systems through a ransomware attack Continue Reading
By- Kim Loohuis
-
News
06 Feb 2020
Stressed, overworked CISOs losing £23k a year in unpaid overtime
Nominet’s latest CISO Stress Report has revealed the extent to which organisations are taking advantage of their security staff, and the deleterious effects of overwork and stress on mental health Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Feb 2020
Darktrace signs to McLaren for 2020 F1 season
McLaren Racing has enlisted Darktrace to become its official artificial intelligence cyber security partner Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Feb 2020
Scammers using fake PayPal emails stole over £1m in the UK in last quarter
Fraudsters tricked Brits into sending over £1m worth of goods to them that they hadn't paid for Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
05 Feb 2020
Web app ubiquity gives cyber criminals new opportunities
The popularity and ubiquity of web-based apps such as Office 365 and Salesforce is a temptation too good to miss for cyber criminals Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Feb 2020
Check Point pledges end to security updates
Check Point’s Gil Shwed expands on a vision for the next 10 years of cyber security, which he calls Infinity Next Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Feb 2020
IoT network flaw left Philips Hue bulbs open to attack
Vulnerabilities in the ZigBee internet of things networking protocol have left market-leading smart devices, including Philips Hue lightbulbs, open to exploitation Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
05 Feb 2020
Security Think Tank: Zero trust is not the answer to all your problems
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero-trust architecture? Continue Reading
-
News
04 Feb 2020
Acronis CEO bullish as specialist goes beyond backup
Acronis is set to launch Cyber Protect as it rides a wave of confidence based on increasing revenues and investor funding. Will the backup-plus-cyber protection calculation pay off? Continue Reading
By- Antony Adshead, Storage Editor
-
Opinion
04 Feb 2020
The fight against cyber crime: Why cooperation matters
With the WEF’s Global Risk Report 2019 ranking cyber attack in the top five global risks, we now see rising consensus at institutional level that no individual stakeholder can address the breadth of security challenges we face today Continue Reading
By- Elisabetta Zaccaria
-
News
04 Feb 2020
Social media targeting algorithms need regulation, says CDEI
The Centre for Data Ethics and Innovation is recommending regulation of social media algorithms as part of a drive to make user targeting safe and ethical Continue Reading
By- Brian McKenna, Senior Analyst, Business Applications
-
Podcast
04 Feb 2020
Podcast: The Computer Weekly Downtime Upload – Episode 45
In this week’s episode of the Computer Weekly Downtime Upload podcast, Caroline Donnelly, Clare McDonald and Brian McKenna are joined by investigations editor Bill Goodwin to delve deeper into the Travelex and related affairs, and to discuss public sector cloud trends, AI and the NHS, and the Hangar 51 startups accelerator programme Continue Reading
By- Brian McKenna, Senior Analyst, Business Applications
- Caroline Donnelly, Senior Editor, UK
- Clare McDonald, Business Editor
-
News
04 Feb 2020
MI5 faces court ruling over unlawful surveillance warrants
Privacy groups Liberty and Privacy International ask the Investigatory Powers Tribunal to order MI5 to disclose full details of ‘unlawful’ conduct, after classified documents reveal the spy agency failed to comply with surveillance laws Continue Reading
By- Bill Goodwin, Computer Weekly
-
Opinion
04 Feb 2020
Security Think Tank: Facing the challenge of zero trust
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero-trust architecture? Continue Reading
By