IT security
-
Opinion
30 Jun 2025
Better governance is required for AI agents
The Security Think Tank considers how CISOs can best plan to facilitate the secure running of AI and Gen AI-based initiatives and ensure employees do not inadvertently leak data or make bad decisions Continue Reading
By- Mandy Andress, Elastic
-
Feature
30 Jun 2025
Enterprise cybersecurity: A strategic guide for CISOs
CISOs and others responsible for safeguarding an organization's systems, networks and data need to manage day-to-day threats while also planning strategically for what's ahead. Continue Reading
By- Phil Sweeney, Industry Editor
- Craig Stedman, Industry Editor
-
News
03 Jan 2019
IT regulators and practitioners need common language
There needs to be greater understanding between lawmakers and technologists to ensure regulations do not have unintended consequences, says a US computer security researcher and bug bounty pioneer Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Jan 2019
Intel admits chip security has a long way to go
A year ago, the world came to realise how a side-loading attack could compromise a microprocessor. Intel has been working hard to make fixes easier Continue Reading
By- Cliff Saran, Managing Editor
-
News
03 Jan 2019
Fortinet to lead cyber security discussion at WEF annual summit
The head of cyber security firm Fortinet has been named as a discussion leader at the upcoming World Economic Forum annual meeting in Davos, Switzerland Continue Reading
By- Warwick Ashford, Senior analyst
-
News
02 Jan 2019
Kaspersky Lab champions gender equality and digital child safety
Kaspersky Lab report highlights gender equality in the technology industry and child education about digital security Continue Reading
By- Warwick Ashford, Senior analyst
-
News
02 Jan 2019
How e-signatures fix broken digitisation
A big barrier to the end-to-end digitisation of business processes is that certain steps require paper – but DocuSign plans to fix this Continue Reading
By- Cliff Saran, Managing Editor
-
News
31 Dec 2018
New Year’s Honours 2019 lauds women in IT and data specialists
The New Year’s Honours list 2019 features accolades for leading women in IT and data, as well as other specialists in data Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
Opinion
31 Dec 2018
Can we live without passwords?
Can you imagine a future in which we can be secure online without having to remember an unwieldly list of passwords? Solutions are emerging that could make passwords redundant, but there will be other security problems to resolve Continue Reading
By- Bruno Halopeau & Adrien Ogee
-
Opinion
31 Dec 2018
Security Think Tank: Pay attention to attribute-based system access permissions
At the close of 2018, we asked CW Security Think Tank contributors to name one thing predicted for 2018 that did not happen, one thing that was not predicted and did happen and one thing that should happen in 2019, but probably will not Continue Reading
By- Simon Persin, Turnkey Consulting
-
News
31 Dec 2018
Top 10 network stories of 2018
2018 was the year when software-defined networking, and more specifically software-defined WANs, took centre stage. We look back at a transformative year for the world of the network manager Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
28 Dec 2018
Security Think Tank: Focus on malicious use of AI in 2019
At the close of 2018, we asked CW Security Think Tank contributors to name one thing predicted for 2018 that did not happen, one thing that was not predicted but did happen, and one thing that should happen in 2019 but probably will not Continue Reading
By- Rob Clyde, Isaca
-
News
28 Dec 2018
Top 10 stories on national security in 2018
From Russian disinformation, state surveillance, and police stop and seizure powers, to Facebook and WikiLeaks Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
27 Dec 2018
Malwarebytes: Fileless ransomware an emerging threat for U.S.
A new Malwarebytes report examines Sorebrect, a fileless ransomware threat that's been detected in the U.S. this year, as well as with three other fileless attacks. Continue Reading
By- Casey Clark, TechTarget
-
Opinion
27 Dec 2018
Security Think Tank: Strong 2FA should be a goal in 2019
At the close of 2018, we asked CW Security Think Tank contributors to name one thing predicted for 2018 that did not happen, one thing that was not predicted but did happen, and one thing that should happen in 2019 but probably will not Continue Reading
-
News
24 Dec 2018
Top 10 IT security stories of 2018
Here are Computer Weekly’s top 10 IT security stories of 2018 Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
24 Dec 2018
Security Think Tank: Let’s hope for treaty on online norms
At the close of 2018, we asked CW Security Think Tank contributors to name one thing predicted for 2018 that did not happen, one thing that was not predicted but did happen, and one thing that should happen in 2019 but probably will not Continue Reading
By- Stephen Bonner, Deloitte Cyber Risk Services
-
News
23 Dec 2018
'Serious' Twitter flaw allows hackers to post on other people's accounts
A vulnerability in Twitter allows hackers to send tweets, private messages, post images or videos, and turn off security features, says British security researcher Continue Reading
By- Bryan Glick, Editor in chief
-
News
21 Dec 2018
Government announces new plans to develop cyber talent
The government has announced plans for a Cyber Security Council to form a strategy for developing future cyber talent Continue Reading
By- Clare McDonald, Business Editor
-
Opinion
21 Dec 2018
Security Think Tank: Put collaboration on 2019 security agenda
At the close of 2018, we asked CW Security Think Tank contributors to name one thing predicted for 2018 that did not happen, one thing that was not predicted but did happen, and one thing that should happen in 2019 but probably will not Continue Reading
By- Emma Bickerstaffe, Information Security Forum (ISF)
-
News
21 Dec 2018
Top 10 cyber crime stories of 2018
Here are Computer Weekly’s top 10 cyber crime stories of 2018 Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
20 Dec 2018
CW ANZ: Rise to cloud and data management challenges
Use of cloud services is soaring in Australia, but a lack of cloud management skills is holding back enterprises from reaping the full benefits of the technology. In this edition of CW ANZ, we look at how enterprises in ANZ are approaching data management in the cloud, and some of the best practices that they can adopt to address cloud related challenges. Read the issue now. Continue Reading
-
Blog Post
20 Dec 2018
Six months on, GDPR is a qualified success
Anyone hoping that we would by now have greater clarity on GDPR will have been sadly disappointed. Large swathes of the Regulation have yet to be tested in a court, and many of the high profile ... Continue Reading
By- Bryan Betts, Freeform Dynamics
-
Answer
20 Dec 2018
Ticketmaster breach: How did this card skimming attack work?
The hacking group Magecart was recently found to have run a card skimming campaign that put customer information at risk. Learn how this attack worked from Nick Lewis. Continue Reading
By -
News
20 Dec 2018
Marriott data breach losses could be over half a billion dollars
Direct losses related to a huge data breach at US hotel group could reach $600m Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
19 Dec 2018
Top 10 Australia IT stories of 2018
Australia continues to cement its position as a leader in mastering and deploying advanced information and communications technology across a large segment of its economy Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
19 Dec 2018
Lauri Love battles police for return of computers as NCA confirms live investigation
The National Crime Agency (NCA) confirms there is a live investigation into Lauri Love in the UK, as Love brings legal action against UK police for the return of seized computer equipment Continue Reading
By- Bill Goodwin & Julia Gregory
-
Opinion
19 Dec 2018
Security Think Tank: Align security strategy to business objectives
At the close of 2018, we asked CW Security Think Tank contributors to name one thing predicted for 2018 that did not happen, one thing that was not predicted and did happen and one thing that should happen in 2019, but probably will not Continue Reading
-
News
18 Dec 2018
APAC cyber security landscape to be more tumultuous in 2019
Amid growing cyber threats, the Asia-Pacific cyber security landscape will not get any rosier in 2019 unless organisations start shoring up their cyber hygiene Continue Reading
By- Aaron Tan, Informa TechTarget
-
Blog Post
18 Dec 2018
Have your Christmas Presents vanished from your doorstep?
So far only one of the presents we have ordered on-line this year failed to arrive - more than one e-mails telling us of delivery slots arrived after the parcel. It was therefore only chance that ... Continue Reading
By- Philip Virgo, Winsafe Ltd
-
News
18 Dec 2018
Mobile security needs a rethink for the 5G era
A report released through the government’s 5G Testbeds and Trials programme has recommended the UK rethink its mobile security strategy Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Dec 2018
Broadband coverage improved through 2018, says Ofcom
Ofcom’s annual Connected Nations report reveals that the number of people who cannot receive a 10Mbps broadband connection has halved Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
18 Dec 2018
Security Think Tank: Let’s get back to basics in 2019
At the close of 2018, we asked CW Security Think Tank contributors to name one thing predicted for 2018 that did not happen, one thing that was not predicted but did happen, and one thing that should happen in 2019 but probably will not Continue Reading
By -
News
17 Dec 2018
Top 10 ASEAN stories of 2018
Organisations across Southeast Asia have been doubling down on efforts to take the lead in digital transformation initiatives Continue Reading
By- Aaron Tan, Informa TechTarget
-
Opinion
17 Dec 2018
Security Think Tank: Prioritise multifactor authentication in 2019
At the close of 2018, we asked CW Security Think Tank contributors to name one thing predicted for 2018 that did not happen, one thing that was not predicted but did happen, and one thing that should happen in 2019 but probably will not Continue Reading
By- Corey Nachreiner, Watchguard Technologies
-
News
14 Dec 2018
Iranian cyber espionage highlights human element
State-backed hackers in Iran have reportedly upped efforts to compromise US officials’ email accounts using phishing scams Continue Reading
By- Warwick Ashford, Senior analyst
-
News
14 Dec 2018
Australia passes controversial encryption law
Arguments continue over law that requires companies to work with government agencies to ensure that encrypted communications can be read if a crime is suspected Continue Reading
-
Opinion
14 Dec 2018
Security Think Tank: Smart botnets resist attempts to cut comms
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including "sleepers" designed to be activated at a future date Continue Reading
-
Opinion
14 Dec 2018
Security Think Tank: Strategies for blocking malware comms
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including “sleepers” designed to be activated at a future date? Continue Reading
By -
News
13 Dec 2018
ICO and government help UK businesses prepare for no-deal Brexit
The Information Commissioner’s Office (ICO) and the government are providing guidance for UK businesses, particularly SMEs, on how to prepare for a possible no-deal Brexit Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 Dec 2018
Machine identity protection development gets funding boost
Cyber security firm Venafi has launched a development fund aimed at accelerating the delivery of protection for machine identities Continue Reading
By- Warwick Ashford, Senior analyst
-
Blog Post
13 Dec 2018
Shock Headline: IT Saves $$$$ (again)!
Two and a bit years ago – I should remember, it was on my birthday! – I was presenting a panel debate on the latest Cybersecurity deterrents. With four vendors and two consultants on the panel, it ... Continue Reading
By- Steve Broadhead, Broadband Testing
- 13 Dec 2018
-
News
13 Dec 2018
Social engineering at the heart of critical infrastructure attack
Social engineering is the core technique used in a series of cyber attacks targeting government, defence, nuclear, energy and financial organisations around the world, which means people are key to defence Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
13 Dec 2018
CW Europe: Russia banks on electronic payments
A recent study by Sberbank, Russia’s largest state-run lender, shows the country has experienced a cashless payment boom over the past decade. Also read about the attempt by four Russians to break into the networks of the Organisation for the Prohibition of Chemical Weapons in The Hague, and why the Estonian government is directly targeting IT professionals in the UK. Continue Reading
-
News
13 Dec 2018
UK trade sector risks GDPR fines over poor data disposal
UK businesses in the trade sector are risking GDPR fines for failing to wipe data from old IT equipment, a survey shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 Dec 2018
Most UK retailers plan to up cyber security
The majority of UK retailers are planning to increase cyber security measures during the Christmas season, a survey reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
12 Dec 2018
Security Think Tank: Prevention and detection key to disrupting malware comms
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including “sleepers” designed to be activated at a future date? Continue Reading
By- Simon Persin, Turnkey Consulting
-
News
12 Dec 2018
Criminals act like nation-state attackers in Russian campaign
Security researchers have uncovered evidence of a sustained effort targeting Russian state-owned critical infrastructure companies by financially motivated non-state actors Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
11 Dec 2018
Security Think Tank: Severing C&C comms is key, but complex
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including “sleepers” designed to be activated at a future date? Continue Reading
By- Emma Bickerstaffe, Information Security Forum (ISF)
-
News
11 Dec 2018
Mac malware makes debut in top 10 list
Mac malware appears in the WatchGuard top 10 malware list for first time, and 6.8% of major websites still use an insecure SSL protocol, according to the firm’s latest internet security report Continue Reading
By- Warwick Ashford, Senior analyst
-
11 Dec 2018
Trusted nodes: The next generation in quantum key distribution
QKD is a form of protection against interception by quantum computers, but cost and technical limitations have made the technology impractical. Could trusted nodes make all the difference? Continue Reading
-
E-Zine
11 Dec 2018
Manchester’s evolution from rag trade to digital hub
In this week’s Computer Weekly, we visit Manchester to examine the city’s expanding digital and e-commerce industry and find out the key to tech sector growth in the former home of the UK rag trade. We look at the challenges of IT security in the quantum computing age. And we talk to Bloomberg’s CTO about tech innovation, machine learning and blockchain. Read the issue now. Continue Reading
-
News
11 Dec 2018
Large disparity in NHS cyber skills and training spend
Despite government pledges to up cyber security spending across the NHS, there are still huge disparities in cyber security skills and spending on cyber security training, FoI requests reveal Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Dec 2018
O2 expected to pursue Ericsson for compensation over 24-hour stoppage
Mobile network operator could seek up to £100m in damages from its supplier, which failed to update expired software certificates, causing a day-long outage Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
10 Dec 2018
Security Think Tank: Firms neglect DNS security at their peril
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including “sleepers” designed to be activated at a future date? Continue Reading
By- Simon McCalla, Nominet
-
News
10 Dec 2018
UK businesses feel let down by government on cyber security
Government needs to provide more support around cyber security issues in 2019, according to the majority of UK IT leaders polled Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
07 Dec 2018
What does the 802.11ax wireless standard mean for your network?
The publication of the 802.11ax standard will pave the way for the next generation of wireless technology, but what does it mean for enterprise networks? Continue Reading
-
News
07 Dec 2018
O2 outage highlights importance of software certificate audits
A major outage on the O2 4G mobile network was caused by an expired certificate and could easily have been avoided, it has emerged Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Dec 2018
Half of business leaders unaware of BPC cyber attacks
Half of management teams polled in 12 countries, including the UK, are unaware of business process compromise (BPC) attacks Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
07 Dec 2018
Security Think Tank: Three steps to detect malware comms
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including “sleepers” designed to be activated at a future date? Continue Reading
By- Bruce Beam , (ISC)²
-
News
07 Dec 2018
Court orders Post Office to explain inability to access encrypted file
Post Office unable to open encrypted recording of an interview that forms part of its evidence in High Court case Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Opinion
06 Dec 2018
Security Think Tank: How to tool up to catch evasive malware comms
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including “sleepers” designed to be activated at a future date? Continue Reading
-
News
06 Dec 2018
Fileless malware surge, warns Malwarebytes report
Data from millions of consumers reveals an uptick in fileless malware and other new-generation malware that calls for a new cyber security approach, report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Dec 2018
China demands release of arrested Huawei CFO
The Chinese government has called for the release of Huawei chief financial officer Meng Wanzhou, who was detained in Canada at the weekend Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Dec 2018
Software failure paralyses O2’s 4G network
O2 is racing to fix a major outage on its 4G network that has left millions of mobile subscribers without access to data services Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Dec 2018
Adobe releases Flash patch for zero-day exploit
Emergency security update released for zero-day vulnerability that is being exploited in the wild via a Microsoft Office document, according to researchers Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
05 Dec 2018
Drawing the line for cyber warfare
With alleged Russian meddling in elections and the state-backed attack on Iran’s nuclear programme, it is becoming difficult to define the boundaries of cyber warfare Continue Reading
By -
Feature
05 Dec 2018
Brexit implications for data protection
Leaving the European Union will have serious implications for data protection in the UK unless adequate steps are taken, so businesses are advised to have contingency plans in place Continue Reading
-
News
05 Dec 2018
BT moves to strip Huawei kit from EE’s network
Telco will remove Huawei’s networking equipment from the core of EE’s 4G mobile network Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
05 Dec 2018
Security Think Tank: Situational awareness underpins effective security
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure they detect such methods and that all C&C systems are removed, including ‘sleepers’ designed to be activated at a future date? Continue Reading
-
News
05 Dec 2018
Symantec unveils AI-based protection for critical infrastructure
Cyber security firm has unveiled what it claims to be the industry’s first neural network to protect critical infrastructure from USB-borne malware attacks Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
05 Dec 2018
Raising security awareness through phishing simulation – how to get it right
Testing employees’ security practices by sending fake phishing emails has become commonplace, but few organisations are conducting such exercises effectively Continue Reading
By- Ed Tucker, Human Firewall
-
News
05 Dec 2018
Nominet brings security expertise and tech to market
The .uk domain registry is to bring its DNS expertise and technology developed for the NCSC to market to address cyber security ‘blindspot’ Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Dec 2018
Phishing at centre of cyber attack on Ukraine infrastructure
Phishing is one of the key tools used by cyber attackers against critical national infrastructure (CNI), as highlighted by attacks on telecommunications in Ukraine Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Dec 2018
UK consumers threaten data breach backlash
Most UK and global consumers are willing to walk away from businesses that fail to look after personal data, with retailers most at risk, research shows Continue Reading
By- Warwick Ashford, Senior analyst
-
Answer
04 Dec 2018
What are the differences between network security vs. cybersecurity?
IT groups need to consider varying layers of security. For instance, the similarities and differences between cybersecurity and network security are closely entwined. Continue Reading
By- Mike Jude, Stratecast/Frost & Sullivan
-
Feature
04 Dec 2018
The future of network-connected device security
The proliferation of poorly secured network-connected devices has prompted the UK government to publish new best practice guidelines. Do these go far enough? Continue Reading
-
News
04 Dec 2018
‘Open-minded’ DVSA cuts cost of MOT testing
Government agency harnesses customised open source platform to ensure data security while cutting costs and plans to extend its MOT testing capability to do the same for drivers’ theory tests Continue Reading
-
News
04 Dec 2018
Financial institutions’ data at risk despite security spending
Despite increased spending on cyber security, digital transformation and advanced attacks mean financial institutions’ data is still at risk, a report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
Tip
04 Dec 2018
Testing applications in production vs. non-production benefits
To ensure proper application security testing, production and non-production systems should both be tested. In this tip, expert Kevin Beaver weighs the pros and cons. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Opinion
04 Dec 2018
Security Think Tank: Basic steps to countering malware comms
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure they detect such methods and that all C&C systems are removed, including "sleepers" designed to be activated at a future date Continue Reading
By -
News
04 Dec 2018
100 million Quora.com user details exposed
Question-and-answer site is the latest organisation to admit a breach of users’ personal data, with industry commentators calling out credential theft as a top cause of such breaches Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Dec 2018
Liberty heads for judicial review over Investigatory Powers Act
The UK's powers to conduct supsicionless bulk surveillance on individuals and organisations face a legal challenge in the high court next year Continue Reading
By- Bill Goodwin, Computer Weekly
-
Opinion
03 Dec 2018
Security Think Tank: Combine tech, process and people to block malware comms
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including "sleepers" designed to be activated at a future date. Continue Reading
By- Maxine Holt, Omdia
-
News
03 Dec 2018
Digital identity market welcomes plan to hand Gov.uk Verify to private sector
Players in the UK digital identity community welcome the clarity over the future of Verify, but question marks remain over prospects for government ID system Continue Reading
By- Bryan Glick, Editor in chief
-
News
03 Dec 2018
BT announces new head of security business
BT has appointed a former law enforcement officer and BT investigator as the new head of its security business Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Dec 2018
UK government commits to opening up data in bid to push adoption of AI
Opening up data is vital to government plans to push adoption of artificial intelligence across all sectors of the UK economy Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
03 Dec 2018
Police investigations into cyber crime up 14% in a year
Officers forced to follow up over 2,500 complaints of Instagram, Facebook, email and website hacking, and Bitcoin ransom, despite a rise in violent crime, report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
03 Dec 2018
Brexit and digital identity – avoiding future restrictions on digital trade
The UK has been a major contributor to European efforts to establish cross-border digital identities. Governments need to ensure that Brexit does not introduce unwanted restrictions that harm digital trade Continue Reading
By- Gillan Ward, ID Crowd
-
News
30 Nov 2018
Cyber crime most significant harm in UK, says top cyber cop
Cyber crime is the most significant harm in the UK, according to the cyber lead at the City of London Police, which is the national lead for online crime Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Nov 2018
Marriott data breach highlights basic failings
A breach of a guest reservation database of the Starwood division of the Marriott International hotel group highlights basic personal data protection failures Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Nov 2018
WannaCry borderline national cyber emergency
The May 2017 WannaCry attack, which disrupted services at one-third of NHS trusts and more than 600 primary care organisations is the closest the UK has come to a national cyber emergency, says the NCSC Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Nov 2018
E-commerce sites warned of heightened DDoS threat
E-commerce sites are being urged to ensure that they have adequate DDoS protection ahead of the vital holiday trading season after attacks ramped up on Black Friday and Cyber Monday Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Nov 2018
UK cyber security strategy making ‘good progress’
The National Cyber Security Strategy is making good progress, but there is much left to be done, according to a Cabinet Office official Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Nov 2018
120,000 police officers to receive cyber security training
Cisco is partnering with UK police forces to offer cyber security training through the Cisco Networking Academy Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Nov 2018
Cyber resilience lacking due to apathy of UK leaders
An unwillingness to accept that cyber is a real threat to critical national infrastructure by UK political and business leaders has resulted in a lack of resilience, says security industry veteran Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 Nov 2018
CIO interview: Stephen Docherty on NHS data sharing
The Cambridge Analytica scandal raised awareness about privacy. Stephen Docherty, CIO of South London and Maudsley NHS Trust, explains why Continue Reading
By- Cliff Saran, Managing Editor
-
News
28 Nov 2018
FCA deeply concerned as no end in sight for IT failures in banking
The FCA has reported a massive increase in the number of banking IT failures in the UK and admitted there is no end in sight Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
27 Nov 2018
Businesses failing to win consumer trust
Businesses are still largely failing to win the trust of consumers to keep their personal data safe as data breaches continue to make headlines Continue Reading
By- Warwick Ashford, Senior analyst
-
Tip
27 Nov 2018
How bring-your-own-land attacks are challenging enterprises
FireEye researchers developed a new technique called bring your own land, which involves attackers creating their own tools. Discover more about how this works with Nick Lewis. Continue Reading
By -
News
27 Nov 2018
York teen crowned 2018 UK cyber security champion
Teenager beat off competition from 41 other cyber security enthusiasts from across the UK, and six from Singapore, in the UK Cyber Security Challenge final Continue Reading
By- Warwick Ashford, Senior analyst