IT security
-
E-Zine
07 Dec 2023
CW EMEA: Prepare for cyber war
When the war between Hamas and Israel began in October, cyber security professionals and major government and private organisations braced for an inevitable accompanying online war. In this issue of CW EMEA, we outline cyber war, patterns of threat activity, and find out what security teams can do to protect their organisations. We also look at Finland’s advances in quantum computing, how Belgian researchers have developed technology to help datacentres process data faster, and the secrets of KPN’s successful business transformation. Read the issue now. Continue Reading
-
E-Zine
09 Nov 2023
Heineken lets the data flow
In this month’s CW EMEA ezine, we find out about Heineken’s mission to make the most out of the data it holds through an enterprise-wide data ecosystem. We also look at how the UK has turned its back on the German government-funded Gaia-X data platform, why cyber experts are urging the EU to rethink vulnerability disclosure plans, and how the IT industry is responding to the software developer skills shortfall. Read the issue now. Continue Reading
-
News
13 Mar 2024
US authorities move a step closer to banning TikTok
Lawmakers in Washington DC have moved a step closer to enacting a broad national ban on controversial video app TikTok in the US, with global ramifications Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Mar 2024
Microsoft AI-powered cyber service to go live in April
After a year being previewed by beta customers, Microsoft’s much vaunted Copilot for Security service is about to go on general release, promising time savings and improved accuracy for hard-pressed security pros Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Mar 2024
British Library opens up over ransomware attack to help others
The British Library has opted for full transparency after experiencing a devastating ransomware attack, publishing details of the intrusion, its response and the lessons it has learned Continue Reading
By- Alex Scroxton, Security Editor
-
Tip
13 Mar 2024
17 potential costs of shadow IT
Companies should be vigilant and consider the significant costs associated with shadow IT. Learn about these overlooked issues and how they affect the organization. Continue Reading
By -
News
12 Mar 2024
March Patch Tuesday throws up two critical Hyper-V flaws
Two critical vulnerabilities in Windows Hyper-V stand out on an otherwise unremarkable Patch Tuesday Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
12 Mar 2024
A new security partnership to build a silicon valley in South Wales
The £140m acquisition of Newport Wafer Fab by American firm Vishay is to be welcomed but the UK needs needs security, stability and strategic investment to grow our domestic semiconductor capability, writes Alun Cairns MP Continue Reading
By- Alun Cairns
-
News
12 Mar 2024
More DDoS attacks launched against APAC financial firms
The financial sector in Asia-Pacific saw more DDoS attacks in 2023, but no notable impact was reported, according to a report by Akamai and FS-ISAC Continue Reading
By- Aaron Tan, TechTarget
-
News
11 Mar 2024
Aryaka advances network, security convergence with SASE as a service
Cloud-based software-defined networking and security services provider claims to transform global secure networking with unified secure access service edge solution Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
11 Mar 2024
Government not facing up to CNI cyber risks, committee warns
The Joint Committee on the National Security Strategy has accused the government of burying its head in the sand over the cyber threat to UK critical infrastructure Continue Reading
By- Alex Scroxton, Security Editor
-
Podcast
11 Mar 2024
Podcast: Immutable storage essential against ransomware, but...
...not all immutable storage is created equal. That’s the message from Paul Speciale of Scality, who looks at immutable storage, its variants and what’s needed to secure data Continue Reading
By- Antony Adshead, Storage Editor
-
News
11 Mar 2024
Dutch organisations vulnerable to deepfake fraud
With the information many employees share on social media, Dutch companies are especially vulnerable to a new form of fraud Continue Reading
By- Kim Loohuis
-
News
11 Mar 2024
How Microsoft is easing GenAI adoption into financial services
Microsoft is supporting enterprise deployment models, addressing the risks of the technology and leveraging its industry cloud capabilities to ease generative AI adoption in the financial sector Continue Reading
By- Aaron Tan, TechTarget
-
News
11 Mar 2024
TechUK calls for next government to introduce ‘industrial strategy’ for AI
Trade group TechUK publishes blueprint calling for winner of next election to boost tech startups, digitise government services and accelerate technology R&D Continue Reading
By- Bill Goodwin, Computer Weekly
-
Answer
08 Mar 2024
Cloud security vs. network security: What's the difference?
While network security focuses on solely protecting networks, cloud security provides protection for networks, servers, containers, apps and more. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
News
08 Mar 2024
OSS leaders detail commitments to bolster software security
CISA has announced a number of actions to help secure the global open source ecosystem, as leading package repositories including the Python and Rust foundations advance their own initiatives Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
08 Mar 2024
electronic protected health information (ePHI)
Electronic protected health information (ePHI) is protected health information that is produced, saved, transferred or received in an electronic form. Continue Reading
By -
Opinion
08 Mar 2024
How to address third-party risk to ensure business resiliency
Identifying third-party risks, determining risk controls and treating third-parties as allies are some of the ways to address the risks associated with third-party transactions and business engagements Continue Reading
By- Luke Ellery
-
News
07 Mar 2024
PSNI chief denies ‘industrial’ use of surveillance powers against journalists
PSNI chief constable Jon Boutcher has agreed to provide a report on police surveillance of journalists and lawyers to Northern Ireland’s policing watchdog Continue Reading
By- Bill Goodwin, Computer Weekly
-
Tip
07 Mar 2024
5-step IaaS security checklist for cloud customers
Get expert advice on patching, data encryption, and identity and access management responsibilities in this enterprise IaaS security checklist. Continue Reading
By- Ed Moyle, Drake Software
-
News
07 Mar 2024
Government insists it is acting ‘responsibly’ on military AI
The government has responded to calls from a Lords committee that it must “proceed with caution” when it comes to autonomous weapons and military artificial intelligence, arguing that caution is already embedded throughout its approach Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
07 Mar 2024
NI Policing Board pressed to open inquiry into PSNI spying on journalists’ phones
Amnesty International and the Committee on the Administration of Justice have asked Northern Ireland’s policing watchdog to open an inquiry into the Police Service of Northern Ireland’s use of surveillance powers against journalists Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
07 Mar 2024
Western Sydney Metro deploys mission-critical communications for driverless transport
Nokiar teams with industrial partner to provide IP/MPLS backbone communications network and security solution for new Metro line connecting Australia’s largest city to airport Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
06 Mar 2024
Apple patches zero-days amid ‘foundational’ post-quantum update
Apple’s iOS 17.4 update not only fixes zero-day flaws that are being actively exploited, but includes important new security protocols to safeguard users against future attacks Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Mar 2024
Cash-strapped cyber pros go rogue on the dark web
Research conducted by CIISec has turned up worrying evidence of hard-up legitimate cyber professionals offering their services to the cyber criminal underground Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Mar 2024
Nation states buying hacking tools from underground Russian cyber forums
State-sponsored hacking groups, posing as hacktivists, are using Russian cyber crime forums to stock up on cyber weapons, says Check Point Software’s threat analyst, Sergey Shykevich Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
05 Mar 2024
Rapid7 hits out over botched vulnerability disclosure
Software development firm JetBrains and security specialist Rapid7 fall out over the handling of a critical vulnerability disclosure, while customers are left rushing to patch Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Mar 2024
ALPHV/BlackCat gang vanishes amid ransomware ‘turmoil’
Mystery surrounds the apparent disappearance of the ALPHV/BlackCat cyber crime gang amid reports that a prominent US victim paid a $22m ransom Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Mar 2024
Meta outage disrupts social media globally
Meta services, including Facebook, Instagram and Threads, have been downed in a brief service outage Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Mar 2024
IT chiefs fear Kubernetes data log overload
IT architectures are set to grow in complexity, and more mission-critical systems are being deployed on Kubernetes, meaning log files are becoming unmanageable Continue Reading
By- Cliff Saran, Managing Editor
-
News
05 Mar 2024
Open Rights Group accuses LiveRamp of ‘unlawful’ data processing
Privacy campaigners at Open Rights Group have submitted formal complaints to UK and French data regulators about allegedly unlawful data processing by online advertising firm LiveRamp Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
05 Mar 2024
American Express customers exposed through third-party breach
US card giant warns customers that their personal details may have been exposed after a third party experienced a systems breach Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
05 Mar 2024
Banning ransomware payments back on the agenda
The idea of banning ransomware payments to cyber criminals is back on the agenda, with former NCSC chief Ciaran Martin arguing that tougher measures need to be taken Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
05 Mar 2024
How Southeast Asia’s largest bank is riding the AI wave
DBS has scaled its AI capabilities across all parts of its business to deliver tangible outcomes and productivity gains Continue Reading
By- Piyush Gupta
-
E-Zine
05 Mar 2024
Authorised access only – biometrics in the workplace
In this week’s Computer Weekly, we examine how biometrics technologies are transforming identity and access management. We analyse research that shows a mismatch between managerial expectations of generative AI and worker experience. And we look at how to assess the best hybrid cloud management tools. Read the issue now. Continue Reading
-
04 Mar 2024
Biometric revolution in IAM: The future of authentication
The IAM landscape is experiencing profound change thanks to the advent of biometrics. Learn about the latest advantages and key benefits of biometrics in identity Continue Reading
-
News
04 Mar 2024
The Security Interviews: Cyber security is about managing risk effectively
Effective cyber security must lead to cyber resilience – that is, the ability to anticipate, protect against, withstand and recover from any adverse condition, disruption or compromise, as Kyndryl’s security practice leader explains Continue Reading
By- Melisa Osores, Managing Editor para América Latina
-
Feature
01 Mar 2024
Ivanti vulnerabilities explained: Everything you need to know
A series of vulnerabilities in Ivanti products have caused concern worldwide. Delve into some of the key issues arising from the Ivanti disclosures, looking at the vulnerabilities and their impact, what affected users should do, and learn about new developments Continue Reading
By- Alex Scroxton, Security Editor
-
News
01 Mar 2024
Fancy Bear sniffs out Ubiquiti router users
The authorities have warned users of Ubiquiti EdgeRouter products to take remedial action after a number of devices were hijacked into a malicious botnet by a Russian cyber espionage unit Continue Reading
By- Alex Scroxton, Security Editor
-
News
01 Mar 2024
APAC firms bullish on IT spending
More than half of organisations plan to spend more on key areas such as cyber security, generative AI and cloud in a sign of growing optimism across the region Continue Reading
By- Aaron Tan, TechTarget
-
News
29 Feb 2024
Home Office GPS tagging of asylum seekers breaches data protection law
The Information Commissioner’s Office has issued an enforcement notice against the Home Office after finding its programme to tag asylum seekers with GPS monitors breaches data protection law Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
29 Feb 2024
Okta doubles down on cyber in wake of high-profile breaches
Okta launches Secure Identity Commitment to shore up its technology in the wake of a damaging breach and elevate best practice around identity Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Feb 2024
DSIT publishes results of public digital identity trust consultation
Report from Department for Science, Innovation and Technology shows UK public wants government to be accountable and transparent, and views trust and inclusivity as key Continue Reading
By -
News
29 Feb 2024
Police arrested journalists as part of surveillance operation to identify confidential sources
Three police forces took part in surveillance operations between 2011 and 2018 to identify sources that leaked information to journalists Trevor Birney and Barry McCaffrey, the Investigatory Powers Tribunal hears Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
28 Feb 2024
New version of ALPHV/BlackCat ransomware hits victims
An updated version of the ALPHV/BlackCat ransomware has been spotted in the wild amid a series of attacks on American healthcare providers, prompting a new alert from the authorities Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Feb 2024
75% of third-party breaches target software, IT supply chains
Data drawn from SecurityScorecard’s telemetry reveals how supply chain breaches are becoming a weapon of choice for threat actors Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Feb 2024
Users love their cyber teams, but find them frustrating
Despite strong support for security teams, a good number of ordinary workers see them as obstructive to business goals, and would like to see them operate more transparently Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Feb 2024
Black Basta and Bl00dy ransomware gangs exploiting ConnectWise vulns
More ransomware gangs have been observed exploiting two dangerous vulnerabilities in ConnectWise ScreenConnect software, prompting new warnings for users to get patching Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Feb 2024
VulnCheck bug listing to help track new threats quicker
Exploit intelligence firm VulnCheck launches a proprietary Known Exploited Vulnerabilities catalogue in hopes of improving end-user access to intel on emerging threats and reaching those that the likes of CISA do not Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Feb 2024
Majority of UK employees ‘willingly gamble’ with security
Human-centric threats originating from employees continue to damage organisations both financially and reputationally, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Feb 2024
Executive interview: David Wong, Thomson Reuters
We speak to the chief product officer of Thomson Reuters about working with artificial intelligence and embedding Microsoft Copilot for Word Continue Reading
By- Cliff Saran, Managing Editor
-
Definition
27 Feb 2024
OpenSSL
OpenSSL is an open source cryptographic toolkit that facilitates secure communications between endpoints on a network. Continue Reading
-
News
27 Feb 2024
Hycu uses AI to develop APIs for SaaS application backup
SaaS applications don’t usually come with built-in data protection, but Hycu plans to tackle that gap in the market with AI to generate the connectors needed to backup user data Continue Reading
By- Yann Serra, LeMagIT
- Antony Adshead, Storage Editor
-
Definition
27 Feb 2024
computer forensics (cyber forensics)
Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. Continue Reading
By- Rahul Awati
- Ben Lutkevich, Site Editor
-
News
27 Feb 2024
Microsoft president commits to Azure open platform for AI
Brad Smith sets out Microsoft’s ambitions to make Azure the best platform to host foundational AI models, and train and run AI applications Continue Reading
By- Cliff Saran, Managing Editor
-
News
27 Feb 2024
Cozy Bear and other APTs changing tack as cloud adoption increases
A change in APT tactics has been observed resulting from greater adoption of cloud-based services, according to the NCSC Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Feb 2024
LockBit bids to save face after NCA takedown
The LockBit gang’s ringleader resurfaces with new infrastructure and new victims, claiming to have shrugged off a multinational police sting Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Feb 2024
Storage and backup spend in 2024 targets risk and resilience
The TechTarget and ESG spending intentions survey finds big bias towards averting risk and building organisational resilience, but on-premise storage a significant planned outlay Continue Reading
By- Antony Adshead, Storage Editor
-
News
23 Feb 2024
ConnectWise users see cyber attacks surge, including ransomware
ConnectWise ScreenConnect users who have yet to patch against a critical vulnerability are now being targeted by a barrage of cyber attacks, including ransomware Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Feb 2024
NCA trolls under fire LockBit gang leaders
The NCA has teased details of the identity of LockBit's main admin via the gang’s compromised dark web site, and hinted that he has been engaging with law enforcement Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
23 Feb 2024
LLMs explained: A developer’s guide to getting started
A guide to help enterprise developers use large language models securely, efficiently and cost-effectively in their applications Continue Reading
By- Cliff Saran, Managing Editor
-
News
22 Feb 2024
Cyber experts alarmed by ‘trivial’ ConnectWise vulns
The disclosure of two dangerous vulnerabilities in the popular ConnectWise ScreenConnect product is drawing comparisons with major cyber incidents, including the 2021 Kaseya attack Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
22 Feb 2024
How can we adapt work practices to protect CISO mental health?
Cyber leaders are finding it harder to keep up with security requirements than just two years ago, risking a domino effect of dissatisfaction, burnout and eventually, resignation Continue Reading
By- Mick Baccio
-
News
22 Feb 2024
Toshiba and Orange test quantum encryption on traditional network
Researchers used QKD on a fibre-optic network spanning 184km to show how the technology could be used to secure networks cost-effectively Continue Reading
By- Cliff Saran, Managing Editor
-
News
22 Feb 2024
Inside LockBit: A ransomware gang in decline?
The LockBit ransomware gang was already on the ropes prior to the NCA-led takedown, according to security researchers Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Feb 2024
Australian data breach report highlights supply chain risks
The OAIC has called for organisations to proactively address privacy risks from outsourcing personal information handling to third parties Continue Reading
By- Aaron Tan, TechTarget
-
News
21 Feb 2024
CVE volumes set to increase 25% this year
The number of reported Common Vulnerabilities and Exposures is likely to grow significantly in 2024, hitting a new high of almost 35,000, according to Coalition, a cyber insurance specialist Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Feb 2024
SITA enhances aviation SASE with automated multi-cloud networking service
Leading IT provider in the air transport industry announces strategic collaboration with multi-cloud networking firm to gain enhanced access to secure cloud-based offerings Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
21 Feb 2024
Assange created a ‘grave and immediate risk’, says US government, as it seeks extradition
Lawyers for the US government hit back at claims that extraditing WikiLeaks founder Julian Assange is politically motivated Continue Reading
By- Charlie Moloney
-
News
21 Feb 2024
How Indian fintechs can address compliance issues
Fintechs will need to bolster their know-your-customer practices and establish self-regulatory mechanisms, among other measures, to address compliance issues that have come under the spotlight Continue Reading
By- Kavitha Srinivasa
-
News
20 Feb 2024
LockBit locked out: Cyber community reacts
Reaction to the takedown of the LockBit ransomware gang is enthusiastic, but tempered with the knowledge that cyber criminals are often remarkably resilient Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Feb 2024
US extradition of Julian Assange is ‘state retaliation’ for exposing war crimes, court hears
Lawyers argue that the US extradition case against WikiLeaks founder Julian Assange is politically motivated and in is breach of the UK-US extradition treaty Continue Reading
By- Charlie Moloney
-
Definition
20 Feb 2024
Advanced Encryption Standard (AES)
The Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.S. government to protect classified information. Continue Reading
-
News
20 Feb 2024
LockBit gang members arrested in Poland and Ukraine
The UK’s National Crime Agency and its global partners have shared more details on their audacious takedown of the LockBit ransomware operation, including news of two arrests Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Feb 2024
Government agrees law to protect confidential journalistic material from state hacking
The government will update Investigatory Powers Act to require secret intelligence agencies to seek independent approval before accessing confidential journalistic material obtained by bulk hacking, but journalists remain vulnerable to other bulk surveillance powers Continue Reading
By- Bill Goodwin, Computer Weekly
-
E-Zine
20 Feb 2024
Flying into cloud – EasyJet’s journey out of the datacentre to AI
In this week’s Computer Weekly, we find out how EasyJet fills an aircraft every 10 seconds while migrating to the cloud and introducing AI. There’s only 283 years to go until we have a diverse IT workforce – we find out why. And we examine how the UK anti-trust investigation into the cloud market could hit the big hyperscalers. Read the issue now. Continue Reading
-
News
19 Feb 2024
Cops take down LockBit ransomware gang
The notorious LockBit ransomware crew has been disrupted in an international law enforcement sting led by the UK's National Crime Agency Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
19 Feb 2024
Gartner: Three top trends in cyber security for 2024
IT security will be influenced by generative AI, identity and access management, and continuous threat exposure management Continue Reading
By- Richard Addiscott, senior director analyst and Alex Michaels, senior principal analyst at Gartner
-
News
16 Feb 2024
Poor data and IT hamper cross-government working, PAC report finds
Report cites inadequate data, poor IT systems and departmental silos as major barriers to cross-government working, and calls on government to do better Continue Reading
By -
Opinion
15 Feb 2024
Bouncing back from a cyber attack
Organisations need to move away from victim blaming when cyber attacks on OT systems occur and focus on fostering collaboration between teams to minimise downtime, among other efforts to bounce back and return to business Continue Reading
By- Marty Rickard
-
News
15 Feb 2024
WikiLeaks founder Julian Assange faces last appeal against ‘political’ extradition
WikiLeaks founder Julian Assange is seeking leave to appeal against extradition to the US in a case that could have chilling implications for journalists reporting on national security Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
15 Feb 2024
Security-by-design push prompts new ISC2 accreditations
Security-by-design has become a hot-button regulatory issue. ISC2 has decided now is the time to upskill cyber pros around these vital software and hardware development principles Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
15 Feb 2024
firewall as a service (FWaaS)
Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis capabilities to customers as part of an overall cybersecurity program. Continue Reading
By- Paul Kirvan
- Mike Chapple, University of Notre Dame
-
15 Feb 2024
Australia ups ante on cyber security
The country’s new cyber security strategy will focus on building threat-blocking capabilities, protecting critical infrastructure and improving the cyber workforce, among other priorities Continue Reading
-
E-Zine
15 Feb 2024
CW APAC: February to April 2024 – Trend Watch: CIO trends
Organisations have plenty of technologies to keep track of when digitising their operations. In this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly looks at IT predictions for 2024, how India’s space missions will propel tech and Australia’s advances in cyber security. Continue Reading
-
News
14 Feb 2024
Microsoft: Nation-state hackers are exploiting ChatGPT
Threat actors from China, Iran, North Korea and Russia have all been probing use cases for generative AI service ChatGPT, but have yet to use such tools in a full-blown cyber attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Feb 2024
Dutch Supreme Court approves use of EncroChat evidence
Defence lawyers plan appeal to European Court of Human Rights after Supreme Court upholds a conviction based on intercepted messages from the EncroChat encrypted phone network Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
14 Feb 2024
Southern Water customer data was taken in ransomware attack
Southern Water has started to contact customers whose data was stolen in a January 2024 ransomware attack on its systems Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Feb 2024
Met Police to scrap and replace ‘racist’ Gangs Violence Matrix
A database used by the Metropolitan Police to identify and track people linked with gang violence is being decommissioned and replaced. The decision follows a long-running controversy over its discriminatory impacts on young black people, but campaigners warn that racial discrimination will persist with new tool Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
14 Feb 2024
Microsoft patches two zero-days for Valentine’s Day
Two security feature bypasses impacting Microsoft SmartScreen are on the February Patch Tuesday docket, among more than 70 issues Continue Reading
By- Alex Scroxton, Security Editor
-
Podcast
14 Feb 2024
Podcast: What is the impact of AI on storage and compliance?
Start now looking at artificial intelligence compliance. That’s the advice of Mathieu Gorge of Vigitrust, who says AI governance is still immature but firms should recognise the limits and still act Continue Reading
By- Antony Adshead, Storage Editor
-
News
14 Feb 2024
Security experts: Investigatory powers plans will delay security updates
Cyber security experts warn that government proposals to amend the Investigatory Powers Act will limit tech companies’ ability to respond to security threats and could hamper the use of end-to-end encryption Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
13 Feb 2024
New variants of Qakbot malware under development
Despite its infrastructure having been taken down by the FBI last year, someone appears to be actively working on a new and improved version of the infamous Qakbot malware Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Feb 2024
Hunter-killer malware volumes seen surging
Latest Picus Security report on malware tactics, techniques and procedures reveals an increasing focus on disabling security defences Continue Reading
By- Alex Scroxton, Security Editor
-
Podcast
13 Feb 2024
Podcast: What are snapshots? Can they replace backup?
We talk to Shawn Meyers, field CTO at Tintri, who defines snapshots, why they are no substitute for backups, and the effect on recovery of snapshot granularity Continue Reading
By- Antony Adshead, Storage Editor
-
News
13 Feb 2024
What will result from Cohesity’s Veritas acquisition?
The $7bn backup giant will leverage huge assets in enterprise customer base, compliance and governance intelligence, AI, R&D, and Kubernetes backup and storage Continue Reading
By- Yann Serra, LeMagIT
- Antony Adshead, Storage Editor
-
E-Zine
13 Feb 2024
Intelligent defence – the role of data in the military
In this week’s Computer Weekly, we examine the role of data in tying together military operations across ground, air, sea and cyber. Has SAP finally convinced customers to migrate to cloud ERP? We assess the trends. And we talk to the CIO helping to set up the UK’s fastest supercomputer. Read the issue now. Continue Reading
-
Definition
12 Feb 2024
crisis management plan (CMP)
A crisis management plan (CMP) outlines how an organization should respond to a critical situation that if left unaddressed, could negatively affect its profitability, reputation or ability to operate. Continue Reading
By- Rahul Awati
- Nick Barney, Technology Writer
- Paul Crocetti, Executive Editor
-
Opinion
12 Feb 2024
Executives must face down state-sponsored hacking groups targeting firmware
State-backed groups have ratcheted up the pressure for cyber security professionals and executives. But that’s not an excuse to cede them the territory. Continue Reading
By- Michael Marcotte
-
Feature
12 Feb 2024
Trends driving cyber security in 2024
While cyber security breaches are not going away, emerging threats are driving new and innovative approaches to IT security Continue Reading
By- Cliff Saran, Managing Editor
-
News
09 Feb 2024
Amazon defends facial-recognition tech sale to FBI despite moratorium
The FBI has confirmed it is using Amazon’s Rekognition image and video analysis software, but Amazon says it is ‘false’ to suggest this violates the company’s self-imposed moratorium on selling facial-recognition technology to US police Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor