IT security
-
News
19 Sep 2024
HSBC tests post-quantum VPN tunnel for digital ledgers
Encryption required for post-quantum cryptography will have a material impact on the performance of distributed ledgers Continue Reading
By- Cliff Saran, Managing Editor
-
News
18 Sep 2024
NCSC exposes Chinese company running malicious Mirai botnet
The NCSC and its Five Eyes allies have published details of the activities of a China-based cyber security company that is operating a Mirai IoT botnet in the service of government-backed intrusions Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 Jan 2024
Kaspersky shares Pegasus spyware-hunting tool
Kaspersky has developed a way of easily exposing the presence of Pegasus spyware on iOS devices and believes its methodology may also help users identify other such surveillance malware Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 Jan 2024
Republic of Ireland publishes progress update on digital strategy
Update reveals 2.3 million people in Ireland now have MyGovID accounts, and the Irish government plans to launch a new digital portal for businesses, as well as establishing an AI advisory council imminently Continue Reading
By -
Opinion
16 Jan 2024
The human toll of ransomware: how IT pros suffer during incidents
Any ransomware attack causes significant challenges for a business or organisation going through such incident. But ransomware attacks also have tremendous impact on the staff – especially IT teams – working on mitigating the attack’s effect Continue Reading
By- Pia Hüsch, Jamie MacColl and Gareth Mott
-
News
15 Jan 2024
British Library catalogues back online after ransomware attack
The British Library has restored online access to its main catalogue of nearly 40 million items on a limited basis as it continues the long and arduous process of recovering from a ransomware attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Jan 2024
Cosmetics retailer Lush dealing with mystery cyber incident
Cosmetics retailer Lush confirms it’s investigating a cyber attack of an undisclosed nature, but key public-facing systems appear to be unaffected Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
15 Jan 2024
British Library cyber attack explained: What you need to know
In this essential guide, Computer Weekly investigates the cyber attack on the British Library that has rendered IT systems inoperable and caused service disruption to thousands of users Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Jan 2024
Russia hacked ex-MI6 chief’s emails – what they reveal is more Dad’s Army than deep state
A Russian hacking group that published emails of ex-MI6 chief Richard Dearlove claimed to have uncovered a conspiracy, but it was more Dad’s Army than the ‘deep state’, Computer Weekly and Byline Times reveal Continue Reading
By -
News
15 Jan 2024
How legal disclosure failures disrupted the Post Office Horizon inquiry
From overly narrow search terms, overzealous deduplication of documents and failed email migrations, poor management of legal discovery has delayed justice for postmasters in the Horizon inquiry Continue Reading
By- Martin Nikel, Thomas Murray
-
News
15 Jan 2024
EU amendment changes open source definition
The EU Cyber Resilience Act has the potential to cause confusion among open source developers, with questions remaining over open development Continue Reading
By- Cliff Saran, Managing Editor
-
News
15 Jan 2024
IT failure caused weekend chaos at Sussex hospitals
The critical incident at University Hospitals Sussex NHS Foundation Trust, caused by IT issues on Sunday night, has now been resolved Continue Reading
By -
News
15 Jan 2024
NCA director sacked after WhatsApp and email security breaches
Nikki Holland, former director of investigations at the NCA, was sacked for “misconduct” after sending sensitive NCA information over personal email and WhatsApp Continue Reading
By- Bill Goodwin, Computer Weekly
-
Opinion
15 Jan 2024
How the UK is supporting the Ukraine tech community
The launch of a TechBridge between UK and Ukraine allow IT experts from each country to collaborate and share experiences Continue Reading
By- Nusrat Ghani, Department of Business and Trade
-
Tip
12 Jan 2024
Incident response: How to implement a communication plan
Communication is critical to an effective incident response plan. Here are five best practices for communication planning and a free, editable template to get started. Continue Reading
By- Mike Chapple, University of Notre Dame
-
Feature
12 Jan 2024
10 types of security incidents and how to prevent them
Cyberattacks are more varied and numerous than ever. Learn the key signs of common security incidents and how to respond to keep systems and data safe. Continue Reading
By- TechTarget Contributor
- Alissa Irei, Senior Site Editor
-
News
12 Jan 2024
UK government seeks public views on impacts of AI-generated porn
The government’s Pornography Review will look in part at the use of AI throughout the industry to generate sexually explicit content without people’s consent Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
11 Jan 2024
Cisco fixes high-impact flaw in unified comms platform
Cisco unified comms customers are urged to patch a critical vulnerability in Unity Connection, a messaging and voicemail product Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
11 Jan 2024
Redefining the cyber domain to tackle the challenges of tomorrow
Emerging technologies have brought about a new age of cyber – and we need a 360-degree collaborative approach more than ever to succeed Continue Reading
By- Saj Huq, Plexal
-
News
10 Jan 2024
Davos 2024: AI-generated disinformation poses threat to elections, says World Economic Forum
Disinformation and misinformation are the top risks facing businesses, governments and the public over the next two years Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
10 Jan 2024
Windows Kerberos, Hyper-V vulns among January Patch Tuesday bugs
Microsoft starts 2024 right with another slimline Patch Tuesday drop, but there are some critical vulns to be alert to, including a number of man-in-the-middle attack vectors Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Jan 2024
SEC social media hack highlights value of MFA
The US SEC briefly appeared to approve new bitcoin trading rules after a social media account was targeted by troublemakers, proving the value of MFA once again Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Jan 2024
Scotland ‘sleepwalking’ to mass surveillance with DPDI Bill
The independent checks and balances over biometrics and biometric-enabled surveillance must be strengthened to prevent Scotland from sliding into a surveillance state along with the rest of the UK Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
09 Jan 2024
Babuk Tortilla ransomware decryptor made available
A joint effort between Cisco Talos, Avast and the Dutch police will bring relief to many victims of a variant of the Babuk ransomware known as Tortilla Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
09 Jan 2024
Inadequate cloud logs are proving a headache for CISOs
The mass adoption of cloud environments is pushing strained CISOs to the brink and a lack of attention to logging isn't helping. Vectra's Mark Wojtasiak calls for organisations to do more to improve visibility in their clouds in 2024 Continue Reading
By- Mark Wojtasiak
-
News
09 Jan 2024
Study reveals cyber risks to US elections
With the 2024 US presidential election cycle beginning, a study produced by Arctic Wolf has highlighted big gaps in preparedness and resourcing at government bodies across the US Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
09 Jan 2024
Top incident response tools: How to choose and use them
The OODA loop helps organizations throughout the incident response process, giving insight into the incident response tools needed to detect and respond to security events. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Feature
09 Jan 2024
How to fix the top 5 cybersecurity vulnerabilities
Check out how to fix five top cybersecurity vulnerabilities to prevent data loss from poor endpoint security, ineffective network monitoring, weak authentication and other issues. Continue Reading
By- Dave Shackleford, Voodoo Security
-
Feature
09 Jan 2024
Top 30 incident response interview questions
Job interviews are nerve-wracking, but preparation can minimize jitters and position you to land the role. Get started with these incident response interview questions and answers. Continue Reading
By- Ed Moyle, Drake Software
-
Blog Post
09 Jan 2024
The future of CISOs in APAC
This is a guest post by Geoffrey Coley, regional chief technology officer for Asia-Pacific at Veritas Technologies The pace at which the cyber threat landscape is evolving with the use of malicious ... Continue Reading
By- Aaron Tan, TechTarget
-
Feature
08 Jan 2024
How to become an incident responder: Requirements and more
Incident response is a growth area that provides career advancement options and a good salary. Here's an in-depth look at job requirements, salaries and available certifications. Continue Reading
By- Ed Moyle, Drake Software
-
News
08 Jan 2024
British Library ransomware attack could cost up to £7m
The cost of recovering the British Library’s ransomware-stricken IT systems could be up to £7m, it has emerged Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Jan 2024
Inside the Met Police’s investigation into EncroChat crime gangs
The Met’s senior investigating officer responsible for investigating criminals using the EncroChat encrypted phone network tells the inside story of the UK’s biggest organised crime bust in a BBC podcast series released this week Continue Reading
By- Bill Goodwin, Computer Weekly
-
Opinion
05 Jan 2024
Mind the gap: AI leaders pulling ahead as LLMs take off
Advice on how to implement large language models safely within an enterprise IT environment Continue Reading
By- Oliver King-Smith
-
Definition
04 Jan 2024
computer security incident response team (CSIRT)
A computer security incident response team, or CSIRT, is a group of IT professionals that provides an organization with services and support surrounding the assessment, management and prevention of cybersecurity-related emergencies, as well as coordination of incident response efforts. Continue Reading
By- Katie Donegan, Social Media Manager
- Peter Sullivan
-
News
04 Jan 2024
Celona and Palo Alto partner to enhance private 5G network security
Wireless services specialist Celona and security firm Palo Alto Networks are coming together to enhance device protection for organisations operating private mobile networks Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Jan 2024
Dutch working to promote cooperation in Europe to keep internet safe
A Dutch cooperative approach offers national and international cooperation opportunities for ISPs to guard against DDoS attacks, lawful interception and detect abuse in networks Continue Reading
By- Kim Loohuis
-
News
03 Jan 2024
Fighting money laundering with AI
Mike Foster, CEO of SymphonyAI Sensa-NetReveal, talks up how AI can be used to fight financial crime and how the company’s technology can augment existing AML investments Continue Reading
By- Aaron Tan, TechTarget
-
News
02 Jan 2024
China’s UNC4841 pivots to new Barracuda ESG zero-day
The Chinese state threat actor behind a series of cyber attacks on Barracuda Networks customers embarked on a campaign targeting the supplier’s email security products in the run-up to Christmas Continue Reading
By- Alex Scroxton, Security Editor
-
News
02 Jan 2024
Cloudflare eyes GenAI workloads with Workers AI
Cloudflare’s Workers developer platform is touted to make it easier for organisations to deploy GenAI capabilities at the edge to speed up inferencing Continue Reading
By- Aaron Tan, TechTarget
-
Blog Post
29 Dec 2023
2024: Putting Cyber Resilience into Social, Political, Business and Budget context.
On-line Safety, Safeguarding, Security, Counter-fraud and Resilience matter to voters and business. Cyber does not ... until they become victims ... Online crime is, however, now the world’s third ... Continue Reading
By- Philip Virgo, Winsafe Ltd
-
News
29 Dec 2023
Top 10 India IT stories of 2023
We recap the year’s top 10 stories in India, including the country’s datacentre boom and innovations in space and agriculture technologies Continue Reading
By- Aaron Tan, TechTarget
-
News
29 Dec 2023
Top 10 AI regulation stories of 2023
From the UK government’s publication of its long-awaited AI whitepaper to its convening of the world’s first AI Safety Summit, here are Computer Weekly’s top 10 AI regulation stories of 2023 Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Feature
28 Dec 2023
Decoding zero trust in endpoint security: A practical guide for CISOs
The exponential increase in endpoints has vastly expanded the average organisation’s attack surface – address this by applying zero-trust best practice to endpoints Continue Reading
By -
News
28 Dec 2023
Top 10 technology and ethics stories of 2023
Here are Computer Weekly’s top 10 technology and ethics stories of 2023 Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
27 Dec 2023
Top 10 police technology stories of 2023
Here are Computer Weekly’s top 10 police technology stories of 2023 Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
27 Dec 2023
Top 10 ASEAN IT stories of 2023
Organisations across the region have continued to shore up their cyber security posture while investing in infrastructure to pave the way for emerging technologies like GenAI Continue Reading
By- Aaron Tan, TechTarget
-
News
22 Dec 2023
Top 10 government IT stories of 2023
In the year that gave life to four new government departments, Whitehall bosses have continued to fly the flag for technology, with mixed results and success. Here are the stories that made waves in 2023 Continue Reading
By -
Definition
21 Dec 2023
What is the CIA triad (confidentiality, integrity and availability)?
The CIA triad refers to confidentiality, integrity and availability, describing a model designed to guide policies for information security within an organization. Continue Reading
By- Cameron Hashemi-Pour, Site Editor
- Wesley Chai
-
News
21 Dec 2023
Top 10 cyber crime stories of 2023
Ransomware gangs dominated the cyber criminal underworld in 2023, a year that will prove notable for significant evolutionary trends in their tactics Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Dec 2023
Top 10 storage supplier strategy stories of 2023
In 2023, we looked at the top storage suppliers, their market share and how they set themselves for a future of hybrid cloud, containerisation and consumption models of purchasing Continue Reading
By- Antony Adshead, Storage Editor
-
Opinion
20 Dec 2023
Beyond the office walls: Safeguarding remote workers from attack
Remote working has enabled people to work from almost anywhere but has piled pressure on cyber pros. Three years after Covid, how are best practices evolving and what can we expect going forward? Continue Reading
By- Paul Lewis, Nominet
-
Opinion
20 Dec 2023
Zero-trust principles: Your gateway to securing remote workers
Remote working has enabled people to work from almost anywhere but has piled pressure on cyber pros. Three years after Covid, how are best practices evolving and what can we expect going forward? Continue Reading
By- Michael Healey, Turnkey Consulting
-
Opinion
20 Dec 2023
What we learned in cyber in 2023, and what to look out for
PA Consulting's Rasika Somasiri looks back at a busy 12 months in the cyber security world, and highlights some key learnings from 2023 Continue Reading
By- Rasika Somasiri
-
Opinion
20 Dec 2023
Evolving best practice: What next for securing remote work?
Remote working has enabled people to work from almost anywhere but has piled pressure on cyber pros. Three years after Covid, how are best practices evolving and what can we expect going forward? Continue Reading
By- Scott Burman
-
News
20 Dec 2023
ALPHV/BlackCat operation down, but maybe not out
Multinational law enforcement has targeted the operations of the notorious ALPHV/BlackCat cyber extortion gang, but the group’s members appear to remain defiant Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Dec 2023
Top 10 NHS IT stories of 2023
In the year we said goodbye to NHS Digital, the NHS has made some serious strides in digitising the health service, but many challenges remain. We look back at the stories that made the headlines in 2023 Continue Reading
By -
Definition
19 Dec 2023
supply chain risk management (SCRM)
Supply chain risk management (SCRM) is the coordinated efforts of an organization to help identify, monitor, detect and mitigate threats to supply chain continuity and profitability. Continue Reading
By- Kinza Yasar, Technical Writer
-
News
19 Dec 2023
Nokia and HellasQCI complete quantum-safe networks proof of concept
Trial showcase by leading networking tech firm and communication infrastructure consortium shows hybrid approach with both classic and quantum physics key to reach goal of quantum-safe networks Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Opinion
19 Dec 2023
Security Think Tank: Testing to improve remote worker security
Remote working has enabled people to work from almost anywhere but has piled pressure on cyber pros. Three years after Covid, how are best practices evolving and what can we expect going forward? Continue Reading
By- Rowland Johnson
-
News
19 Dec 2023
Top 10 cyber security stories of 2023
The past 12 months have seen the security agenda dominated by the usual round of vulnerabilities, concerns over supply chain security and more besides, but it was the chaotic state of global geopolitics that really made an impact Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
19 Dec 2023
Security Think Tank: Anytime, anywhere access is achievable
Remote working has enabled people to work from almost anywhere but has piled pressure on cyber pros. Three years after Covid, how are best practices evolving and what can we expect going forward? Continue Reading
By- Tim Holman, 2-sec
-
E-Zine
19 Dec 2023
The ransomware threat to UK critical infrastructure
In this week’s Computer Weekly, a parliamentary report warns that a lack of ransomware preparedness at the highest levels of government is leaving UK critical national infrastructure dangerously exposed – we analyse the risks. We examine how AI tools are helping to enhance cloud security. And the CTO at jewellery retailer Pandora discusses organisational change in IT. Read the issue now. Continue Reading
-
News
18 Dec 2023
Cathay takes off with global SASE deployment
Unified secure access service edge services provider replaces legacy MPLS network for improved performance and observability, and unified end user security, access and application performance across global sites Continue Reading
By- Joe O’Halloran, Computer Weekly
-
18 Dec 2023
Automated cloud IR: Empowering cyber with AI-powered playbooks
As cyber threats increasingly target cloud infrastructure, demand increases for robust and reliable incident response. How can AI help? Continue Reading
-
18 Dec 2023
Critical UK infrastructure a ‘hostage of fortune’ to ransomware
A lack of ransomware planning and preparedness at the highest levels of government is leaving UK operators or critical national infrastructure dangerously exposed, according to a Joint Committee report Continue Reading
-
News
18 Dec 2023
How threat intelligence is applied in DNS security
Infoblox’s director of security architecture explains how the company leverages its threat intelligence capabilities to help organisations stay ahead of DNS security threats Continue Reading
By- Aaron Tan, TechTarget
-
Feature
18 Dec 2023
How hybrid work patterns change end user computing
While some organisations have mandated that staff return to the office, many places still operate a hybrid policy – we look at the IT admin challenges Continue Reading
By- Cliff Saran, Managing Editor
-
Blog Post
17 Dec 2023
Cyber threats risk our progression as a society
This is a guest post by Jason Baden, regional vice-president for multicloud application services and security company, F5 A shadow of doubt has been cast over the preparedness of Australian ... Continue Reading
By- Aaron Tan, TechTarget
-
News
14 Dec 2023
Government plans to regulate to tackle datacentre threats
DSIT outlines a range of proposals designed to protect data storage facilities from cyber attacks, as well as physical threats and the effects of climate breakdown Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Dec 2023
The Security Interviews: Talking identity with Microsoft’s Joy Chik
Microsoft’s president of identity and network access, Joy Chik, joins Computer Weekly to discuss the evolving threat landscape in identity security, using innovations in artificial intelligence to stay ahead, and advocating for the coming passwordless future Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Dec 2023
NCSC CEO Lindy Cameron to step down in 2024
NCSC chief exec Lindy Cameron, who helped lead and elevate the national dialogue on cyber security through major events such as Covid-19, SolarWinds Sunburst and Colonial Pipeline, is to step down in the New Year Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Dec 2023
ICO complaint seeks answers from prosecutors over deleted Assange emails
An Italian journalist has complained to the data protection watchdog after the Crown Prosecution Service gave conflicting explanations over its deletion of key emails on WikiLeaks founder Julian Assange Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
14 Dec 2023
Cisco eyes opportunities in AI, sustainability in Australia
Cisco is looking to tap opportunities in sustainability, AI and cyber security as it navigates Australia’s economic headwinds Continue Reading
-
News
13 Dec 2023
How ransomware gangs use the tech media against their victims
Ransomware gangs are increasingly media-savvy operators, and this means incident response plans now need to account for communications and PR strategies too Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Dec 2023
Microsoft’s Christmas present for cyber teams: no zero-days
Barely 30 vulnerabilities, and no zero-days, have been fixed in the final Patch Tuesday drop of 2023 Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Dec 2023
Critical UK infrastructure a ‘hostage of fortune’ to ransomware
A lack of ransomware planning and preparedness at the highest levels of government is leaving UK operators or critical national infrastructure dangerously exposed, according to a Joint Committee report Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Dec 2023
Inside the Singapore government’s cloud journey
The Smart Nation Group’s chief digital technology officer outlines the government’s cloud journey, including its approach to cloud migration and how it came to host mission-critical workloads on AWS Continue Reading
By- Aaron Tan, TechTarget
-
News
12 Dec 2023
MoD fined after breach of Afghan staffers’ data put lives at risk
The MoD has been fined £350,000 by the ICO after an email blunder exposed data on Afghan nationals who had worked with British forces and were at risk of Taliban reprisals Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Dec 2023
Outdated data protection practice key factor in PSNI data breach
The August 2023 data breach at the Police Service of Northern Ireland arose chiefly from an outdated approach to data protection and compliance at the force, according to an independent review Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Dec 2023
Top IT predictions in APAC in 2024
Generative AI will continue to leave its mark on many areas in business and IT, along with other trends such as sustainability, cyber security and smart factories that are expected to shape the region’s technology landscape in 2024 Continue Reading
By- Aaron Tan, TechTarget
-
News
11 Dec 2023
Nordic governments join forces to protect data transfers
Nordic countries deepen their cooperation over cyber security amid heightened threat from neighbouring Russia Continue Reading
By- Gerard O'Dwyer
-
News
08 Dec 2023
Fancy Bear targets Nato entities via critical Outlook flaw
A vulnerability patched in March has likely been exploited by the Russian state actor Fancy Bear, for over two years, according to the latest intelligence Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Dec 2023
UK names Russian FSB agents behind political hacking campaign
Russian hacking group, Star Blizzard, was part of a Russian intelligence operation aimed at interfering with UK politics and the democratic process, says government. Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
07 Dec 2023
NCSC exposes Russian cyber attacks on UK political processes
The NCSC has firmly attributed a long-running campaign of cyber attacks targeting UK political processes to a group run out of Russia’s FSB intelligence agency, known as Star Blizzard Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Dec 2023
2023 may have seen highest ransomware ‘body count’ yet
Ransomware, or cyber extortion as it is increasingly being termed, remained the most prominent security threat in 2023 – and thanks to large-scale supply chain attacks, the past 12 months may have seen the most victims ever Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
07 Dec 2023
Considerations for the security of evolving workspaces
Remote working has enabled people to work from almost anywhere but has piled pressure on cyber pros. Three years after Covid, how are best practices evolving and what can we expect going forward? Continue Reading
By- Simon Backwell
-
News
07 Dec 2023
How Proofpoint is helping to mitigate AI security threats
Proofpoint is offering monitoring tools to prevent leakage of sensitive information in generative AI models and other capabilities to mitigate AI mediated attacks Continue Reading
By- Aaron Tan, TechTarget
-
E-Zine
07 Dec 2023
CW EMEA: Prepare for cyber war
When the war between Hamas and Israel began in October, cyber security professionals and major government and private organisations braced for an inevitable accompanying online war. In this issue of CW EMEA, we outline cyber war, patterns of threat activity, and find out what security teams can do to protect their organisations. We also look at Finland’s advances in quantum computing, how Belgian researchers have developed technology to help datacentres process data faster, and the secrets of KPN’s successful business transformation. Read the issue now. Continue Reading
-
Definition
07 Dec 2023
advanced persistent threat (APT)
An advanced persistent threat (APT) is a prolonged and targeted cyber attack in which an intruder gains access to a network and remains undetected for an extended period. Continue Reading
By- Kinza Yasar, Technical Writer
- Linda Rosencrance
-
News
06 Dec 2023
How a Node4 virtual datacentre proved better than MS cloud for mental health charity
Charity Together For Mental Wellbeing managed to migrate legacy servers into a new virtual environment and fix a major disaster recovery issue Continue Reading
By- Cliff Saran, Managing Editor
-
News
06 Dec 2023
Government launches UK-wide Cyber Explorers Cup
Schoolkids across the UK are being called on to team up and defeat Herbert the Hacker in a new government-backed competition Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
05 Dec 2023
offensive security
Offensive security is the practice of actively seeking out vulnerabilities in an organization's cybersecurity. Continue Reading
By -
Feature
05 Dec 2023
How to recover systems in the event of a cyber attack
Recovering compromised systems after a cyber attack isn’t easy, but understanding industry best practice offers a template for the key processes to follow Continue Reading
-
News
05 Dec 2023
Operator of Sellafield nuclear facility denies hacking claims
The operator of the Sellafield nuclear site has denied allegations that senior managers covered up a series of cyber security lapses that enabled Chinese and Russian threat actors to compromise its networks Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
05 Dec 2023
Technologies to support hybrid working
In this week’s Computer Weekly, our latest buyer’s guide looks at technologies to support hybrid working – even when your business is as unique as farming. We examine the new guidelines on AI cyber security published by G7 government security chiefs. And we find out how the Jaguar Formula E racing team is using digital twins to improve electric vehicle performance. Read the issue now. Continue Reading
-
Definition
04 Dec 2023
PCAOB (Public Company Accounting Oversight Board)
The Public Company Accounting Oversight Board (PCAOB) is a congressionally established nonprofit that assesses audits of public companies in the United States to protect investors' interests. Continue Reading
By- Ben Cole, Executive Editor
-
News
04 Dec 2023
Rhysida ransomware gang hits hospital holding royal family’s data
Ransomware gang boasts of having stolen data on the royal family in an attack on a private London hospital Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
04 Dec 2023
Cyber and remote working: How Covid moved the cursor
Remote working has enabled people to work from almost anywhere but has piled pressure on cyber pros. Three years after Covid, how are best practices evolving and what can we expect going forward? Continue Reading
By- Lionel Garacotche
-
04 Dec 2023
What are the cyber risks from the latest Middle Eastern conflict?
The outbreak of war between Hamas and Israel in October 2023 has seen a wide variety of accompanying cyber attacks from hacktivists and other groups. We look at the risks to organisations Continue Reading
-
News
01 Dec 2023
Human augmentation tech requires dual use oversight
Researchers investigating human augmentation technologies must acknowledge the potential military applications of their work, and military bodies cannot be allowed to dismiss ethical concerns in their pursuit of national security interests, says NGO Drone Wars UK Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
01 Dec 2023
National Cyber Security Centre publishes landmark guidelines on AI cyber security
The NCSC and its US counterpart CISA have brought together tech companies and governments to agree new guidelines to promote a secure-by-design culture in artificial intelligence development. Continue Reading