IT security
-
Opinion
30 Jun 2025
Better governance is required for AI agents
The Security Think Tank considers how CISOs can best plan to facilitate the secure running of AI and Gen AI-based initiatives and ensure employees do not inadvertently leak data or make bad decisions Continue Reading
By- Mandy Andress, Elastic
-
Feature
30 Jun 2025
Enterprise cybersecurity: A strategic guide for CISOs
CISOs and others responsible for safeguarding an organization's systems, networks and data need to manage day-to-day threats while also planning strategically for what's ahead. Continue Reading
By- Phil Sweeney, Industry Editor
- Craig Stedman, Industry Editor
-
News
15 Dec 2015
Bracknell man arrested over VTech toy hack
Police have arrested a 21-year-old man in connection with the hacking of Hong Kong-based toymaker VTech Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Dec 2015
Eight startups selected for Cyber London security accelerator programme
Cyber London has selected startups from the UK, Finland, Hungary, Israel, Brazil and South Africa for its second cyber security accelerator programme Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Dec 2015
UK firms act quickly to fix payment card data encryption
Security firm found that 16 global companies had failed to effectively encrypt traffic to the payment portion of their websites and apps Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
10 Dec 2015
How to deal with the aftermath of a data breach
Considering that a data breach could happen to any company, at any time, a plan of action is the best tactic Continue Reading
By -
Feature
10 Dec 2015
Disaster recovery planning: Where virtualisation can help
The disaster recovery planning process is not fundamentally technology-centric, so when can virtualisation make it quicker and easier to restore services after an unplanned outage? Continue Reading
By -
News
09 Dec 2015
The FCA is open to cloud – but what of the firms it regulates?
The Financial Conduct Authority (FCA) says cloud computing – even in its public form – is acceptable for finance organisations Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
E-Zine
08 Dec 2015
The most influential people in UK IT 2015
In this week’s Computer Weekly, we announce our sixth annual UKtech50 list of the 50 most influential people in UK IT, and talk to this year’s winner – BT chief executive Gavin Patterson, about the challenges facing the telecoms giant in 2016. Also, we find out how the genomics industry is pushing big data technology to its limits. Read the issue now. Continue Reading
-
Feature
07 Dec 2015
The next stage in quantum key distribution
Authentication schemes based on quantum physics are emerging to address the growing number of ways to compromise data traffic Continue Reading
-
News
07 Dec 2015
Cyber attacks an increasing concern for Asean countries
Organisations in the Association of Southeast Asian Nations are increasingly the targets for cyber criminals, according to a report focused on the region Continue Reading
By -
Guide
07 Dec 2015
Essential guide to data breaches, the dark web and the hidden data economy
In this guide, we look at the aftermath of a data breach - what do cyber criminals use that stolen data for, and what can companies do to avoid becoming a victim? Continue Reading
-
News
04 Dec 2015
Wetherspoon pub chain warns customers of data breach
Discovery of a data breach at JD Wetherspoons comes hard on the heels of a breach at TalkTalk, underlining the importance of keeping customer data safe Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Dec 2015
Veracode finds most web apps fail Owasp security check list
The findings of a report on critical vulnerabilities in most web applications is raising concerns over potential security vulnerabilities in millions of websites Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Dec 2015
The US and China agree more steps to fight cyber crime
The US and China have made progress in expanding co-operation on cyber crime as China claims criminals and not state-backed hackers broke into the US Office of Personnel Management Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Dec 2015
Workday ringfences support in Europe after Safe Harbour ruled unsafe
US cloud HR and financial services provider reponds to Safe Harbour failure by ringfencing European data Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
01 Dec 2015
Security analytics needs practical approach, says Fico Ciso Vickie Miller
Analytics must form part of a comprehensive defence-in-depth strategy, according to chief information security officer (Ciso) Vickie Miller at software firm Fico Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
01 Dec 2015
Balancing speed and risk in IT projects
In this week’s Computer Weekly, as IT leaders face boardroom pressure to roll out IT projects ever more quickly, we examine how to do that without running unacceptable risks. Michael Dell talks about how he sees the future for his company when it buys EMC in the largest IT acquisition in history. And we hear from IT chiefs about the challenges of implementing DevOps. Read the issue now. Continue Reading
-
News
27 Nov 2015
Word ‘smart’ being abused by IoT advocates
Speakers at an event hosted by Cambridge Wireless say the term ‘smart’ is overused to describe connected devices on the internet of things Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Nov 2015
Microsoft steps up efforts to clarify cloud security and privacy policy
Microsoft debuts merged security information hub to make it easier for cloud users to find out more about the privacy and security policies of its hosted products Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
26 Nov 2015
Use legal protection to soften cyber attack impact, says Kemp Little
IT outsourcing provides an opportunity for businesses to transfer risk and recover losses from cyber attacks, says law firm Kemp Little Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Nov 2015
Dridex banking Trojan regains strength to mount attacks on the UK
Fresh Dridex banking Trojan campaigns target the US, UK and France – despite a recent law enforcement takedown operation – warn security researchers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Nov 2015
Data breach hits Hilton Worldwide hotel chain
Hilton Worldwide says malware found its way onto point of sale (PoS) systems and enabled attackers to steal payment card information Continue Reading
By- Warwick Ashford, Senior analyst
-
News
24 Nov 2015
Defence review promises 1.2% of defence budget spend on technology
The government’s defence review highlights need for technology investment, innovative ideas and cyber security Continue Reading
By -
E-Zine
23 Nov 2015
Technology helping to deliver aid for refugees
In this week's Computer Weekly, we find out how technology is helping to deliver vital aid to Syrian refugees in the Middle East. We look at the barriers to achieving the government's aim of a paperless NHS. And the CTO of special effects studio Framestore talks about the IT challenges behind hit movies such as Gravity. Read the issue now. Continue Reading
-
News
20 Nov 2015
Five key strategies for IoT success
Companies need to be agile because in some IoT systems, it will be a question of the winner taking it all, according to Kent Eriksson, IoT business consultant at PTC Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Nov 2015
Coalition of top tech firms opposes weakened encryption
Weakening security with the aim of advancing security simply does not make sense, a coalition of top tech firms tells US president Barack Obama Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Nov 2015
Cyber security mindset needs to change, says report
Government organisations are prime targets for cyber attacks, leading to increased importance on robust information security, according to a report by Intel Security and the Digital Government Security Forum Continue Reading
By -
News
17 Nov 2015
Irish hospital to offer patient access to records by November 2016
Galway Clinic plans a big-bang launch of its Meditech electronic medical record system, which includes a patient portal and mobile app Continue Reading
By -
News
12 Nov 2015
Three men charged over JP Morgan hacking and fraud
Exploiting the Heartbleed bug was one of the methods used by three men charged in connection with the theft of more than 100 million customer data records from financial institutions to carry out "pump and dump" fraud Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Nov 2015
Snoopers’ charter will force ISPs to raise broadband prices
The Science and Technology Select Committee hears that ISPs may be forced to put up their service charges to cover the cost of retaining communications data, should the Investigatory Powers Bill become law Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Nov 2015
Germany is finalising legislation to shore up CNI cyber security
Germany is working to ensure digital sovereignty through IT security legislation and negotiations on IT security regulations and transatlantic trade at a European Union level Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Nov 2015
EU data protection official optimistic on successor to Safe Harbour
An EU data protection official says he is optimistic that an alternative to the Safe Harbour agreement will be found, but it will take work from both the US and the EU Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Nov 2015
GCHQ and NCA join forces to police dark web
GCHQ and the National Crime Agency are to track down paedophiles and serious online criminals by using the techniques and expertise used to find terrorists Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
06 Nov 2015
Avoiding security issues when recycling hardware
What are the options for the environmentally and ethically responsible recycling of end-of-life hardware, without compromising data security? Continue Reading
-
E-Zine
05 Nov 2015
CW Europe – November 2015
Cloud computing has huge benefits to businesses in Europe, but data protection rules have been different for organisations in different parts of Europe. This is about to change with the final version of the General Data Protection Regulation (GDPR) expected soon. All 28 EU member states will have one set of rules to follow. Continue Reading
-
News
04 Nov 2015
UAE recognises importance of cyber security, says official
Like the UK, the UAE federal government has identified the importance of creating an environment in which it is safe to do business online Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Nov 2015
Theresa May proposes bulk data and internet tracking under the Investigatory Powers Bill
The home secretary has unveiled the draft Investigatory Powers Bill, which sets out the government's plans to collect data on UK citizens' internet use Continue Reading
By- Cliff Saran, Managing Editor
-
News
02 Nov 2015
000Webhost blames PHP exploit for breach of 13.5 million records
Unencrypted passwords for a free web hosting firm were on sale for five months before customers were notified their records had been leaked, according to a security researcher Continue Reading
By- Warwick Ashford, Senior analyst
-
News
02 Nov 2015
Hewlett Packard Enterprise: think of us as a startup
As Hewlett Packard Enterprise and HP Inc finally part ways, UK managing director Andy Isherwood shares some insight on what the future holds for the newly minted enterprise business Continue Reading
By- Alex Scroxton, Security Editor
-
News
02 Nov 2015
Theresa May promises strong oversight in surveillance bill
The proposed Investigatory Powers Bill contains “very strong” oversight and “world-beating” authorisation procedures, according to home secretary Theresa May Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Oct 2015
Law enforcement cracks down on DroidJack Android snooping malware users
A joint EU/US operation on the DroidJack malware is the latest example of international collaboration between law enforcement officers directed at cyber crime Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Oct 2015
M&S data breach forces retailer to temporarily suspend service
A glitch that allowed online customers to see each others' details forced retailer Mark & Spencer to take its website offline while it resolved the issue Continue Reading
By- Clare McDonald, Business Editor
-
News
28 Oct 2015
Lack of data classification very costly to firms, says survey
Most data retained by organisations is not identified or classified and gobbles budget spent on storage, as well as being potentially non-compliant, reveals Veritas-sponsored survey Continue Reading
By- Antony Adshead, Storage Editor
-
E-Zine
26 Oct 2015
Blockchain sparks change in banking industry
In this week's Computer Weekly, we find out why blockchain, the technology that underpins bitcoin, is making waves in the banking sector. EasyJet tells us why digital is increasingly important for airlines. And we look at the forces driving digital disruption and why some sectors are changing faster than others. Read the issue now. Continue Reading
-
News
23 Oct 2015
TalkTalk warns customers about personal data breach
TalkTalk has warned customers their personal data may have been compromised in the second cyber attack on the firm in 2015, with some data left unencrypted Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Oct 2015
Police and industry to tackle cyber crime together, says TechUK
A TechUK report calls for collaboration between police and industry to raise standards of reporting, recording and responding to cyber crime Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Oct 2015
Infosec pros should start preparing for the future, say experts
Information security professionals need to grow their skills, engage with the business, increase security awareness, set business goals and tailor their messages, says a panel of experts Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
19 Oct 2015
IT giants Dell and EMC unite
In this week's Computer Weekly, Dell's proposed $67bn acquisition of EMC would be the biggest in the history of IT – we assess the implications. £175bn of IT outsourcing contracts come up for renewal in the next three years- what are your options? And we hear from IT leaders about security and the internet of things. Read the issue now. Continue Reading
-
News
19 Oct 2015
Dow Jones denies it was target of insider trading hack
Dow Jones says there is no information to support reports that it was the target of hackers seeking information for insider trading Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Oct 2015
Opera chooses Workday over Oracle as it moves HR to cloud
Browser company Opera opts for slick internal IT as it competes with Apple and Google for skilled technologists Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
16 Oct 2015
Yahoo announces password-killing Account Key
Yahoo Account Key uses push notifications to provide a fast and secure way to access Yahoo accounts from a mobile device Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
15 Oct 2015
The true cost of a cyber security breach in Australia
The costs of cyber security breaches can quickly add up with fines, reputational damage and overhauls to network security all hitting the coffers. The case of one Australian firm shows why paying a ransom to a hacker might be tempting. Continue Reading
-
News
13 Oct 2015
Cyber security innovation is crucial, says security evangelist
Visibility and automation are key areas of cyber security innovation, but firms should concentrate first on the basics and not overlook the human element of security Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Oct 2015
Encryption is a double-edged sword, says Blue Coat
Seven more security suppliers join Blue Coat encrypted traffic management programme amid fresh warnings of attackers using encryption to hide malicious activity Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Oct 2015
NHS Health Apps Library to close
The NHS Health Apps Library is shutting down after a two-year tenure, shortly after NHS-approved apps were found to leak data Continue Reading
By -
E-Zine
12 Oct 2015
Europe's data privacy shake-up
In this week's Computer Weekly, after the European Court of Justice ruled the Safe Harbour agreement invalid, we assess the implications for transatlantic data protection. We find out why DVLA has brought its IT back in-house after a 13-year outsourcing deal. And we look at the role of IT in cutting costs in the NHS. Read the issue now. Continue Reading
-
News
09 Oct 2015
Lack of trust for banks causes NHS rethink over government online identity scheme
NHS trials of the Verify ID assurance system found patients concerned over using banks to allow access to medical data Continue Reading
By -
Feature
09 Oct 2015
The security dangers of home networks
Most companies take reasonable steps to protect their networks from virus attacks, but one area of vulnerability that is often overlooked is infection from employees’ home networks Continue Reading
-
Feature
09 Oct 2015
How to ensure strong passwords and better authentication
Five steps to ensure stronger passwords and better authentication to reduce the threat of business data theft Continue Reading
By- Peter Wood, First Base Technologies LLP
-
News
09 Oct 2015
Apple removes more iOS apps over security concerns
Apple has blocked more apps over security concerns just weeks after ridding the App Store of XcodeGhost malware Continue Reading
By- Warwick Ashford, Senior analyst
-
News
08 Oct 2015
Samsung Pay isolated from LoopPay attack
Hackers who compromised LoopPay’s computer systems had no access to Samsung Pay’s user data or other core information, says Samsung Continue Reading
By- Warwick Ashford, Senior analyst
-
News
08 Oct 2015
Estonian government IT initiative increases virtual population
Estonia is leading the way when it comes to providing easy and secure access to government services for citizens and foreigners alike Continue Reading
By- Tarmo Virki
-
News
07 Oct 2015
Singapore and UK researchers investigate privacy in big data era
Academic organisations in Singapore and the UK collaborate on the privacy questions raised by big data and the cloud Continue Reading
By- Tao ai Lei
-
Feature
06 Oct 2015
Max Schrems: The man who broke Safe Harbour
Schrems has persuaded a high court judge to confirm that Edward Snowden’s evidence is acceptable in court and that the US is engaged in mass surveillance of European citizens Continue Reading
By -
Photo Story
06 Oct 2015
Aid organisations using technology to help Syrian refugees in the Middle East
Technology is playing a crucial role in supporting humanitarian aid organisations coping with the influx of Syrian refugees in the Middle East Continue Reading
By -
News
06 Oct 2015
Researchers find credential-stealing webmail server APT attack
Security researchers have discovered a new and unique advanced persistent threat (APT) technique that involves a malicious module loaded onto a webmail server Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Oct 2015
Facebook ruling not only landmark data protection case in Europe, say experts
A landmark ruling against Slovakia-based website Weltimmo could impact the Max Schrems case against Facebook and new European data protection rules currently being finalised Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
05 Oct 2015
CW Europe – October 2015
Access to vast amounts of educational resources via the cloud promises much for education. But like in the business world there are fears associated with the cloud. Read the issue now. Continue Reading
-
News
02 Oct 2015
David Jones online customers hit by data breach
Hackers have accessed the personal details of an unknown number of David Jones online customers, but the retailer says payment details and passwords are not affected Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
01 Oct 2015
How technology is helping deliver aid to Syrian refugees in the Middle East
The Syrian refugee crisis has engulfed the Middle East, but technology is proving to be an essential tool to help aid organisations support displaced people Continue Reading
By -
News
30 Sep 2015
Medical devices must be secure by design, say industry experts
The information security industry is calling for medical device manufacturers to design and build cyber security into all internet-enabled devices after thousands are found to be hackable Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Sep 2015
120-day patching gap puts many firms at risk of cyber attack, study shows
The probability of a vulnerability being exploited hits 90% between 40-60 days after discovery, but many firms are taking up to 60 days beyond that to patch, while others are failing to patch at all, a study shows Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
28 Sep 2015
Keeping app pirates at bay
In this week's Computer Weekly, we look at how digital piracy is affecting app developers – and what they can do about it. The man behind the controversial NHS Care.data project has quit – what will it mean for the troubled programme? And we find out how digital disruption is affecting the insurance market. Read the issue now. Continue Reading
-
Feature
25 Sep 2015
How to fully test IT networks for vulnerabilities
Making sure a company network is secure is a very important task, and one that should be scheduled regularly Continue Reading
By -
News
22 Sep 2015
Is Microsoft Office 2016 reliable enough for business?
A day after a major Skype outage, Microsoft unveils Office 2016, which, ironically, offers tight integration with Skype Continue Reading
By- Cliff Saran, Managing Editor
-
E-Zine
21 Sep 2015
How cloud technology helps kittens
In this week's Computer Weekly, we talk to the CIO at the UK's leading animal charity, the RSPCA, about how her cloud-first strategy is helping animal welfare. Microsoft is ending support for older version of Internet Explorer – we assess the implications. And we ask the experts about the best practice in mobile security. Read the issue now. Continue Reading
-
News
21 Sep 2015
Department for Culture, Media and Sport takes over responsibility for data protection policy
Government transfers responsibility for data protection policy and ICO oversight from Ministry of Justice (MOJ) to Department for Culture, Media and Sport (DCMS) Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Sep 2015
Health chief 'should be held to account' for whistleblow errors
Former nurse and clincial commissioner Bernie Rochford claims unfair dismissal after blowing the whistle on IT problems which put patient care at risk Continue Reading
By- Julia Gregory and Bill Goodwin
-
News
18 Sep 2015
Public-private co-operation in the Nordics tackles growing cyber crime threat
Nordic governments and businesses are putting cyber security at the centre of their planning as threats increase Continue Reading
By -
News
16 Sep 2015
BT launches ethical hacking service for bankers
BT introduces a certified Crest Star ethical hacking test service for financial services customers Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Sep 2015
Most DDoS attacks hiding something more sinister, Neustar warns
Smaller DDoS attacks can be more dangerous than a powerful attack that knocks a company offline but does not install malware or steal data, warns Neustar Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 Sep 2015
NHS trust denies bullying and intimidation of IT whistleblower
Managers were already aware of whistleblower's concerns about the accuracy of NHS Southwark's data, tribunal hears Continue Reading
By- Bill Goodwin and Julia Gregory
-
News
14 Sep 2015
RSA Group flags ID theft risk to Lloyds Bank customers following datacentre storage theft
International insurance group has seen 500 customers take up offer of identity theft protection in wake of datacentre theft Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
11 Sep 2015
Security industry welcomes GCHQ password guidelines
GCHQ's guidance on password policy covers some of the most pressing issues facing UK businesses and employees today, according to Skyhigh Networks Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Sep 2015
DD4BC cyber extortion gang adds social media to arsenal
Cyber extortion gang DD4BC is using social media campaigns to garner more attention for its ability to create service disruptions by publicly embarrassing large organisations Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
11 Sep 2015
CW Europe – September 2015 edition
Find out the winners of the Computer Weekly European User Awards 2015. The awards aim to shine a light on businesses across Europe that have excelled in their approach to using technology. You can find a full list of winners in this issue and we have highlighted a few through in-depth case studies. Continue Reading
-
News
10 Sep 2015
Researchers discover Android PIN locker ransomware
Researchers say LockerPIN is a self-defending, aggressive piece of ransomware currently targeting Android devices, mainly in the US Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Sep 2015
US health insurer Excellus BlueCross BlueShield hit by data breach
Forensic investigation reveals a data breach at US health insurer Excellus BlueCross BlueShield exposing up to 11 million records 21 months after the first intrusion Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Sep 2015
Cloudian boosts object storage HyperStore compliance features
Distributed object storage software maker Cloudian upgrades HyperStore with added granularity of data protection features that can help meet compliance requirements Continue Reading
By- Antony Adshead, Storage Editor
-
News
09 Sep 2015
Security pros failing to address digital certificate risks, survey shows
Even though 90% of security professionals believe a leading CA will be compromised in next two years, only 13% have existing automation to deal with that happening Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Sep 2015
Conventional security measures hit productivity, study shows
Most IT professionals say context-aware security would improve productivity without compromising security, a survey from Dell reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Sep 2015
Security vulnerability management more than patching, warns Secunia
Keeping track of what makes an IT environment vulnerable is an ongoing and complex task, according to Secunia Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Sep 2015
US State Department plans cyber security playbook
The US State Department issues a request for information to determine the capabilities of commercial industry to provide and maintain a cyber security playbook Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 Sep 2015
DDoS attack on NCA highlights need to be prepared, says Barracuda Networks
A Lizard Squad DDoS attack the NCA says is a fact of life highlights the need for organisations to be prepared, according to Barracuda Networks Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 Sep 2015
Use 2FA to mitigate KeyRaider iOS malware, says Rapid7
KeyRaider iOS malware targeting iPhone users in China and 17 other countries including the UK has raised enterprise security concerns Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 Aug 2015
Police arrest six UK teenagers for using DDoS cyber attack tool
Police arrest six UK teenagers on suspicion of using a DDoS attack tool targeting a national newspaper, a school and online gaming companies and retailers Continue Reading
-
News
27 Aug 2015
Rapid7 calls on router makers to eliminate backdoors
Until manufacturers stop using default passwords, we will continue to see opportunistic attacks on home and small business routers, says Rapid7's Tod Beardsley Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Aug 2015
Many firms not getting to grips with third-party data security risk
Supply chain data security risk is pervasive, but being unable to deal with it is down to basic failings, says a cyber risk expert Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Aug 2015
Sans Institute identifies top UK cyber talent
The cream of UK cyber security talent selected from 24,000 candidates are set to begin eight weeks of intensive training in the first-ever intake at the Sans UK Cyber Academy Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
25 Aug 2015
Life’s a breach: How to handle the press after a hacking attack
Emily Dent, specialist in crisis PR, offers some advice to organisations that unexpectedly find themselves in the headlines Continue Reading
By- Emily Dent
-
E-Zine
25 Aug 2015
Computer Weekly – 25 August 2015: Coping with a crisis
In this week’s Computer Weekly, IT leaders discuss their experiences of dealing with disaster and the importance of planning to ensure business continuity. Jaeger’s CIO talks about bring the iconic fashion brand into the digital age. And we look at the issues around writing supplier contracts for agile software development. Read the issue now. Continue Reading