Identity and access management products
-
Opinion
10 Dec 2024
Defending against cyber grinches: AI for enhanced security
On the Seventh Day of AI, Defending against cyber grinches: AI for enhanced security, we explore the double-edged sword of AI in cybersecurity and how businesses can protect themselves against the cyber grinches. Continue Reading
-
News
10 Dec 2024
UK police continue to hold millions of custody images unlawfully
Annual report from the biometrics and surveillance camera commissioner of England and Wales highlights the ongoing and unlawful retention millions of custody images of innocent people never charged with a crime by police Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
E-Zine
10 Dec 2024
On the road to change at Aston Martin
In this week’s Computer Weekly, we talk to the CIO at luxury car maker Aston Martin to find out how technology is helping tackle the huge challenges facing the automotive sector. The new National Cyber Security boss explains why organisations need to be extra vigilant against the growing online threats. And we examine the future of secure remote connectivity in the cloud era. Read the issue now. Continue Reading
-
Opinion
09 Dec 2024
In 2025: Identities conquer, and hopefully unite
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Stephen McDermid, Okta
-
Definition
09 Dec 2024
What is user authentication?
User authentication refers to the process of verifying the identity of a user attempting to gain access to a computer network, system or device. This process runs in the background and can be done through different means, such as asking the user to enter a password, provide a PIN or provide a fingerprint. Continue Reading
By -
Definition
09 Dec 2024
What is a session key?
A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session between a user and another computer or between two computers. Continue Reading
By -
Opinion
06 Dec 2024
Six trends that will define cyber through to 2030
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Pierre-Martin Tardif, ISACA
-
News
05 Dec 2024
Met Police challenged on claim LFR supported by ‘majority of Lewisham residents’
A community impact assessment for the Met Police’s deployment of live facial-recognition tech in Lewisham brings into question the force’s previous claims to Computer Weekly that its use of the technology is supported by ‘the majority of residents’ Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
04 Dec 2024
Nordics move to deepen cyber security cooperation
Nordic countries are increasing collaboration on cyber security amid more sophisticated and aggressive attacks Continue Reading
By- Gerard O'Dwyer
-
E-Zine
03 Dec 2024
Curing cancer with computers
In this week’s Computer Weekly, we go behind the scenes at the Francis Crick Institute to find out how data science and AI support its groundbreaking medical research. As courts on both sides of the Atlantic target Google, we analyse the legal threats for Big Tech. And our latest buyer’s guide examines cloud and object storage. Read the issue now. Continue Reading
-
Opinion
02 Dec 2024
CISOs will face growing challenges in 2025 and beyond
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Mike Gillespie and Ellie Hurst, Advent IM
-
News
02 Dec 2024
UK economy could see £600m boost through digital IDs for businesses
Government-backed organisation kicks off initiative to widen use of digital identities, in an effort to streamline financial services and cut hundreds of millions of pounds of economic crime Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
29 Nov 2024
Second Merseyside hospital hit by cyber attack
Hot on the heels of a major cyber attack at a nearby NHS trust, one of Europe’s biggest and busiest children’s hospitals is reportedly scrambling to deal with ransomware gang Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Opinion
27 Nov 2024
In the cloud, effective IAM should align to zero-trust principles
The Security Think Tank considers best practices in identity and access management and how can they be deployed to enable IT departments to combat cyber-attacks, phishing attacks and ransomware Continue Reading
By- Vladimir Jirasek, Foresight Cyber
-
E-Zine
26 Nov 2024
The Most Influential Women in UK Technology 2024
In this week’s Computer Weekly, we reveal the 50 most influential women in UK technology for 2024. Read an interview with the winner, co-CEO of Tech She Can, Sheridan Ash. And meet this year’s rising stars – six women with a bright future in IT leadership. Read the issue now. Continue Reading
-
News
25 Nov 2024
Metropolitan Police officer dismissed for unlawfully accessing Sarah Everard files
Over 100 Met Police officers and staff have been investigated for accessing sensitive data related to the Sarah Everard case, leading to the dismissal of a Roads and Transport officer who accessed the information while off-duty Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Feature
25 Nov 2024
IAM within the framework of defence in depth
If it is deployed correctly, identity and access management is among the plethora of techniques that can help to secure enterprise IT Continue Reading
By- Cliff Saran, Managing Editor
-
News
21 Nov 2024
Brit charged in US over Scattered Spider cyber attacks
A UK national named as Tyler Robert Buchanan has been charged in the US over his alleged involvement in cyber attacks perpetrated by the Scattered Spider gang Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Nov 2024
Government issues strategic priorities for online safety regulator Ofcom
Technology secretary Peter Kyle sets out the government’s strategic priorities for how Ofcom should approach regulating online safety, including embedding safety by design and supporting innovation in technologies to help protect people online Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
E-Zine
19 Nov 2024
Adventures in AI at Tripadvisor
In this week’s Computer Weekly, we find out how travel site Tripadvisor is embracing AI to offer new products and services to its users. Gartner says the chance of a successful digital project is like ‘flipping a coin’ – we went to its annual IT leadership symposium to ask why. And we examine what companies must do to comply with the EU’s new NIS2 cyber security rules. Read the issue now. Continue Reading
-
News
18 Nov 2024
AWS widening scope of MFA programme after early success
AWS reports strong take-up of multi-factor authentication among customers since making it compulsory for root users earlier this year, and plans to expand the scope of its IAM programme in spring 2025 Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Nov 2024
Denmark’s AI-powered welfare system fuels mass surveillance
Research reveals the automated tools used to flag individuals for benefit fraud violate individuals’ privacy and risk discriminating against marginalised groups Continue Reading
By- Josh Osman, Computer Weekly
-
Definition
18 Nov 2024
What is acceptable use policy (AUP)?
An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to or use of a corporate network, the internet or other computing resources. Continue Reading
By -
News
14 Nov 2024
MPs hold first ever debate on live facial recognition
MPs have held an open debate on police use of live facial recognition technology for the first time since it was initially deployed by the Met Police in August 2016 Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
14 Nov 2024
Ping CEO on ForgeRock integration and future of identity
Ping Identity CEO Andre Durand discusses the company’s unified roadmap, commitment to customer stability and growth plans in the evolving identity landscape following the merger with ForgeRock Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
12 Nov 2024
Strengthening cyber: Best IAM practices to combat threats
The Security Think Tank considers best practices in identity and access management and how can they be deployed to enable IT departments to combat cyber-attacks, phishing attacks and ransomware Continue Reading
By- Andrew Peel, Scott Swalling, PA Consulting
-
News
12 Nov 2024
Police cloud project raises data protection concerns despite legal reforms
Ongoing data protection issues with the use of hyperscale public cloud infrastructure by UK police could complicate the ambitions of nine forces to move their common records management system into the cloud Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
11 Nov 2024
IAM: Enterprises face a long, hard road to improve
Poor identity and access management puts enterprise data at risk, but the path to stronger IAM remains complex Continue Reading
-
News
11 Nov 2024
Fresh concerns over NHS England registries procurement
Clinicians and technologists behind a number of medical devices registries being brought together by NHS England on a new common platform have accused the health service of flouting public sector procurement regulations Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
11 Nov 2024
IAM: Enterprises face a long, hard road to improve
Poor identity and access management puts enterprise data at risk, but the path to stronger IAM remains complex Continue Reading
-
Feature
08 Nov 2024
Beyond VPNs: The future of secure remote connectivity
As more companies adopt cloud services and remote work, the limitations of VPNs are becoming obvious. We explore what’s next for secure remote connectivity Continue Reading
By -
News
07 Nov 2024
Google Cloud MFA enforcement meets with approval
Latest Google Cloud policy to enforce multifactor authentication across its user base is welcomed by security professionals Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Nov 2024
Interview: Petra Molnar, author of ‘The walls have eyes’
Refugee lawyer and author Petra Molnar speaks to Computer Weekly about the extreme violence people on the move face at borders across the world, and how increasingly hostile anti-immigrant politics is being enabled and reinforced by a ‘lucrative panopticon’ of surveillance technologies Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
06 Nov 2024
Lords shoplifting inquiry calls for facial recognition laws
A Lords committee has expressed concern about the use of facial recognition technology by retailers to combat shoplifting, and is calling on the government to introduce new laws to ensure there are minimum standards for their deployments Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
06 Nov 2024
Starmer announces tech-enabled crackdown on people smuggling
The UK government has announced a further £75m of funding for its Border Security Command, meaning it will now have £150m over two years to spend on new technologies and staff Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
05 Nov 2024
User-centric security should be core to cloud IAM practice
The Security Think Tank considers best practices in identity and access management and how can they be deployed to enable IT departments to combat cyber-attacks, phishing attacks and ransomware Continue Reading
-
Definition
31 Oct 2024
What is face detection and how does it work?
Face detection, also called facial detection, is a computer technology that identifies human faces in digital images and video. Continue Reading
By- Robert Sheldon
- Nick Barney, Technology Writer
- Corinne Bernstein
-
Opinion
30 Oct 2024
IAM best practices for cloud environments to combat cyber attacks
The Security Think Tank considers best practices in identity and access management and how can they be deployed to enable IT departments to combat cyber-attacks, phishing attacks and ransomware Continue Reading
By- Varun Prasad, ISACA
-
Definition
28 Oct 2024
What is two-factor authentication (2FA)?
Two-factor authentication (2FA), sometimes referred to as two-step verification or dual-factor authentication, is a security process in which users provide two different authentication factors to verify themselves. Continue Reading
By- Paul Kirvan
- Peter Loshin, Former Senior Technology Editor
- Michael Cobb
-
News
25 Oct 2024
Dutch critical infrastructure at risk despite high leadership confidence
Stark paradox in Dutch cyber security landscape has business leaders expressing high confidence in their IT infrastructure as cyber attacks rise Continue Reading
By- Kim Loohuis
-
News
22 Oct 2024
Danish government reboots cyber security council amid AI expansion
Denmark’s government relaunches digital security initiative to protect business sectors and society at large Continue Reading
By- Gerard O'Dwyer
-
News
21 Oct 2024
Can AI be secure? Experts discuss emerging threats and AI safety
International cyber security experts call for global cooperation and proactive strategies to address the security challenges posed by artificial intelligence Continue Reading
By- Aaron Tan, TechTarget
-
Feature
15 Oct 2024
Reinventing security operations for the modern threat landscape
The growing pace of digital transformation has opened new avenues for attackers, making traditional security measures obsolete. Organisations must modernise their security operations to fortify their defences and navigate the evolving threat landscape Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
11 Oct 2024
Robust cloud IAM should align to zero-trust principles
The Security Think Tank considers best practices in identity and access management and how can they be deployed to enable IT departments to combat cyber-attacks, phishing attacks and ransomware. Continue Reading
By- Ricky Simpson, Quorum Cyber
-
News
10 Oct 2024
UK and US pledge closer working on children’s online safety
In their first agreement on the subject of children’s online safety, the UK and US governments have said they will create a new working group to boost cooperation Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
03 Oct 2024
Microsoft files lawsuit to seize domains used by Russian spooks
Microsoft has been given permission to seize multiple domains used by the Russian state threat actor Star Blizzard as part of a coordinated disruption effort undertaken ahead of the US elections Continue Reading
By- Alex Scroxton, Security Editor
-
News
02 Oct 2024
Amazon Mechanical Turk workers suspended without explanation
A likely glitch in Amazon Payments resulted in hundreds of Mechanical Turk workers being suspended from the platform without proper explanation or pay Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Definition
27 Sep 2024
What is access control?
Access control is a security technique that regulates who or what can view or use resources in a computing environment. Continue Reading
By- Gavin Wright
- Ben Lutkevich, Site Editor
-
News
27 Sep 2024
UK on high alert over Iranian spear phishing attacks, says NCSC
The NCSC and counterpart agencies in the US have issued a warning over enhanced Iranian spear phishing activity targeting politicians, journalists, activists and others with an interest in Middle Eastern affairs Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Sep 2024
Microsoft shares progress on Secure Future Initiative
Microsoft has published a progress report on its Secure Future Initiative, launched last year in the wake of multiple security incidents, and made a series of commitments to improve its internal cyber culture Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Sep 2024
Home Office eVisa scheme is ‘broken’, says Open Rights Group
Digital rights campaigners say the Home Office’s plan to make its new electronic Visa scheme a real-time online-only process is part and parcel of the 'hostile environment' around immigration status Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
23 Sep 2024
Gartner: Mitigating security threats in AI agents
Agents represent a step-change in the use of artificial intelligence in the enterprise - as attendees at Salesforce's annual conference saw first hand this month - but do not come without their risks Continue Reading
By- Avivah Litan, Gartner
-
News
18 Sep 2024
Europol provides detail on Ghost encrypted comms platform takedown
Law enforcement bodies from across the world have revealed how they collaborated to bring down encrypted network Ghost and the new ways of working that have been established with Europol at the centre Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Definition
17 Sep 2024
What is passive keyless entry (PKE)?
Passive keyless entry (PKE) is an automotive security system that operates automatically when the user is in proximity to the vehicle, unlocking the door on approach or when the door handle is pulled, and locking it when the user walks away or touches the car on exit. Continue Reading
-
News
17 Sep 2024
First CyberBoost Catalyse startup cohort named
The first group of companies named to a cyber incubator programme run by Plexal and the National University of Singapore includes two growing UK businesses Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
16 Sep 2024
Will autonomous weapons make humans passive participants in war?
Experts warn the emergence and adoption of AI-powered military systems may eventually push battlefield decision-making beyond the limits of human cognition Continue Reading
By- Kyle Hiebert, Computer Weekly
-
News
13 Sep 2024
Cyber workforce must almost double to meet global talent need
Research from ISC2 finds global cyber workforce needs additional 4.8 million people to fully secure businesses Continue Reading
By- Clare McDonald, Business Editor
-
News
12 Sep 2024
Data sharing for immigration raids ferments hostility to migrants
Data sharing between public and private bodies for the purposes of carrying out immigration raids helps to prop up the UK’s hostile environment by instilling an atmosphere of fear and deterring migrants from accessing public services Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
09 Sep 2024
Developing nations need the UN cyber crime treaty to pass
The UN cyber crime treaty is flawed but represents a move in the right direction for developing nations seeking greater digital sovereignty Continue Reading
By- Kyle Hiebert, Computer Weekly
-
News
05 Sep 2024
Tencent Cloud debuts palm scanning tech in global markets
Tencent Cloud launches palm verification technology for global markets, offering AI-driven identity authentication to support contactless payments and security access management Continue Reading
By- Aaron Tan, TechTarget
-
News
04 Sep 2024
Retailers question using live facial recognition for shoplifting
Retailers praise benefits of retrospective over live facial recognition in dealing with shoplifting, but stress there are ongoing concerns around the ethical, legal and safety implications of using the technology in stores Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
30 Aug 2024
Norwegian Refugee Council leverages Okta for Good cyber scheme
Pietro Galli, CIO of the Norwegian Refugee Council, reveals how the globally distributed NGO has been taking advantage of the Okta for Good CSR programme to improve its own cyber security and data protection practice, and elevate good practice in the third sector Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Aug 2024
Met Police deploy LFR in Lewisham without community input
The Met’s latest live facial recognition deployment in Catford has raised concerns over the lack of community engagement around the police force’s use of the controversial technology Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
28 Aug 2024
Iranian APT Peach Sandstorm teases new Tickler malware
Peach Sandstorm, an Iranian state threat actor, has developed a dangerous new malware strain that forms a key element of a rapidly evolving attack sequence Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Aug 2024
Global cyber spend to rise 15% in 2025, pushed along by AI
Security spending will increase at pace in 2025, with artificial intelligence, cloud and consultancy services all pushing outlay to new highs, according to Gartner Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Aug 2024
New Qilin tactics a ‘bonus multiplier’ for ransomware chaos
Sophos X-Ops caught the Qilin ransomware gang stealing credentials stored by victims' employees in Google Chrome, heralding further cyber attacks and breaches down the line. Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
20 Aug 2024
From manifesto to material: What No. 10 needs to make reality
With Labour returning to 10 Downing Street after 14 years, the Computer Weekly Security Think Tank panellists share advice and wish lists for the new government Continue Reading
By- Paul Lewis, Nominet
-
News
16 Aug 2024
Thousands of NetSuite customers accidentally exposing their data
Misconfigured permissions across live websites are leaving thousands of NetSuite users open to having their valuable customer data stolen, researchers say Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 Aug 2024
Campaigners criticise Starmer post-riot public surveillance plans
A UK government programme to expand police facial recognition and information sharing after racist riots is attracting criticism from campaigners for exploiting the far-right unrest to generally crack down on protest and increase surveillance Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
15 Aug 2024
Google's cookie conundrum: What comes next?
Google's revised approach to third-party cookies shouldn't come as a surprise, and may also be welcome Continue Reading
By- Christian Ward
-
News
14 Aug 2024
Automated police tech contributes to UK structural racism problem
Civil society groups say automated policing technologies are helping to fuel the disparities that people of colour face across the criminal justice sector, as part of wider warning about the UK’s lack of progress in dealing with systemic racism Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
13 Aug 2024
NIST debuts three quantum-safe encryption algorithms
NIST has launched the first three quantum-resistant encryption algorithms, and as the threat of quantum-enabled cyber attacks grows greater, organisations are encouraged to adopt them as soon as they can Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
09 Aug 2024
Deep dive into quantum-resistant cryptography for email security
Quantum computers have the potential to crack many of the encryption methods we currently rely on to keep our digital communications safe. Quantum-resistant cryptography may be the answer Continue Reading
By -
News
06 Aug 2024
Advanced faces fine over LockBit attack that crippled NHS 111
Advanced Software faces a multimillion pound fine for a series of failings which directly led to a 2022 LockBit ransomware attack that disrupted NHS and social care services across the UK Continue Reading
By- Alex Scroxton, Security Editor
-
News
31 Jul 2024
Breach costs soar as record ransomware payment made
IBM publishes data on the spiralling costs of cyber attacks and data breaches, while researchers identify what appears to be the largest ransomware payment ever made Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Jul 2024
WTO digital trade agreement aims to modernise global commerce
A digital trade deal negotiated over five years at the World Trade Organization has been signed by 91 countries, laying the groundwork for a new global digital trade regime Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
26 Jul 2024
Ban predictive policing and facial recognition, says civil society
A coalition of civil society groups is calling for an outright ban on predictive policing and biometric surveillance in the UK Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
24 Jul 2024
Mimecast to buy insider threat specialist Code42
Mimecast is to buy fellow human-centred risk experts Code42 for an undisclosed sum to take advantage of its insider threat and data loss protection specialisms Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
23 Jul 2024
Enhancing mobile app security with behaviour-based biometrics
Behavioural-based biometrics offer tantalising advantages over more traditional biometric solutions. Learn about some of the benefits and potential challenges for safe and secure implementation Continue Reading
By -
18 Jul 2024
European Digital Identity Wallet: One ID for EU citizens
The European Digital Identity Wallet is a personal digital wallet with which you will be able to identify yourself digitally in the future. Is this the solution for a centralised ID? Continue Reading
-
News
17 Jul 2024
How iProov is fending off deepfake fraud
Facial biometrics and controlled illumination can detect liveness, verify identities and help prevent deepfake attacks Continue Reading
By- Aaron Tan, TechTarget
-
News
16 Jul 2024
Incubator Plexal heads to Singapore for CyberBoost
Cyber startup hub Plexal expands its presence to Singapore through a new initiative, and sets its sights on helping new UK businesses break into the booming Asia-Pacific market Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Jul 2024
AT&T loses ‘nearly all’ phone records in Snowflake breach
Hackers have stolen records of virtually every call made by AT&T's customers during a six-month period in 2022, after compromising the US telco's Snowflake data environment Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Jul 2024
Public awareness of ID security grows, but big obstacles remain
Consumers are improving their awareness of the issues around digital identity security, but there are still some big issues preventing many from doing better, according to an Okta report Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Jul 2024
Dutch research firm TNO pictures the SOC of the future
In only a few years, security operations centres will have a different design and layout, and far fewer will remain Continue Reading
By- Kim Loohius
-
News
09 Jul 2024
Atos jumps on ‘moving train’ for Euro 2024
Atos provides the IT supporting major recurring sporting events including Uefa’s European Football Championship Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
08 Jul 2024
Synnovis attack highlights degraded, outdated state of NHS IT
More cyber attacks against the health service are likely, and will succeed if something isn’t done to address the increasingly elderly NHS IT estate, experts are warning Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Jun 2024
How Recorded Future is operationalising threat intelligence
Recorded Future is investing in APIs to enable automated security workflows, among other measures, to help organisations overcome the hurdles of operationalising threat intelligence Continue Reading
By- Aaron Tan, TechTarget
-
News
26 Jun 2024
Police Scotland did not consult ICO about high-risk cloud system
Police Scotland chose not to formally consult with the data regulator about the risks identified with a cloud-based digital evidence sharing system, while the regulator itself did not follow up for nearly three months Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Definition
25 Jun 2024
digital signature
A digital signature is a mathematical technique used to validate the authenticity and integrity of a digital document, message or software. Continue Reading
By- Cameron Hashemi-Pour, Site Editor
- Alexander S. Gillis, Technical Writer and Editor
- Ben Lutkevich, Site Editor
-
News
24 Jun 2024
Sellafield pleads guilty to criminal charges over cyber security
Nuclear Decommissioning Authority-backed organisation Sellafield Ltd pleads guilty to criminal charges brought over significant cyber security failings that could have compromised sensitive nuclear information Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Definition
21 Jun 2024
OpenID (OpenID Connect)
OpenID Connect is an open specification for authentication and single sign-on (SSO). Continue Reading
By -
News
19 Jun 2024
Microsoft admits no guarantee of sovereignty for UK policing data
Documents show Microsoft’s lawyers admitted to Scottish policing bodies that the company cannot guarantee sensitive law enforcement data will remain in the UK, despite long-standing public claims to the contrary Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Feature
17 Jun 2024
Autonomous weapons systems defy rigid attempts at arms control
In an ever more dangerous world, the technology is outpacing diplomacy and holds clear strategic value. Retaining human control over its use will require embracing imperfect solutions Continue Reading
By- Kyle Hiebert, Computer Weekly
-
News
11 Jun 2024
Pure Storage hit by Snowflake credential hackers
Pure Storage emerges as the latest victim of a fast-spreading breach of Snowflake customers targeting users with lax credential security measures in place Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Jun 2024
More than 160 Snowflake customers hit in targeted data theft spree
Mandiant reports that more than 160 Snowflake customers have been hit in a broad data theft and extortion campaign targeting organisations that have failed to pay proper attention to securing valuable credentials Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
08 Jun 2024
The future of identity in print infrastructure management
The use of identity-centric infrastructure access management is set to play a critical role in fortifying the printing environment. Continue Reading
By- Louella Fernandes, Quocirca
-
Blog Post
08 Jun 2024
The future of identity in print infrastructure management
Identity-centric infrastructure access management is set to play a critical role in fortifying the printing environment. Continue Reading
By- Louella Fernandes, Quocirca
-
News
03 Jun 2024
97 FTSE 100 firms exposed to supply chain breaches
Between March 2023 and March 2024, 97 out of 100 companies on the UK’s FTSE 100 list were put at risk of compromise following supply chain breaches at third-party suppliers Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Jun 2024
Major breaches allegedly caused by unsecured Snowflake accounts
Significant data breaches at Ticketmaster and Santander appear to have been orchestrated through careful targeting of the victims’ Snowflake cloud data management accounts Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 May 2024
Storebrand divests from IBM over supply of biometrics to Israel
Norwegian asset manager Storebrand’s decision to divest from IBM comes amid growing scrutiny of the role technology companies play in Israel’s human rights abuses Continue Reading
-
Definition
15 May 2024
out-of-band authentication
Out-of-band authentication is a type of two-factor authentication (2FA) that requires a secondary verification method through a separate communication channel along with the typical ID and password. Continue Reading
By- Nick Barney, Technology Writer