Identity and access management products
-
News
10 Oct 2024
UK and US pledge closer working on children’s online safety
In their first agreement on the subject of children’s online safety, the UK and US governments have said they will create a new working group to boost cooperation Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
03 Oct 2024
Microsoft files lawsuit to seize domains used by Russian spooks
Microsoft has been given permission to seize multiple domains used by the Russian state threat actor Star Blizzard as part of a coordinated disruption effort undertaken ahead of the US elections Continue Reading
By- Alex Scroxton, Security Editor
-
News
01 Apr 2020
CDN and cloud suppliers join routing security initiative
Akamai and Amazon Web Services are among a group of cloud and content delivery network providers to participate in a global initiative to address the security threats to internet routing systems Continue Reading
By- Aaron Tan, TechTarget
-
News
31 Mar 2020
Marriott International hotel chain in second data breach
Marriott International notifies customers of a major data breach that unfolded earlier in 2020 – the second it has experienced in the past two years Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
31 Mar 2020
Why security validation matters
FireEye’s top executives in Asia-Pacific discuss the benefits of security validation and offer their take on the region’s cyber threat landscape Continue Reading
By- Aaron Tan, TechTarget
-
News
27 Mar 2020
Lorca calls on security scaleups to tackle coronavirus challenge
Lorca innovation programme has launched an open call for its next cohort of cyber security scaleups, with a timely focus on coronavirus challenges Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Mar 2020
Coronavirus: What are the latest free cyber security offers?
We round up the latest free offers on cyber security products and services being made available during the Covid-19 coronavirus crisis Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Mar 2020
Huge queues for Universal Credit online applications due to coronavirus surge
Online queues in the tens of thousands are hindering emergency applications for Universal Credit, with the Gov.uk Verify identity verification system becoming a particular bottleneck Continue Reading
By- Bryan Glick, Editor in chief
-
News
23 Mar 2020
Thousands of Netflix, Disney+ streaming accounts being stolen
Proofpoint has urged users of streaming services to be alert to cyber criminals hijacking their accounts Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Mar 2020
Interview: Jamil Farshchi, CISO, Equifax
Equifax CISO Jamil Farshchi discusses public cloud and why it’s not something IT security professionals should be afraid of Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
23 Mar 2020
Coronavirus: UK mobile operators discuss sharing crowd movement data with government
Reports emerge of unprecedented cooperation between UK telcos and government to provide people-modelling data to prevent spread of coronavirus Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
19 Mar 2020
IT Priorities 2020: ANZ firms to spend more on cyber security
Over half of respondents in Australia and New Zealand plan to invest more in cyber security, especially in key areas such as data loss prevention Continue Reading
By- Aaron Tan, TechTarget
-
News
19 Mar 2020
Volume of computer misuse incidents falling, says ONS
Downward trend comes despite an overall increase in fraud, according to new statistics Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
19 Mar 2020
Coronavirus: How to implement safe and secure remote working
Find out what CIOs and CISOs need to know to enable their end-users to work remotely and stay secure during the Covid-19 coronavirus crisis, and learn how users can help themselves Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Mar 2020
Coronavirus now possibly largest-ever cyber security threat
The cumulative volume of coronavirus-related email lures and other threats is the largest collection of attack types exploiting a single theme for years, possibly ever Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Mar 2020
Push for digitisation in Malaysia amid coronavirus crisis
Event cancellations and travel bans are spurring more companies to embrace digital tools to support remote and flexible working arrangements Continue Reading
By -
Opinion
18 Mar 2020
Security Think Tank: Amid panic, how to find a sound level of security
In our globalised world, high-profile events such as Covid-19 have huge business impacts, some of which may be felt by CISOs. What responsibilities do security professionals have in such circumstances? Continue Reading
By- Sabba Mirza and James Walsh
-
News
17 Mar 2020
Covid-19: NCSC issues secure remote working guidance
With hundreds of thousands likely to be working remotely for some time, the UK’s NCSC has issued best practice guidance to enable security teams to support them Continue Reading
By- Alex Scroxton, Security Editor
-
News
17 Mar 2020
UN identifies tech companies working in Occupied Palestinian Territories
United Nations Human Rights Office report names a number of technology companies that could be involved in violating human rights Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
12 Mar 2020
Cookie-stealing trojans found lurking on Android phones
Kaspersky discovers two new Android malware modifications that could give hackers control of their victims’ social media accounts Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Mar 2020
APAC remains hotbed for digital transformation
Nearly half of organisations in the Asia-Pacific region see digital transformation as their top priority, followed by cloud infrastructure deployment and artificial intelligence, survey finds Continue Reading
By- Aaron Tan, TechTarget
-
News
10 Mar 2020
More questions raised about Gov.uk Verify as digital identity chief quits
Lisa Barrett, director of digital identity at GDS and head of the troubled Verify programme, is leaving government as funding questions remain ahead of Budget Continue Reading
By- Bryan Glick, Editor in chief
-
News
06 Mar 2020
Virgin Media confirms 'misconfigured database' left personal data of 900,000 people exposed
Telco provider Virgin Media confirms 'data incident' that left personal details of 900,000 people exposed, but denies its systems were hacked or that it suffered a data breach Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
05 Mar 2020
Biometrics ethics group takes evidence on public-private use of facial recognition
Collaboration between police forces and private entities on facial recognition technology comes under scrutiny by the Home Office’s Biometrics and Forensics Ethics Group Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
05 Mar 2020
Cathay Pacific hit with £500,000 data protection fine from ICO over 2018 breach
Airline receives maximum financial penalty under Data Protection Act for data breach that led to nine million customers having their personal data accessed by hackers Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
Blog Post
04 Mar 2020
Cabinet Office gives more non-answers on the future of Gov.uk Verify
The remarkable levels of secrecy and avoidance of scrutiny around the Gov.uk Verify digital identity scheme continue – and if anything, seem to have reached new levels of absurdity. Last week, ... Continue Reading
By- Bryan Glick, Editor in chief
-
News
03 Mar 2020
NCSC issues smart camera security guidance to protect consumers from unauthorised snoops
Government’s latest push to safeguard users of in-home connected devices sees National Cyber Security Centre issue guidance to help consumers tighten up security of smart cameras and baby monitors Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
E-Zine
03 Mar 2020
What will points-based immigration mean for IT recruitment?
In this week’s Computer Weekly, we look at the government’s new points-based immigration rules and assess the implications for the tech sector. IR35 tax rules change in April – we find out how IT contractors need to prepare. And we examine whether the rise of cloud is really displacing the datacentre. Read the issue now. Continue Reading
-
News
01 Mar 2020
Data breaches in Australia showing no signs of abating
Compromised login credentials and human error were the most common causes of data breaches reported under Australia’s notifiable data breach regime from July to December 2019 Continue Reading
By- Aaron Tan, TechTarget
-
News
28 Feb 2020
NCSC makes ransomware attack guidance more accessible
Following a swathe of high-profile ransomware attacks, the UK’s National Cyber Security Centre has made changes to its guidance, emphasising the importance of offline backups Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
27 Feb 2020
CW Nordics: Swedes lose faith in social media as data security fears increase
Swedish citizens are becoming more concerned about the activities of social media companies and are reducing their online interaction with them as a result. Also read about new mobility-as-a-service projects gaining traction across Denmark, Finland, Norway and Sweden, and why the Finnish government has committed resources to a cyber security project aimed at local authorities. Continue Reading
-
News
26 Feb 2020
How tech suppliers are easing barriers to hybrid cloud adoption
The tech industry has risen to the challenge of helping enterprises ease their transition to hybrid cloud, but issues remain Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
25 Feb 2020
Is the EU better equipped than the US to supervise the use of facial recognition?
Clearview AI can be an indispensable tool to reinforce national security, but there are many risks associated with the use of facial recognition technology that the EU might be better equipped to deal with than the US Continue Reading
By- Mathilde Gérot, Signature Litigation
-
News
25 Feb 2020
The Security Interviews: Gil Shwed’s 10-year vision for security
Check Point founder Gil Shwed discusses his new Infinity Next concept and how he plans to remodel the world of cyber security in the next 10 years Continue Reading
-
E-Zine
25 Feb 2020
Using meteorological data to prepare for the worst
In this week’s Computer Weekly, after the storms that swept across the UK, we look at the technology behind Weather Source’s meteorological data service. Oracle and SAP are battling over customers to upgrade their ERP systems to the cloud. And we report from the world’s biggest retail tech show. Read the issue now. Continue Reading
-
News
24 Feb 2020
Open security group unveils common OpenDXL language
Open Cybersecurity Alliance announces the availability of OpenDXL Ontology, the first open source language for connecting disparate security tools through a common messaging framework Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Feb 2020
Cisco goes all-in on security integration with SecureX platform
CISOs are struggling to stitch together disparate cyber security products and services – Cisco believes its cloud-native SecureX platform will change their working lives for the better Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
18 Feb 2020
Security Think Tank: Zero trust strategies must start small, then grow
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs approach moving their organisations from traditional network security to a zero-trust architecture? Continue Reading
-
News
17 Feb 2020
Ex-soldiers to become ethical hackers
A new programme will give armed forces veterans in Scotland a grounding in cyber security skills, including penetration testing and ethical hacking Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
17 Feb 2020
Security Think Tank: Ask yourself if zero trust is right for you
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero-trust architecture? Continue Reading
By- Simon Persin, Turnkey Consulting
-
Blog Post
14 Feb 2020
Want to hear the latest on Gov.uk Verify? Sorry, GDS still has nothing to say
The great and the good of the digital identity sector gathered in London yesterday (13 February) for the Think Digital Identity for Government conference – a popular bi-annual event that always ... Continue Reading
By- Bryan Glick, Editor in chief
-
Opinion
14 Feb 2020
Security Think Tank: How zero trust lets you take back control
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero trust architecture? Continue Reading
By- James Walsh, Fieldfisher
-
Opinion
13 Feb 2020
Security Think Tank: Practical steps to achieve zero trust
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero-trust architecture? Continue Reading
By -
Feature
12 Feb 2020
Inside the SOC: the nerve centre of security operations
Security operations centres are the bedrock of any cyber defence strategy, but operating one is increasingly challenging, with mounting workloads and a shortage of skilled personnel Continue Reading
By- Aaron Tan, TechTarget
-
News
10 Feb 2020
What should be in Australia’s next cyber security strategy
The Australian government is reviewing the nation’s cyber security strategy, but is it looking at the right issues? Continue Reading
-
Opinion
10 Feb 2020
Security Think Tank: Zero trust is complex, but has rich rewards
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero-trust architecture? Continue Reading
By- Bhanu Jagasia
-
Opinion
07 Feb 2020
Security Think Tank: No trust in zero trust need not be a problem
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero-trust architecture? Continue Reading
By- Silvano Sogus
-
News
05 Feb 2020
Web app ubiquity gives cyber criminals new opportunities
The popularity and ubiquity of web-based apps such as Office 365 and Salesforce is a temptation too good to miss for cyber criminals Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Feb 2020
Check Point pledges end to security updates
Check Point’s Gil Shwed expands on a vision for the next 10 years of cyber security, which he calls Infinity Next Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
05 Feb 2020
Security Think Tank: Zero trust is not the answer to all your problems
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero-trust architecture? Continue Reading
-
Opinion
04 Feb 2020
Security Think Tank: Facing the challenge of zero trust
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero-trust architecture? Continue Reading
By -
News
03 Feb 2020
NHS adds supplier security audits to procurement platform
A new feature in the NHS’s Edge4Health procurement platform will help NHS suppliers improve their cyber security posture and NHS organisations make better buying decisions Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
03 Feb 2020
Security Think Tank: Zero trust – just another name for the basics?
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero-trust architecture? Continue Reading
By- Tim Holman, 2-sec
-
News
30 Jan 2020
NCSC launches study on cyber security diversity
The UK’s National Cyber Security Centre wants to improve the diversity of the cyber security sector Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Jan 2020
UK cyber security sector worth more than £8bn
The UK’s cyber security industry employs 43,000 full-time workers, and contributed nearly £4bn to the UK economy in 2019, according to DCMS Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Jan 2020
Met Police could deploy facial recognition against protesters
Live facial recognition will be rolled out operationally by the Met Police, but police monitoring group Netpol believes it will hamper people’s ability to exercise their rights to protest Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
28 Jan 2020
Organisations losing control of cloud data
Data is more widely dispersed in enterprise clouds than most organisations think, and as a result they are at risk of losing control of it, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Jan 2020
Interpol uncovers cyber crime operation in Indonesia
An Interpol-coordinated cyber operation leads to the arrest of three people in Indonesia who allegedly used a JavaScript-sniffer malware to steal payment card details of online shoppers Continue Reading
By- Aaron Tan, TechTarget
-
News
24 Jan 2020
Milan hosts Cisco’s first European security innovation unit
Cisco has cut the ribbon on its first Cyber Security Co-Innovation Centre in Europe, at Milan’s Leonardo da Vinci Science and Technology Museum Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Jan 2020
End-user security ignorance laid bare in new report
Proofpoint’s 2020 State of the Phish report highlights an urgent need for better user training and reporting Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
23 Jan 2020
Startup uses machine learning to support GDPR’s right to be forgotten
Non-intrusive algorithms enable users to track which companies hold their data, so they can take it back Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
21 Jan 2020
5G builders test vulnerabilities in Finnish hackathon
University hackathon puts 5G security to the test as new wireless technology’s roll-out nears Continue Reading
By- Gerard O'Dwyer
-
News
17 Jan 2020
App developers sue Facebook over ‘anti-competitive conduct’
Lawsuit is based on leaked internal Facebook documents obtained and published by Computer Weekly and NBC last year Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
16 Jan 2020
A quarter of users will fall for basic phishing attacks
Phishing emails that appear to be security alerts are the most effective method of compromise, says KnowBe4 Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
16 Jan 2020
Security Think-Tank: Tackle insider threats to achieve data-centric security
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but what does this mean for security professionals? Continue Reading
By- Mike Yeomans, Information Security Forum
-
News
16 Jan 2020
Thailand gets ready for data protection law
Thailand’s personal data protection law comes into effect in May 2020, subjecting organisations to new rules that safeguard the personal data of individuals Continue Reading
By- Aaron Tan, TechTarget
-
News
15 Jan 2020
LGBTQ+ social app Grindr accused of breaching GDPR
Norwegian Consumer Council files complaints about LGBTQ+ social networking app, alleging it is in breach of the General Data Protection Regulation Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Jan 2020
Two-thirds of UK healthcare organisations breached last year
The majority of healthcare organisations in the UK experienced a cyber security incident during 2019, with almost half the result of viruses and malware introduced on third party devices Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Jan 2020
Sextortion campaign hits Nest home security cameras
Owners of Google’s Nest home security cameras are being targeted in a sextortion scam by criminals playing on fears over IoT security Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
08 Jan 2020
Implementing a 21st century approach to digital identity
The government’s attempts at digital identity have failed – it is time for a new, modern approach Continue Reading
-
News
07 Jan 2020
Broadcom flogs Symantec enterprise security unit to Accenture
Acquisition is set to make Accenture a global leader in managed cyber security services Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Jan 2020
Iran likely to hit back with cyber attacks, security experts warn
The possibility of cyber attack by threat groups acting on behalf of the Iranian government has dramatically increased following US actions in Iraq Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Jan 2020
Government injects £40m into single sign-on NHS programme
The government has put aside funding to speed up login times. Additional funding has been announced to support adult digital health services Continue Reading
By- Cliff Saran, Managing Editor
-
News
03 Jan 2020
Survey about Swedish people’s attitude to the internet reveals growing distrust of social media
Swedish citizens are becoming more concerned about the activities of social media companies and are reducing their online interaction with them as a result Continue Reading
By- Gerard O'Dwyer
-
News
24 Dec 2019
Top 10 enterprise IT in the Middle East stories of 2019
Here are Computer Weekly’s top 10 enterprise IT in the Middle East stories of 2019 Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
24 Dec 2019
Top 10 cyber crime stories of 2019
Here are Computer Weekly’s top 10 cyber crime stories of 2019 Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Dec 2019
Top 10 cyber security stories of 2019
Here are Computer Weekly’s top 10 cyber security stories of 2019 Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Dec 2019
Finnish government supports local authorities in cyber security initiative
The Finnish government has committed resources to a cyber security project aimed at local authorities Continue Reading
By- Gerard O'Dwyer
-
News
19 Dec 2019
Top 10 artificial intelligence stories of 2019
Here are Computer Weekly’s top 10 artificial intelligence stories of 2019 Continue Reading
By- Cliff Saran, Managing Editor
-
News
17 Dec 2019
Group-IB CEO talks up global threat landscape
Public attribution of cyber attacks could backfire while a global cyber norms framework won’t emerge until a catastrophic incident occurs, says the head of Singapore-based Group-IB Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
16 Dec 2019
Security Think Tank: Data-centric security requires a holistic approach
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but what does this mean for security professionals? Continue Reading
By- James Walsh, Fieldfisher
-
News
13 Dec 2019
Alarm bells ring, the IoT is listening
With Christmas bearing down on us, a series of vulnerability disclosures has drawn attention to the parlous state of IoT security, and serves as a timely warning to people planning to buy smart devices as gifts Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
13 Dec 2019
Security Think Tank: Data-centric security requires context and understanding
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but what does this mean for security professionals? Continue Reading
By -
News
09 Dec 2019
Public sector still losing user devices in high numbers
The Ministry of Justice has lost 354 smartphones, PCs, laptops and tablets in the past 12 months, according to a Freedom of Information request, and other government departments are in the same boat Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Dec 2019
How commodities firm ED&F Man solved its threat detection challenges
After a minor server breach, leading commodities trader turned to Vectra’s Cognito service to expose hidden threats, spot privilege misuse, and conduct conclusive investigations Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Dec 2019
Aviatrix VPN vulnerability left user endpoints wide open
Immersive Labs has disclosed a serious vulnerability in VPN supplier Aviatrix’s enterprise client that could have granted hackers elevated user privileges across enterprise targets Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
03 Dec 2019
Security Think Tank: In-depth protection is a matter of basic hygiene
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but what does this mean for security professionals? Continue Reading
By -
News
03 Dec 2019
Chinese web users take more risks than Brits or Americans
A research paper published by the University of Birmingham seems to show that differences in cultural values have an impact both on risky behaviour online and legal regulation Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Nov 2019
Cyber criminal RAT busted by cops
Police forces around the UK have arrested nine people as part of an international operation targeting users of a remote access trojan Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Nov 2019
TfL locks down Oyster accounts to ward off credential stuffing
Mandatory password reset for all travellers who use Oyster and contactless payment systems follows minor breach incident earlier in 2019 Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Nov 2019
Top APAC security predictions for 2020
More attacks on critical infrastructure, supply chain vulnerabilities and file-less attacks are some of the security threats that enterprises should keep an eye on next year Continue Reading
By- Aaron Tan, TechTarget
-
News
25 Nov 2019
Uber app exploit posed safety risk to passengers
A flaw in Uber’s system meant thousands of trips in London were taken with unauthorised drivers at the wheel Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Nov 2019
Massive increase in fraud attacks on TSB customers during IT meltdown
There was a massive spike in attempts by fraudsters to steal from TSB customers when the bank’s IT systems failed in 2018 Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
E-Zine
19 Nov 2019
Is facial recognition happening too fast?
In this week’s Computer Weekly, as the information commissioner calls on police forces to slow down the introduction of facial recognition, we examine the issues. We look at what the use of DevOps methods means for storage strategy. And we talk to Microsoft’s global cyber security chief. Read the issue now. Continue Reading
-
News
13 Nov 2019
11 new 5G hacks enable user device tracking and monitoring
Researchers at Purdue University and the University of Iowa publish details of several new 5G mobile network vulnerabilities Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Nov 2019
Finnish biometric identity plans for seamless air travel
Finnair and Finavia explore options for automatic digital identification and authentication of air travellers Continue Reading
By- Alex Cruickshank
-
News
12 Nov 2019
Nordic SMEs lack the money needed for cyber security
Businesses and governments in Denmark and Norway are working together to address a cyber security shortfall for SMEs in each country Continue Reading
By- Gerard O'Dwyer
-
News
11 Nov 2019
Australia’s productivity woes pinned on poor employee experience
Research by Ricoh suggests that the lukewarm view of employee experience among IT leaders is part of the reason for Australia’s declining productivity Continue Reading
-
News
05 Nov 2019
Ransomware authors seeking new ways to avoid being spotted
Sector analysis from Sophos has revealed some insight into how malware authors are adapting to thwart cyber security controls Continue Reading
By- Alex Scroxton, Security Editor
-
News
31 Oct 2019
Facebook agrees to pay £500,000 fine over Cambridge Analytica data law breaches
Social media giant also promises to change the way its platform is used to protect people’s data Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
29 Oct 2019
Mitigating social engineering attacks with MFA
The growing frequency of social engineering attacks highlights the increasing need for organisations to take steps to mitigate the effects of phishing. Continue Reading
-
Blog Post
24 Oct 2019
Hack the Kop – the Reds are sitting ducks
Liverpool may be flying high at the top of the Premier League table right now, but when they get home after a hard-fought 90 minutes, their fans are the most likely to have had their personal data ... Continue Reading
By- Alex Scroxton, Security Editor