Identity and access management products
-
News
17 Jul 2024
How iProov is fending off deepfake fraud
Facial biometrics and controlled illumination can detect liveness, verify identities and help prevent deepfake attacks Continue Reading
-
News
16 Jul 2024
Incubator Plexal heads to Singapore for CyberBoost
Cyber startup hub Plexal expands its presence to Singapore through a new initiative, and sets its sights on helping new UK businesses break into the booming Asia-Pacific market Continue Reading
-
News
20 Apr 2017
Mastercard integrates biometric technology into cards
MasterCard tests out biometric technology embedded into payment cards, with further trials in Europe planned Continue Reading
-
News
20 Apr 2017
Banks suffer average of 85 attempted serious cyber attacks a year, and one-third are successful
Banks face daily cyber attacks, many of which succeed in stealing data, research finds Continue Reading
-
News
11 Apr 2017
Security as a service on the rise in the UAE
Organisations in the United Arab Emirates are increasingly turning to security services Continue Reading
-
News
10 Apr 2017
IAM a core building block for GDPR compliance
Identity and access management is key to enabling organisations to become compliant with the GDPR, increase security and improve customer relationships, according to a senior analyst at KuppingerCole Continue Reading
-
News
10 Apr 2017
Outsourcing service left Scottrade Bank customer data exposed
Mistake by outsourcing service provider left the details of 20,000 Scottrade Bank customers vulnerable to theft Continue Reading
-
News
06 Apr 2017
Interview: F-Secure’s Mikko Hyppönen on the Nordics, Russia and the internet of insecure things
Computer Weekly sat down with Finnish cyber security expert Mikko Hyppönen to talk about security in the Nordics, Russia and the trouble with connected devices Continue Reading
-
News
05 Apr 2017
NHS Digital plans September go-live for citizen identity service
Health and social care patients will have a single online identity verification log-in to use across health and care by autumn 2017 Continue Reading
-
News
28 Mar 2017
Threats grow in Saudi Arabia’s cyber sector
Saudi Arabia's wealth makes it an attractive target for cyber criminals, but what have been the recent trends in cyber crime? Continue Reading
-
News
07 Mar 2017
Country as a service becoming reality in Estonia
Programme to help foreigners set up businesses in Estonia through virtual residency is gathering pace Continue Reading
-
News
27 Feb 2017
Cyber criminals net £8bn from financial services in 2016
Organised cyber fraud gangs are turning their attention to online lenders and emerging financial services, potentially netting £8bn in 2016, a report reveals Continue Reading
-
Blog Post
21 Feb 2017
Gov.uk Verify ID providers eye the prize of HMRC’s digital users – but what happens without them?
In all the recent talk about whether HM Revenue & Customs (HMRC) is truly committed to the Cabinet Office’s Gov.uk Verify service, there’s been less said about the commitment of the external ... Continue Reading
-
Blog Post
15 Feb 2017
HMRC ID vs Gov.uk Verify – what’s the difference, and why it matters
The long-term row between HM Revenue & Customs (HMRC) and the Government Digital Service (GDS) over online identity assurance broke into the open this week. HMRC published a blog post that ... Continue Reading
-
Blog Post
14 Feb 2017
GDS, HMRC and Verify: so much for cross-government digital collaboration
Less than a week after Cabinet Office minister Ben Gummer announced the new government transformation strategy, its central premise is already in question after HM Revenue & Customs (HMRC) ... Continue Reading
-
News
26 Jan 2017
Facebook ups security with Fido U2F two-factor authentication
Social media giant is enabling users to increase the security of their logins with Fido U2F USB security keys Continue Reading
-
News
21 Dec 2016
Top 10 IT security stories of 2016
Here are Computer Weekly’s top 10 IT security stories of 2016: Continue Reading
-
News
15 Dec 2016
Typo allowed Russian hackers to access US Democratic Party emails
Typographical mistake in an email warning of a phishing attack on the US Democrats led to thousands of private emails being accessed and published by Russian-backed hackers Continue Reading
-
News
05 Dec 2016
Top 10 ANZ enterprise IT stories of 2016
Here is a rundown of Computer Weekly’s most popular ANZ enterprise IT articles for 2016 Continue Reading
-
News
30 Nov 2016
Mastercard uses artificial intelligence for transaction approval
Mastercard is using artificial intelligence to reduce the number of transactions that are wrongly declined, while maintaining security Continue Reading
-
News
28 Nov 2016
IBM blamed for Australian census website crash
Computer giant reportedly pays $30m to Australian government as reports are released from two inquiries into DDoS attacks on census website Continue Reading
-
News
22 Nov 2016
Consumer identity key to digital transformation
Customer identity and access management has benefits for consumers and service providers alike, but is key to digital transformation, says KuppingerCole Continue Reading
-
News
18 Nov 2016
Three breach highlights several security issues, says (ISC)2
Customer data breaches continue to demonstrate that companies are still not treating cyber risk like every other business risk, says Adrian Davis of (ISC)2 Continue Reading
-
News
16 Nov 2016
Digital transformation not a finite process, says Martin Kuppinger
Security, privacy and identity are key to digital transformation, which is an evolutionary process, according to Martin Kuppinger Continue Reading
-
News
15 Nov 2016
Online identity needs to be fixed, says Microsoft’s Kim Cameron
Software giant’s identity architect calls on enterprises to professionalise the way they relate to customers to help replace online identity infrastructure that is not fit for purpose Continue Reading
-
News
11 Nov 2016
GDS aiming for 25 million users of Gov.uk Verify by 2020
Early draft of new GDS strategy reveals an ambitious target for its identity assurance service Continue Reading
-
E-Zine
03 Nov 2016
CW ASEAN: SMEs present security weakness
In this month's CW ASEAN, we look at how the cyber security defences at small and medium-sized enterprises in Southeast Asia may have some vulnerabilities, resulting in cyber security attacks on the large corporations they work with. We also consider the need to educate users of smartphones and tablets across the region as card fraud rates rise, with high use of mobile devices considered a contributing factor. Read the issue now. Continue Reading
-
E-Zine
03 Nov 2016
CW ANZ: Using gamification to build cyber security skills
In this month's CW ANZ, we look at how PwC is using an online game to give its customers first-hand experience of what it means to face a cyber attack. We also look at how identity is gaining greater prominence in the security debate in Australia as the DTO takes the wraps off plans for a national identity system. Read the issue now. Continue Reading
-
News
01 Nov 2016
UK government re-announces £1.9bn cyber security spend
Five-year spending increase - announced by Chancellor Philip Hammond 12 months after George Osborne did so - will support new UK cyber security strategy Continue Reading
-
Feature
31 Oct 2016
The cyber threats lurking within every company
Insider threats have been around for a long time, but it is only recently that people have begun to acknowledge the true danger they pose Continue Reading
-
News
18 Oct 2016
Saving Lauri Love: activists plan their next move
An eclectic bunch of activists, charity workers and reformed hackers spent a rainy Sunday afternoon plotting their next move in a campaign to save Lauri Love from extradition to the US on hacking charges Continue Reading
-
Opinion
12 Oct 2016
Gary McKinnon: Why Lauri Love should be spared the nightmare of extradition
Computer activist Lauri Love should be spared a life sentence in a US jail, says former hacker Gary McKinnon Continue Reading
-
News
19 Sep 2016
Consumers trust banks more than government for biometric security
UK citizens think banks are the best organisations to provide biometric authentication for payments Continue Reading
-
News
05 Sep 2016
Mobile device use feeds card fraud in Asean region
Card fraud is rising in Asean countries, with the high use of mobile devices a contributing factor. Continue Reading
-
News
30 Aug 2016
Westpac bank launches Databank data protection service
Australia's Westpac bank is offering organisations that share customer data a service that it says securely locks down personal information Continue Reading
-
Opinion
28 Jul 2016
Consumer identity management is the core of real CRM
IAM + CRM is much more than simply IAM for external users, says Ivan Niccolai Continue Reading
-
News
26 Jul 2016
Government tests use of social media accounts for verifying online user identity
Online public service users may be asked to allow access to their Facebook, LinkedIn or Twitter accounts to help prove they are who they say they are Continue Reading
-
News
12 Jul 2016
IBM sets up security centre in Canberra
IBM leads the charge as large private businesses invest heavily in security resources across Australia in an attempt to close the security gap Continue Reading
-
E-Zine
07 Jul 2016
CW ASEAN: July 2016
Lessons from the Philippine government hack: In this issue we ask why a hack on the Philippine Commission on the Elections (Comelec) was allowed to happen and what organisations in Southeast Asia can learn from this breach of security. Retailers in the region are concerned – read how the theft of customer data is their biggest worry. Continue Reading
-
E-Zine
07 Jul 2016
CW ANZ: July 2016
Australia knows it has a cyber security problem, but not the scale. In this month’s CW ANZ we describe how Australia's $230m security strategy serves as a wake-up call to enterprises. We also reveal the techniques and technologies being used to protect one Australian school, as well as a more general look at the main cyber threats to orgainsations in Australia. Read the issue now. Continue Reading
-
Feature
07 Jul 2016
The problem of passwords and how to deal with it
Security experts have long recognised passwords as inadequate, but finally technology is offering some viable alternative authentication methods that businesses can explore to keep their data safe Continue Reading
-
News
21 Jun 2016
Enterprises urged not to view security as a barrier to internet of things adoption
The Lower Colorado River Authority’s chief administrative officer urges enterprises to balance the risks of using the internet of things with the benefits connected devices can bring Continue Reading
-
News
20 Jun 2016
Lower average cost of Australian data breaches is not a sign of comfort
The average cost of a data breach to Australian organisations dropped in 2015, according to research Continue Reading
-
News
13 Jun 2016
Singapore banks adopt voice biometrics for user authentication
Banks in Singapore are rolling out biometric technology to improve customer services by speeding up the authentication process Continue Reading
-
News
12 Jun 2016
Philippines government data breach is a warning to Asean region
Security is a rising concern in the Asean region, with fears fuelled by incidents such as the recent hacking incident in Manila Continue Reading
-
News
19 May 2016
Gov.uk Verify to go live 24 May 2016
On 24 May 2016, the government’s identity assurance platform will move from beta to “fully live”, after missing its original April go-live target Continue Reading
-
News
12 May 2016
IAM central to Deutsche Bank’s digital transformation
Deutsche Bank is using a centralised identity and access management (IAM) system and an application program interface (API) architecture for digital transformation Continue Reading
-
News
09 May 2016
Australian health sector an easy target for cyber criminals, says IBM
A push to encourage greater adoption of electronic health records has raised the spectre of online record theft Continue Reading
-
News
03 May 2016
Gov.uk Verify misses April go-live target
The Government Digital Service didn’t meet its target of taking identity assurance service Verify out of beta by the end of April, but is “nearly there”, according to programme director Janet Hughes Continue Reading
-
News
15 Apr 2016
BBC turns micro:bit computers into IoT devices
The BBC and Nominet demonstrate a new use case for the micro:bit computer and hope to turn Britain’s schoolchildren into internet of things pioneers Continue Reading
-
Feature
23 Mar 2016
How to manage IT access for external users
Identity and access management has extended from being solely an internal IT management process to focus on external business engagement too Continue Reading
-
News
23 Mar 2016
Gov.uk Verify not secure enough for NHS, says HSCIC
The government’s Verify identity verification platform isn’t secure enough for the NHS, so Liverpool Clinical Commissioning Group and HSCIC are working to add extra levels of security Continue Reading
-
News
18 Mar 2016
Australian girls believe online harassment is endemic
There are clear signals that online threats against women and attempts to invade their privacy are becoming societal norms in Australia Continue Reading
-
E-Zine
15 Mar 2016
Robots at your service
In this week’s Computer Weekly, we find out how financial services firms are investing in artificial intelligence to create robo-advisors to help customers with financial advice online. We ask if virtual reality is ready for mainstream business adoption or is still just an over-hyped technology. And we examine the key steps needed to successfully build smart cities using internet of things and networking technologies. Read the issue now. Continue Reading
-
Feature
15 Mar 2016
IAM is the future for managing data security
Why identity and access management is taking centre stage in companies’ access policies Continue Reading
-
News
11 Mar 2016
Royal Mail becomes eighth accredited Gov.uk Verify provider
The Royal Mail is the latest provider to be accredited to support the government’s Gov.uk Verify identity assurance service Continue Reading
-
Opinion
07 Mar 2016
The problem with passwords: how to make it easier for employees to stay secure
An organisation’s IT security can be compromised if staff do not follow a strict policy of using strong passwords to access internal systems Continue Reading
-
Opinion
03 Mar 2016
Security Think Tank: Top five access control mistakes
In the modern business environment, what are the most common access control mistakes and what is the best way to correct them? Continue Reading
-
News
18 Feb 2016
Mobile innovation shifts to smartphone services
As smartphone sales continue to stagnate, suppliers are looking to innovate in more novel ways Continue Reading
-
News
10 Feb 2016
Gov.uk Verify identity system targets 50 government services for April go-live
Government identity assurance system is set to move from beta to live in April, three years after its original target date Continue Reading
-
News
29 Jan 2016
HSBC online services hit by DDoS attack
HSBC was hit by a distributed denial of service (DDoS) attack, which targeted its online personal banking services. Continue Reading
-
News
21 Jan 2016
Candy Crush maker King secures mobile access through cloud
Candy Crush maker King.com uses cloud-based Duo Security authentication for access to cloud services, customised apps and remote VPNs Continue Reading
-
News
19 Jan 2016
Most Android devices running outdated versions
Nearly a third of Android devices in enterprises today are running version 4.0 or older of the operating system, leaving them highly susceptible to vulnerabilities, a study shows Continue Reading
-
News
24 Dec 2015
Top 10 IT security stories of 2015
Computer Weekly looks back at the most significant stories on IT security in the past 12 months Continue Reading
-
Guide
07 Dec 2015
Essential guide to data breaches, the dark web and the hidden data economy
In this guide, we look at the aftermath of a data breach - what do cyber criminals use that stolen data for, and what can companies do to avoid becoming a victim? Continue Reading
-
News
27 Nov 2015
Word ‘smart’ being abused by IoT advocates
Speakers at an event hosted by Cambridge Wireless say the term ‘smart’ is overused to describe connected devices on the internet of things Continue Reading
-
E-Zine
23 Nov 2015
Technology helping to deliver aid for refugees
In this week's Computer Weekly, we find out how technology is helping to deliver vital aid to Syrian refugees in the Middle East. We look at the barriers to achieving the government's aim of a paperless NHS. And the CTO of special effects studio Framestore talks about the IT challenges behind hit movies such as Gravity. Read the issue now. Continue Reading
-
News
29 Oct 2015
M&S data breach forces retailer to temporarily suspend service
A glitch that allowed online customers to see each others' details forced retailer Mark & Spencer to take its website offline while it resolved the issue Continue Reading
-
E-Zine
19 Oct 2015
IT giants Dell and EMC unite
In this week's Computer Weekly, Dell's proposed $67bn acquisition of EMC would be the biggest in the history of IT – we assess the implications. £175bn of IT outsourcing contracts come up for renewal in the next three years- what are your options? And we hear from IT leaders about security and the internet of things. Read the issue now. Continue Reading
-
Feature
15 Oct 2015
The true cost of a cyber security breach in Australia
The costs of cyber security breaches can quickly add up with fines, reputational damage and overhauls to network security all hitting the coffers. The case of one Australian firm shows why paying a ransom to a hacker might be tempting. Continue Reading
-
News
09 Oct 2015
Lack of trust for banks causes NHS rethink over government online identity scheme
NHS trials of the Verify ID assurance system found patients concerned over using banks to allow access to medical data Continue Reading
-
News
08 Oct 2015
Estonian government IT initiative increases virtual population
Estonia is leading the way when it comes to providing easy and secure access to government services for citizens and foreigners alike Continue Reading
-
Photo Story
06 Oct 2015
Aid organisations using technology to help Syrian refugees in the Middle East
Technology is playing a crucial role in supporting humanitarian aid organisations coping with the influx of Syrian refugees in the Middle East Continue Reading
-
Feature
01 Oct 2015
How technology is helping deliver aid to Syrian refugees in the Middle East
The Syrian refugee crisis has engulfed the Middle East, but technology is proving to be an essential tool to help aid organisations support displaced people Continue Reading
-
News
14 Sep 2015
RSA Group flags ID theft risk to Lloyds Bank customers following datacentre storage theft
International insurance group has seen 500 customers take up offer of identity theft protection in wake of datacentre theft Continue Reading
-
News
09 Sep 2015
Conventional security measures hit productivity, study shows
Most IT professionals say context-aware security would improve productivity without compromising security, a survey from Dell reveals Continue Reading
-
News
16 Aug 2015
Mobile phone users at risk as hackers bug and track victims
An investigation by Australian TV show 60 Minutes demonstrates how hackers based thousands of miles away in Germany were able to record the calls of an Australian senator and track his movements Continue Reading
-
News
03 Aug 2015
Why the time is ripe for security behaviour analytics
Recent months have seen an uptick in announcements by security suppliers around behavioural analytics, but what is driving this trend? Continue Reading
-
News
24 Jul 2015
GDS targets three million new users of Gov.uk Verify service in next 12 months
Roll-out of the system for logging in to digital public services is taking longer than expected, but user numbers are expected to grow significantly in 2015 Continue Reading
-
News
07 Jul 2015
Dashlane bullish about the future despite LastPass hack
Password management firm Dashlane is confident its business model will evolve and continue to be relevant even if passwords eventually disappear Continue Reading
-
News
23 Jun 2015
Pharmaceutical companies use BPM to cut cost of clinical trial drugs
Pharmaceutical companies have developed an IT system to secure the supply of medicines they need for clinical studies, saving hundreds of thousands on their drugs bill in the process Continue Reading
-
News
22 Jun 2015
Government Digital Service insists Verify safe despite claims of vulnerabilities
An academic paper suggests the Gov.uk Verify system could be used as a spy network, but the Government Digital Service (GDS) insists this is not the case Continue Reading
-
News
12 Jun 2015
Government preparing to let private sector companies use its Verify identity scheme
The Cabinet Office is talking to banks, insurers and retailers to establish Gov.uk Verify identity assurance as a national scheme Continue Reading
-
News
03 Jun 2015
VMware puts network virtualisation to work in McAfee environments
VMware announces an integrated system to automate distribution and enforcement of McAfee’s network security platform using its NSX network virtualisation system Continue Reading
-
News
29 May 2015
Data classification key to IP protection, says Titus
Data classification can help organisations get more value out of encryption and data loss prevention systems Continue Reading
-
News
29 May 2015
Google announces security features for Android
Google announces better app permission controls and other Android security changes at its Google I/O developer conference Continue Reading
-
News
18 May 2015
Wi-Fi Global Congress: Hotspot 2.0 standard addresses wireless security holes
At Wi-Fi Global Congress, Ruckus Wireless announces it will be first to market with the second release of Hotspot 2.0 Continue Reading
-
News
11 May 2015
PSNGB rebrands to drive information sharing across PSN
PSNGB, the trade association set up to promote the Public Services Network, rebrands itself as Innopsis and says its work is far from over Continue Reading
-
News
07 May 2015
Future IAM will need to be broader, says Martin Kuppinger
Identity and access management systems need to look at all forms of identity, not just employees or users, says KuppingerCole analyst Continue Reading
-
News
29 Apr 2015
Time to embrace a new level of IAM, says Martin Kuppinger
A new level of identity and access management is at hand, yet many businesses still rely on usernames and passwords Continue Reading
-
Feature
25 Apr 2015
Bill Binney, the ‘original’ NSA whistleblower, on Snowden, 9/11 and illegal surveillance
Always a patriot: Computer Weekly talks to Bill Binney, the senior NSA official who blew the whistle before Edward Snowden Continue Reading
-
E-Zine
20 Apr 2015
The future of Moore's Law at 50
In this week's Computer Weekly, Moore's Law – the seminal forecast by Intel founder Gordon Moore that oversees technology development – is 50 years old. We look at its modern relevance and future implications. IT chiefs discuss whether Windows is still core to their strategy. And we look back at five years of government IT. Read the issue now. Continue Reading
-
News
08 Apr 2015
Exit checks system for UK borders finally goes live
The Home Office launches a system for making exit checks of travellers at UK borders, following the scrapped e-Borders programme Continue Reading
-
News
25 Mar 2015
UK government adds five authentication providers to Gov.uk Verify identity management system
The Government Digital Service (GDS) adds five authentication providers to the Gov.uk Verify identity and access management scheme Continue Reading
-
News
27 Feb 2015
Case study: Norwegian insurer invests in Darktrace machine-learning cyber defence
Shipping insurance company DNK hopes to inspire the rest of the shipping industry to adopt Darktrace’s cyber defence system Continue Reading
-
News
20 Feb 2015
BlackBerry 10.3.1 review: Access Android apps and Blend
BlackBerry has finally released version 10.3.1 of its mobile operating system, which gives access to the Amazon Android app store Continue Reading
-
News
02 Feb 2015
Former Capital One data analysts charged with mining customer data
US financial services regulator SEC charges two former employees of financial services firm Capital One with insider trading Continue Reading
-
News
17 Dec 2014
Cabinet Office begins procurement for next stage of Gov.uk Verify
The Cabinet Office has submitted a tender notice for a £150m three-year framework for the provision of identity assurance services Continue Reading
-
News
17 Dec 2014
US interception in the EU faces new legal challenges
US government orders against Microsoft to hand over email data 'infringes privacy legislation' in other countries Continue Reading
-
E-Zine
08 Dec 2014
The most influential people in UK IT 2014
In this week's Computer Weekly, we unveil the 50 most influential people in UK IT for 2014, and interview the winner of our UKtech50 list, Unilever's global CIO, Jane Moran. We examine how Cisco is responding to software-defined networking. And we hear from IT chiefs successfully implementing identity and access management. Read the issue now. Continue Reading
-
News
28 Nov 2014
CGI secures communications between pilots and air traffic control
Satellite communications firm Inmarsat has outsourced the provision of security IT and services to CGI Continue Reading
-
Feature
14 Nov 2014
The business challenges and benefits of identity and access management
IT leaders gathered at a CW500 Club meeting to hear from peers about the challenges of identity and access management Continue Reading