Identity and access management products
- 
				News
					30 Oct 2025
					
									
										  Yubico bolsters APAC presence, touts device subscriptionsYubico is moving beyond one-off product sales, hiring local teams in Singapore and pitching its subscription service to help enterprises secure employee access to corporate networks and applications Continue Reading By- Aaron Tan, Informa TechTarget
 
- 
				News
					29 Oct 2025
					
									
										  Rapid7: Cyber defences stuck in the 1980s as threats mountThe company’s chief product officer notes that many defence tactics are still stuck in the past, urging organisations to adopt AI-driven security platforms to improve threat detection and response Continue Reading 
- 
                E-Zine
                19 Nov 2024
                  Adventures in AI at TripadvisorIn this week’s Computer Weekly, we find out how travel site Tripadvisor is embracing AI to offer new products and services to its users. Gartner says the chance of a successful digital project is like ‘flipping a coin’ – we went to its annual IT leadership symposium to ask why. And we examine what companies must do to comply with the EU’s new NIS2 cyber security rules. Read the issue now. Continue Reading 
- 
                News
                18 Nov 2024
                  AWS widening scope of MFA programme after early successAWS reports strong take-up of multi-factor authentication among customers since making it compulsory for root users earlier this year, and plans to expand the scope of its IAM programme in spring 2025 Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                18 Nov 2024
                  Denmark’s AI-powered welfare system fuels mass surveillanceResearch reveals the automated tools used to flag individuals for benefit fraud violate individuals’ privacy and risk discriminating against marginalised groups Continue Reading By- Josh Osman, Computer Weekly
 
- 
                Definition
                18 Nov 2024
                  What is acceptable use policy (AUP)?An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to or use of a corporate network, the internet or other computing resources. Continue Reading By
- 
                News
                14 Nov 2024
                  MPs hold first ever debate on live facial recognitionMPs have held an open debate on police use of live facial recognition technology for the first time since it was initially deployed by the Met Police in August 2016 Continue Reading By- Sebastian Klovig Skelton, Data & ethics editor
 
- 
                News
                14 Nov 2024
                  Ping CEO on ForgeRock integration and future of identityPing Identity CEO Andre Durand discusses the company’s unified roadmap, commitment to customer stability and growth plans in the evolving identity landscape following the merger with ForgeRock Continue Reading By- Aaron Tan, Informa TechTarget
 
- 
                Opinion
                12 Nov 2024
                  Strengthening cyber: Best IAM practices to combat threatsThe Security Think Tank considers best practices in identity and access management and how can they be deployed to enable IT departments to combat cyber-attacks, phishing attacks and ransomware Continue Reading By- Andrew Peel, Scott Swalling, PA Consulting
 
- 
                News
                12 Nov 2024
                  Police cloud project raises data protection concerns despite legal reformsOngoing data protection issues with the use of hyperscale public cloud infrastructure by UK police could complicate the ambitions of nine forces to move their common records management system into the cloud Continue Reading By- Sebastian Klovig Skelton, Data & ethics editor
 
- 
                11 Nov 2024
                  IAM: Enterprises face a long, hard road to improvePoor identity and access management puts enterprise data at risk, but the path to stronger IAM remains complex Continue Reading 
- 
                News
                11 Nov 2024
                  Fresh concerns over NHS England registries procurementClinicians and technologists behind a number of medical devices registries being brought together by NHS England on a new common platform have accused the health service of flouting public sector procurement regulations Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Feature
                11 Nov 2024
                  IAM: Enterprises face a long, hard road to improvePoor identity and access management puts enterprise data at risk, but the path to stronger IAM remains complex Continue Reading 
- 
                Feature
                08 Nov 2024
                  Beyond VPNs: The future of secure remote connectivityAs more companies adopt cloud services and remote work, the limitations of VPNs are becoming obvious. We explore what’s next for secure remote connectivity Continue Reading By
- 
                News
                07 Nov 2024
                  Google Cloud MFA enforcement meets with approvalLatest Google Cloud policy to enforce multifactor authentication across its user base is welcomed by security professionals Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                07 Nov 2024
                  Interview: Petra Molnar, author of ‘The walls have eyes’Refugee lawyer and author Petra Molnar speaks to Computer Weekly about the extreme violence people on the move face at borders across the world, and how increasingly hostile anti-immigrant politics is being enabled and reinforced by a ‘lucrative panopticon’ of surveillance technologies Continue Reading By- Sebastian Klovig Skelton, Data & ethics editor
 
- 
                News
                06 Nov 2024
                  Lords shoplifting inquiry calls for facial recognition lawsA Lords committee has expressed concern about the use of facial recognition technology by retailers to combat shoplifting, and is calling on the government to introduce new laws to ensure there are minimum standards for their deployments Continue Reading By- Sebastian Klovig Skelton, Data & ethics editor
 
- 
                News
                06 Nov 2024
                  Starmer announces tech-enabled crackdown on people smugglingThe UK government has announced a further £75m of funding for its Border Security Command, meaning it will now have £150m over two years to spend on new technologies and staff Continue Reading By- Sebastian Klovig Skelton, Data & ethics editor
 
- 
                Opinion
                05 Nov 2024
                  User-centric security should be core to cloud IAM practiceThe Security Think Tank considers best practices in identity and access management and how can they be deployed to enable IT departments to combat cyber-attacks, phishing attacks and ransomware Continue Reading 
- 
                Definition
                31 Oct 2024
                  What is face detection and how does it work?Face detection, also called facial detection, is a computer technology that identifies human faces in digital images and video. Continue Reading By- Robert Sheldon
- Nick Barney, Technology Writer
- Corinne Bernstein
 
- 
                Opinion
                30 Oct 2024
                  IAM best practices for cloud environments to combat cyber attacksThe Security Think Tank considers best practices in identity and access management and how can they be deployed to enable IT departments to combat cyber-attacks, phishing attacks and ransomware Continue Reading By- Varun Prasad, ISACA
 
- 
                Definition
                28 Oct 2024
                  What is two-factor authentication (2FA)?Two-factor authentication (2FA), sometimes referred to as two-step verification or dual-factor authentication, is a security process in which users provide two different authentication factors to verify themselves. Continue Reading By- Paul Kirvan
- Peter Loshin, Former Senior Technology Editor
- Michael Cobb
 
- 
                News
                25 Oct 2024
                  Dutch critical infrastructure at risk despite high leadership confidenceStark paradox in Dutch cyber security landscape has business leaders expressing high confidence in their IT infrastructure as cyber attacks rise Continue Reading By- Kim Loohuis
 
- 
                News
                22 Oct 2024
                  Danish government reboots cyber security council amid AI expansionDenmark’s government relaunches digital security initiative to protect business sectors and society at large Continue Reading By- Gerard O'Dwyer
 
- 
                News
                21 Oct 2024
                  Can AI be secure? Experts discuss emerging threats and AI safetyInternational cyber security experts call for global cooperation and proactive strategies to address the security challenges posed by artificial intelligence Continue Reading By- Aaron Tan, Informa TechTarget
 
- 
                Feature
                15 Oct 2024
                  Reinventing security operations for the modern threat landscapeThe growing pace of digital transformation has opened new avenues for attackers, making traditional security measures obsolete. Organisations must modernise their security operations to fortify their defences and navigate the evolving threat landscape Continue Reading By- Aaron Tan, Informa TechTarget
 
- 
                Opinion
                11 Oct 2024
                  Robust cloud IAM should align to zero-trust principlesThe Security Think Tank considers best practices in identity and access management and how can they be deployed to enable IT departments to combat cyber-attacks, phishing attacks and ransomware. Continue Reading By- Ricky Simpson, Quorum Cyber
 
- 
                News
                10 Oct 2024
                  UK and US pledge closer working on children’s online safetyIn their first agreement on the subject of children’s online safety, the UK and US governments have said they will create a new working group to boost cooperation Continue Reading By- Sebastian Klovig Skelton, Data & ethics editor
 
- 
                News
                03 Oct 2024
                  Microsoft files lawsuit to seize domains used by Russian spooksMicrosoft has been given permission to seize multiple domains used by the Russian state threat actor Star Blizzard as part of a coordinated disruption effort undertaken ahead of the US elections Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                02 Oct 2024
                  Amazon Mechanical Turk workers suspended without explanationA likely glitch in Amazon Payments resulted in hundreds of Mechanical Turk workers being suspended from the platform without proper explanation or pay Continue Reading By- Sebastian Klovig Skelton, Data & ethics editor
 
- 
                Definition
                27 Sep 2024
                  What is access control?Access control is a security technique that regulates who or what can view or use resources in a computing environment. Continue Reading By- Gavin Wright
- Ben Lutkevich, Site Editor
 
- 
                News
                27 Sep 2024
                  UK on high alert over Iranian spear phishing attacks, says NCSCThe NCSC and counterpart agencies in the US have issued a warning over enhanced Iranian spear phishing activity targeting politicians, journalists, activists and others with an interest in Middle Eastern affairs Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                23 Sep 2024
                  Microsoft shares progress on Secure Future InitiativeMicrosoft has published a progress report on its Secure Future Initiative, launched last year in the wake of multiple security incidents, and made a series of commitments to improve its internal cyber culture Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                23 Sep 2024
                  Home Office eVisa scheme is ‘broken’, says Open Rights GroupDigital rights campaigners say the Home Office’s plan to make its new electronic Visa scheme a real-time online-only process is part and parcel of the 'hostile environment' around immigration status Continue Reading By- Sebastian Klovig Skelton, Data & ethics editor
 
- 
                Opinion
                23 Sep 2024
                  Gartner: Mitigating security threats in AI agentsAgents represent a step-change in the use of artificial intelligence in the enterprise - as attendees at Salesforce's annual conference saw first hand this month - but do not come without their risks Continue Reading By- Avivah Litan, Gartner
 
- 
                News
                18 Sep 2024
                  Europol provides detail on Ghost encrypted comms platform takedownLaw enforcement bodies from across the world have revealed how they collaborated to bring down encrypted network Ghost and the new ways of working that have been established with Europol at the centre Continue Reading By- Sebastian Klovig Skelton, Data & ethics editor
 
- 
                Definition
                17 Sep 2024
                  What is passive keyless entry (PKE)?Passive keyless entry (PKE) is an automotive security system that operates automatically when the user is in proximity to the vehicle, unlocking the door on approach or when the door handle is pulled, and locking it when the user walks away or touches the car on exit. Continue Reading 
- 
                News
                17 Sep 2024
                  First CyberBoost Catalyse startup cohort namedThe first group of companies named to a cyber incubator programme run by Plexal and the National University of Singapore includes two growing UK businesses Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Feature
                16 Sep 2024
                  Will autonomous weapons make humans passive participants in war?Experts warn the emergence and adoption of AI-powered military systems may eventually push battlefield decision-making beyond the limits of human cognition Continue Reading By- Kyle Hiebert, Computer Weekly
 
- 
                News
                13 Sep 2024
                  Cyber workforce must almost double to meet global talent needResearch from ISC2 finds global cyber workforce needs additional 4.8 million people to fully secure businesses Continue Reading By- Clare McDonald, Business Editor
 
- 
                News
                12 Sep 2024
                  Data sharing for immigration raids ferments hostility to migrantsData sharing between public and private bodies for the purposes of carrying out immigration raids helps to prop up the UK’s hostile environment by instilling an atmosphere of fear and deterring migrants from accessing public services Continue Reading By- Sebastian Klovig Skelton, Data & ethics editor
 
- 
                Opinion
                09 Sep 2024
                  Developing nations need the UN cyber crime treaty to passThe UN cyber crime treaty is flawed but represents a move in the right direction for developing nations seeking greater digital sovereignty Continue Reading By- Kyle Hiebert, Computer Weekly
 
- 
                News
                05 Sep 2024
                  Tencent Cloud debuts palm scanning tech in global marketsTencent Cloud launches palm verification technology for global markets, offering AI-driven identity authentication to support contactless payments and security access management Continue Reading By- Aaron Tan, Informa TechTarget
 
- 
                News
                04 Sep 2024
                  Retailers question using live facial recognition for shopliftingRetailers praise benefits of retrospective over live facial recognition in dealing with shoplifting, but stress there are ongoing concerns around the ethical, legal and safety implications of using the technology in stores Continue Reading By- Sebastian Klovig Skelton, Data & ethics editor
 
- 
                News
                30 Aug 2024
                  Norwegian Refugee Council leverages Okta for Good cyber schemePietro Galli, CIO of the Norwegian Refugee Council, reveals how the globally distributed NGO has been taking advantage of the Okta for Good CSR programme to improve its own cyber security and data protection practice, and elevate good practice in the third sector Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                29 Aug 2024
                  Met Police deploy LFR in Lewisham without community inputThe Met’s latest live facial recognition deployment in Catford has raised concerns over the lack of community engagement around the police force’s use of the controversial technology Continue Reading By- Sebastian Klovig Skelton, Data & ethics editor
 
- 
                News
                28 Aug 2024
                  Iranian APT Peach Sandstorm teases new Tickler malwarePeach Sandstorm, an Iranian state threat actor, has developed a dangerous new malware strain that forms a key element of a rapidly evolving attack sequence Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                28 Aug 2024
                  Global cyber spend to rise 15% in 2025, pushed along by AISecurity spending will increase at pace in 2025, with artificial intelligence, cloud and consultancy services all pushing outlay to new highs, according to Gartner Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                22 Aug 2024
                  New Qilin tactics a ‘bonus multiplier’ for ransomware chaosSophos X-Ops caught the Qilin ransomware gang stealing credentials stored by victims' employees in Google Chrome, heralding further cyber attacks and breaches down the line. Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Opinion
                20 Aug 2024
                  From manifesto to material: What No. 10 needs to make realityWith Labour returning to 10 Downing Street after 14 years, the Computer Weekly Security Think Tank panellists share advice and wish lists for the new government Continue Reading By- Paul Lewis, Nominet
 
- 
                News
                16 Aug 2024
                  Thousands of NetSuite customers accidentally exposing their dataMisconfigured permissions across live websites are leaving thousands of NetSuite users open to having their valuable customer data stolen, researchers say Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                16 Aug 2024
                  Campaigners criticise Starmer post-riot public surveillance plansA UK government programme to expand police facial recognition and information sharing after racist riots is attracting criticism from campaigners for exploiting the far-right unrest to generally crack down on protest and increase surveillance Continue Reading By- Sebastian Klovig Skelton, Data & ethics editor
 
- 
                Opinion
                15 Aug 2024
                  Google's cookie conundrum: What comes next?Google's revised approach to third-party cookies shouldn't come as a surprise, and may also be welcome Continue Reading By- Christian Ward
 
- 
                News
                14 Aug 2024
                  Automated police tech contributes to UK structural racism problemCivil society groups say automated policing technologies are helping to fuel the disparities that people of colour face across the criminal justice sector, as part of wider warning about the UK’s lack of progress in dealing with systemic racism Continue Reading By- Sebastian Klovig Skelton, Data & ethics editor
 
- 
                News
                13 Aug 2024
                  NIST debuts three quantum-safe encryption algorithmsNIST has launched the first three quantum-resistant encryption algorithms, and as the threat of quantum-enabled cyber attacks grows greater, organisations are encouraged to adopt them as soon as they can Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Feature
                09 Aug 2024
                  Deep dive into quantum-resistant cryptography for email securityQuantum computers have the potential to crack many of the encryption methods we currently rely on to keep our digital communications safe. Quantum-resistant cryptography may be the answer Continue Reading By
- 
                News
                06 Aug 2024
                  Advanced faces fine over LockBit attack that crippled NHS 111Advanced Software faces a multimillion pound fine for a series of failings which directly led to a 2022 LockBit ransomware attack that disrupted NHS and social care services across the UK Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                31 Jul 2024
                  Breach costs soar as record ransomware payment madeIBM publishes data on the spiralling costs of cyber attacks and data breaches, while researchers identify what appears to be the largest ransomware payment ever made Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                29 Jul 2024
                  WTO digital trade agreement aims to modernise global commerceA digital trade deal negotiated over five years at the World Trade Organization has been signed by 91 countries, laying the groundwork for a new global digital trade regime Continue Reading By- Sebastian Klovig Skelton, Data & ethics editor
 
- 
                News
                26 Jul 2024
                  Ban predictive policing and facial recognition, says civil societyA coalition of civil society groups is calling for an outright ban on predictive policing and biometric surveillance in the UK Continue Reading By- Sebastian Klovig Skelton, Data & ethics editor
 
- 
                News
                24 Jul 2024
                  Mimecast to buy insider threat specialist Code42Mimecast is to buy fellow human-centred risk experts Code42 for an undisclosed sum to take advantage of its insider threat and data loss protection specialisms Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Feature
                23 Jul 2024
                  Enhancing mobile app security with behaviour-based biometricsBehavioural-based biometrics offer tantalising advantages over more traditional biometric solutions. Learn about some of the benefits and potential challenges for safe and secure implementation Continue Reading By
- 
                18 Jul 2024
                  European Digital Identity Wallet: One ID for EU citizensThe European Digital Identity Wallet is a personal digital wallet with which you will be able to identify yourself digitally in the future. Is this the solution for a centralised ID? Continue Reading 
- 
                News
                17 Jul 2024
                  How iProov is fending off deepfake fraudFacial biometrics and controlled illumination can detect liveness, verify identities and help prevent deepfake attacks Continue Reading By- Aaron Tan, Informa TechTarget
 
- 
                News
                16 Jul 2024
                  Incubator Plexal heads to Singapore for CyberBoostCyber startup hub Plexal expands its presence to Singapore through a new initiative, and sets its sights on helping new UK businesses break into the booming Asia-Pacific market Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                12 Jul 2024
                  AT&T loses ‘nearly all’ phone records in Snowflake breachHackers have stolen records of virtually every call made by AT&T's customers during a six-month period in 2022, after compromising the US telco's Snowflake data environment Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                12 Jul 2024
                  Public awareness of ID security grows, but big obstacles remainConsumers are improving their awareness of the issues around digital identity security, but there are still some big issues preventing many from doing better, according to an Okta report Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                11 Jul 2024
                  Dutch research firm TNO pictures the SOC of the futureIn only a few years, security operations centres will have a different design and layout, and far fewer will remain Continue Reading By- Kim Loohius
 
- 
                News
                09 Jul 2024
                  Atos jumps on ‘moving train’ for Euro 2024Atos provides the IT supporting major recurring sporting events including Uefa’s European Football Championship Continue Reading By- Karl Flinders, Chief reporter and senior editor EMEA
 
- 
                News
                08 Jul 2024
                  Synnovis attack highlights degraded, outdated state of NHS ITMore cyber attacks against the health service are likely, and will succeed if something isn’t done to address the increasingly elderly NHS IT estate, experts are warning Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                28 Jun 2024
                  How Recorded Future is operationalising threat intelligenceRecorded Future is investing in APIs to enable automated security workflows, among other measures, to help organisations overcome the hurdles of operationalising threat intelligence Continue Reading By- Aaron Tan, Informa TechTarget
 
- 
                News
                26 Jun 2024
                  Police Scotland did not consult ICO about high-risk cloud systemPolice Scotland chose not to formally consult with the data regulator about the risks identified with a cloud-based digital evidence sharing system, while the regulator itself did not follow up for nearly three months Continue Reading By- Sebastian Klovig Skelton, Data & ethics editor
 
- 
                Definition
                25 Jun 2024
                  digital signatureA digital signature is a mathematical technique used to validate the authenticity and integrity of a digital document, message or software. Continue Reading By- Cameron Hashemi-Pour, Former Site Editor
- Alexander S. Gillis, Technical Writer and Editor
- Ben Lutkevich, Site Editor
 
- 
                News
                24 Jun 2024
                  Sellafield pleads guilty to criminal charges over cyber securityNuclear Decommissioning Authority-backed organisation Sellafield Ltd pleads guilty to criminal charges brought over significant cyber security failings that could have compromised sensitive nuclear information Continue Reading By- Sebastian Klovig Skelton, Data & ethics editor
 
- 
                Definition
                21 Jun 2024
                  OpenID (OpenID Connect)OpenID Connect is an open specification for authentication and single sign-on (SSO). Continue Reading By
- 
                News
                19 Jun 2024
                  Microsoft admits no guarantee of sovereignty for UK policing dataDocuments show Microsoft’s lawyers admitted to Scottish policing bodies that the company cannot guarantee sensitive law enforcement data will remain in the UK, despite long-standing public claims to the contrary Continue Reading By- Sebastian Klovig Skelton, Data & ethics editor
 
- 
                Feature
                17 Jun 2024
                  Autonomous weapons systems defy rigid attempts at arms controlIn an ever more dangerous world, the technology is outpacing diplomacy and holds clear strategic value. Retaining human control over its use will require embracing imperfect solutions Continue Reading By- Kyle Hiebert, Computer Weekly
 
- 
                News
                11 Jun 2024
                  Pure Storage hit by Snowflake credential hackersPure Storage emerges as the latest victim of a fast-spreading breach of Snowflake customers targeting users with lax credential security measures in place Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                11 Jun 2024
                  More than 160 Snowflake customers hit in targeted data theft spreeMandiant reports that more than 160 Snowflake customers have been hit in a broad data theft and extortion campaign targeting organisations that have failed to pay proper attention to securing valuable credentials Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Blog Post
                08 Jun 2024
                  The future of identity in print infrastructure managementThe use of identity-centric infrastructure access management is set to play a critical role in fortifying the printing environment. Continue Reading By- Louella Fernandes, Quocirca
 
- 
                Blog Post
                08 Jun 2024
                  The future of identity in print infrastructure managementIdentity-centric infrastructure access management is set to play a critical role in fortifying the printing environment. Continue Reading By- Louella Fernandes, Quocirca
 
- 
                News
                03 Jun 2024
                  97 FTSE 100 firms exposed to supply chain breachesBetween March 2023 and March 2024, 97 out of 100 companies on the UK’s FTSE 100 list were put at risk of compromise following supply chain breaches at third-party suppliers Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                03 Jun 2024
                  Major breaches allegedly caused by unsecured Snowflake accountsSignificant data breaches at Ticketmaster and Santander appear to have been orchestrated through careful targeting of the victims’ Snowflake cloud data management accounts Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                29 May 2024
                  Storebrand divests from IBM over supply of biometrics to IsraelNorwegian asset manager Storebrand’s decision to divest from IBM comes amid growing scrutiny of the role technology companies play in Israel’s human rights abuses Continue Reading 
- 
                Definition
                15 May 2024
                  out-of-band authenticationOut-of-band authentication is a type of two-factor authentication (2FA) that requires a secondary verification method through a separate communication channel along with the typical ID and password. Continue Reading By- Nick Barney, Technology Writer
 
- 
                Opinion
                09 May 2024
                  Zero Trust: Unravelling the enigma and charting the futureA special interest group aims to start a long-overdue discourse on the merits, dangers, costs, and development of Zero Trust and IAM in information security Continue Reading By
- 
                News
                09 May 2024
                  Ofcom publishes draft online child safety rules for tech firmsIn the draft codes, Ofcom calls on technology firms to use ‘robust’ age-checking and content moderation systems to keep harmful material away from children online Continue Reading By- Sebastian Klovig Skelton, Data & ethics editor
 
- 
                News
                06 May 2024
                  Microsoft beefs up cyber initiative after hard-hitting US reportMicrosoft is expanding its recently launched Secure Future Initiative in the wake of a hard-hitting US government report on recent nation state intrusions into its systems Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                03 May 2024
                  Why IAM is central to cyber securityBeyondTrust’s chief security strategist talks up the importance of identity and access management, and the role of cyber insurance in driving security improvements Continue Reading 
- 
                News
                02 May 2024
                  Dropbox Sign user information accessed in data breachAccount data belonging to Dropbox Sign users was accessed by an unknown threat actor after they hacked into the organisation’s backend infrastructure Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                02 May 2024
                  How Okta is fending off identity-based attacksOkta has been bolstering the security of its own infrastructure and building new tools to scan customer environments for vulnerable identities, among other efforts to fend off identity-based attacks Continue Reading By- Aaron Tan, Informa TechTarget
 
- 
                News
                01 May 2024
                  EMEA CISOs must address human factors behind cyber incidentsThe 17th annual Verizon report on data breaches makes for sobering reading for security pros, urging them to do more to address the human factors involved in cyber incidents, and highlighting ongoing issues with zero-day patching Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                30 Apr 2024
                  Keeper to help Williams F1 keep up with cyber challengesKeeper Security signs up to support F1 team Williams Racing with credential management ahead of the 2024 Miami Grand Prix Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                30 Apr 2024
                  Global majority united on multilateral regulation of AI weaponsForeign ministers and civil society representatives say that multilateralism is key to controlling the proliferation and use of AI-powered autonomous weapons, but that a small number of powerful countries are holding back progress Continue Reading By- Sebastian Klovig Skelton, Data & ethics editor
 
- 
                Definition
                29 Apr 2024
                  digital identityA digital identity is the body of information about an individual, organization or electronic device that exists online. Continue Reading 
- 
                News
                29 Apr 2024
                  UK’s long-awaited device security law kicks inThe Product Security and Telecommunications Infrastructure Act has become law across the UK, enforcing basic cyber security standards across connected products sold to the public Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                26 Apr 2024
                  Post Office ‘lied’ to subpostmasters when forced to meet them, says former federation representativePost Office executives were forced to meet subpostmasters to discuss an unexplained error in their branch, then misled the branch managers over remote access Continue Reading By- Karl Flinders, Chief reporter and senior editor EMEA
 
- 
                News
                25 Apr 2024
                  Zero trust is a strategy, not a technologyZero-trust security should be seen as a strategy to protect high-value assets and is not tied to a specific technology or product, says the model’s creator John Kindervag Continue Reading By- Aaron Tan, Informa TechTarget
 
- 
                News
                24 Apr 2024
                  Mandatory MFA pays off for GitHub and OSS communityMandating multifactor authentication for select developers has been a huge success for GitHub, the platform reports, and now it wants to go further Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                18 Apr 2024
                  Gov.uk One Login accounts on the riseSince August 2023, more than 1.8 million people verified their identity using the Gov.uk One Login app, while face-to-face verifications have also increased Continue Reading By
- 
                News
                16 Apr 2024
                  CW Innovation Awards: Balancing security and user experienceThe National University of Singapore’s Safe initiative has strengthened the security of IT systems and end-user devices while prioritising user experience through passwordless access Continue Reading By
- 
                News
                16 Apr 2024
                  Recognising APAC’s trailblazers in digital transformationDBS Bank and NUS were among the top industry innovators that were lauded for various transformational initiatives at the Computer Weekly Innovation Awards APAC 2024 Continue Reading By- Aaron Tan, Informa TechTarget
 

 
		