Network security management
-
News
13 Dec 2024
How AWS is protecting customers from cyber threats
Amazon Web Services reveals how its threat intelligence capabilities work under the hood to thwart cyber attacks and keep its customers’ data safe Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
12 Dec 2024
CISOs: Don’t rely solely on technical defences in 2025
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
-
News
10 Dec 2024
Dangerous CLFS and LDAP flaws stand out on Patch Tuesday
Microsoft has fixed over 70 CVEs in its final Patch Tuesday update of the year, and defenders should prioritise a zero-day in the Common Log File System Driver, and another impactful flaw in the Lightweight Directory Access Protocol Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
10 Dec 2024
Defending against cyber grinches: AI for enhanced security
On the Seventh Day of AI, Defending against cyber grinches: AI for enhanced security, we explore the double-edged sword of AI in cybersecurity and how businesses can protect themselves against the cyber grinches. Continue Reading
By- Justin Young, ANS
-
News
10 Dec 2024
Top IT predictions in APAC in 2025
Enterprises across the Asia-Pacific region are expected to focus on securing their AI workloads, invest in energy efficient infrastructure and rethink their platform strategy, among other tech trends in the new year Continue Reading
By- Aaron Tan, TechTarget
-
E-Zine
10 Dec 2024
On the road to change at Aston Martin
In this week’s Computer Weekly, we talk to the CIO at luxury car maker Aston Martin to find out how technology is helping tackle the huge challenges facing the automotive sector. The new National Cyber Security boss explains why organisations need to be extra vigilant against the growing online threats. And we examine the future of secure remote connectivity in the cloud era. Read the issue now. Continue Reading
-
Opinion
06 Dec 2024
Six trends that will define cyber through to 2030
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Pierre-Martin Tardif, ISACA
-
News
06 Dec 2024
TfL cyber attack cost over £30m to date
TfL provides more detail on the financial impact of the September 2024 cyber attack that crippled several of its online systems Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Dec 2024
Shared digital gateway was source of three NHS ransomware attacks
Alder Hey children’s hospital confirms ransomware operators accessed its systems through a shared digital gateway, but is standing firm in the face of the gang’s demands Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
04 Dec 2024
The most pressing challenges for CISOs and cyber security teams
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Elliot Rose, PA Consulting
-
News
04 Dec 2024
Nordics move to deepen cyber security cooperation
Nordic countries are increasing collaboration on cyber security amid more sophisticated and aggressive attacks Continue Reading
By- Gerard O'Dwyer
-
News
03 Dec 2024
US updates telco security guidance after mass Chinese hack
Following the widespread Salt Typhoon hacks of US telecoms operators including AT&T and Verizon, CISA and partner agencies have launched refreshed security guidance for network engineers and defenders alike Continue Reading
By- Alex Scroxton, Security Editor
-
News
02 Dec 2024
APAC businesses face cyber onslaught
The Asia-Pacific region is a cyber security hotspot, enduring significantly more cyber attacks than the global average, with AI-powered threats and skills shortages exacerbating the problem Continue Reading
-
News
02 Dec 2024
NCSC boss calls for ‘sustained vigilance’ in an aggressive world
NCSC CEO Richard Horne is to echo wider warnings about the growing number and severity of cyber threats facing the UK as he launches the security body’s eighth annual report Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
02 Dec 2024
CISOs will face growing challenges in 2025 and beyond
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Mike Gillespie and Ellie Hurst, Advent IM
-
News
26 Nov 2024
Sellafield operator opens dedicated cyber centre
The UK’s Nuclear Decommissioning Authority has opened a cyber security centre spanning its activities across the nuclear sector Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Nov 2024
BT unveils managed SASE service
Telecoms provider expands managed software-defined wide area network solution with new security service edge capabilities to help businesses transition to a secure access service edge model Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Definition
25 Nov 2024
What is IPsec (Internet Protocol Security)?
IPsec (Internet Protocol Security) is a suite of protocols and algorithms for securing data transmitted over the internet or any public network. Continue Reading
By- Katie Terrell Hanna
- Peter Loshin, Former Senior Technology Editor
-
Definition
25 Nov 2024
What is Extensible Authentication Protocol (EAP)?
Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by Point-to-Point Protocol (PPP), a protocol often used when connecting a computer to the internet. Continue Reading
-
News
25 Nov 2024
Geopolitical strife drives increased ransomware activity
The lines between financially motivated cyber criminals and nation state APTs are rapidly blurring, as geopolitical influences weigh heavily on the threat landscape, according to data from NCC Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
22 Nov 2024
What is endpoint detection and response (EDR)?
Endpoint detection and response (EDR) is a system that gathers and analyzes security threat-related information from computer workstations and other endpoints. Continue Reading
By- Nick Barney, Technology Writer
- Gavin Wright
- Alexander S. Gillis, Technical Writer and Editor
-
News
21 Nov 2024
BianLian cyber gang drops encryption-based ransomware
The Australian and American cyber authorities have published updated intelligence on the BianLian ransomware gang, which has undergone a rapid evolution in tactics Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Nov 2024
AI readiness stalls in APAC
Despite significant investment in AI, only 15% of organisations in Asia-Pacific are ready to deploy the technology today, according to Cisco’s latest regional AI readiness survey Continue Reading
-
Feature
19 Nov 2024
Storage technology explained: Ransomware and storage and backup
We look at ransomware attacks, and the importance of good backup practice as well as immutable snapshots, air-gapping, network segmentation, AI anomaly detection and supplier warranties Continue Reading
By- Antony Adshead, Storage Editor
-
Definition
18 Nov 2024
What is a spam trap?
A spam trap is an email address that's used to identify and monitor spam email. It's also a type of honeypot because it uses a fake email address to bait spammers. Continue Reading
By- Scott Robinson, New Era Technology
- Ben Lutkevich, Site Editor
-
News
13 Nov 2024
China’s Volt Typhoon rebuilds botnet in wake of takedown
Nine months after its malicious botnet comprising legacy routers was disrupted by the Americans, Chinese APT Volt Typhoon is rebuilding and presents as persistent a threat as ever Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
08 Nov 2024
Beyond VPNs: The future of secure remote connectivity
As more companies adopt cloud services and remote work, the limitations of VPNs are becoming obvious. We explore what’s next for secure remote connectivity Continue Reading
By -
News
01 Nov 2024
CISA looks to global collaboration as fraught US election begins
The US' CISA cyber agency has unveiled a two-year International Strategic Plan to advance collaboration and improve resilience against shared risks and threats Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Oct 2024
Dutch critical infrastructure at risk despite high leadership confidence
Stark paradox in Dutch cyber security landscape has business leaders expressing high confidence in their IT infrastructure as cyber attacks rise Continue Reading
By- Kim Loohuis
-
News
25 Oct 2024
How Infoblox is tackling multicloud complexity and boosting security
Infoblox CEO Scott Harrell discusses the company’s new Universal DDI service designed to address the growing challenges of managing network security in hybrid IT environments Continue Reading
By- Aaron Tan, TechTarget
-
News
22 Oct 2024
Danish government reboots cyber security council amid AI expansion
Denmark’s government relaunches digital security initiative to protect business sectors and society at large Continue Reading
By- Gerard O'Dwyer
-
News
16 Oct 2024
Cato further expands SASE platform for ‘complete’ UK delivery
Secure access service edge platform gains digital experience monitoring capability so enterprises can monitor user experiences and fix them online or in private datacentres Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Feature
15 Oct 2024
Reinventing security operations for the modern threat landscape
The growing pace of digital transformation has opened new avenues for attackers, making traditional security measures obsolete. Organisations must modernise their security operations to fortify their defences and navigate the evolving threat landscape Continue Reading
By- Aaron Tan, TechTarget
-
News
15 Oct 2024
Telefónica and Halotech integrate post-quantum encryption into IoT devices
Leading global telco implements state-of-the-art cyber security through internet of things managed connectivity platform allowing devices to be controlled and monitored in real time and remotely Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
11 Oct 2024
NFL and Cisco gain yardage with network and security partnership
Cisco scores contract extension with US sports body NFL to connect and protect 2024 roster of International Games in the UK, Germany, Brazil and Spain in 2025 Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
10 Oct 2024
NCSC issues fresh alert over wave of Cozy Bear activity
The NCSC, FBI and NSA publish updated warning about Cozy Bear’s activities, highlighting a range of vulnerabilities the threat actor is using to set up its cyber attacks Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Oct 2024
Government launches cyber standard for local authorities
Local government bodies are being invited to take advantage of a new NCSC-derived Cyber Assessment Framework to help enhance their resilience and ward off cyber attacks Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Oct 2024
How Recorded Future finds ransomware victims before they get hit
Threat intel specialists at Recorded Future have shared details of newly developed techniques they are using to disrupt Rhysida ransomware attacks before the gang even has a chance to execute them Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Oct 2024
Secureworks: Ransomware takedowns didn’t put off cyber criminals
The number of active cyber criminal ransomware gangs has surged by almost a third in the space of 12 months, according to the latest intelligence from Secureworks Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Oct 2024
UK’s cyber incident reporting law to move forward in 2025
The UK government says that enforced cyber incident and ransomware reporting for critical sectors of the economy will help to build a better picture of the threat landscape and enable more proactive and preventative responses Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Oct 2024
UK telcos including BT at risk from DrayTek router vulnerabilities
A series of vulnerabilities in DrayTek's Vigor router product lines affects multiple comms service providers in the UK, according to new analysis Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Oct 2024
NCSC celebrates eight years as Horne blows in
Outgoing NCSC interim leader Felicity Oswald shares her thoughts on the body’s work over the past eight years as she hands over the reins to incoming CEO Richard Horne Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Oct 2024
Cups Linux printing bugs open door to DDoS attacks, says Akamai
The Cups Linux printing vulnerabilities disclosed at the end of September would seem to have a nasty sting in their tail, according to researchers at Akamai Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Oct 2024
Microsoft files lawsuit to seize domains used by Russian spooks
Microsoft has been given permission to seize multiple domains used by the Russian state threat actor Star Blizzard as part of a coordinated disruption effort undertaken ahead of the US elections Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Oct 2024
Nutanix courts VMware customers in APAC amid Broadcom concerns
Nutanix is driving double-digit growth across the region by capitalising on the evolving cloud landscape with its hybrid cloud and artificial intelligence offerings, as well as anxieties about the future direction of VMware under Broadcom’s ownership Continue Reading
By- Aaron Tan, TechTarget
-
Definition
30 Sep 2024
What is WPA3 (Wi-Fi Protected Access 3)?
WPA3, also known as Wi-Fi Protected Access 3, is the third iteration of a security certification standard developed by the Wi-Fi Alliance. WPA3 is the latest updated implementation of WPA2, which has been in use since 2004. Continue Reading
By- Gavin Wright
- Alexander S. Gillis, Technical Writer and Editor
-
News
26 Sep 2024
Racist Network Rail Wi-Fi hack was work of malicious insider
Police have revealed that this week’s racist cyber attack on public Wi-Fi networks at stations across the UK appears to have been the work of a malicious insider, after arresting an employee of one of the service providers Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Sep 2024
Islamophobic cyber attack downs Wi-Fi at UK transport hubs
An apparent hacktivist attack disrupted public-facing Wi-Fi networks at UK rail stations to display Islamophobic content Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Sep 2024
Microsoft shares progress on Secure Future Initiative
Microsoft has published a progress report on its Secure Future Initiative, launched last year in the wake of multiple security incidents, and made a series of commitments to improve its internal cyber culture Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
16 Sep 2024
Automation driving SD-WAN optimisation
AIOps is being deployed to help manage highly distributed enterprise networking configurations Continue Reading
By- Cliff Saran, Managing Editor
-
News
13 Sep 2024
Cyber workforce must almost double to meet global talent need
Research from ISC2 finds global cyber workforce needs additional 4.8 million people to fully secure businesses Continue Reading
By- Clare McDonald, Business Editor
-
News
12 Sep 2024
European enterprise networking lacks hybrid maturity
Deploying a complex hybrid and multicloud IT architecture has an impact on enterprise network management Continue Reading
By- Cliff Saran, Managing Editor
-
News
06 Sep 2024
Longstanding Darktrace CEO Poppy Gustafsson to step down
Darktrace CEO Poppy Gustafsson is to leave the AI cyber company she helped build with Mike Lynch after more than a decade, following its acquisition by a private equity firm Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Aug 2024
Siegwerk strengthens global manufacturing operations with managed SD-WAN
Global manufacturer enhances operational security and digitisation with managed SD-WAN, managed security and professional services Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
30 Aug 2024
MEF association claims SASE milestone
Leading technology provider achieves first milestone in secure access service edge programme, with SASE certification now generally available to trade association’s technology and service provider members Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
30 Aug 2024
Norwegian Refugee Council leverages Okta for Good cyber scheme
Pietro Galli, CIO of the Norwegian Refugee Council, reveals how the globally distributed NGO has been taking advantage of the Okta for Good CSR programme to improve its own cyber security and data protection practice, and elevate good practice in the third sector Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Aug 2024
Iranian APT caught acting as access broker for ransomware crews
Members of Iran-backed Pioneer Kitten APT appear to be trying to supplement their pay packets by helping Russian-speaking ransomware gangs to access their victims in exchange for a cut of the profits Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Aug 2024
Iranian APT Peach Sandstorm teases new Tickler malware
Peach Sandstorm, an Iranian state threat actor, has developed a dangerous new malware strain that forms a key element of a rapidly evolving attack sequence Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Aug 2024
Global cyber spend to rise 15% in 2025, pushed along by AI
Security spending will increase at pace in 2025, with artificial intelligence, cloud and consultancy services all pushing outlay to new highs, according to Gartner Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Aug 2024
How Kaspersky is driving growth in APAC
Kaspersky is leveraging its threat intelligence capabilities and local market knowledge to navigate geopolitical tensions and expand its footprint across the Asia-Pacific region Continue Reading
By- Aaron Tan, TechTarget
-
News
27 Aug 2024
Palo Alto Networks bets on ‘precision AI’
Palo Alto Networks’ regional leader, Steven Scheurmann, explains how machine learning, neural networks and generative AI can help to prevent breaches in what it calls ‘precision AI’ Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
15 Aug 2024
Google's cookie conundrum: What comes next?
Google's revised approach to third-party cookies shouldn't come as a surprise, and may also be welcome Continue Reading
By- Christian Ward
-
News
13 Aug 2024
NIST debuts three quantum-safe encryption algorithms
NIST has launched the first three quantum-resistant encryption algorithms, and as the threat of quantum-enabled cyber attacks grows greater, organisations are encouraged to adopt them as soon as they can Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
13 Aug 2024
Labour's first cyber priority must be the NHS
With Labour returning to 10 Downing Street after 14 years, the Computer Weekly Security Think Tank panellists share advice and wish lists for the new government Continue Reading
By- Adam Button
-
News
24 Jul 2024
WhatsApp and Signal messages at risk of surveillance following EncroChat ruling, court hears
Defence lawyers seek leave to appeal a decision by the Investigatory Powers Tribunal that the National Crime Agency lawfully obtained warrants to intercept messages sent over an encrypted phone network Continue Reading
By- Bill Goodwin, Computer Weekly
-
Feature
23 Jul 2024
Enhancing mobile app security with behaviour-based biometrics
Behavioural-based biometrics offer tantalising advantages over more traditional biometric solutions. Learn about some of the benefits and potential challenges for safe and secure implementation Continue Reading
By -
News
22 Jul 2024
NCA cracks digitalstress DDoS-for-hire operation
The UK authorities have taken down a major component of the multinational DDoS cyber attack-for-hire ecosystem, hacking into the digitalstress.su service and exfiltrating data on its users, who now face arrest Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
22 Jul 2024
The sky’s the limit with the two sides of AI and networking
Generative AI is a hyped topic in virtually all industries. But within the realms of infrastructure management, there are two aspects to consider: AI for networking, and networking for AI Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
18 Jul 2024
Netscout expands network observability for the digital edge
Network performance management firm announces business edge observability for networks, applications and user experience to mitigate risk and reduce mean time to respond Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
16 Jul 2024
Incubator Plexal heads to Singapore for CyberBoost
Cyber startup hub Plexal expands its presence to Singapore through a new initiative, and sets its sights on helping new UK businesses break into the booming Asia-Pacific market Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Jul 2024
How Snowflake is tackling AI challenges
Snowflake’s regional leader Sanjay Deshmukh outlines how the company is helping customers to tackle the security, skills and cost challenges of AI implementations Continue Reading
By- Aaron Tan, TechTarget
-
News
11 Jul 2024
Dutch research firm TNO pictures the SOC of the future
In only a few years, security operations centres will have a different design and layout, and far fewer will remain Continue Reading
By- Kim Loohius
-
News
09 Jul 2024
Lessons from war: How Israel is fighting Iranian state-backed hacking
The general director of the Israel National Cyber Directorate talks about the rise in cyber attacks and what lessons the country has gleaned to defend against hacking from foreign parties Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
28 Jun 2024
How Recorded Future is operationalising threat intelligence
Recorded Future is investing in APIs to enable automated security workflows, among other measures, to help organisations overcome the hurdles of operationalising threat intelligence Continue Reading
By- Aaron Tan, TechTarget
-
News
26 Jun 2024
Scottish Courts and Tribunal Service replaces legacy SD-WAN
Contract awarded for the deployment of cross-Scotland software-defined wide area network designed to ensure efficient, secure and reliable administrative services to the judiciaries of Scotland Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
24 Jun 2024
Sellafield pleads guilty to criminal charges over cyber security
Nuclear Decommissioning Authority-backed organisation Sellafield Ltd pleads guilty to criminal charges brought over significant cyber security failings that could have compromised sensitive nuclear information Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
24 Jun 2024
Hybrid work prompts spike in network security threats
Survey shows more than two-thirds of organisations have seen an increase in network security threats over the past 18 months, with remote and hybrid working the biggest contributor to heightened threat levels Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
24 Jun 2024
Tata Communications hosted SASE claims to redefine networking, security
Tata Communications claims world-first implementation of unified SASE solution to deliver unified visibility and control of network traffic with context-led insights and enhanced user experience Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
21 Jun 2024
Qilin ransomware gang publishes stolen NHS data online
The ransomware gang behind a major cyber attack on NHS supplier Synnovis has published a 400GB trove of private healthcare data online Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
21 Jun 2024
ICO police cloud guidance released under FOI
Long-awaited guidance from the UK data regulator on police cloud deployments highlights some potential data transfer mechanisms it thinks can clear up ongoing legal issues, but tells forces it’s up to them to decide if the measures would work Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
16 Jun 2024
Securing the edge: A new battleground in mobile network security
Edge computing is changing approaches to mobile network infrastructure, but failure to secure it can expose networks and data to cyber threats. We look at the dangers and potential solutions. Continue Reading
-
Opinion
13 Jun 2024
Data leakage in the cloud – can data truly be safe in the cloud?
This month, the Computer Weekly Security Think Tank considers how CISOs and security practitioners should ensure that the business can make use of public cloud services safely and securely and avoid accidental or deliberate data leakage. Continue Reading
By- Scott Swalling
-
Definition
13 Jun 2024
secure access service edge (SASE)
Secure access service edge (SASE), pronounced sassy, is a cloud architecture model that bundles together network and cloud-native security technologies and delivers them as a single cloud service. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Kinza Yasar, Technical Writer
-
News
07 Jun 2024
Juniper Networks claims first with AIOps to WAN routing
Juniper Networks announces industry leadership with enhancements to cloud-native Mist AI engine for all network domains, claiming to deliver insight for exceptional experiences Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
07 Jun 2024
Sophos uncovers Chinese state-sponsored campaign in Southeast Asia
Sophos found three distinct clusters of activity targeted at a high-level government organisation that appeared to be tied to Chinese interests in the South China Sea Continue Reading
By- Aaron Tan, TechTarget
-
News
04 Jun 2024
Haier Europe taps Orange Business to build responsive SD-WAN
Looking to offer a scalable, secure networking infrastructure to support its growth, Fortune 500 home appliances company works with business arm of telco to deploy cloud-first platform enhancing security, visibility and agility Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
03 Jun 2024
McLaren Formula 1 Team revs up network security with Cisco
Legendary motor racing team expands global partnership with networking giant to accelerate network security for on-premise hardware and cloud-based software, including secure firewall and XDR Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
24 May 2024
Networks emerge as catalyst for digital business success
Global networking trends report for 2024 reveals continued measurable impact of the network in advancing business goals, with 72% planning on deploying integrated network management platforms over the next two years Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Definition
23 May 2024
wireless intrusion prevention system (WIPS)
A wireless intrusion prevention system (WIPS) is a dedicated security device or integrated software application that monitors a wireless local area network (WLAN) or Wi-Fi network's radio spectrum for rogue access points (APs) and other wireless threats. Continue Reading
By -
News
22 May 2024
Rockwell urges users to disconnect ICS equipment
ICS systems maker Rockwell Automation calls on users to take steps to secure their equipment, and reminds them there is no reason to ever have its hardware connected to the public internet, as it tracks an increase in global threat activity Continue Reading
By- Alex Scroxton, Security Editor
-
News
17 May 2024
Cato Networks and e& partner to further expand SASE presence in UAE
Global technology group forges partnership with provider to see the establishment of a second point-of-presence in UAE, extending SASE Cloud to enterprises across the region Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Definition
10 May 2024
Pegasus malware
Pegasus malware is spyware that can hack any iOS or Android device and steal a variety of data from the infected device, including text messages, emails, key logs, audio and information from installed applications, such as Facebook or Instagram. Continue Reading
-
Opinion
09 May 2024
Zero Trust: Unravelling the enigma and charting the future
A special interest group aims to start a long-overdue discourse on the merits, dangers, costs, and development of Zero Trust and IAM in information security Continue Reading
By -
News
08 May 2024
Cyber attack ruled out as source of UK Border Force outage
An IT outage that caused automated passport control e-gates to crash across the UK has been resolved, with a cyber attack ruled out as the cause Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 May 2024
Versa Networks adds AI capabilities to SASE platform
Artificial intelligence and machine learning-based secure access service edge provider enhances core solution to include GenAI firewall for threat detection and data protection Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
06 May 2024
Microsoft beefs up cyber initiative after hard-hitting US report
Microsoft is expanding its recently launched Secure Future Initiative in the wake of a hard-hitting US government report on recent nation state intrusions into its systems Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 May 2024
Optimising application connections, improving security posture top SD-WAN priorities
Research looking into key drivers behind global SD-WAN investments find deployments are mainly driven by need to optimise network connections to cloud-based applications and improve overall security posture Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
02 May 2024
Palo Alto Networks claims to raise bar on SASE
Palo Alto Networks releases version 3.0 of SASE tech designed to extend zero trust to unmanaged devices, secure data with artificial intelligence and boosts application performance for partners and customers Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Definition
02 May 2024
What is a SSL (secure sockets layer)?
Secure sockets layer (SSL) is a networking protocol designed for securing connections between web clients and web servers over an insecure network, such as the internet. Continue Reading
By- TechTarget Contributor
- Michael Cobb
- Peter Loshin, Former Senior Technology Editor
-
News
02 May 2024
How Okta is fending off identity-based attacks
Okta has been bolstering the security of its own infrastructure and building new tools to scan customer environments for vulnerable identities, among other efforts to fend off identity-based attacks Continue Reading
By- Aaron Tan, TechTarget
-
Definition
01 May 2024
remote access
Remote access is the ability for an authorized person to access a computer or network from a geographical distance through a network connection. Continue Reading
-
News
30 Apr 2024
Bad bot traffic in Australia grew 23% in 2023
Traffic from bad bots that perform malicious tasks accounted for 30.2% of Australia’s internet traffic in 2023 Continue Reading
By- Aaron Tan, TechTarget