Network security management
-
News
29 Apr 2025
Kaspersky calls for cyber immunity amid growing cyber threats
The rise of professional cyber crime groups and state-sponsored actors targeting critical infrastructure requires a move towards inherently secure ‘cyber immune’ systems, says Kaspersky CEO Eugene Kaspersky Continue Reading
By- Aaron Tan, TechTarget
-
News
24 Apr 2025
Ericsson boosts NetCloud SASE with integrated clientless ZTNA for wireless WAN
Leading comms tech provider claims industry’s first fully integrated clientless zero-trust network access, designed for wireless wide area network with update to core secure access service edge platform Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
23 Apr 2025
Qualys goes to bat for US cricket side San Francisco Unicorns
Cloud security specialist Qualys partners with US T20 cricket squad San Francisco Unicorns and its Sparkle Army fanclub as the team prepares for its summer 2025 campaign Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Apr 2025
AI-powered APIs proving highly vulnerable to attack
The growth of AI is proving a double-edged sword for API security, presenting opportunities for defenders to enhance their resilience, but also more risks from AI-powered attacks, according to report Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Apr 2025
CW Innovation Awards: Transforming cyber security with AI
Facing rising cyber threats and a shortage of experts, Citic Telecom International CPC developed an AI-powered penetration testing tool to automate security audits and reduce costs Continue Reading
By -
News
16 Apr 2025
Security leaders grapple with AI-driven threats
Experts warn of AI’s dual role in both empowering and challenging cyber defences, and called for intelligence sharing and the need to strike a balance between AI-driven innovation and existing security practices Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
14 Apr 2025
Defending the grid with secure connectivity
Connectivity providers, device manufacturers and the energy companies they support must prioritise cyber security as the use of IoT grows in Singapore's energy sector Continue Reading
By- Simon Trend
-
News
11 Apr 2025
Comms consortium calls for greater vigilance on subsea cable security
Open letter from European telecommunications operators and subsea cable stakeholders calls on cables ecosystem to align security objectives with operational feasibility as well create viable business model based on risk-based best practices Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
10 Apr 2025
Google bets on unifying security tools to ease CISO pain
At Google Cloud Next in Las Vegas, Google launches its Unified Security platform with the goal of bringing together disparate security solutions to help cyber leaders and practitioners address their most keenly felt pain points Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
10 Apr 2025
GCHQ historian Dave Abrutat’s mission to preserve the UK’s forgotten signals intelligence history
Dave Abrutat, GCHQ’s official historian, is on a mission to preserve the UK’s historic signals intelligence sites and capture their stories before they disappear from folk memory. A new charity, NSIST, will raise funds and recruit volunteers Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
09 Apr 2025
Microsoft’s April 2025 bumper Patch Tuesday corrects 124 bugs
Microsoft is correcting 124 vulnerabilities in its March Patch Tuesday, one of which is being actively exploited in the wild, and 11 of which are ‘critical’ Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
09 Apr 2025
Nokia, Telia, Finnish Defence Forces claim 5G standalone slice first
Companies showcase potential of 5G technology in enhancing critical communications for defence units operating in coalition environments to ensure seamless experience when crossing country borders Continue Reading
-
News
04 Apr 2025
Norway and Nordic financial sector ramps up cyber security
Finans Norge sets up cyber security unit CTSU to support the finance sector in Norway amid increasing threats Continue Reading
By- Gerard O'Dwyer
-
News
03 Apr 2025
Are LLM firewalls the future of AI security?
As large language models permeate industries, experts at Black Hat Asia 2025 debate the need for LLM firewalls and explore their role in fending off emerging AI threats Continue Reading
By- Aaron Tan, TechTarget
-
Definition
02 Apr 2025
What is an initialization vector?
An initialization vector (IV) is an arbitrary number that can be used with a secret key for data encryption to foil cyber attacks. Continue Reading
By -
News
01 Apr 2025
Southern Linc enhances management, security of its private cellular network
Wireless subsidiary of Southern Company selects private LTE/5G OT management and zero-trust security provider’s Bridge platform to enhance management and security of its LTE network Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
31 Mar 2025
UK law enforcement data adequacy at risk
The UK government says reforms to police data protection rules will help to simplify law enforcement data processing, but critics argue the changes will lower protection to the point where the UK risks losing its European data adequacy Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
27 Mar 2025
Surging cyber threats drive IT directors to decentralised networks
As directors increasingly recognise the threats posed by increasingly sophisticated, AI-driven cyber attacks, risks are being mitigated by changes in physical infrastructure networks, research finds Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
25 Mar 2025
Nokia, Numana, Honeywell Aerospace team to advance quantum-safe networks
Collaboration designed to drive innovation and enable a global post-quantum security economy for enterprises using quantum key distribution and advanced cryptographic network technologies to safeguard digital infrastructure Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Feature
24 Mar 2025
Ethical qualms prompt challenging social media migrations
Changing content moderation and artificial intelligence training practices means social media has undergone a fundamental shift in the past six months, presenting organisations and people migrating away from these platforms for ethical reasons with a number of practical challenges Continue Reading
-
News
18 Mar 2025
Largest ever cyber deal reflects Google’s CNAPP ambitions
In a signal of its future ambitions, Google lays down $32bn to acquire cloud-native application protection platform Wiz, reflecting the increasing need to secure multicloud environments Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Mar 2025
Seaco charts course for unified security strategy
Shipping container leasing giant consolidates security tools onto a single platform, leveraging AI and extended detection and response to improve security operations Continue Reading
By- Aaron Tan, TechTarget
-
Definition
17 Mar 2025
What is a buffer overflow? How do these types of attacks work?
A buffer overflow occurs when a program or process attempts to write more data to a fixed-length block of memory, or buffer, than the buffer is allocated to hold. Continue Reading
-
News
13 Mar 2025
Chinese espionage group UNC3886 targets Juniper routers
Advanced persistent threat group UNC3886 deployed custom backdoors on end-of-life Juniper Networks routers, underscoring the need for timely patching and advanced security monitoring Continue Reading
By- Aaron Tan, TechTarget
-
News
13 Mar 2025
HMRC looks to upgrade SOC with advanced SIEM tech
HMRC issues a request for information notice ahead of opening up bids for a new security information and event management project that aims to reinforce its ability to respond to cyber threats Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
13 Mar 2025
What is a pass-the-hash attack?
A pass-the-hash attack is an exploit in which an attacker steals a hashed user credential and -- without cracking it -- reuses it to trick an authentication system into creating a new authenticated session on the same network. Continue Reading
By- Nick Barney, Technology Writer
- Madelyn Bacon, TechTarget
-
News
13 Mar 2025
Cato claims end to network patching with SASE-native LAN NGFW
Leading SASE provider unveils ‘the world’s first’ SASE-native local area network next-generation firewall to address longstanding IT pain point for firewall appliances Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
11 Mar 2025
Musk claims of Ukraine DDoS attack derided by cyber community
Elon Musk draws criticism after accusing Ukraine of being behind a significant DDoS attack against social media platform X Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Mar 2025
Enterprise 5G, AI to drive global IoT market to near $2tn by 2028
Research finds global internet of things market on a steep upwards trajectory presenting robust revenue opportunities, but concerns persist regarding security Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
11 Mar 2025
Singapore IT leaders boost AI security defences
Study reveals a surge in perceived importance of artificial intelligence for cyber security in Singapore, but declining investment in traditional measures raises concerns as sophisticated cyber attacks intensify Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
10 Mar 2025
2024: the year misconfigurations exposed digital vulnerabilities
Small configuration errors cascaded into major outages during 2024. Mike Hicks, from Cisco ThousandEyes, propounds techniques to defend digital resilience against tales of the unexpected Continue Reading
By- Mike Hicks
-
News
07 Mar 2025
Managing security in the AI age
Gartner experts offer guidance on harnessing AI’s power while mitigating its risks, from managing shadow AI to implementing security controls and policies Continue Reading
-
Definition
06 Mar 2025
What is promiscuous mode in networking?
In computer networking, promiscuous mode is a mode of operation in which a network device, such as a network interface card (NIC) or an adapter on a host system, can intercept and read in its entirety each network packet that arrives instead of just the packets addressed to the host. Continue Reading
By -
Feature
06 Mar 2025
Norway says ‘no way’ to global financial crime
Oslo’s startup ecosystem is fighting back against cyber criminals with tech to wipe out attacks rather than just detect them Continue Reading
-
News
03 Mar 2025
Singapore’s HomeTeamNS hit by ransomware attack
The non-profit organisation suffered a ransomware attack that affected some servers containing employee and member data, prompting an investigation and enhanced security measures Continue Reading
By- Aaron Tan, TechTarget
-
News
28 Feb 2025
France pushes for law enforcement access to Signal, WhatsApp and encrypted email
Proposals to be discussed in the French Parliament will require tech companies to hand over decrypted messages and email or face huge fines Continue Reading
By- Bill Goodwin, Computer Weekly
-
Definition
28 Feb 2025
What is FCAPS (fault, configuration, accounting, performance and security)?
FCAPS (fault, configuration, accounting, performance and security) is a network management framework and model created by the International Organization for Standardization (ISO). Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Andrew Zola
-
News
26 Feb 2025
UK law firm embarks on SD-WAN and SASE infrastructure upgrade
Network services provider collaborates with commercial law firm Hill Dickinson to enhance network connectivity and security by introducing SD-WAN and SASE frameworks to help safeguard corporate assets Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
24 Feb 2025
Versa claims to redefine SASE for enterprises
Universal secure access service edge company announces general commercial availability of what it says is unique proposition allowing enterprises, governments and service providers to deploy customised networking and security services Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Opinion
24 Feb 2025
The need for secure data sharing: Lessons learned from public health
Privacy-enhancing technologies can help healthcare organisations build resilience against cyber threats while maintaining patient privacy, security and regulatory compliance. Continue Reading
By- Ronen Cohen, Duality Technologies
-
News
23 Feb 2025
Check Point co-founder on AI, quantum and independence
Gil Shwed, Check Point’s co-founder and executive chairman, discusses the company’s focus on artificial intelligence-driven security and his commitment to remaining an independent force in the cyber security market Continue Reading
By- Aaron Tan, TechTarget
-
Definition
20 Feb 2025
What is network visibility?
Network visibility is an awareness of the components and data within an enterprise computer network. Continue Reading
By- Cameron Hashemi-Pour, Former Site Editor
- Ben Lutkevich, Site Editor
-
Feature
19 Feb 2025
Quantum computing in cyber security: A double-edged sword
Scepticism still abounds, but quantum computing stocks have boomed this year. In the world of cyber, however, quantum brings both unprecedented capabilities and significant threats, demanding careful attention Continue Reading
By -
Definition
19 Feb 2025
What is challenge-response authentication?
In computer security, challenge-response authentication is a set of protocols used to protect digital assets and services from unauthorized users, programs and activities. Continue Reading
By- Cameron Hashemi-Pour, Former Site Editor
- Linda Rosencrance
-
News
18 Feb 2025
EY: Industrial companies worldwide stunted in emerging technology use
Businesses globally are spending more on emerging technologies year-on-year, but struggle to expand experimental use cases, finds EY’s sixth annual Reimagining Industry Futures study Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
Definition
18 Feb 2025
What is the Nessus vulnerability scanning platform?
Nessus is a platform developed by Tenable that scans for security vulnerabilities in devices, applications, operating systems, cloud services and other network resources. Continue Reading
By -
News
18 Feb 2025
CPX 2025: Check Point CEO talks up hybrid mesh security
At CPX 2025 in Bangkok, Check Point CEO Nadav Zafrir outlined a vision for network security centred on hybrid mesh architecture and AI-powered capabilities Continue Reading
By- Aaron Tan, TechTarget
-
News
17 Feb 2025
The Security Interviews: Yevgeny Dibrov, Armis
Armis CEO Yevgeny Dibrov talks about how his military service and intelligence work opened the door into the world of cyber security entrepreneurship Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Feb 2025
Gartner: CISOs struggling to balance security, business objectives
Only 14% of security leaders can ‘effectively secure organisational data assets while also enabling the use of data to achieve business objectives’, according to Gartner Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Feb 2025
Lenovo CSO: AI adoption fuels security paranoia
Doug Fisher, Lenovo’s chief security officer, outlines the company’s approach to security and AI governance, and the importance of having a strong security culture to combat cyber threats amplified by the use of AI Continue Reading
By- Aaron Tan, TechTarget
-
Definition
13 Feb 2025
What is a denial-of-service attack?
A denial-of-service (DoS) attack is a security threat that occurs when an attacker makes it impossible for legitimate users to access computer systems, networks, services or other IT resources. Continue Reading
By- Scott Robinson, New Era Technology
- Kevin Ferguson
- Peter Loshin, Former Senior Technology Editor
-
News
12 Feb 2025
Cisco Live EMEA: Network supplier tightens AI embrace
At its annual EMEA show, Cisco tech leadership unveiled a raft of new products, services and features designed to help customers do more with artificial intelligence Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Feb 2025
Google: Cyber crime meshes with cyber warfare as states enlist gangs
A report from the Google Threat Intelligence Group depicts China, Russia, Iran and North Korea as a bloc using cyber criminal gangs to attack the national security of western countries Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
Definition
11 Feb 2025
What is a honeypot? How it protects against cyberattacks
A honeypot is a network-attached system set up as a decoy to lure cyberattackers and to help organizations detect, deflect and study hacking attempts to gain unauthorized access to IT. Continue Reading
By- Scott Robinson, New Era Technology
- Ben Lutkevich, Site Editor
- Casey Clark, TechTarget
-
News
11 Feb 2025
F1’s Red Bull charges 1Password to protect its 2025 season
For the upcoming 2025 Formula 1 season, Oracle Red Bull Racing adds cyber security partner 1Password to its roster of team suppliers and sponsors Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
10 Feb 2025
What is ISO 27001?
ISO 27001, formally known as ISO/IEC 27001:2022, is an information security standard jointly created by the International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC). Continue Reading
-
Feature
07 Feb 2025
Self-healing networks: The next evolution in network management
The age of AI is highlighting the security risks and pitfalls of traditional network management techniques. Self-healing networks may offer a solution that not only bolsters security, but makes IT and network teams more efficient Continue Reading
By -
News
06 Feb 2025
Kyndryl expands SASE services with Palo Alto Networks
IT infrastructure services provider enhances end-to-end secure access service edge services to help customers accelerate adoption of cloud-first, zero-trust offering for network security Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Definition
04 Feb 2025
What is Internet Key Exchange (IKE)?
Internet Key Exchange (IKE) is a standard protocol used to set up a secure and authenticated communication channel between two parties via a virtual private network (VPN). Continue Reading
By- Gavin Wright
- Andrew Zola
- Alexander S. Gillis, Technical Writer and Editor
-
Definition
31 Jan 2025
What is a certificate revocation list (CRL) and how is it used?
A certificate revocation list (CRL) is a list of digital certificates that have been revoked by the issuing certificate authority (CA) before their actual or assigned expiration date. Continue Reading
-
News
31 Jan 2025
DeepSeek API, chat log exposure a ‘rookie’ cyber error
Security researchers at Wiz find a trove of DeepSeek data including API secrets and chat logs publicly exposed via an open source database management tool, raising questions about the fast-growing service’s approach to security Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
30 Jan 2025
What is a password?
A password is a string of characters used to verify the identity of a user during the authentication process. Continue Reading
By- Rahul Awati
- Madelyn Bacon, TechTarget
-
News
28 Jan 2025
NAO: UK government cyber resilience weak in face of mounting threats
The National Audit Office has found UK government cyber resilience wanting, weakened by legacy IT and skills shortages, and facing mounting threats Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
27 Jan 2025
Cyber incident that closed British Museum was inside job
An IT incident that disrupted visitor access to the British Museum last week was the work of a disgruntled contractor who had been let go Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Jan 2025
Inside CyberArk’s security strategy
CyberArk CIO Omer Grossman talks up the company’s security-first ethos, the importance of an assumed breach mentality and how the company is addressing threats from the growing use of AI Continue Reading
By- Aaron Tan, TechTarget
-
Definition
23 Jan 2025
What is SSL (Secure Sockets Layer)?
SSL (Secure Sockets Layer) is a networking protocol that secures connections between web clients and web servers over internal networks or the internet by encrypting the data sent between those clients and servers. Continue Reading
By- Rahul Awati
- Michael Cobb
- Peter Loshin, Former Senior Technology Editor
-
Opinion
17 Jan 2025
Cyber innovation to address rising regulatory, threat burden
The Computer Weekly Security Think Tank considers how security leaders should best navigate the multitude of new national and multinational regulations affecting their work, and ensure their organisations remain compliant and protected Continue Reading
By- Nick New, Optalysys
-
News
16 Jan 2025
Biden signs new cyber order days before Trump inauguration
With days left in the White House, outgoing US president Joe Biden has signed a wide-ranging cyber security executive order with far-reaching implications Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Jan 2025
Cyber security dovetails with AI to lead 2025 corporate IT investment
Cyber security and GenAI top enterprise IT investment plans for 2025, whether singly or together, according to research from Enterprise Strategy Group Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
15 Jan 2025
Biggest Patch Tuesday in years sees Microsoft address 159 vulnerabilities
The largest Patch Tuesday of the 2020s so far brings fixes for more than 150 CVEs ranging widely in their scope and severity – including eight zero-day flaws Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Jan 2025
CNI operators should ask these 12 questions of their OT suppliers
The NCSC, CISA and others have set out 12 cyber security considerations CNI organisations and other users of operational technology should incorporate into their buying processes to force their suppliers to do better Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Jan 2025
US bank FNBO uses Pindrop to tackle voice fraud, deepfakes
Learn how First National Bank of Omaha in the US is enhancing customer authentication and verification in its contact centres, eliminating friction points and making life easier for its customer service teams, with Pindrop voice security technology Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Jan 2025
Mandiant: Latest Ivanti vulns exploited by Chinese cyber spooks
Threat actors are once again lining up to exploit vulnerabilities in the widely used Ivanti product suite, with an apparent link to Chinese espionage activity Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Jan 2025
German court finds hacked EncroChat phone evidence inadmissible
The Berlin Regional Court has found that evidence obtained by a joint French and Dutch operation to hack the EncroChat encrypted mobile phone network is legally inadmissible, raising questions about its use in other European countries Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
03 Jan 2025
US Treasury incident a clear warning on supply chain security in 2025
A cyber incident at the US Department of the Treasury – blamed on a Chinese state actor – raises fresh warnings about supply chain risk after it was found to have originated via vulnerabilities in a remote tech support product Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
23 Dec 2024
What is a proxy firewall?
A proxy firewall is a network security system that protects network resources by filtering messages at the application layer. Continue Reading
By -
Opinion
19 Dec 2024
Innovation, insight and influence: the CISO playbook for 2025 and beyond
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Mandy Andress, Elastic
-
News
18 Dec 2024
The Security Interviews: Martin Lee, Cisco Talos
Threat intel expert and author Martin Lee, EMEA technical lead for security research at Cisco Talos, joins Computer Weekly to mark the 35th anniversary of the first ever ransomware attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Dec 2024
Top 10 cyber security stories of 2024
Data breaches, data privacy and protection, and the thorny issue of open source security were all hot topics this year. Meanwhile, security companies frequently found themselves hitting the headlines, and not always for good reasons. Here are Computer Weekly's top 10 cyber security stories of 2024 Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
18 Dec 2024
Look to the future: How the threat landscape may evolve next
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Elliott Wilkes, ACDS
-
News
18 Dec 2024
Top 10 cyber crime stories of 2024
From ransomware targeting the NHS to nation-state-backed intrusions, 2024 was another big year for cyber criminals and cyber spooks alike, but they didn't have it all their own way as the good guys fought back Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Dec 2024
How AWS is protecting customers from cyber threats
Amazon Web Services reveals how its threat intelligence capabilities work under the hood to thwart cyber attacks and keep its customers’ data safe Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
12 Dec 2024
CISOs: Don’t rely solely on technical defences in 2025
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Deepti Gopal, Gartner
-
News
10 Dec 2024
Dangerous CLFS and LDAP flaws stand out on Patch Tuesday
Microsoft has fixed over 70 CVEs in its final Patch Tuesday update of the year, and defenders should prioritise a zero-day in the Common Log File System Driver, and another impactful flaw in the Lightweight Directory Access Protocol Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
10 Dec 2024
Defending against cyber grinches: AI for enhanced security
On the Seventh Day of AI, Defending against cyber grinches: AI for enhanced security, we explore the double-edged sword of AI in cybersecurity and how businesses can protect themselves against the cyber grinches. Continue Reading
By- Justin Young, ANS
-
News
10 Dec 2024
Top IT predictions in APAC in 2025
Enterprises across the Asia-Pacific region are expected to focus on securing their AI workloads, invest in energy efficient infrastructure and rethink their platform strategy, among other tech trends in the new year Continue Reading
By- Aaron Tan, TechTarget
-
E-Zine
10 Dec 2024
On the road to change at Aston Martin
In this week’s Computer Weekly, we talk to the CIO at luxury car maker Aston Martin to find out how technology is helping tackle the huge challenges facing the automotive sector. The new National Cyber Security boss explains why organisations need to be extra vigilant against the growing online threats. And we examine the future of secure remote connectivity in the cloud era. Read the issue now. Continue Reading
-
Opinion
06 Dec 2024
Six trends that will define cyber through to 2030
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Pierre-Martin Tardif, ISACA
-
News
06 Dec 2024
TfL cyber attack cost over £30m to date
TfL provides more detail on the financial impact of the September 2024 cyber attack that crippled several of its online systems Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Dec 2024
Shared digital gateway was source of three NHS ransomware attacks
Alder Hey children’s hospital confirms ransomware operators accessed its systems through a shared digital gateway, but is standing firm in the face of the gang’s demands Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
04 Dec 2024
The most pressing challenges for CISOs and cyber security teams
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Elliot Rose, PA Consulting
-
News
04 Dec 2024
Nordics move to deepen cyber security cooperation
Nordic countries are increasing collaboration on cyber security amid more sophisticated and aggressive attacks Continue Reading
By- Gerard O'Dwyer
-
News
03 Dec 2024
US updates telco security guidance after mass Chinese hack
Following the widespread Salt Typhoon hacks of US telecoms operators including AT&T and Verizon, CISA and partner agencies have launched refreshed security guidance for network engineers and defenders alike Continue Reading
By- Alex Scroxton, Security Editor
-
News
02 Dec 2024
APAC businesses face cyber onslaught
The Asia-Pacific region is a cyber security hotspot, enduring significantly more cyber attacks than the global average, with AI-powered threats and skills shortages exacerbating the problem Continue Reading
-
News
02 Dec 2024
NCSC boss calls for ‘sustained vigilance’ in an aggressive world
NCSC CEO Richard Horne is to echo wider warnings about the growing number and severity of cyber threats facing the UK as he launches the security body’s eighth annual report Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
02 Dec 2024
CISOs will face growing challenges in 2025 and beyond
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Mike Gillespie and Ellie Hurst, Advent IM
-
News
26 Nov 2024
Sellafield operator opens dedicated cyber centre
The UK’s Nuclear Decommissioning Authority has opened a cyber security centre spanning its activities across the nuclear sector Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Nov 2024
BT unveils managed SASE service
Telecoms provider expands managed software-defined wide area network solution with new security service edge capabilities to help businesses transition to a secure access service edge model Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Definition
25 Nov 2024
What is Extensible Authentication Protocol (EAP)?
Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by Point-to-Point Protocol (PPP), a protocol often used when connecting a computer to the internet. Continue Reading
-
Definition
25 Nov 2024
What is IPsec (Internet Protocol Security)?
IPsec (Internet Protocol Security) is a suite of protocols and algorithms for securing data transmitted over the internet or any public network. Continue Reading
By- Katie Terrell Hanna
- Peter Loshin, Former Senior Technology Editor
-
News
25 Nov 2024
Geopolitical strife drives increased ransomware activity
The lines between financially motivated cyber criminals and nation state APTs are rapidly blurring, as geopolitical influences weigh heavily on the threat landscape, according to data from NCC Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
22 Nov 2024
What is endpoint detection and response (EDR)?
Endpoint detection and response (EDR) is a system that gathers and analyzes security threat-related information from computer workstations and other endpoints. Continue Reading
By- Nick Barney, Technology Writer
- Gavin Wright
- Alexander S. Gillis, Technical Writer and Editor