Network security management
-
News
14 Feb 2025
Gartner: CISOs struggling to balance security, business objectives
Only 14% of security leaders can ‘effectively secure organisational data assets while also enabling the use of data to achieve business objectives’, according to Gartner Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Feb 2025
Lenovo CSO: AI adoption fuels security paranoia
Doug Fisher, Lenovo’s chief security officer, outlines the company’s approach to security and AI governance, and the importance of having a strong security culture to combat cyber threats amplified by the use of AI Continue Reading
By- Aaron Tan, TechTarget
-
News
13 Jun 2019
AI-enabled cyber attacks a reality soon, warns Mikko Hypponen
Technology continues to shape human conflict and artificial intelligence will be no exception, so business needs to up its ability to detect attacks and respond, says security expert Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Jun 2019
Cisco shows off AI-driven network analysis at customer event
New tools to help IT departments better understand network behaviour and predict potential problems were among a series of announcements made on the opening day of Cisco Live in the US Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Jun 2019
MP brands Huawei exec a ‘moral vacuum’ as operators demand 5G clarity
Huawei chief security officer John Suffolk faces tough questions from parliament’s Science and Technology Select Committee over the firm’s links to the Chinese government Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Jun 2019
Implementing Dmarc a top priority for UK
Basic email security should be a top priority for UK firms, followed by reducing third-party web exposure and monitoring data flows leaving the enterprise, a Rapid7 study reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Jun 2019
Large firms look to zero-trust security to reduce cyber risk
In the face of increasing cyber breach risk as organisations move to hybrid multi-cloud IT environments, just over half of large firms in Europe are planning a zero-trust approach to security Continue Reading
By- Warwick Ashford, Senior analyst
-
News
07 Jun 2019
NotPetya offers industry-wide lessons, says Maersk’s tech chief
There are several key industry-wide lessons to be learned from the NotPetya attack in 2017, according to the information chief at one of the companies most heavily impacted Continue Reading
By- Warwick Ashford, Senior analyst
-
News
07 Jun 2019
How ASEAN firms are using AI to combat cyber threats
Artificial intelligence tools are becoming a vital part of the security arsenal for organisations and cyber criminals alike Continue Reading
By -
Opinion
05 Jun 2019
Joining the dots to deliver effective cyber security
In too many organisations, cyber security is dislocated and siloed. Security chiefs need to take a more joined-up approach, but that is likely to mean a rethink of how the security team operates Continue Reading
By- Ed Tucker, Human Firewall
-
News
05 Jun 2019
DNS – a security opportunity not to be overlooked, says Nominet
Domain name system data is the best-kept secret for eliminating network cyber threats, Nominet tells Infosecurity Europe attendees Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Jun 2019
Businesses investing blindly in cyber security
Businesses need to find out what their real cyber risks and weaknesses are before investing in new technologies, says ethical hacker Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Jun 2019
Beware of security blind spots in encrypted traffic
The growth of encrypted traffic has put the spotlight on intrusion prevention systems that help to surface cyber attacks conducted under the cloak of network encryption Continue Reading
By- Aaron Tan, TechTarget
-
News
30 May 2019
2.3 billion business and consumer data files exposed online
In the year since the GDPR compliance deadline, the number of data files exposed online without adequate protection is up more than 50% due to misconfigured security controls, report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 May 2019
Turla APT group beefs up cyber attack tool
An advanced persistent threat cyber espionage group has improved its tools to attack diplomatic targets, making their activities more difficult to detect and block Continue Reading
By- Warwick Ashford, Senior analyst
-
News
23 May 2019
Lapse in LinkedIn security certificate update
A lapse in the update of LinkedIn’s security certificate has once again underlined the importance of keeping track to avoid disruptions and phishing attacks, and how even big players are failing to get it right Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
22 May 2019
Security Think Tank: Effective IT segregation must involve the business
What are the security benefits and challenges of segregating IT environments, and how best are these challenges overcome? Continue Reading
By- RV Raghu, ISACA
-
News
21 May 2019
US grants Huawei stay of execution
US Commerce Department temporarily restores Huawei’s ability to maintain its existing networks and smartphone user base Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
21 May 2019
Security Think Tank: In-app segregation more intelligent and permissive
What are the security benefits and challenges of segregating IT environments, and how best are these challenges overcome? Continue Reading
By- Simon Persin, Turnkey Consulting
-
Opinion
20 May 2019
Security Think Tank: IT asset separation is a risk-based decision
What are the security benefits and challenges of segregating IT environments, and how best are these challenges overcome? Continue Reading
By- Deshini Newman, (ISC)²
-
News
20 May 2019
Google cuts off Huawei from Android ecosystem
Google decision follows an executive order signed by President Trump, but Huawei insists US businesses and consumers will be the real losers Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
17 May 2019
Security Think Tank: Challenges of segregation
What are the security benefits and challenges of segregating IT environments, and how best are these challenges overcome? Continue Reading
-
Feature
16 May 2019
Vulnerability assessment done. Now what?
Vulnerability assessment establishes the current state of an organisation’s cyber security, but to meet industry best practices, companies should go beyond that to achieve continuous improvement Continue Reading
By -
News
16 May 2019
Trump bans ‘adversary’ tech from US telecoms in blow at Huawei
US president announced ban on telecoms equipment from designated “adversary” states, including China Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
Opinion
16 May 2019
Security Think Tank: Proper segregation is more important than ever
What are the security benefits and challenges of segregating IT environments, and how best are these challenges overcome? Continue Reading
By- Emma Bickerstaffe, Information Security Forum (ISF)
-
News
14 May 2019
APAC firms on the back foot in cyber security
Most Asia-Pacific organisations did not consider cyber security until after their digital transformation projects had begun, new survey finds Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
14 May 2019
Security Think Tank: How to realise the benefits of security zoning
What are the security benefits and challenges of segregating IT environments, and how best are these challenges overcome? Continue Reading
-
Opinion
13 May 2019
Security Think Tank: Benefits and challenges of security segmentation
What are the security benefits and challenges of segregating IT environments, and how best are these challenges overcome? Continue Reading
By- Maxine Holt, Omdia
-
News
07 May 2019
Privileged access management moving to cloud
Survey shows nearly half of information security professionals are either planning to move privileged access management to the cloud or are exploring the possibility Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 May 2019
Zero trust: A 21st century security model
Traditional corporate security models date back to a time when there were fewer, lower-level threats, but a zero trust model is better suited to the 21st century, according to the originator of the idea Continue Reading
By- Warwick Ashford, Senior analyst
-
Blog Post
02 May 2019
Huawei furore leads inevitably to a global polarisation of the tech sector
The sacking of defence minister Gavin Williamson is another indication of how technology is influencing politics, and vice versa. While his crime was to leak details from a national security ... Continue Reading
By- Bryan Glick, Editor in chief
-
News
02 May 2019
Defence secretary sacked over Huawei leak
Defence secretary Gavin Williamson has been sacked after leaking confidential discussions over the use of Huawei networking equipment Continue Reading
By- Alex Scroxton, Security Editor
-
News
01 May 2019
Get more proactive on cyber security, says ex Europol chief
Business needs to get more proactive, collaborative, resilient and analytical to manage cyber risks posed by cyber criminals down to acceptable levels, says former Europol chief Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Apr 2019
Huawei leak inquiry launched
Cabinet secretary Mark Sedwill has instituted an inquiry aimed at discovering who leaked confidential discussions about UK mobile operators’ use of Huawei in their future 5G networks to the press Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Apr 2019
GDPR cases drive bigger budgets for Nordic regulators
High-profile General Data Protection Regulation cases in Finland and Sweden have increased the workload for regulators, which are to receive an increase in funding Continue Reading
By- Gerard O'Dwyer
-
News
25 Apr 2019
No final decision taken on Huawei 5G ban, government claims
Culture secretary tells MPs that a final decision on use of Huawei in UK 5G networks has not been taken, and says government is taking the leak of confidential discussions at the National Security Council very seriously Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Apr 2019
NCSC looks to industry to scale Active Cyber Defence
The national cyber security agency is calling on wider government organisations as well as industry to help scale automated cyber attack blocking systems country-wide Continue Reading
By- Warwick Ashford, Senior analyst
-
News
24 Apr 2019
PM May approves Huawei for use in 5G networks despite opposition
The UK’s National Security Council has approved the use of Huawei’s networking equipment in parts of the country’s 5G mobile networks in spite of widespread opposition Continue Reading
By- Alex Scroxton, Security Editor
-
News
17 Apr 2019
TfL suspends Wi-Fi service as Extinction Rebellion spreads
Transport for London has cut off its public Virgin Media Wi-Fi service to disrupt climate change protests Continue Reading
By- Alex Scroxton, Security Editor
-
News
17 Apr 2019
Wipro admits to potential breach to employee accounts by phishing attack
Indian IT services company Wipro is investigating a phishing attack, which hit some staff email accounts and launched attacks on customer environments Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
16 Apr 2019
Huawei cyber security chief John Suffolk: It’s not our culture to be aggressive
John Suffolk, global cyber security and privacy officer at China-based telecoms equipment supplier Huawei, tells Huawei Analyst Summit growth is the best answer to US criticism Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
15 Apr 2019
How Palo Alto Networks fends off its cyber adversaries
Palo Alto Networks CIO Naveen Zutshi talks up the company’s approach in keeping threat actors at bay Continue Reading
By- Aaron Tan, TechTarget
-
News
15 Apr 2019
Zero trust is about more than products
The zero trust security model is more than just products and network segmentation, it’s an architectural design principle with identity at its core that needs to be applied enterprise-wide, says KuppingerCole Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
09 Apr 2019
Using data science at Sainsbury’s
In this week’s Computer Weekly, we talk to one of the UK’s leading retailers, Sainsbury’s, about its data science strategy and how it helps the firm to better understand customers. We take a detailed look at the evolution of the business intelligence market and the impact of big data. And we find out how simulated disaster management can tackle the security skills gap. Read the issue now. Continue Reading
-
News
05 Apr 2019
Huawei ban will cost UK plc £6.8bn, delay 5G
If the UK government decides to impose tighter restrictions, or an outright ban on the use of Huawei in national 5G networks, the country faces severe consequences, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Apr 2019
Enhanced Wi-Fi cuts costs to maximise efficiency at Dorset school
The need for cost-effective, manageable wireless infrastructure without additional annual licence fees drove Lytchett Minster School’s decision to upgrade its on-site network with TP-Link Continue Reading
By- Alex Scroxton, Security Editor
-
News
02 Apr 2019
Akamai to open second traffic scrubbing centre in Australia
New centre in Melbourne will meet growing demand for scrubbing services to mitigate the impact of distributed denial of service attacks in Australia Continue Reading
-
News
02 Apr 2019
Huawei reports record numbers despite tumultuous year
Huawei has become one of the world’s largest technology companies by revenue, suggesting the accusations over its ties to the Chinese government are failing to have much impact Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
02 Apr 2019
The nightmare driving test – making driverless cars safe
In this week’s Computer Weekly, we talk to AI experts about the challenges of teaching autonomous vehicles how to drive safely in often extreme environments, and how deep learning simulations can help. Our latest buyer’s guide looks at business intelligence and analytics technologies. And we examine the implications of the EU’s controversial new copyright laws. Read the issue now. Continue Reading
-
News
01 Apr 2019
Singapore government to review data security in public sector
A high-level committee comprising ministers and private sector security experts will review data security practices and recommend measures to better protect citizens’ data Continue Reading
By- Aaron Tan, TechTarget
-
News
28 Mar 2019
Huawei making no progress on addressing security concerns
Huawei has made no material progress on addressing the issues identified last year by the NCSC, according to the latest highly critical report from its HSCEC Oversight Board Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Mar 2019
Encryption adoption driven by new tech and compliance
The adoption of encryption is at its highest level yet, driven by the need to protect data generated by new digital initiatives, but still less than half of organisations are applying it consistently across the enterprise Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Mar 2019
BT switches on quantum network link at Adastral Park
BT has opened its quantum network link between its Adastral Park research base and the UK Quantum Network node at the University of Cambridge Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Mar 2019
UK government at odds over Huawei threat
The chair of the Science and Technology Committee has criticised the government’s vague response to concerns about Huawei’s activities in the UK Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
19 Mar 2019
Growing board focus on cyber risk challenges current thinking
As digital transformation continues to drive change in the business and risk landscape, business and cyber security leaders need to improve discussions around this topic Continue Reading
-
E-Zine
13 Mar 2019
CW APAC: Buyer's guide to cloud security
When putting data in the cloud, companies must understand how it is protected – and not assume that security is all taken care of. In this buyer's guide, Computer Weekly offers advice on making cloud security choices, looks at how to guard against DDoS attacks, and finds out Amazon's approach to building secure cloud products. Continue Reading
-
13 Mar 2019
How traffic scrubbing can guard against DDoS attacks
Although most scrubbing services can help fend off distributed denial of service attacks, a more comprehensive mitigation strategy is required to remain unscathed. Continue Reading
-
Opinion
11 Mar 2019
Security Think Tank: Is it true you can't manage what you don't measure?
What should be the key cyber security risk indicator for any business? Continue Reading
By- Vladimir Jirasek, Foresight Cyber
-
News
07 Mar 2019
Vodafone defends its use of Huawei as 5G trials go live
As Vodafone begins trials of a live 5G service in Bristol, Cardiff and Liverpool, the operator’s CTO and general counsel have defended their use of Huawei equipment in Vodafone’s network and challenged its detractors to produce evidence of spying Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Mar 2019
How aid workers are using encrypted communications to stay safe in conflict zones
Often operating in volatile conflict zones, aid workers are frequently turning to encrypted communication services to protect each other Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
07 Mar 2019
US government ban unconstitutional, says Huawei
Huawei’s lawsuit accuses Washington of violating the US Constitution by banning it from government contracts Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Mar 2019
Singapore can now certify security products based on Common Criteria
The city-state is has attained the status of a Certificate Authorising Nation, enabling it to evaluate and certify security products under the Common Criteria standard Continue Reading
By- Aaron Tan, TechTarget
-
Feature
01 Mar 2019
What are the CDN options for enterprises?
We look at how content delivery networks can give your organisation’s web presence a literal edge Continue Reading
By -
News
28 Feb 2019
Supplier consolidation tops infosec goals for 2019
Supplier consolidation, collaboration between networking and security teams, and security awareness are the top priorities for information security professionals trying to prepare for the unknown, annual benchmark study shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Feb 2019
Cyber power needs wider discussion, says GCHQ director
The topic of cyber power needs wider discussion, says GCHQ head in a speech about the opportunities of digital innovation such as 5G, as well as the accompanying complexity and risk, with particular mention of China and Huawei Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Feb 2019
US may cut off countries that use Huawei in 5G networks
US secretary of state Mike Pompeo has said America may scale back or cut military and diplomatic ties with countries that use Huawei equipment in national 5G networks Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Feb 2019
Thales to sell nCipher to Entrust Datacard
Thales eSecurity has announced that it is to sell HSM specialist nCipher, the UK-based encryption firm it acquired in 2008, after spinning it out as a separate business Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Feb 2019
IT Priorities 2019: Security concerns top agenda for network buyers again
The ability to gain visibility into what is happening on enterprise networks has once again topped the agenda for network managers and buyers, according to the latest Computer Weekly/TechTarget IT Priorities survey Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Feb 2019
MWC 2019: Huawei claims massive lead on 5G readiness
At a pre-Mobile World Congress event in London, Huawei’s Ryan Ding shared details of the firm’s rapidly expanding 5G mobile portfolio, and laid into his competitors Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Feb 2019
UK naïve to think China won’t try to exploit Huawei
A think-tank report has branded the UK government naïve at best, irresponsible at worst, over its use of Chinese networking equipment in critical national infrastructure Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
19 Feb 2019
Cybersecurity needs both psychologists and field marshals
Many cybersecurity professionals like military analogies. Indeed, some security pros are ex-military. But after a recent security exercise involving IBM’s new lorry-mounted SOC (security operations ... Continue Reading
By- Bryan Betts, Freeform Dynamics
-
News
19 Feb 2019
Huawei’s Ren Zhengfei: US won’t crush us
Huawei CEO Ren Zhengfei has taken a more combative stance in the ongoing row over the firm’s alleged links to the Chinese intelligence services Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Feb 2019
NCSC signals UK may take softer line on Huawei
The UK’s National Cyber Security Centre suggests Huawei will be allowed to form core elements of the country’s 5G mobile network infrastructure after all Continue Reading
By- Alex Scroxton, Security Editor
-
Answer
11 Feb 2019
What are the pros and cons of machine learning in network security?
The predictive nature of machine learning can benefit network security strategies. But it can also benefit those looking to break through secure network barriers. Continue Reading
By- David Jacobs, The Jacobs Group
-
Feature
08 Feb 2019
A guide to choosing cloud-based security services
Cloud-based security services can help organisations with a growing cloud footprint to reduce cost and address the manpower crunch in cyber security Continue Reading
By- Aaron Tan, TechTarget
-
News
07 Feb 2019
Data breaches in Australia show no sign of abating
Australia’s privacy watchdog recorded over 800 cases of data breaches, nearly one year into the country’s mandatory data breach notification regime Continue Reading
-
News
06 Feb 2019
Huawei: We are not spying on the UK
Huawei’s Ryan Ding tells the British government that the company has never, and will never, use its technology to assist the Chinese intelligence services Continue Reading
By- Alex Scroxton, Security Editor
-
News
31 Jan 2019
Cisco Live Europe: Intent-based networking meets the IoT head-on
Networking and communications technology supplier Cisco plans to bring intent-based networking techniques to bear on the internet of things Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Jan 2019
How traffic scrubbing can guard against DDoS attacks
Although most scrubbing services can help fend off distributed denial of service attacks, a more comprehensive mitigation strategy is required to remain unscathed Continue Reading
By -
Tip
29 Jan 2019
How a Windows antimalware tool helps endpoint security
The Windows Defender Antivirus program was updated to include sandbox network security. Learn why this is so important and why security professionals have been asking for it. Continue Reading
By -
News
28 Jan 2019
UK cyber security agency investigates DNS hijacking
NCSC is probing the large-scale DNS hijacking campaign that has reportedly affected government and commercial organisations worldwide, and has issued defence advice Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Jan 2019
Vodafone suspends use of Huawei hardware
Vodafone’s UK CEO has said the operator will ‘pause’ its use of Huawei hardware for the foreseeable future Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Jan 2019
Chinese government grants BT new powers
Enhanced operating licences improve telco’s ability to work with customers in China Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Jan 2019
Thales eSecurity spins out nCipher
After just over a decade, Thales eSecurity has announced that it has spun out HSM specialist nCipher, the UK-based encryption firm it acquired for $100m in 2008 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
23 Jan 2019
MPs challenge Huawei over spying allegations
The chair of the cross-bench Science and Technology Committee has written to Huawei seeking answers over its activities in the UK Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Jan 2019
US issues emergency directive to halt DNS hijacking
US government agencies have been given 10 days to complete a four-step action plan to stop DNS hijacking attacks Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
22 Jan 2019
Moving beyond network boundaries
In this week’s Computer Weekly, we look at how businesses are adapting to the challenges of perimeterless network security. We examine how digital transformation is bringing increased complications for identity and access management (IAM). And we ask if public cloud providers are becoming a threat to the funding model for open source software. Read the issue now. Continue Reading
-
News
21 Jan 2019
Public procurement key to cyber security
Using public procurement as a means of boosting cyber security is the top recommendation for 2019, according to a report based on expert views Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
21 Jan 2019
Break free from traditional network security
Highly connected businesses put pressure on traditional network security. We look at how corporate networks are breaking out of their boundaries Continue Reading
By- Cliff Saran, Managing Editor
-
Opinion
17 Jan 2019
Security Think Tank: Cloud tech helps to protect advanced networks
How can organisations combine software-defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
By -
News
17 Jan 2019
CenturyLink opens Singapore SOC amid security services boom
US telco’s second Asia-Pacific security operations centre in Singapore is one of eight globally as it bids to carve a slice of the security services market Continue Reading
By- Aaron Tan, TechTarget
-
News
15 Jan 2019
Millions of industrial remote controllers open to attack
Millions of industrial remote controllers are open to cyber attack because of vulnerabilities in the radio frequency technology used, a study has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
15 Jan 2019
Security Think Tank: Apply different techniques to safeguard against rogue code
How can organisations combine software-defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
By- Ramsés Gallego, Isaca
-
Opinion
14 Jan 2019
Security Think Tank: Combine SDN, containerisation and encryption to halt rogue code
How can organisations combine software-defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
By- Mary-Jo de Leeuw, (ISC)2
-
Feature
14 Jan 2019
Security without borders
Perimeterless security offers a way to secure each point of connectivity and every device, rather than relying on perimeter protection Continue Reading
By -
Opinion
11 Jan 2019
Security Think Tank: How to use SDN, containers and encryption – and some warnings
How can organisations combine software-defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
By -
Opinion
09 Jan 2019
Security Think Tank: The security role of SDN, containers, encryption and SDP
How can organisations combine software-defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
-
Opinion
31 Dec 2018
Can we live without passwords?
Can you imagine a future in which we can be secure online without having to remember an unwieldly list of passwords? Solutions are emerging that could make passwords redundant, but there will be other security problems to resolve Continue Reading
By- Bruno Halopeau & Adrien Ogee
-
News
31 Dec 2018
Top 10 network stories of 2018
2018 was the year when software-defined networking, and more specifically software-defined WANs, took centre stage. We look back at a transformative year for the world of the network manager Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Dec 2018
Malwarebytes: Fileless ransomware an emerging threat for U.S.
A new Malwarebytes report examines Sorebrect, a fileless ransomware threat that's been detected in the U.S. this year, as well as with three other fileless attacks. Continue Reading
By- Casey Clark, TechTarget
-
News
24 Dec 2018
Top 10 IT security stories of 2018
Here are Computer Weekly’s top 10 IT security stories of 2018 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Dec 2018
APAC cyber security landscape to be more tumultuous in 2019
Amid growing cyber threats, the Asia-Pacific cyber security landscape will not get any rosier in 2019 unless organisations start shoring up their cyber hygiene Continue Reading
By- Aaron Tan, TechTarget