Network security management
-
News
11 Nov 2025
Google: Don’t get distracted by AI, focus on real cyber threats
While hackers are using artificial intelligence to optimise attacks, many of the most damaging breaches still rely on old-school methods, says a top security analyst from Google Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
07 Nov 2025
City of London deploys SASE to future-proof public infrastructure
Managed services provider to deliver an end-to-end networking connectivity offering, encompassing what is said to be a UK-first enterprise secure access service edge roll-out for public services Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
25 Jan 2019
Vodafone suspends use of Huawei hardware
Vodafone’s UK CEO has said the operator will ‘pause’ its use of Huawei hardware for the foreseeable future Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Jan 2019
Chinese government grants BT new powers
Enhanced operating licences improve telco’s ability to work with customers in China Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Jan 2019
Thales eSecurity spins out nCipher
After just over a decade, Thales eSecurity has announced that it has spun out HSM specialist nCipher, the UK-based encryption firm it acquired for $100m in 2008 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
23 Jan 2019
MPs challenge Huawei over spying allegations
The chair of the cross-bench Science and Technology Committee has written to Huawei seeking answers over its activities in the UK Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Jan 2019
US issues emergency directive to halt DNS hijacking
US government agencies have been given 10 days to complete a four-step action plan to stop DNS hijacking attacks Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
22 Jan 2019
Moving beyond network boundaries
In this week’s Computer Weekly, we look at how businesses are adapting to the challenges of perimeterless network security. We examine how digital transformation is bringing increased complications for identity and access management (IAM). And we ask if public cloud providers are becoming a threat to the funding model for open source software. Read the issue now. Continue Reading
-
News
21 Jan 2019
Public procurement key to cyber security
Using public procurement as a means of boosting cyber security is the top recommendation for 2019, according to a report based on expert views Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
21 Jan 2019
Break free from traditional network security
Highly connected businesses put pressure on traditional network security. We look at how corporate networks are breaking out of their boundaries Continue Reading
By- Cliff Saran, Managing Editor
-
Opinion
17 Jan 2019
Security Think Tank: Cloud tech helps to protect advanced networks
How can organisations combine software-defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
By -
News
17 Jan 2019
CenturyLink opens Singapore SOC amid security services boom
US telco’s second Asia-Pacific security operations centre in Singapore is one of eight globally as it bids to carve a slice of the security services market Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
15 Jan 2019
Millions of industrial remote controllers open to attack
Millions of industrial remote controllers are open to cyber attack because of vulnerabilities in the radio frequency technology used, a study has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
15 Jan 2019
Security Think Tank: Apply different techniques to safeguard against rogue code
How can organisations combine software-defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
By- Ramsés Gallego, Isaca
-
Opinion
14 Jan 2019
Security Think Tank: Combine SDN, containerisation and encryption to halt rogue code
How can organisations combine software-defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
By- Mary-Jo de Leeuw, (ISC)2
-
Feature
14 Jan 2019
Security without borders
Perimeterless security offers a way to secure each point of connectivity and every device, rather than relying on perimeter protection Continue Reading
By -
Opinion
11 Jan 2019
Security Think Tank: How to use SDN, containers and encryption – and some warnings
How can organisations combine software-defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
By -
Opinion
09 Jan 2019
Security Think Tank: The security role of SDN, containers, encryption and SDP
How can organisations combine software-defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
-
Opinion
31 Dec 2018
Can we live without passwords?
Can you imagine a future in which we can be secure online without having to remember an unwieldly list of passwords? Solutions are emerging that could make passwords redundant, but there will be other security problems to resolve Continue Reading
By- Bruno Halopeau & Adrien Ogee
-
News
31 Dec 2018
Top 10 network stories of 2018
2018 was the year when software-defined networking, and more specifically software-defined WANs, took centre stage. We look back at a transformative year for the world of the network manager Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Dec 2018
Malwarebytes: Fileless ransomware an emerging threat for U.S.
A new Malwarebytes report examines Sorebrect, a fileless ransomware threat that's been detected in the U.S. this year, as well as with three other fileless attacks. Continue Reading
By- Casey Clark, TechTarget
-
News
24 Dec 2018
Top 10 IT security stories of 2018
Here are Computer Weekly’s top 10 IT security stories of 2018 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Dec 2018
APAC cyber security landscape to be more tumultuous in 2019
Amid growing cyber threats, the Asia-Pacific cyber security landscape will not get any rosier in 2019 unless organisations start shoring up their cyber hygiene Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
18 Dec 2018
Mobile security needs a rethink for the 5G era
A report released through the government’s 5G Testbeds and Trials programme has recommended the UK rethink its mobile security strategy Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Dec 2018
Broadband coverage improved through 2018, says Ofcom
Ofcom’s annual Connected Nations report reveals that the number of people who cannot receive a 10Mbps broadband connection has halved Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
14 Dec 2018
Security Think Tank: Smart botnets resist attempts to cut comms
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including "sleepers" designed to be activated at a future date Continue Reading
-
Opinion
14 Dec 2018
Security Think Tank: Strategies for blocking malware comms
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including “sleepers” designed to be activated at a future date? Continue Reading
By -
Opinion
12 Dec 2018
Security Think Tank: Prevention and detection key to disrupting malware comms
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including “sleepers” designed to be activated at a future date? Continue Reading
By- Simon Persin, Turnkey Consulting
-
Opinion
11 Dec 2018
Security Think Tank: Severing C&C comms is key, but complex
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including “sleepers” designed to be activated at a future date? Continue Reading
By- Emma Bickerstaffe, Information Security Forum (ISF)
-
News
10 Dec 2018
O2 expected to pursue Ericsson for compensation over 24-hour stoppage
Mobile network operator could seek up to £100m in damages from its supplier, which failed to update expired software certificates, causing a day-long outage Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
07 Dec 2018
What does the 802.11ax wireless standard mean for your network?
The publication of the 802.11ax standard will pave the way for the next generation of wireless technology, but what does it mean for enterprise networks? Continue Reading
-
News
07 Dec 2018
O2 outage highlights importance of software certificate audits
A major outage on the O2 4G mobile network was caused by an expired certificate and could easily have been avoided, it has emerged Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
06 Dec 2018
Security Think Tank: How to tool up to catch evasive malware comms
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including “sleepers” designed to be activated at a future date? Continue Reading
-
News
06 Dec 2018
Fileless malware surge, warns Malwarebytes report
Data from millions of consumers reveals an uptick in fileless malware and other new-generation malware that calls for a new cyber security approach, report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Dec 2018
China demands release of arrested Huawei CFO
The Chinese government has called for the release of Huawei chief financial officer Meng Wanzhou, who was detained in Canada at the weekend Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Dec 2018
Software failure paralyses O2’s 4G network
O2 is racing to fix a major outage on its 4G network that has left millions of mobile subscribers without access to data services Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Dec 2018
BT moves to strip Huawei kit from EE’s network
Telco will remove Huawei’s networking equipment from the core of EE’s 4G mobile network Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Dec 2018
Symantec unveils AI-based protection for critical infrastructure
Cyber security firm has unveiled what it claims to be the industry’s first neural network to protect critical infrastructure from USB-borne malware attacks Continue Reading
By- Warwick Ashford, Senior analyst
-
Answer
04 Dec 2018
What are the differences between network security vs. cybersecurity?
IT groups need to consider varying layers of security. For instance, the similarities and differences between cybersecurity and network security are closely entwined. Continue Reading
By- Mike Jude, Stratecast/Frost & Sullivan
-
Feature
04 Dec 2018
The future of network-connected device security
The proliferation of poorly secured network-connected devices has prompted the UK government to publish new best practice guidelines. Do these go far enough? Continue Reading
-
Answer
16 Nov 2018
What are today's top 3 network security challenges?
A significant shortage of cybersecurity staff, poorly configured firewalls and unmanaged end-user mobile devices are some of the top network security threats. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
-
Answer
16 Nov 2018
How does Thanatos ransomware decryptor tool restore data?
Cisco Talos' Thanatos ransomware decryptor can recover files affected by new ransomware that won't decrypt ransomed files even when a ransom has been paid. Continue Reading
By -
Feature
16 Nov 2018
Securing the SD-WAN: The next network challenge
Every time an enterprise weighs up whether or not to try SD-WAN, security is an essential part of the picture Continue Reading
-
News
16 Nov 2018
Why is hiring a government chief security officer such a tricky business?
Security bosses and CIOs weigh in on why they think the government is struggling to recruit a chief security officer Continue Reading
By -
E-Zine
15 Nov 2018
CW ASEAN: Blockchain is no ‘magic wand’ for security
Blockchain is all the rage, although the technology is so much more than just about bitcoin and cryptocurrencies. In this issue of CW ASEAN, we examine how blockchain is being applied in cyber security, and whether the technology is really as secure as claimed by its proponents. Read the issue now. Continue Reading
-
Feature
14 Nov 2018
It’s complicated: How enterprises are approaching IAM challenges
Identity and access management challenges are evolving with digital transformation. Computer Weekly explores some of the ways organisations are ensuring the right people gain the right access to the right resources Continue Reading
-
News
12 Nov 2018
Norway’s IT industry must tackle security vulnerabilities
Report reveals growing threat posed by “hostile foreign actors” against Norway’s IT systems and critical national infrastructure Continue Reading
By- Gerard O'Dwyer
-
News
06 Nov 2018
APAC firms warm up to SD-WAN to solve networking woes
A third of enterprises in the APAC region have already deployed SD-WAN at most of their sites, while 55% are in the process of doing so, a study shows Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
26 Oct 2018
British Airways data breach worse than thought
British Airways has admitted that up to 185,000 more people than first thought may have had personal details compromised in August’s data breach Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Oct 2018
DNS attacks cost finance firms millions of pounds a year
Average cost of recovering from a single DNS attack is $924,390 for a large financial services company, survey shows Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
24 Oct 2018
Sibos 2018: ‘Black swan’ cyber event is inevitable
With security experts and bankers expecting a 9/11-style cyber event, deeper collaboration between companies and governments is necessary to identify emerging threats before they occur Continue Reading
-
News
22 Oct 2018
McAfee CTO raises concerns about election cyber security
The security industry needs to look at the security of election processes around the world as well as the security of voting and counting machines, says McAfee CTO Continue Reading
By- Warwick Ashford, Senior analyst
-
Answer
17 Oct 2018
How did the IcedID and TrickBot banking Trojans join forces?
The TrickBot banking Trojan joined forces with IcedID to form a dual threat that targets victims for money. Discover how this union occurred and how it has changed their behaviors. Continue Reading
By -
News
16 Oct 2018
APAC security spending tipped to reach new highs
Security services will be the largest and fastest-growing slice of the overall security pie in the Asia-Pacific region Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
15 Oct 2018
Cost of WannaCry attack to NHS set at £92m
Department for Health and Social Care estimates the immediate cost of the May 2017 WannaCry attack on the NHS was £92m, and says it will have spent about £275m on improvements to its cyber security infrastructure by the end of 2021 Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Oct 2018
AI is no silver bullet for cyber security
A security expert has called for businesses to manage the risks of adopting new technologies and improve their cyber hygiene, rather than see artificial intelligence as a panacea for their security woes Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
11 Oct 2018
Optus to acquire Hivint in cyber security deal
The deal is expected to bolster the telco’s security pedigree in a market that is grappling with more data breaches and cyber incidents Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
08 Oct 2018
Airbus secures European institutions against cyber threat
Airbus CyberSecurity has partnered with Atos to help protect 17 European government institutes from cyber attacks Continue Reading
By- Cliff Saran, Managing Editor
-
Opinion
04 Oct 2018
Security Think Tank: Use Cyber Essentials to kick-start outcomes-based security
What is the first step towards moving from a tick-box approach to security to one that is outcomes-based and how can an organisation test whether its security defences are delivering the desired outcome? Continue Reading
By -
News
03 Oct 2018
Companies failing to recognise the internal cyber threat
The focus at many companies is on external cyber threats, and internal threats are being overlooked as a consequence, a researcher warns Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Oct 2018
Rise in data-stealing Betabot malware
Researchers are warning about an increase in Betabot malware after detecting multiple infections in recent weeks, underlining the importance of software patching Continue Reading
By- Warwick Ashford, Senior analyst
-
Answer
01 Oct 2018
SamSam ransomware: How is this version different from others?
Sophos recently discovered a SamSam extortion code that performs company-wide attacks using a range of vulnerability exploits. Discover how this version differs from past variants. Continue Reading
By -
News
28 Sep 2018
Cyber attackers are increasingly exploiting RDP, warns FBI
Businesses should to act to reduce the likelihood of compromise from cyber attackers exploiting the remote desktop protocol, warns the FBI Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Sep 2018
Network growth brings management challenges
As enterprise networks grow, so do the challenges of managing them effectively, says a report compiled by Oracle’s communications unit Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Sep 2018
Business is at inflection point for proactive cyber security
The time is ripe for proactive cyber security, but many organisations must first overcome four key obstacles to achieve effective protection, according to a research report Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Sep 2018
Norwegian state discusses vulnerabilities with IT sector
Government is collaborating with the country’s IT industry to improve the availability of security expertise Continue Reading
By- Gerard O'Dwyer
-
News
25 Sep 2018
MI5 admits to ‘unlawful’ spying on Privacy International
The UK's intelligence agencies acted unlawfully by intercepting communications data on NGO, Privacy International, the UK's most secret court ruled. Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
18 Sep 2018
AI is crucial element of security strategy in the IoT era
Machine learning and network visibility for users and internet of things devices are essential to battle threats inside the enterprise, according to a new report Continue Reading
By- Alex Scroxton, Security Editor
-
News
17 Sep 2018
Singapore government to start bug bounty programme
Singapore’s bug bounty programme will help the authorities identify cyber blind spots and benchmark its defences against skilled hackers Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
13 Sep 2018
GCHQ mass surveillance regime was in breach of human rights law, European court rules
The European Court of Human Rights in Strasbourg has ruled that the UK’s collection of bulk interception of communications data lacked adequate oversight and safeguards and was in breach of human rights law Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
11 Sep 2018
Higher education sector's poor response to cyber threats laid bare in EfficientIP report
The 2018 EfficientIP Global DNS Report shines a light on how ill-prepared the higher education sector is for handling cyber threats Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
11 Sep 2018
British Airways data breach: Security researchers name suspects and query attack timeline
Security researchers claim to have pinpointed the cause and perpetrators of the British Airways data breach, and also claim the attackers may have had access to its customer data for far longer than previously thought Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
10 Sep 2018
Cyber criminals outspend businesses in cyber security battle
Cybercriminals are flexing their financial might and UK organisations are facing more attacks as a result Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
21 Aug 2018
New Zealand to run national cyber security exercise
The island-nation will test the resilience of its critical infrastructure in November 2018, bringing together multiple agencies to protect assets of national significance Continue Reading
-
News
16 Aug 2018
Global infosec spending to top $114bn in 2018, says Gartner
The need for improved detection, response and privacy is driving the demand for security products and services in response to security risks, business needs and industry changes, Gartner reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
14 Aug 2018
Cyber attackers target infrastructure
In this week’s Computer Weekly, we find out about the growing sophistication of cyber attackers who specialise in industrial control systems. They are fast, efficient and able to move between IT and OT environments. We also discover how few businesses in general are reporting cyber crime, as they should. The issue also tracks Google’s playing court to the C-suite, with respect to cloud computing. Read the issue now. Continue Reading
-
News
14 Aug 2018
FBI warns of global ATM cyber crime spree
The FBI has issued a warning to banks that cyber criminals are planning to steal millions in a coordinated worldwide attack on cash machines Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 Aug 2018
Millions of businesses vulnerable to fax-based cyber attack
Hackers could exploit security vulnerabilities in fax machines to launch cyber attacks in millions of organisations around the world, researchers warn, underlining the need for cyber resilience Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Aug 2018
Brace for more Triton-like attacks, researchers warn
The world has not seen the last of industrial control system (ICS) attacks like Triton, researchers have warned Continue Reading
By- Warwick Ashford, Senior analyst
-
News
07 Aug 2018
Industrial control systems a specialised cyber target
Cyber attackers specialising in industrial control systems are fast, efficient and able to move between IT and OT environments, a study has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Aug 2018
Virus outbreak at iPhone chip plant could delay shipments
A computer virus at an iPhone chip manufacturing plant could delay shipments of Apple’s latest smartphones, but the impact will be limited, say analysts Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Aug 2018
UK security centre to launch IoT security standard
The London-based Centre for Strategic Cyber Space and Security Science is working on an internet of things security standard and has roped in participants from eight markets Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
31 Jul 2018
Briton ran pro-Kremlin disinformation campaign that helped Trump deny Russian links
A British IT manager and former hacker from Darlington ran a disinformation campaign that duped former US intelligence agents and provided Donald Trump with manufactured “evidence” to deny that Russia interfered with the US election Continue Reading
By- Duncan Campbell , 2QQ Ltd, Sussex University
-
News
26 Jul 2018
Brace for PowerGhost cryptominer, warns Kaspersky Lab
Corporate networks are the target of a new illicit cryptocurrency mining malware that is difficult to detect and eradicate, security researchers warn Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Jul 2018
Cyber security vulnerability concerns skyrocket
Security professionals are more worried about data breaches and cyber attacks than they were a year ago, with most fearing that Meltdown-Spectre attacks are becoming the norm Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
25 Jul 2018
Smart cities face challenges and opportunities
IHS Markit analysts Noman Akhtar and Kevin Hasley assess the way forward for smart city technology projects around the world Continue Reading
By- Norman Akhtar and Kevin Hasley
-
Opinion
25 Jul 2018
Beyond GDPR: ePrivacy could have an even greater impact on mobile
From how we monitor air pollution and manage our public transport systems, to how we enable connected cars and the next generation of 5G mobile services, the forthcoming ePR could have a lasting impact on European society Continue Reading
By- Jade Nester, GSMA
-
News
24 Jul 2018
MPs call for inquiry into smart meter roll-out
Government urged to conduct a review of the roll-out of smart meters for electricity and gas, and to intervene to tackle a number of failures Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Jul 2018
Singapore public healthcare sector limits internet use
Healthcare workers who require internet access will have to use separate internet workstations following an unprecedented attack on Singapore’s public healthcare system Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
23 Jul 2018
Zero trust security model boosts business confidence
Organisations that combine the zero trust security model with next-gen access are more confident about meeting access control challenges, a study shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Jul 2018
How Splunk is ‘splunking’ data for APAC enterprises
Splunk’s regional vice-president talks up the company’s business strategy and how its customers are using big data analytics in security and IT operations Continue Reading
By- Aaron Tan, Informa TechTarget
-
E-Zine
17 Jul 2018
CW ANZ: Fix the weak links
Recent reports have suggested that cyber threats are increasingly aimed at critical information infrastructure such as power grids, water treatment plants and transportation networks. While the scale of the problem that Australian industry faces is hard to quantify, no one disputes the threat is real. In this edition of CW ANZ, we look at how Australia is securing its industrial control systems and how it is bridging the security gap between IT and OT teams. Read the issue now. Continue Reading
-
Feature
17 Jul 2018
An insider’s look into the dark web
A principal research scientist at Sophos offers a glimpse into the abysses of the dark web in a bid to uncover what cyber crooks are up to Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
17 Jul 2018
A third of organisations do not have a security expert, survey shows
Around a third of organisations are vulnerable to cyber attacks due to a lack of dedicated in-house cyber security experts, finds Gartner survey Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
13 Jul 2018
Hackers increasingly targeting cloud infrastructure
Cloud infrastructure is a growing target for cyber attackers because of available computing resources, as well as the repositories of valuable data, a report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Jul 2018
Cyber attackers cashing in on ‘hidden’ attack surface
Cyber attackers are cashing in on organisations’ lack of visibility into all online interactions that can involve multiple third parties, a report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Jul 2018
Corporate networks vulnerable to insider attacks, report finds
Researchers found that 100% of corporate networks tested in 2017 were vulnerable to insider attacks, with Wi-Fi networks and employees among the top areas of weakness Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Jul 2018
Inside one of the world’s largest bug bounty programmes
Trend Micro’s Zero Day Initiative may be the top external supplier of software bug reporting for Microsoft and Adobe, but that does not mean it purchases every type of bug Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
29 Jun 2018
UK government cyber security standard welcomed
The information security community has welcomed the publication of the government’s minimum cyber security standard, which could be used by any organisation to improve its cyber defences Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 Jun 2018
University of Melbourne claims quantum computing breakthrough
Australian scientists have simulated the power of quantum computing on classical computers to solve a mathematical problem, paving the way for future breakthroughs in the nascent field Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
27 Jun 2018
Brexit a greater risk to UK financial system than cyber attack
While Brexit is seen as the biggest risk to the stability of the UK financial system, cyber attack is the most difficult risk to manage for over half of firms Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
27 Jun 2018
Government must challenge popular smart city misconceptions
A report by the All Party Parliamentary Group on Smart Cities says many people feel alienated by the concept, and calls on the government to challenge some popular misconceptions Continue Reading
By- Alex Scroxton, Security Editor
