Network security management
-
E-Zine
07 Dec 2023
CW EMEA: Prepare for cyber war
When the war between Hamas and Israel began in October, cyber security professionals and major government and private organisations braced for an inevitable accompanying online war. In this issue of CW EMEA, we outline cyber war, patterns of threat activity, and find out what security teams can do to protect their organisations. We also look at Finland’s advances in quantum computing, how Belgian researchers have developed technology to help datacentres process data faster, and the secrets of KPN’s successful business transformation. Read the issue now. Continue Reading
-
News
21 Mar 2023
Nordics move towards common cyber defence strategy
Nordic countries agree to work together to improve their cyber defences amid increasing threat Continue Reading
-
News
11 Aug 2014
USB-connected devices present cyber vulnerabilities
Connecting devices to computers using a USB port could lead to security breaches, say Berlin-based researchers Continue Reading
-
News
18 Jul 2014
BT’s secure link to Microsoft Azure goes live in Europe
BT’s new, secure, high-performance connectivity to Azure public cloud has gone live in Europe three months after BT teamed up with Microsoft Continue Reading
-
Opinion
16 Jul 2014
The legal considerations of the internet of things
As with many new technologies, there are a number of tricky legal challenges to consider as part of widespread IoT adoption Continue Reading
-
News
07 Jul 2014
Smart light bulbs get security update
Smart light bulb maker LIFX has issued a firmware update after security researchers exposed a security weakness Continue Reading
-
News
04 Jul 2014
Barclays passes government’s ‘internet-born threat’ test
Barclays Bank has been awarded the government’s cyber security certificate for digital banking services after independent tests of services such as Pingit Continue Reading
-
News
03 Jul 2014
Netflix releases its AWS monitoring tool Security Monkey into the wild
Netflix has made Security Monkey, the AWS tracker tool it built for itself, freely available to other Amazon cloud users Continue Reading
-
News
16 Jun 2014
Microsoft admits running out of IP addresses for Azure
Microsoft has assured US Azure customers data remains in the US, despite running out of US-registered IP addresses at times Continue Reading
-
E-Zine
09 Jun 2014
The case for a European cloud market
In this week’s Computer Weekly, the European Commission wants to create a digital single market in Europe based on industry standard clouds – but is the plan realistic? Network encryption promises to solve many IT security threats – we examine the benefits. And our latest buyer’s guide looks at business process management. Read the issue now. Continue Reading
-
News
06 Jun 2014
Vodafone blows lid on government spy networks
Vodafone reveals secret mobile phone-tapping network and joins Microsoft and Cisco in calling for debate on electronic surveillance Continue Reading
-
News
02 Jun 2014
Cyber threats hiding in plain sight, says Palo Alto Networks
Cyber attackers exploit commonly used business applications to bypass security controls, research shows Continue Reading
-
News
25 Apr 2014
Cyber threat detection paramount, says SANS fellow
Cyber threat prevention is ideal, but detection is a must, says Eric Cole, SANS Institute fellow Continue Reading
-
News
03 Apr 2014
Why have organisations failed to make PSN compliance deadline?
A number of organisations have failed to meet the PSN security compliance deadline despite the threat of being cut off from critical services Continue Reading
-
Feature
14 Mar 2014
Hacktivism: good or evil?
IT lawyer Dai Davis looks at the rise of hacktivism and its impact on business and international politics Continue Reading
-
News
12 Mar 2014
More than 162,000 WordPress sites used in DDoS attack
Security researchers have uncovered a DDoS attack that used more than 162,000 legitimate and unwitting WordPress websites Continue Reading
-
News
04 Mar 2014
IT Security Salary Index (UK)
Are you being paid the right rate for the job? Check out this IT Security salary index from Acumin. Continue Reading
-
News
21 Feb 2014
PSN gets encryption for higher security levels
An encryption service has been announced by the Cabinet Office which will enable public sector staff to share information at the IL3 security level over the Public Services Network (PSN) Continue Reading
-
News
06 Feb 2014
UK critical infrastructure at risk of cyber attack, says IET report
UK critical national infrastructure is at risk of cyber attack, says a report by consultancy Atkins for the Institution of Engineering and Technology (IET) Continue Reading
-
News
05 Feb 2014
Bank of England publishes Waking Shark II cyber security exercise results
Bank of England publishes the results of its Waking Shark II security exercise, which tested financial institutions' contingency plans for cyber attack Continue Reading
-
News
17 Jan 2014
Internet at risk of 'cybergeddon' says WEF
Internet is at risk of fragmenting amid concerns over spying and cyber crime, says World Economic Forum Continue Reading
-
News
10 Jan 2014
Security considerations for UK enterprises
This Research Snapshot from Vanson Bourne looks at IT security spending trends, awareness of cyber-threats, and the factors perceived as the biggest security risks for organisations. Continue Reading
-
News
20 Dec 2013
UK citizen wins legal round against Facebook over Prism leaks
A British citizen has applied for a judgement against Facebook in a case that will test the right of tech firms to give UK personal data to the NSA. Continue Reading
-
E-Zine
16 Dec 2013
Can BlackBerry restore its business appeal?
In this week’s issue of Computer Weekly, we examine whether former Sybase chief, John Chen, will be able to stem the decline of BlackBerry and reinvent the the smartphone maker as a software business for the “bring your own device” (BYOD) era. Our buyer’s guide to the internet of things concludes with a look at how universal connectivity will yield insights in fields as diverse as aviation and hospitality. And we analyse Google’s attempts to compete with Amazon Web Services in public cloud. Continue Reading
-
News
05 Dec 2013
UK citizen sues Microsoft over Prism private data leak to NSA
A court action brought in the UK will test Microsoft's legal right to disclose private data on UK citizens to US intelligence services Continue Reading
-
News
04 Dec 2013
Councils threatened with disconnection from PSN in escalating security row
A London council was hours away from being disconnected from the public sector network, in an row between central and local government over security compliance Continue Reading
-
News
27 Nov 2013
European Parliament closes Wi-Fi after man-in-the-middle attack
A number of mailboxes have been compromised and users’ smartphones could be at risk following a man-in-the-middle attack on the European Parliament’s public Wi-Fi Continue Reading
-
News
26 Nov 2013
NCA changed UK cyber crime fighting, says NCCU head
The NCA has changed the UK law enforcement landscape, says Andy Archibald, head of the NCA’s National Cyber Crime Unit Continue Reading
-
News
26 Nov 2013
White hat Wi-Fi hacking shows vulnerability of business data
Whitehat hackers have shown that senstitive data can be sniffed easily from public Wi-Fi hotspots Continue Reading
-
News
25 Nov 2013
Facebook authentication - Like?
As Cisco teams up with Facebook to offer authentication for public Wi-Fi, is this option safe for businesses? Continue Reading
-
News
15 Nov 2013
Cyber collateral damage a concern for all, says Lancope
All organisations could be affected by cyber attack collateral damage, says network security firm Lancope Continue Reading
-
News
12 Nov 2013
Mass surveillance a bad idea, says Information Commissioner Christopher Graham
Information Commissioner Christopher Graham says issues of national security must not overshadow concerns of legitimate public interest Continue Reading
-
News
12 Nov 2013
Global profiles of the fraudster
Computers, rather than conmen, are set to be the future face of fraud, as criminals turn to robotics in an effort to avoid detection, this report from KPMG reveals. Continue Reading
-
News
29 Oct 2013
Analysis: RSA says security needs to change, but what does that mean?
RSA executive chairman Art Coviello has issued a call to action to the security industry to improve technology and collaboration Continue Reading
-
News
29 Oct 2013
Most businesses need to transform IT security, says RSA
No modern network or IT system can withstand the onslaught of a skilled adversary, given focus and time, says Amit Yoran, general manager of RSA Continue Reading
-
News
23 Oct 2013
US publishes draft cyber security framework
The US has published a draft framework of voluntary cyber security standards aimed at reducing risks to critical national infrastructure Continue Reading
-
News
17 Oct 2013
Government overhauls security classification to fit digital age
In its first overhaul since World War II the government is consolidating six security bands to three with a system deemed more appropriate in the digital age. Continue Reading
-
News
17 Oct 2013
The challenges of using mobile devices in the public sector
The government is allowing the public sector to implement BYOD schemes, but the guidelines are limiting and challenges still remain Continue Reading
-
News
16 Oct 2013
Neustar to host first DDoS awareness day
Communications firm Neustar is to host the first international awareness day on distributed denial of service (DDoS) attacks Continue Reading
-
News
02 Oct 2013
McAfee Focus 2013: McAfee leadership upbeat about Stonesoft acquisition
Intel-owned security firm McAfee is upbeat about its acquisition of Stonesoft and its future capability to tackle security differently Continue Reading
-
News
30 Sep 2013
MoD announces specialist programme to fend off cyber attacks
The Ministry of Defence (MoD) has announced a strategy to defend UK national security from the threat of cyber attacks Continue Reading
-
News
27 Sep 2013
Top 10 cyber crime stories of 2013
Cyber crime featured heavily in security news coverage in 2013, with cyber criminals and cyber law enforcers upping their games with each passing month Continue Reading
-
News
06 Sep 2013
NSA and GCHQ unlock online privacy encryption
UK and US intelligence agencies have unlocked the technology used to encrypt online services, including email, online banking and medical records. Continue Reading
-
News
05 Sep 2013
Windows 2012 Server Network Security
This book chapter offers an introduction to Windows 8 and Windows Server 2012 network security and IPv6. It includes a 30% discount code for Computer Weekly readers. Continue Reading
-
News
05 Sep 2013
Windows Server 2012 Security from End to Edge and Beyond
This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask. Continue Reading
-
News
05 Sep 2013
Printing: a false sense of security?
Louella Fernandes and Bob Tarzey show how secure printing technology can provide authentication, authorisation and accounting capabilities, helping businesses improve document security and meet compliance regulations. Continue Reading
-
News
22 Aug 2013
Charlie McMurdie joins PwC’s cyber practice
Charlie McMurdie, former head of the Metro Police central e-crime unit, is joining business consultancy firm PwC as its senior crime adviser Continue Reading
-
News
20 Aug 2013
Targeted attacks and how to defend against them
Analysts Bob Tarzey and Louella Fernandes assess the scale and real impact of targeted attacks the measures being taken to defend against them. Continue Reading
-
News
05 Aug 2013
Websites hacked to show child abuse images
More than 25 business websites worldwide have been hacked to show illegal images of child sex abuse Continue Reading
-
Feature
30 Jul 2013
Big data journalism exposes offshore tax dodgers
How journalists harnessed big data to challenge offshore financial secrecy Continue Reading
-
News
29 Jul 2013
Continual vigilance key to security, says Damballa
UK businesses must update their approach to cyber security to look for signs of compromise continually Continue Reading
-
E-Zine
29 Jul 2013
Securing your Wi-Fi data network
Has the 2007 assault on the Wi-Fi network of the US based TJX retail group shocked corporations enough to take note and ensure their networks are actually secure?CW Europe investigates the dip in high-profile security breaches, across the region. Continue Reading
-
News
19 Jul 2013
IT security case studies
Four critical IT security case-studies selected from the winners of Computer Weekly's European User Awards for security Continue Reading
-
News
18 Jul 2013
Needle in a Datastack: The rise of big security data
This research from McAfee investigates how well organisations are positioned to address the challenges of managing security in a world of ever increasing amounts and types of data. Continue Reading
-
News
17 Jul 2013
IT Security Case Studies
Warwick Ashford presents 4 essential IT security case-studies selected from the winners of Computer Weekly's European User Awards. Continue Reading
-
News
08 Jul 2013
UK takes cyber threats to infrastructure seriously
The UK is taking seriously potential cyber threats to critical national infrastructure, according to GCHQ head Iain Lobban Continue Reading
-
News
05 Jul 2013
Security Think Tank: Prism unlikely to change much
Does the data collected by Prism put the US Government at risk from other state or non-state sponsored activists? Continue Reading
-
News
21 Jun 2013
UK businesses failing to secure virtual environments, study finds
Most UK businesses are failing to secure data in virtual environments, a survey of IT decision makers has revealed Continue Reading
-
News
10 Jun 2013
Telefonica Digital forms security group Eleven Paths
The business division of mobile operator Telefonica launches Eleven Paths, an independent company working on security issues in the workplace Continue Reading
-
News
21 May 2013
Privileged accounts key to most APT attacks, says Cyber-Ark
The theft, misuse and exploitation of privileged accounts is becoming an increasingly key tactic in advanced persistent threat attacks Continue Reading
-
News
01 May 2013
What’s to be done about data breach discovery?
The time from first contact by cyber attackers to the victim learning of it is still measured in months and years, not hours and days Continue Reading
-
News
01 May 2013
CW buyer's guide: context-aware security
This 11-page Computer Weekly buyer's guide looks at how organisations should approach context-aware security technologies and what business benefits they can deliver. Continue Reading
-
News
01 May 2013
CW Special Report on CSC
This 16-page report from Computer Weekly analyses the challenges facing CSC, its financial performance, the services it offers, its place in the IT market and its future strategy. Continue Reading
-
News
29 Apr 2013
Another online firm hit by data breach
Online deals service LivingSocial is the latest company to report a breach of its computer systems that may mean attackers accessed customer details Continue Reading
-
News
25 Apr 2013
Spam SMS messages drop following ICO penalty
The number of spam SMS messages has significantly reduced since government regulator ICO issued £440,000 fines last year Continue Reading
-
News
22 Apr 2013
Infosec 2013: University research challenges reliability of IPS
Research shows intrusion prevention systems (IPS) are not as effective at detecting malicious activity as some might think Continue Reading
-
Feature
22 Apr 2013
The internet of things is set to change security priorities
IT leaders must protect against the security risks introduced by the growing interaction between technology and the physical world. Continue Reading
-
News
19 Apr 2013
Conficker makes way for web-based attacks, says Microsoft
Web attacks emerge as top threat as businesses finally begin to win the battle against Conficker and other worms, says Microsoft Continue Reading
-
News
11 Apr 2013
Bots and web apps among top threats to data security, says Check Point
Bots, viruses, breaches and attacks are a constant and real threat to the information security of organisations Continue Reading
-
News
11 Apr 2013
Porn websites pose malware risk, says researcher
Browsing popular pornography internet sites pose a growing risk of malware infection, according to a security researcher Continue Reading
-
News
03 Apr 2013
Anonymous threatens to declare cyber war on North Korea
Anonymous hacktivist collective has threatened North Korea with cyber war if leader Kim Jong-un does not resign and install free democracy Continue Reading
-
News
27 Mar 2013
UK government sets up cyber security fusion cell
A cyber security “fusion cell” for cross-sector threat data sharing aims to put government, industry and information security analysts side-by-side Continue Reading
-
News
26 Mar 2013
Employees ignore security rules, say infosec pros
Most information security professionals believe corporate employees wilfully ignore security rules, survey at RSA Conference 2013 reveals Continue Reading
-
News
20 Mar 2013
Case study: Hamilton Fraser embraces BYOD with MobileIron
How insurance firm Hamilton Fraser is using MobileIron to enable employees to bring their own devices while following company policy Continue Reading
-
News
06 Mar 2013
What is RSA's build, buy, partner strategy?
Computer Weekly takes a closer look at RSA's build, buy, partner strategy Continue Reading
-
News
05 Mar 2013
Security the future: Keeping up with the business
Gareth Lindahl-Wise, group information security manager at British American Tobacco, explains the company's approach to enterprise security architecture. Continue Reading
-
Feature
04 Mar 2013
How to tackle big data from a security point of view
Before leaping into big data, companies must be clear what they are trying to achieve, otherwise their investment will be wasted Continue Reading
-
Feature
11 Feb 2013
How to find the most vulnerable systems on your internal network
Most corporate networks share common vulnerabilities, but many could be mitigated with education in “hacker thinking” for technical staff Continue Reading
-
News
28 Jan 2013
Why has NAC, like DLP, failed to take off?
Why are organisations not investing in systems that are designed to keep malicious actors out of their networks? Continue Reading
-
News
24 Jan 2013
ICO hits Sony with £250,000 data breach penalty
The Information Commissioner’s office (ICO) has fined Sony Computer Entertainment Europe £250,000 for breaching the Data Protection Act Continue Reading
-
News
22 Jan 2013
Why has DLP never taken off?
Why is data loss prevention (DLP) technology not being adopted if it provides the very protection most businesses need? Continue Reading
-
Feature
07 Jan 2013
Business priorities: what to protect, monitor and test
How information security professionals can prioritise what to protect, monitor and test in the light of current budget and resource constraints Continue Reading
-
News
06 Dec 2012
2012 Cost of Cyber Crime Study: UK
The 2012 Cost of Cyber Crime Study: United Kingdom is independently conducted by Ponemon Institute. The benchmark study, sponsored by HP Enterprise Security is based on a representative sample of 38 organisations in various industry sectors. Continue Reading
-
News
03 Dec 2012
IT Security Purchasing Intentions 2013
This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe. Continue Reading
-
News
13 Nov 2012
Many UK firms underestimate cost of data breaches, study finds
Many UK organisations are still failing to understand the implications and costs of data breaches, a study has revealed Continue Reading
-
News
13 Nov 2012
The Global State of Information Security Survey 2013: Key Findings
This global study examines the state of cyber-security and the impact of cyber crime and offers advice to businesses on reducing the risks. Continue Reading
-
News
12 Nov 2012
Hacking attempts to top one billion in Q4, predicts NCC Group
One billion hacking attempts will be made globally in the final quarter of 2012, according to information assurance firm NCC Group Continue Reading
-
News
07 Nov 2012
Police arrest man for DDoS attacks on Theresa May sites
Police have arrested a 41-year-old man in connection with a cyber attack on websites connected to home secretary Theresa May Continue Reading
-
News
31 Oct 2012
‘VM-aware’ viruses on the rise
Viruses targeting virtual machines (VM) are growing in numbers and will soon be the dominant force in the world of cyber crime, says Kaspersky Continue Reading
-
News
30 Oct 2012
IT security budgets mismatched to hacker targets, study shows
IT security budgets are not being used to provide defence technologies in some areas most likely to be targeted by hackers, a study shows Continue Reading
-
News
25 Oct 2012
ICO hits Stoke-on-Trent City Council with £120,000 fine
Stoke City Council has breached the Data Protection Act, for the second time in two years, after details of a child protection legal case were emailed to the wrong person. Continue Reading
-
News
17 Oct 2012
ZTE targets local government for UK growth
Despite security controversy, Chinese firm ZTE’s UK head of sales tells Computer Weekly one of its first targets will be local government Continue Reading
-
News
16 Oct 2012
Organisations need alternative data protection as security models fail
Organisations' security models are failing - so could it be time to adopt an intelligence-led approach to data protection and fighting cyber crime? Continue Reading
-
News
11 Oct 2012
RSA Europe: Thousands of unprotected virtual servers exposed to the web
Organisations are failing to protect data in virtual environments, says Jason Hart, vice-president cloud solutions, SafeNet Continue Reading
-
News
11 Oct 2012
RSA Europe: Security concerns whole supply chain, says Misha Glenny
Targeted attacks affect the whole supply chain, not just big corporations, author Misha Glenny tells RSA Conference Europe 2012 attendees Continue Reading
-
News
05 Oct 2012
Security firm warns against Samsung Galaxy Tab for enterprise use
Security specialist Context Information Security says vulnerabilities in the Samsung Galaxy Tab make it unsuitable for use in the enterprise Continue Reading
-
News
02 Oct 2012
Hackers target White House military network
Hackers using computers in China have infiltrated an “unclassified” network in the US White House, believed to be used for issuing nuclear commands. Continue Reading
-
News
27 Sep 2012
Izz ad-Din al-Qassam hackers launch cyber attack on US bank Wells Fargo
A hacker group connected to Hamas says it attacked US bank Wells Fargo in reaction to the video 'Innocence of Muslims' posted on YouTube Continue Reading
-
News
18 May 2012
MDM, security vendors scramble to address BYOD security issues
Organisations are looking beyond NAC and MDM to resolve BYOD security issues; MDM, security and hybrid vendors are responding with new products. Continue Reading
-
News
30 Mar 2012
SIEM deployment case study shows patience is required
Williams Lea’s SIEM is already helping reduce manual log reviews. But there’s still a lot of work to be done before the SIEM can be fully deployed. Continue Reading
-
News
12 Oct 2011
New batch of IDS, IPS evasion techniques are hitting their targets
Stonesoft has discovered 163 new advanced evasion techniques (AET), claiming these AETs can pass below the radar of some IDS, IPS products. Continue Reading
-
Tip
23 Aug 2011
OpenVAS how-to: Creating a vulnerability assessment report
In this OpenVAS how-to, learn how to use the free scanner to create a vulnerability assessment report and assess threat levels. Continue Reading