Privacy and data protection
-
News
15 May 2025
NHS asks suppliers to sign up to cyber covenant
NHS digital and security leaders call on their suppliers to commit to a new cyber security charter as the health service works to improve its resilience in the face of growing threat levels. Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
14 May 2025
It's time to get to grips with DORA
It's not really a surprise so many organisations missed the EU's DORE compliance deadline, but there's no excuse for delaying, says Azul EMEA VP James Johnston Continue Reading
-
News
15 Jan 2020
Lorca announces new cohort of 20 security scaleups
20 scaleups will focus their attention on automation, zero trust and supply chain security Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Jan 2020
Travelex warns customers to be alert to phone scams
Under-fire forex provider warns that criminals may try to take advantage of its predicament to scam customers Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Jan 2020
LGBTQ+ social app Grindr accused of breaching GDPR
Norwegian Consumer Council files complaints about LGBTQ+ social networking app, alleging it is in breach of the General Data Protection Regulation Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Jan 2020
NSA Windows 10 security disclosure raises questions
In an unprecedented move, the NSA has got out in front of a critical cryptographic flaw in Windows 10, but in doing so has raised multiple questions Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Jan 2020
Threat landscape grew in complexity in 2019, no respite in sight
Check Point’s annual state of security report shares some 2019 trends and looks ahead to 2020 Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Jan 2020
Two-thirds of UK healthcare organisations breached last year
The majority of healthcare organisations in the UK experienced a cyber security incident during 2019, with almost half the result of viruses and malware introduced on third party devices Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Jan 2020
Researchers find cryptojacker hiding in Wav audio file
Victim network was compromised by obfuscated malware hiding a Monero cryptominer, lurking inside a Wav audio file Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Jan 2020
Cyber criminals spend three months lurking in target networks
Cyber criminals are spending longer hiding in target networks before launching their attacks, as more organised groups turn to business disruption to achieve their objectives Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Jan 2020
Turn the end of Windows 7 support into a security advantage
CISOs can take advantage of the end of support for Microsoft Windows 7 by making the case for more investment in cyber security Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Jan 2020
Sextortion campaign hits Nest home security cameras
Owners of Google’s Nest home security cameras are being targeted in a sextortion scam by criminals playing on fears over IoT security Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Jan 2020
Travelex to begin restoring foreign exchange services two weeks after ‘Sodinokibi’ attack
Travelex says it is making “good progress” in its recovery and is to begin restoring electronic foreign exchange services, but is silent about whether it has agreed to pay hackers a $6m ransom to decrypt computer files Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
10 Jan 2020
National Lottery hacker jailed for nine months
Small-time cyber criminal jailed for his role in a cyber attack on lottery operator Camelot that netted him just £5 Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
10 Jan 2020
Learning from the Travelex cyber attack: Failing to prepare is preparing to fail
The key lesson to take from the Travelex breach is that an effective response to a breach is a critical business function and no longer the sole province of the IT department Continue Reading
By- Brian Honan, BH Consulting
-
Blog Post
10 Jan 2020
The rise of 5G, entertainment in cars and increased focus on privacy
This is a guest post by Srinivasan CR, chief digital officer, Tata Communications No matter how much technology keeps evolving, making predictions about the future is always a risky business. But ... Continue Reading
By- Aaron Tan, Informa TechTarget
-
Opinion
10 Jan 2020
Security Think Tank: Hooded hackers? More like ruthless competitors
The traditional picture of a hacker is of a script kiddie in a hoodie hunched over a computer keyboard, but this stereotype is stale and outdated. Is it time to move away from a fear-based approach to security? Continue Reading
By- Vladimir Jirasek, Foresight Cyber
-
News
09 Jan 2020
Customer experience world catches up on CCPA regulations
GDPR compliance has put many marketing, sales, e-commerce and customer service teams somewhat in line with the California Consumer Privacy Act. There are some differences, however. Continue Reading
By- Don Fluckinger, Senior News Writer
-
News
09 Jan 2020
Travelex hackers threaten to sell credit card data on dark web
Sodinokibi cyber gangsters have threatened to sell Travelex customers’ private data on a Russian underground cyber crime forum if it fails to pay a $6m ransom Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
09 Jan 2020
Retail group Dixons Carphone fined £500,000 over data breach
Dixons Carphone receives maximum possible pre-GDPR fine from the ICO following a 2018 data breach Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Jan 2020
Don’t become the next Travelex: Get ready for ransomware
With Travelex’s IT still in disarray and banks and travellers left without access to funds more than a week after it was hit by a ransomware attack, we ask what others can learn from the foreign exchange services company’s response to the incident Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
09 Jan 2020
DRaaS decisions: Key choices in disaster recovery as a service
We examine the key decisions when considering DRaaS. Whether to go full self-service, assisted or managed will depend on what you need to protect and your in-house resources Continue Reading
-
News
09 Jan 2020
PowerTrick backdoor used to target high-value businesses
Threat actors are exploiting a PowerShell-based backdoor called PowerTrick to go after high-value targets, warns SentinelLabs Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
09 Jan 2020
Whisper it… but could a cyber attack be good for your career?
All too often it’s the CISO who carries the can for an enterprise security failure, but this might not be a bad thing. There’s lots of evidence to suggest that falling victim to a cyber attack may actually enhance your CV Continue Reading
By -
News
09 Jan 2020
New GDPR service aims to ease compliance challenges
Security consultants claim their software platform will address a pressing need for an effective and efficient means of complying with data protection rules Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
09 Jan 2020
Security Think Tank: Changing attitudes to cyber is a team sport
The traditional picture of a hacker is of a script kiddie in a hoodie hunched over a computer keyboard, but this stereotype is stale and outdated. Is it time to move away from a fear-based approach to security? Continue Reading
By -
News
08 Jan 2020
Half of UK citizens want tighter data regulations
Over 50% of UK citizens believe the gathering and use of personal data should be subject to more stringent government oversight, according to Fujitsu Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
08 Jan 2020
Five ways that backup has changed since the days of tape
Back in the day, all this was tape, but times have changed, with cloud-to-cloud backup, cloud storage, virtual and physical backup appliances and myriad endpoint hardware Continue Reading
By -
News
08 Jan 2020
TikTok video-sharing app left user data exposed
Check Point uncovered serious vulnerabilities in the TikTok video-sharing app that left users exposed Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
08 Jan 2020
Security Think Tank: Hero or villain? Creating a no-blame culture
The traditional picture of a hacker is of a script kiddie in a hoodie hunched over a computer keyboard, but this stereotype is stale and outdated. Is it time to move away from a fear-based approach to security? Continue Reading
-
News
07 Jan 2020
Facebook to ban deepfake videos
New policy closes some loopholes around misinformation, but seems to leave others wide open Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Jan 2020
Broadcom flogs Symantec enterprise security unit to Accenture
Acquisition is set to make Accenture a global leader in managed cyber security services Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
07 Jan 2020
Security Think Tank: Get your users to take pride in security
The traditional picture of a hacker is of a script kiddie in a hoodie hunched over a computer keyboard, but this stereotype is stale and outdated. Is it time to move away from a fear-based approach to security? Continue Reading
By- Cate Pye, PA Consulting
-
News
06 Jan 2020
Cyber gangsters demand payment from Travelex after ‘Sodinokibi’ attack
Cyber criminals are demanding payment to decrypt Travelex’s computer files after a devastating malware attack. New questions have been raised about the security of Travelex’s computer network after it emerged the company waited eight months to patch vulnerable VPN servers Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
06 Jan 2020
Iran likely to hit back with cyber attacks, security experts warn
The possibility of cyber attack by threat groups acting on behalf of the Iranian government has dramatically increased following US actions in Iraq Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Jan 2020
UK cyber security boss Ciaran Martin to step down
NCSC chief Ciaran Martin will leave his post in the summer of 2020 Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
06 Jan 2020
Security Think Tank: Let’s call time on inciting fear among users
The traditional picture of a hacker is of a script kiddie in a hoodie hunched over a computer keyboard, but this stereotype is stale and outdated. Is it time to move away from a fear-based approach to security? Continue Reading
By- Andrew Morris, Turnkey Consulting
-
News
03 Jan 2020
Survey about Swedish people’s attitude to the internet reveals growing distrust of social media
Swedish citizens are becoming more concerned about the activities of social media companies and are reducing their online interaction with them as a result Continue Reading
By- Gerard O'Dwyer
-
News
03 Jan 2020
Suspected ransomware attack causes worldwide disruption for Travelex
Travelex switches off computer systems and resorts to cash-only currency sales after malware attack. Insiders claim the currency exchange chain has been hit by ransomware which has left critical files containing customer data encrypted Continue Reading
By- Bill Goodwin, Computer Weekly
-
Opinion
03 Jan 2020
Security Think Tank: Put information at the heart of security
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but what does this mean for security professionals? Continue Reading
By- Maxine Holt, Omdia
-
News
02 Jan 2020
Google Health pioneers breast cancer AI scanning
An algorithm developed by Google Health promises to reduce the likelihood of patients being wrongly diagnosed, and improve abnormal mammogram scan identification Continue Reading
By- Cliff Saran, Managing Editor
-
News
02 Jan 2020
California’s CCPA an opportunity for security industry to do better
California’s consumer protection and data privacy laws came into effect on 1 January 2020, and present a golden opportunity for the cyber security practitioners Continue Reading
By- Alex Scroxton, Security Editor
-
News
02 Jan 2020
Interview: Why we need a GDPR for dead people
Back in 2000, there was no Facebook or Twitter and the smartphone revolution had not begun. Today, digital identities outlive the people they represent Continue Reading
By- Cliff Saran, Managing Editor
-
News
31 Dec 2019
Top 10 investigative stories of 2019
Here are Computer Weekly’s top 10 investigative stories of 2019 Continue Reading
By- Bill Goodwin, Computer Weekly
-
Feature
30 Dec 2019
Can the UK government’s efforts solve the cyber skills gap?
There has been an active effort by the UK government to tackle the lack of skills in the cyber security space – but is it enough? Continue Reading
By -
News
24 Dec 2019
Top 10 cyber crime stories of 2019
Here are Computer Weekly’s top 10 cyber crime stories of 2019 Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Dec 2019
Top 10 cyber security stories of 2019
Here are Computer Weekly’s top 10 cyber security stories of 2019 Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
20 Dec 2019
Using data for good, not evil
This is a guest blog post by Cindi Howson, Chief Data Strategy Officer, ThoughtSpot. Nothing illustrates the double-edged nature of data use more vividly than the recent general election in the UK. ... Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
20 Dec 2019
Finnish government supports local authorities in cyber security initiative
The Finnish government has committed resources to a cyber security project aimed at local authorities Continue Reading
By- Gerard O'Dwyer
-
News
19 Dec 2019
EU court opinion finds EU-US data transfers lawful but raises questions over Privacy Shield
The Advocate General of the European Court says standard contractual clauses are lawful, but raises questions over the impact of US surveillance on the legality of Privacy Shield Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
19 Dec 2019
Top 10 artificial intelligence stories of 2019
Here are Computer Weekly’s top 10 artificial intelligence stories of 2019 Continue Reading
By- Cliff Saran, Managing Editor
-
Feature
19 Dec 2019
Human factors are critical to securing digital transformation
Sourcing the latest cyber security technology to support digital transformation projects is all well and good, but it’s meaningless if you fail to address your organisational culture and the people within it Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Dec 2019
Facebook: Legality of EU-US data sharing to be decided by Court of Justice
The Advocate General of the European Court of Justice will give an opinion on the legality of EU-US data transfers that could have major implications for big tech companies and US government mass surveillance practices Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
18 Dec 2019
Top 10 Australia IT stories of 2019
Here are Computer Weekly’s top 10 Australia IT stories of 2019 Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
17 Dec 2019
Group-IB CEO talks up global threat landscape
Public attribution of cyber attacks could backfire while a global cyber norms framework won’t emerge until a catastrophic incident occurs, says the head of Singapore-based Group-IB Continue Reading
By- Aaron Tan, Informa TechTarget
-
Opinion
16 Dec 2019
Can Europe legally share data with the US? A court far away is about to decide
The European Court of Justice will deliver an opinion on whether Europe can legally continue to send private data about European citizens to the US Continue Reading
By -
Opinion
16 Dec 2019
Security Think Tank: Data-centric security requires a holistic approach
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but what does this mean for security professionals? Continue Reading
By- James Walsh, Fieldfisher
-
News
16 Dec 2019
Barco fixes ClickShare wireless flaw, but users still at risk
Supplier patches a major vulnerability in its popular ClickShare wireless presentation system with a firmware upgrade, but experts warn that users are not out of the woods yet Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
16 Dec 2019
We can’t allow fake news and disinformation to upend our democracy
Fake news, misinformation and cyber attacks are part of our political process – now is the time to act Continue Reading
By- Andrew Roughan, Plexal
-
News
13 Dec 2019
Alarm bells ring, the IoT is listening
With Christmas bearing down on us, a series of vulnerability disclosures has drawn attention to the parlous state of IoT security, and serves as a timely warning to people planning to buy smart devices as gifts Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
13 Dec 2019
Security Think Tank: Data-centric security requires context and understanding
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but what does this mean for security professionals? Continue Reading
By -
E-Zine
12 Dec 2019
CW Europe: Deutsche Bank creates innovation division
German banking giant Deutsche Bank is opening a division focused on innovation which will be led by former SAP executive Bernd Leukert. It will create agile teams with business and infrastructure divisions leading teams of technologists, using agile principles. Also read why China’s Huawei has offered governments an anti-industrial espionage commitment, and how software robots are helping social workers in Sweden. Continue Reading
- 11 Dec 2019
-
Opinion
11 Dec 2019
Security Think Tank: Risk-based response critical to protect data
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but what does this mean for security professionals? Continue Reading
By- Simon Persin, Turnkey Consulting
-
News
10 Dec 2019
Rapid evolution of quantum computing a concern for CISOs
With the race to achieve so-called quantum supremacy hotting up, security pros are concerned that it will outpace the development of appropriate safeguards, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
10 Dec 2019
The art of surveillance: the Stasi archives and the Investigatory Powers Act
A photographic exhibition captures the chilling impact of surveillance in the UK and the former German Democratic Republic Continue Reading
By- Rose Butler, Sheffield Hallam University
-
News
10 Dec 2019
Scottish Justice Committee wants extra powers for biometrics commissioner
Members of Scottish Parliament in the Justice Committee have welcomed the creation of a biometrics commissioner for Scotland, but want ensure that they have the ‘necessary teeth’ for the job Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
09 Dec 2019
Public sector still losing user devices in high numbers
The Ministry of Justice has lost 354 smartphones, PCs, laptops and tablets in the past 12 months, according to a Freedom of Information request, and other government departments are in the same boat Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Dec 2019
Jailed hacker ordered to pay back £270k
An Essex man jailed in April over malware offences dating back years has been ordered to pay back the profits of his crime spree, and sell valuable assets Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Dec 2019
How commodities firm ED&F Man solved its threat detection challenges
After a minor server breach, leading commodities trader turned to Vectra’s Cognito service to expose hidden threats, spot privilege misuse, and conduct conclusive investigations Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Dec 2019
Dutch government must facilitate and coordinate a broad eID system
The Dutch government should push for an electronic ID system for its citizens that works across the public and private sectors, according to a report Continue Reading
By- Kim Loohuis
-
News
06 Dec 2019
Cyber security takes its place alongside UK’s armed services
Head of armed services says cyber security will take its place alongside the army, navy and air force as a key pillar of the UK’s defence strategy Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
06 Dec 2019
Security Think Tank: Is data more or less secure in the cloud?
Misconfigured cloud environments are increasingly identified as the source of damaging data breaches and leaks, raising serious questions for enterprises. Where does responsibility for data security in the cloud lie, and how can security professionals best work with their teams and cloud providers to resolve the problem? Continue Reading
By- Benoit Heynderickx, Information Security Forum
-
News
06 Dec 2019
Great Cannon DDoS operation fires on Hong Kong protesters
AT&T’s security unit has evidence that China is pressing its Great Cannon DDoS tool into service once again, specifically to target pro-democracy protests in Hong Kong Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
05 Dec 2019
Security Think Tank: Time for a devolution of responsibility
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but what does this mean for security professionals? Continue Reading
-
News
05 Dec 2019
Two Russians indicted over Dridex and Zeus malware
The US Department of Justice has indicted two Russian citizens over their alleged role in the distribution of the virulent Bugat, or Dridex, and Zeus banking trojans Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Dec 2019
Black Hat Europe: Mental health websites are leaking user data
At Black Hat Europe in London, researchers reveal the extent to which confidential data is being leaked to third parties by online mental health websites Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Dec 2019
Aviatrix VPN vulnerability left user endpoints wide open
Immersive Labs has disclosed a serious vulnerability in VPN supplier Aviatrix’s enterprise client that could have granted hackers elevated user privileges across enterprise targets Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Dec 2019
Black Hat Europe: Red teams and blue teams must evolve in the 2020s
The red team versus blue team dichotomy is somewhat arbitrary and risks pigeonholing skilled security professionals into certain roles, says Facebook’s Amanda Rousseau Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
04 Dec 2019
Security Think Tank: Optimise data-centric strategies with AI
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but what does this mean for security professionals? Continue Reading
By- Stuart Lyons, PA Consulting
-
News
03 Dec 2019
General Election 2019: Which manifesto is best for the UK’s tech sector?
Computer Weekly breaks down each political party’s technology policies ahead of the upcoming General Election to see how they compare Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
03 Dec 2019
Cyber security: How to avoid a disastrous PICNIC
Fieldfisher’s David Lorimer examines how individual employees often facilitate cyber attacks, and what can be done to reduce the risk Continue Reading
By- David Lorimer, Fieldfisher
-
News
03 Dec 2019
Tenable buys Indegy to integrate IT and OT security
Acquisition of industrial security specialist Indegy will create a unified, risk-based platform spanning both IT and OT security for Tenable Continue Reading
By- Alex Scroxton, Security Editor
-
Podcast
03 Dec 2019
Podcast: The Computer Weekly Downtime Upload – Episode 39
In this week’s episode of the Computer Weekly Downtime Upload podcast, Caroline Donnelly and Brian McKenna are joined by Bill Goodwin and Sebastian Klovig Skelton to discuss their stories about Facebook’s machinations against app developers and competitors Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
- Bill Goodwin, Computer Weekly
- Brian McKenna, Enterprise Applications Editor
-
Opinion
03 Dec 2019
Security Think Tank: In-depth protection is a matter of basic hygiene
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but what does this mean for security professionals? Continue Reading
By -
News
03 Dec 2019
Chinese web users take more risks than Brits or Americans
A research paper published by the University of Birmingham seems to show that differences in cultural values have an impact both on risky behaviour online and legal regulation Continue Reading
By- Alex Scroxton, Security Editor
-
News
02 Dec 2019
Top Android apps at risk from StrandHogg vulnerability
Researchers at Promon say all of the 500 most-downloaded Android apps are at risk from a newly discovered vulnerability Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Nov 2019
Cyber criminal RAT busted by cops
Police forces around the UK have arrested nine people as part of an international operation targeting users of a remote access trojan Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Nov 2019
TfL locks down Oyster accounts to ward off credential stuffing
Mandatory password reset for all travellers who use Oyster and contactless payment systems follows minor breach incident earlier in 2019 Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Nov 2019
Hack Friday: This Christmas, fight back against cyber criminals
It’s nearly Christmas, and cyber attacks and fraud attempts in the retail sector are ramping up. Is it time to panic? And is there anything we can do beyond hammering home the message around basic cyber security hygiene? Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
28 Nov 2019
Get ready for CCPA: Implications for UK businesses
The California Consumer Privacy Act, a wide-ranging data privacy and consumer protection law, comes into effect on 1 January 2020. How does CCPA differ from the EU GDPR regulations and what are the responsibilities for UK businesses operating in the US? Continue Reading
-
News
28 Nov 2019
The Security Interviews: Do cyber weapons need a Geneva Convention?
On a cold afternoon in Finland, F-Secure’s Mikko Hypponen discusses cyber weapons and nation state threats, and explains why arms limitations treaties might one day expand to include malware and other threats Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Nov 2019
Australia’s Fenner Dunlop ditches tape backups for cloud
Australian manufacturer of conveyor belts Fenner Dunlop has freed up its IT staff to focus on future projects by moving tape backups to the cloud Continue Reading
-
News
28 Nov 2019
Top APAC security predictions for 2020
More attacks on critical infrastructure, supply chain vulnerabilities and file-less attacks are some of the security threats that enterprises should keep an eye on next year Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
26 Nov 2019
Enterprises muddled over cloud security responsibilities
A McAfee study suggests that 2020 will be a big year for cloud adoption, but confusion still persists over who is responsible for securing it Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Nov 2019
Facebook undermined rivals in bid to dominate global messaging
Facebook used buyouts and bullying tactics towards competitors to grow its business empire, documents leaked to Computer Weekly reveal Continue Reading
By- Bill Goodwin, Computer Weekly
- Crina Boros
-
News
25 Nov 2019
General Election 2019: The Conservatives’ technology policies and digital plans
With the UK gearing up for its third general election in four years, Computer Weekly outlines the Conservative and Unionist Party’s main technology policies and digital plans, as laid out in its manifesto Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
25 Nov 2019
AI may open dangerous new frontiers in geopolitics
Truly artificial intelligence has the potential to provoke an international geopolitical crisis, warns F-Secure’s Mikko Hypponen Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Nov 2019
Uber app exploit posed safety risk to passengers
A flaw in Uber’s system meant thousands of trips in London were taken with unauthorised drivers at the wheel Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Nov 2019
Tim Berners-Lee launches nine principles for the web
Inventor of the worldwide web sets out Contract for the Web to protect its freedom, data privacy and access for all Continue Reading
By- Cliff Saran, Managing Editor
-
News
25 Nov 2019
Conservatives propose national cyber crime force
Manifesto also says Tories would “empower the police to safely use new technologies like biometrics and artificial intelligence, along with the use of DNA, within a strict legal framework” Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Nov 2019
Mystery surrounds leak of four billion user records
Threat researchers uncover four billion user records on a wide-open Elasticsearch server but who left them there is a mystery Continue Reading
By- Alex Scroxton, Security Editor