Privacy and data protection
-
News
17 Jan 2025
US Supreme Court upholds TikTok ban
The US Supreme Court has upheld a legal ban on TikTok, meaning that the video-sharing application will be shut down from midnight on Sunday 19 January Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
17 Jan 2025
Cyber innovation to address rising regulatory, threat burden
The Computer Weekly Security Think Tank considers how security leaders should best navigate the multitude of new national and multinational regulations affecting their work, and ensure their organisations remain compliant and protected Continue Reading
-
News
19 Aug 2016
Expect ransomware arrests soon, says bitcoin tracking firm Chainalysis
Law enforcement organisations are set to ramp up arrests of cyber criminals behind ransomware attacks, according to financial technology startup Chainalysis Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Aug 2016
Police arrest woman in connection with Sage data breach
A woman has been arrested on suspicion of fraud in connection with a data breach at accounting software firm Sage Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
18 Aug 2016
CW Benelux: Painting by numbers
In this issue of CW Benelux, we describe how data scientists in the Netherlands have applied technology to art. The Dutch are renowned for being creative with technology and the country has a deep history in art, boasting some of the most celebrated painters. It is therefore apt that the combined tech brains of ING, Microsoft, the Technical University of Delft and other contributors have created The Next Rembrandt, which serves as a visual showcase for big data. The new portrait in the style of Rembrandt van Rijn was put together by a combination of big data technology and 3D printing. All of Rembrandt’s 346 paintings were analysed using data analytics, making it possible to create a seemingly genuine Rembrandt image, while a 3D printer made accurate emulation of his paint patterns and textures a reality. Also in the Netherlands, we feature a case study about how The Hague is solving a bike parking headache with a mobile app. Continue Reading
-
News
16 Aug 2016
Cerber ransomware service reaps $195,000 profit in a month
Franchises such as Cerber are making highly profitable ransomware available to a broader range of cyber criminals, according to a report by security firm Check Point Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 Aug 2016
Financial sector faces era of cyber mega heists
Banks and other financial institutions are threatened by a new breed of elite cyber criminals running professional operations that will use any means to achieve their goals, says Barclays security chief Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 Aug 2016
Sage data breach underlines insider threat
Organisations need to take insider threats more seriously say security experts, as Sage warns that a data breach using an internal log-in may have compromised employee data at nearly 300 UK firms Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
10 Aug 2016
CW Nordics: Dealing with digital disruption
The Nordic countries are renowned for being home to thriving tech startup scenes, so it is hardly surprising that IT is a disruptive force in the region. In this quarter’s CW Nordics ezine we look more closely at how the Nordic region is being affected by technology disruption across industry sectors and how organisations are reacting to it. Continue Reading
-
News
10 Aug 2016
MI5 staff repeatedly overrode data surveillance rules
Security service MI5 is responsible for 210 “clear contraventions” over five years for the way it accessed private internet and telephone data Continue Reading
By -
News
08 Aug 2016
Strider cyber attack group deploying malware for espionage
Symantec security researchers have uncovered a spying campaign by a previously unknown group using modular malware as stealthware Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Aug 2016
Banner Health cyber breach underlines need for faster intrusion detection
A data breach at Banner Health has highlighted the importance of intrusion detection and prompted calls for greater cyber security investment in the increasingly targeted healthcare industry Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Aug 2016
Artificial intelligence takes centre stage in cyber security
Artificial intelligence-led cyber security technology has been in the spotlight at two major industry conferences in Las Vegas, signalling a firm trend in cyber defence research Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Aug 2016
Italian-based Android RAT spies on mobiles in Japan and China, say researchers
Researchers discover an Italian-based Android RAT designed for spying that is targeting mobile devices using their unique identification codes Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
28 Jul 2016
Consumer identity management is the core of real CRM
IAM + CRM is much more than simply IAM for external users, says Ivan Niccolai Continue Reading
By- Ivan Niccolai
-
Opinion
28 Jul 2016
Six essential processes for keeping data secure
Data security is increasingly vital for organisations as the countdown begins for compliance with new rules imposed by the EU’s general data protection regulation Continue Reading
By- Christine Andrews
-
News
28 Jul 2016
UK’s top security judges struggle to assess privacy threats
Technological advancements make it difficult for the Investigatory Powers Tribunal to assess privacy threats, say the tribunal’s own judges Continue Reading
-
News
26 Jul 2016
Date set for landmark hearing into EU-US data transfers
Irish court hearing triggered by Austrian law student Max Schrems could have huge implications for EU-US trade and the data privacy rights of millions of EU citizens Continue Reading
By- Computer Weekly Reporters
-
News
21 Jul 2016
Security industry welcomes cyber crime’s inclusion in official stats
The security industry welcomes the inclusion of cyber crime statistic in official crime reports to highlight the size and nature of the threat Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Jul 2016
Mobile payments get Isaca’s security approval
Mobile contactless payments enable three key security controls that make them more secure than physical and e-commerce payments, according to a report by Isaca Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Jul 2016
Carbon Black bets on next-generation antivirus
Carbon Black is betting on next-generation antivirus technology by acquiring Confer to extend the capability and appeal of its endpoint protection offerings Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Jul 2016
Case study: Rémy Cointreau boosts security and productivity
Drinks firm Rémy Cointreau uses Centrify’s identity and mobile management to simplify security, improve business agility and reduce IT costs Continue Reading
By- Warwick Ashford, Senior analyst
-
News
14 Jul 2016
Cyber attacks cost UK business more than £34bn a year, study shows
Nearly half of UK firms lack advanced cyber defences, despite the high level of concern about cyber attacks and associated costs Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
13 Jul 2016
Cost-effective managed IPS for small businesses
Small businesses typically struggle to afford cyber intrusion prevention systems, but the introduction of a service tailored for this market could change that Continue Reading
-
News
12 Jul 2016
IBM sets up security centre in Canberra
IBM leads the charge as large private businesses invest heavily in security resources across Australia in an attempt to close the security gap Continue Reading
-
News
11 Jul 2016
Datadog calls for password reset after cyber breach
Monitoring and analytics firm detected unauthorised activity associated with production servers and database of user credentials Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
07 Jul 2016
CW ASEAN: July 2016
Lessons from the Philippine government hack: In this issue we ask why a hack on the Philippine Commission on the Elections (Comelec) was allowed to happen and what organisations in Southeast Asia can learn from this breach of security. Retailers in the region are concerned – read how the theft of customer data is their biggest worry. Continue Reading
-
E-Zine
07 Jul 2016
CW ANZ: July 2016
Australia knows it has a cyber security problem, but not the scale. In this month’s CW ANZ we describe how Australia's $230m security strategy serves as a wake-up call to enterprises. We also reveal the techniques and technologies being used to protect one Australian school, as well as a more general look at the main cyber threats to orgainsations in Australia. Read the issue now. Continue Reading
-
Feature
07 Jul 2016
The problem of passwords and how to deal with it
Security experts have long recognised passwords as inadequate, but finally technology is offering some viable alternative authentication methods that businesses can explore to keep their data safe Continue Reading
-
News
06 Jul 2016
UK's Darktrace aims to lead the way to automatic cyber security
Darktrace hopes to be a leader in the move to automated cyber security to free up security professionals to focus on business risk and innovation Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
05 Jul 2016
How will UK IT adapt after Brexit?
In this week’s Computer Weekly, as the aftershocks continue from the UK’s decision to leave the European Union, we look at the implications and challenges for the UK technology community. Our latest buyer’s guide examines expense management software. And IT leaders discuss ethics in IT and debate the question – can you trust your technology? Read the issue now. Continue Reading
-
News
29 Jun 2016
Lauri Love using illness as a shield against extradition, claims prosecution
Prosecution lawyer questions whether activist Lauri Love is not fit enough to stand trial in the US over hacking charges,as expert witnesses warn that US prisons are ill-equipped for people with mental health problems. Continue Reading
By- Bill Goodwin and Fiona O'Cleirigh
-
News
29 Jun 2016
Most cyber security strategies ignore the way attackers really work
Cyber attackers use more legitimate software than malware, which means most organisations are incapable of detecting much of the malicious activity in their networks, a report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Jun 2016
Lauri Love may be faking mental illness claims lawyer for US
Prosecution lawyer Peter Caldwell questions whether activist Lauri Love is exaggerating mental health problems to avoid extradition to face hacking charges in the US Continue Reading
By- Fiona O’Cleirigh and Bill Goodwin
-
News
28 Jun 2016
Lauri Love suicide risk if extradited to US over hacking allegations
Westminster Magistrates’ Court hears evidence from medical experts that alleged hacker Lauri Love is at risk of suicide if extradited to the US Continue Reading
By- Bill Goodwin and Fiona O'Cleirigh
-
News
21 Jun 2016
Enterprises urged not to view security as a barrier to internet of things adoption
The Lower Colorado River Authority’s chief administrative officer urges enterprises to balance the risks of using the internet of things with the benefits connected devices can bring Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
21 Jun 2016
Cyber security industry mostly welcomes report on TalkTalk breach
Most of the recommendations of a government committee inquiry into the TalkTalk breach have been welcomed, but pundits have expressed reservations about some, particularly proposed new fines Continue Reading
By- Warwick Ashford, Senior analyst
-
News
17 Jun 2016
How MI5 and MI6 gather your personal data for surveillance
Publicly released documents shed light on the many databases and sources used by the intelligence services to gather bulk personal data about UK citizens Continue Reading
By -
News
14 Jun 2016
Shadow data and the risks posed by cloud storage and apps
Cloud storage and apps can open up an organisation to risks of data leakage. Computer Weekly looks at key areas of vulnerability and what you can do to prevent your data going viral Continue Reading
By- Bryan Betts, Freeform Dynamics
-
E-Zine
14 Jun 2016
The password’s the problem – lessons from the LinkedIn breach
In this week’s Computer Weekly, after millions of LinkedIn users had their data compromised, we look at the lessons to be learned from this latest data breach incident. Our buyer’s guide looks at NoSQL technologies and compares the offerings from database leaders Microsoft and Oracle. And we examine the benefits of cloud-based data analytics and how to make it work for your organisation. Read the issue now. Continue Reading
-
News
13 Jun 2016
EU firms slow in detecting cyber attacks, study shows
European firms take an average of 469 days to discover a compromise, compared with an average of 146 days globally, according to Mandiant Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Jun 2016
Philippines government data breach is a warning to Asean region
Security is a rising concern in the Asean region, with fears fuelled by incidents such as the recent hacking incident in Manila Continue Reading
By -
News
10 Jun 2016
IoT security: Lack of expertise will hurt, says Bruce Schneier
Government action at national and international levels is essential for addressing IoT security issues, but the relevant expertise is lacking, according to security expert Bruce Schneier Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Jun 2016
Small businesses bearing the brunt of cyber crime, says FSB
The Federation of Small Businesses is calling for more government support for its members in defending against cyber threats Continue Reading
By- Warwick Ashford, Senior analyst
-
News
07 Jun 2016
Millions of sensitive IT services exposed to the internet, study finds
Encryption should become the default as study reveals millions of sensitive services are exposed to the internet, says Rapid7 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Jun 2016
How emails sent to and from Parliament are monitored
Government officials deny that emails sent by MPs are open to surveillance by GCHQ and NSA - we examine the evidence Continue Reading
By- Duncan Campbell and Bill Goodwin
-
News
01 Jun 2016
MPs’ private emails are routinely accessed by GCHQ
Computer Weekly investigation reveals the extent of interception of MPs’ and peers’ email communications and data Continue Reading
By- Duncan Campbell and Bill Goodwin
-
Feature
01 Jun 2016
My first IoT project: A guide for businesses
We’ve all had a good giggle about having our fridges hacked – but now it’s time to get real. What are the first steps enterprises should take when implementing their first internet of things project? Continue Reading
By -
News
26 May 2016
UK government details plans for National Cyber Security Centre
The objectives of the UK’s National Cyber Security Centre are to address systemic vulnerabilities, reduce risks, respond to serious incidents and nurture national cyber security capability Continue Reading
By- Warwick Ashford, Senior analyst
-
News
24 May 2016
Network Collapse: Why the internet is flirting with disaster
It’s surprising the internet works at all, given the age of its core software. The question is, can we catch it before it falls over? Continue Reading
By- Cliff Saran, Managing Editor
-
E-Zine
20 May 2016
CW Benelux: May-July 2016
Welcome to the Computer Weekly ezine focused on the Benelux region. This quarterly publication will look at the issues facing CIOs in Belgium, the Netherlands and Luxemburg. Continue Reading
-
News
19 May 2016
Lessons from LinkedIn data breach revelations
There are several important lessons to be learned from revelations about LinkedIn's 2012 data breach, say security experts Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 May 2016
Cyber espionage campaign targets Ukraine separatists
Security researchers discover a surveillance operation against separatists in Eastern Ukraine using spear phishing attacks to spread previously unknown malware Continue Reading
By- Warwick Ashford, Senior analyst
-
News
17 May 2016
Police set for better engagement with UK tech firms
The policing lead for digital investigation and intelligence says new structures will improve engagement and collaboration between the UK tech industry and police forces Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
17 May 2016
Countdown begins to new EU data protection rules
In this week’s Computer Weekly, with the new EU data protection rules ready to become law, firms now have just two years to prepare for the stringent regulations – we assess the challenges. Manufacturing giant Rolls-Royce talks about why it moved its HR systems to the cloud and the lessons it learned. And we look back at 50 years of technology innovation in storage. Read the issue now. Continue Reading
-
News
13 May 2016
Time to shift information security focus away from prevention, says Swiss bank CISO
Organisations need a new approach which recognises security is “breakable”, according to Michael Meli Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 May 2016
10 key facts businesses need to note about the GDPR
With less than two years before the new EU data protection rules come into force, there are key areas businesses need to focus on to ensure they will be compliant Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 May 2016
Swift reports another Bangladesh central bank-style cyber attack
Global financial messaging organisation Swift warns of a highly adaptive cyber criminal campaign targeting banks with user credentials to submit transfer requests Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 May 2016
IAM central to Deutsche Bank’s digital transformation
Deutsche Bank is using a centralised identity and access management (IAM) system and an application program interface (API) architecture for digital transformation Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 May 2016
UK court rejects demands for Lauri Love to hand over encryption keys
Court rules against an attempt by the National Crime Agency to force activist Lauri Love to disclose encryption keys by bypassing the Regulation of Investigatory Powers Act Continue Reading
By- Julia Gregory and Bill Goodwin
-
News
09 May 2016
Australian health sector an easy target for cyber criminals, says IBM
A push to encourage greater adoption of electronic health records has raised the spectre of online record theft Continue Reading
-
News
06 May 2016
Ransomware emerges as a top cyber threat to business
Security researchers at Kasperky Lab and FireEye confirm that the upward trend of ransomware is continuing and has emerged as a top threat to business Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 May 2016
D-Day for GDPR is 25 May 2018
The European Parliament’s official publication of the General Data Protection Regulation means it will become enforceable on 25 May 2018 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 Apr 2016
Payment card industry issues data security standard update
PCI DSS version 3.2 introduces six new requirements for compliance, some additional guidance and a raft of clarifications Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 Apr 2016
Technology moving too fast for governments to keep up, says former Darpa chief
Former US defence technology chief supports encryption and privacy, despite intelligence services’ fears Continue Reading
-
News
27 Apr 2016
IPv6 alone will not secure IoT, warns GE CISO
It is important for all users of the internet of things to understand what they are getting into with IPv6, and to be aware of the risks and myths, says GE CISO Hanns Proenen Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Apr 2016
Business failing to learn lessons of past cyber attacks, report shows
Organisations are still failing to address basic security issues and well-known attack methods, Verizon’s latest Data Breach Investigations Report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Apr 2016
GCHQ told analysts to assume surveillance 'bulk data' is legal
Documents obtained by charity Privacy International reveal insights into GCHQ’s collection of sensitive bulk data, as lawyers question the impact of surveillance on legal privilege, fair trials and protection of whistleblowers Continue Reading
By- Alex Scroxton and Bill Goodwin
-
E-Zine
19 Apr 2016
The hunters who prey on cyber criminals
In this week’s Computer Weekly, we talk to the hunters – a new breed of security expert that proactively hunts down cyber attackers before they can strike. We visit Silicon Valley to meet some of the up-and-coming startups in data analytics and business intelligence. And we hear from IT leaders about the people, process and cultural aspects of managing digital transformation. Read the issue now. Continue Reading
-
News
19 Apr 2016
Employees’ use of personal devices puts firms at risk of malware infection, says report
Downloaders care about their own security while grabbing pirated content, not that of their employers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 Apr 2016
BBC turns micro:bit computers into IoT devices
The BBC and Nominet demonstrate a new use case for the micro:bit computer and hope to turn Britain’s schoolchildren into internet of things pioneers Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Apr 2016
NCA attempts 'back door' access to obtain activist Lauri Love’s passwords
Court told that use of civil proceedings to force disclosure of alleged hacker Lauri Love's passwords is disproportionate and would breach human rights law Continue Reading
By- Bill Goodwin, Computer Weekly
-
E-Zine
12 Apr 2016
How IT in a portacabin supports £1bn London Bridge station overhaul
In this week’s Computer Weekly, we find out how a temporary IT set-up based in a portacabin is supporting the UK’s largest critical infrastructure project – the £1bn redevelopment of London Bridge train station. Our latest buyer’s guide looks at converged infrastructure products. And we analyse research showing data protection topping the list of UK security priorities. Read the issue now. Continue Reading
-
News
11 Apr 2016
QA launches cyber attack defence training facility in London
Training firm QA launches a cyber attack simulation facility in London to enable organisations to test and learn cyber defence skills Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Apr 2016
Activist Lauri Love faces order to disclose encryption keys
The UK’s National Crime Agency takes an unusual legal step to force a former university student accused of hacking to disclose encryption keys Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
05 Apr 2016
'Citizens will be stripped naked' by Turkey’s data law
Turkey's data protection law, introduced in March 2016, will make Turkey a near total surveillance state, yet the EU, apparently more concerned about securing Turkey's help in controlling immigration, is turning a blind eye Continue Reading
By- Craig Shaw & Zeynep Sentek
-
News
04 Apr 2016
UK campaign launched against location data security risks
UK consumers are unwittingly signing up to be location tracked and this data is being used and sold on for commercial benefit, warns privacy campaign Continue Reading
By- Warwick Ashford, Senior analyst
-
News
31 Mar 2016
Adwind at centre of cyber attack on Singapore bank
Kaspersky Lab has revealed that the Adwind malware-as-a-service platform was at the centre of an attack on a Singapore bank Continue Reading
By -
Feature
30 Mar 2016
CW@50: Fertile British breeding grounds for information security innovation
Computer Weekly is marking its 50th anniversary this year with a series of articles celebrating 50 years of British technology innovation. In this article, we look at the evolution of information security threats and some of the British innovation to counter those threats Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Mar 2016
Security should be driven by business, says Corvid’s Andrew Nanson
Information security should be business-driven and investments assessed for their effectiveness and business value, according to Corvid CTO Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Mar 2016
Cyber criminals use Microsoft PowerShell in ransomware attacks
A newly discovered family of ransomware, dubbed PowerWare, uses Microsoft PowerShell to target organisations through macro-enabled documents Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
29 Mar 2016
Hunters: a rare but essential breed of enterprise cyber defenders
They wait, they watch, they search the outer reaches of networks and the darkest corners of the web, setting traps, crafting tools, collecting evidence and going in pursuit: they are the hunters Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Mar 2016
Apple vows to raise security as FBI breaks into iPhone
Apple says it will help law enforcement with investigations, but will increase the security of its products after the FBI broke into an iPhone Continue Reading
-
News
24 Mar 2016
Government warned of smart meter security threat back in 2012
The government was warned four years ago that its plans for a nationwide smart meter roll-out represented a “potentially significant” security and privacy threat, Computer Weekly has learned Continue Reading
By- Bryan Glick, Editor in chief
-
News
24 Mar 2016
Businesses urged to update Apple software to dodge zero-day attacks
Security experts are urging Apple Mac, iPhone and iPad users to update their operating systems to avoid data-stealing attacks that exploit a new zero-day vulnerability Continue Reading
By- Warwick Ashford, Senior analyst
-
News
23 Mar 2016
Canadian Elizabeth Denham set for the UK's next information commissioner
Canadian privacy commissioner Elizabeth Denham is to become the UK's next information commissioner as government pushes ahead with the snoopers' charter Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Mar 2016
Britain to pay billions for monster internet surveillance network
New questions raised about Britain’s snoopers’ charter after Denmark abandons its own UK-style surveillance programme for a second time Continue Reading
By- Duncan Campbell , 2QQ Ltd, Sussex University
-
News
21 Mar 2016
National Cyber Security Centre to be UK authority on information security
The UK’s National Cyber Security Centre (NCSC) is to be the UK's one-stop authority on infosec, based in London and led by GCHQ's Ciaran Martin Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Mar 2016
Australian girls believe online harassment is endemic
There are clear signals that online threats against women and attempts to invade their privacy are becoming societal norms in Australia Continue Reading
-
News
18 Mar 2016
Most students say cyber security is a growing threat
Some 70% of higher education students say they are aware that cyber crime and attacks are a threat, but less than half think security is their responsibility Continue Reading
By- Clare McDonald, Business Editor
-
E-Zine
15 Mar 2016
Robots at your service
In this week’s Computer Weekly, we find out how financial services firms are investing in artificial intelligence to create robo-advisors to help customers with financial advice online. We ask if virtual reality is ready for mainstream business adoption or is still just an over-hyped technology. And we examine the key steps needed to successfully build smart cities using internet of things and networking technologies. Read the issue now. Continue Reading
-
News
11 Mar 2016
$1bn cyber bank heist thwarted by spelling error
Cyber thieves made 30 requests for the New York Federal Reserve to transfer nearly $1bn from the Bangladesh central bank’s account, but a typo and the volume of requests alerted banking officials Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Mar 2016
Lack of security knowledge limiting business initiatives, survey shows
Security concerns are limiting the adoption of cloud and mobility throughout organisations, according to the first Dell Data Security Survey Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
08 Mar 2016
Security Think Tank: Many breaches down to poor access controls
In the modern business environment, what are the most common access control mistakes – and how best are these corrected? Continue Reading
By- Paul Yung
-
Opinion
07 Mar 2016
The problem with passwords: how to make it easier for employees to stay secure
An organisation’s IT security can be compromised if staff do not follow a strict policy of using strong passwords to access internal systems Continue Reading
By- Jeremy Bergsman, CEB
-
News
04 Mar 2016
RSAC16: Cyber criminals are hiding in plain sight, says RSA report
Cyber criminals are using social media as a communication and sales channel, not just for reconnaissance and phishing, an RSA study has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
03 Mar 2016
Security Think Tank: Top five access control mistakes
In the modern business environment, what are the most common access control mistakes and what is the best way to correct them? Continue Reading
By- Tim Holman, 2-sec
-
News
02 Mar 2016
RSAC16: RSA’s Amit Yoran comes out in support of strong encryption
A policy of weakened encryption would harm US economic interests and undermine those trying to defend digital environments, according to RSA president Amit Yoran Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 Mar 2016
RSAC16: US works on data access agreement with UK
The US is negotiating with the UK to establish a new framework that will permit UK authorities to access electronic communications directly from US companies Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
01 Mar 2016
Protecting the UK from cyber attacks
In this week’s Computer Weekly, we talk to the National Crime Agency’s top cyber cop, Sarah Goodall, about how the police are tackling IT security threats against the country through global collaborations. We ask CIOs for their tips on building an IT strategy for the digital age. And we review the big six storage suppliers’ plans for all-flash arrays. Read the issue now. Continue Reading
-
News
26 Feb 2016
Majority of Britons support government surveillance for national security
A survey reveals that a majority of UK citizens support government surveillance for national security as Apple attempts to rally public support in its row with the FBI over encryption Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Feb 2016
Nissan acts on Leaf car app security flaw after researcher goes public
Nissan suspends its electric car app after a researcher went public about a security flaw that could enable attackers to take control of heating systems Continue Reading
By- Warwick Ashford, Senior analyst