Regulatory compliance and standard requirements
-
Opinion
26 Apr 2024
Security Think Tank: Maybe let's negotiate with terrorists
In the wake of renewed calls for lawmakers to consider enacting legal bans on ransomware payments, the Computer Weekly Security Think Tank weighs in to share their thoughts on how to tackle the scourge for good. Continue Reading
-
News
25 Apr 2024
Progress being made on gender diversity in cyber
Women make up a higher percentage of new entrants to the cyber security profession, particularly among younger age groups, and are increasingly taking up leadership positions and hiring roles, but challenges still persist Continue Reading
-
News
29 Sep 2014
Case study: Deutsche Post DHL develops software contract templates to reduce costs
Deutsche Post DHL has created contract templates to manage software costs. Computer Weekly speaks to the people leading the initiative Continue Reading
-
News
15 Sep 2014
WikiLeaks reveals Australian police are using surveillance software
Australia's New South Wales police are using spyware that has been linked to repressive states, according to leaked documents Continue Reading
-
News
26 Aug 2014
Local authorities can improve data protection, says ICO audit
There is room for improvement in how local authorities protect personal data, says an audit report by the ICO Continue Reading
-
News
31 Jul 2014
Paddy Power hit by data breach in 2010
Gambling firm Paddy Power owns up to 2010 data breach after recovering a compromised dataset in Canada Continue Reading
-
News
29 Jul 2014
Hacker and UFO hunter Gary McKinnon launches SEO business
Hacker Gary McKinnon has set up a search engine optimisation business after winning a 10-year battle against extradition to the US Continue Reading
-
News
25 Jul 2014
Search firms meet EU regulators over right to be forgotten
Google, Microsoft and Yahoo have met EU data protection authorities to discuss the implications of the right to be forgotten ruling Continue Reading
-
News
21 Jul 2014
Privacy key to UK business opportunity, says KPMG
Finding the right balance between privacy and business insight could help UK firms take the lead in innovative online services, says KPMG Continue Reading
-
Opinion
16 Jul 2014
The legal considerations of the internet of things
As with many new technologies, there are a number of tricky legal challenges to consider as part of widespread IoT adoption Continue Reading
-
News
04 Jul 2014
Barclays passes government’s ‘internet-born threat’ test
Barclays Bank has been awarded the government’s cyber security certificate for digital banking services after independent tests of services such as Pingit Continue Reading
-
News
04 Jul 2014
Security Think Tank: The dos and don’ts of a good incident response plan
What does a good information security incident response plan look like? Continue Reading
-
News
01 Jul 2014
Most people keen to share biometric data for smoother travel
A study has revealed that 89% of citizens agree with the use of biometric identification to aid travel Continue Reading
-
News
27 Jun 2014
Wearable tech must comply with privacy laws, warns ICO
Wearable technology must comply with UK data privacy laws, warns the ICO Continue Reading
-
News
27 Jun 2014
Google begins complying with European takedown requests
Google has begun removing search results in response to takedown requests from European citizens Continue Reading
-
Podcast
18 Jun 2014
Voice recording compliance: What it is and how to achieve it
Voice recording compliance is subject to the regulation by the FSA, PCI, and Data Protection and Freedom of Information Acts Continue Reading
-
News
06 Jun 2014
Vodafone blows lid on government spy networks
Vodafone reveals secret mobile phone-tapping network and joins Microsoft and Cisco in calling for debate on electronic surveillance Continue Reading
-
Feature
28 May 2014
Principles of compliance in the financial services industry
Compliance in financial services can appear a staggeringly complex web of laws and regulations, but some key principles apply, says Mathieu Gorge of Vigitrust Continue Reading
-
News
28 Apr 2014
US judge orders Microsoft to hand over email data held in Dublin
A US Judge has ordered Microsoft to give the District Court access to the contents of one of its customer’s emails stored on a server located in Dublin Continue Reading
-
News
01 Apr 2014
UK update to copyright law imminent
The UK is to update its 1988 copyright law for the digital age in line with a nearly three-year-old review Continue Reading
-
News
28 Mar 2014
Google says government data requests are up 120% since 2009
Government requests for information about Google customers, have increased by 120% since 2009 Continue Reading
-
News
21 Mar 2014
Customer privacy an ongoing challenge, says Unilever
Unilever has set up a programme to address the continually evolving challenge of privacy issues relating to customer data Continue Reading
-
Feature
14 Mar 2014
Hacktivism: good or evil?
IT lawyer Dai Davis looks at the rise of hacktivism and its impact on business and international politics Continue Reading
-
News
04 Mar 2014
IT Security Salary Index (UK)
Are you being paid the right rate for the job? Check out this IT Security salary index from Acumin. Continue Reading
-
News
04 Mar 2014
Governance, Risk Management and Compliance (GRC)
Ensuring that all the stakeholders' information needs are met requires a holistic approach to managing information – the creation of a GRC platform, say analysts Clive Longbottom and Rob Bamforth. Continue Reading
-
Opinion
17 Feb 2014
Should you allow a bring your own device policy?
Employers are realising there are challenges presented by BYOD which, if not dealt with, could have a serious impact on the business Continue Reading
-
News
11 Feb 2014
Rights groups call on White House to open privacy review
A coalition of 25 rights groups is calling for a 90-day US government review of big data and the future of privacy to be opened up to the public Continue Reading
-
News
05 Feb 2014
Bank of England publishes Waking Shark II cyber security exercise results
Bank of England publishes the results of its Waking Shark II security exercise, which tested financial institutions' contingency plans for cyber attack Continue Reading
-
News
17 Jan 2014
Internet at risk of 'cybergeddon' says WEF
Internet is at risk of fragmenting amid concerns over spying and cyber crime, says World Economic Forum Continue Reading
-
News
14 Jan 2014
Top European IT initiative to support business in 2014?
Expanding IT to support business growth is one of the biggest areas of focus for IT departments in 2014, so what does this mean? Continue Reading
-
News
10 Jan 2014
Security considerations for UK enterprises
This Research Snapshot from Vanson Bourne looks at IT security spending trends, awareness of cyber-threats, and the factors perceived as the biggest security risks for organisations. Continue Reading
-
News
03 Jan 2014
Facebook faces lawsuit over monitoring private messages
Facebook is facing a lawsuit that claims it scans the contents of private messages to profile the user’s online activity Continue Reading
-
News
24 Dec 2013
Top 10 IT privacy stories of 2013
Stories related to whistleblower Edward Snowden’s revelations about internet mass surveillance programmes by the US and the UK have dominated this year Continue Reading
-
News
20 Dec 2013
UK citizen wins legal round against Facebook over Prism leaks
A British citizen has applied for a judgement against Facebook in a case that will test the right of tech firms to give UK personal data to the NSA. Continue Reading
-
Podcast
11 Dec 2013
What’s new in ISO 27001: 2103 for storage and backup?
This year, ISO 27001: 2013 was published, putting more emphasis on mapping risk to an ever-expanding and mobile IT infrastructure. But what is new in ISO 27001: 2013? Continue Reading
-
News
05 Dec 2013
UK citizen sues Microsoft over Prism private data leak to NSA
A court action brought in the UK will test Microsoft's legal right to disclose private data on UK citizens to US intelligence services Continue Reading
-
News
04 Dec 2013
The Guardian denies Snowden stories damaged national security
Guardian editor Alan Rusbridger defends decision to publish stories on documents leaked by whistleblower Edward Snowden Continue Reading
-
News
26 Nov 2013
NCA changed UK cyber crime fighting, says NCCU head
The NCA has changed the UK law enforcement landscape, says Andy Archibald, head of the NCA’s National Cyber Crime Unit Continue Reading
-
News
26 Nov 2013
Government lays out 2014 cyber security agenda
The UK government has reiterated its commitment to addressing cyber security and laid out some plans for 2014 at the Cyber Security Summit 2013 Continue Reading
-
News
26 Nov 2013
FTSE 350 firms complete cyber risk assessment
Most FTSE 350 companies put cyber risk on the board agenda, but many need to improve how they manage that risk Continue Reading
-
News
20 Nov 2013
Report highlights poor UK attitudes to mobile security
Businesses should note that many UK mobile users do not take security precautions and do not know how to guard against data theft Continue Reading
-
News
19 Nov 2013
Google reaches $17m multi-state settlement over Safari snooping
Google has reached a $17m settlement agreement with 10 US states for bypassing Apple Safari privacy settings Continue Reading
-
News
12 Nov 2013
Mass surveillance a bad idea, says Information Commissioner Christopher Graham
Information Commissioner Christopher Graham says issues of national security must not overshadow concerns of legitimate public interest Continue Reading
-
News
12 Nov 2013
Web surveillance not a good idea, says Info Commissioner
Information Commissioner Christopher Graham says issues of national security cannot be allowed to overshadow concerns of legitimate public interest Continue Reading
-
News
12 Nov 2013
Global profiles of the fraudster
Computers, rather than conmen, are set to be the future face of fraud, as criminals turn to robotics in an effort to avoid detection, this report from KPMG reveals. Continue Reading
-
News
24 Oct 2013
Thales launches critical infrastructure cyber security lab
Thales has set up a cyber security lab dedicated to help improve the security of critical national infrastructure, government and business Continue Reading
-
News
23 Oct 2013
US publishes draft cyber security framework
The US has published a draft framework of voluntary cyber security standards aimed at reducing risks to critical national infrastructure Continue Reading
-
News
17 Oct 2013
Government overhauls security classification to fit digital age
In its first overhaul since World War II the government is consolidating six security bands to three with a system deemed more appropriate in the digital age. Continue Reading
-
Opinion
16 Oct 2013
Who owns your LinkedIn account?
It is common for employees to use personal social networking accounts for work, but who actually owns those accounts? Continue Reading
-
News
16 Sep 2013
Risk assessment key to cloud adoption, says Isaca
There is mass confusion among small and medium businesses about cloud computing, says Amar Singh, chair of Isaca UK Continue Reading
-
News
05 Sep 2013
Windows 2012 Server Network Security
This book chapter offers an introduction to Windows 8 and Windows Server 2012 network security and IPv6. It includes a 30% discount code for Computer Weekly readers. Continue Reading
-
News
05 Sep 2013
Windows Server 2012 Security from End to Edge and Beyond
This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask. Continue Reading
-
News
05 Sep 2013
Printing: a false sense of security?
Louella Fernandes and Bob Tarzey show how secure printing technology can provide authentication, authorisation and accounting capabilities, helping businesses improve document security and meet compliance regulations. Continue Reading
-
News
23 Aug 2013
Box.com forges new cloud security model
Service providers and consumers need to move to a security model better suited to the cloud computing, says Box.com Continue Reading
-
News
20 Aug 2013
Targeted attacks and how to defend against them
Analysts Bob Tarzey and Louella Fernandes assess the scale and real impact of targeted attacks the measures being taken to defend against them. Continue Reading
-
News
30 Jul 2013
ICO to investigate sale of online dating profiles
The UK’s data protection watchdog is to investigate the sale of 10,000 online dating profiles to the BBC’s Panorama programme Continue Reading
-
Feature
29 Jul 2013
An introduction to cyber liability insurance cover
Cyber liability insurance cover has been around for 10 years, but most security professionals seem to have not heard of it or know that it exists Continue Reading
-
News
22 Jul 2013
UK to block online porn by default
The UK is to block online pornography by default to all new internet users, David Cameron is to announce Continue Reading
-
News
19 Jul 2013
IT security case studies
Four critical IT security case-studies selected from the winners of Computer Weekly's European User Awards for security Continue Reading
-
News
18 Jul 2013
Needle in a Datastack: The rise of big security data
This research from McAfee investigates how well organisations are positioned to address the challenges of managing security in a world of ever increasing amounts and types of data. Continue Reading
-
News
17 Jul 2013
IT Security Case Studies
Warwick Ashford presents 4 essential IT security case-studies selected from the winners of Computer Weekly's European User Awards. Continue Reading
-
News
11 Jul 2013
OpenCorporates makes company data public
Company data is being made available as part of an initiative to place more government data in the public domain Continue Reading
-
News
11 Jul 2013
Yahoo wants Fisa objections revealed
Yahoo is the latest company implicated in the Prism internet surveillance programme to call for more transparency around its involvement Continue Reading
-
News
10 Jul 2013
Microsoft notches up over 3,000 copyright cases
In its battle against piracy, Microsoft says it has settled 3,265 copyright cases in the past year and warns of links to malware distribution Continue Reading
-
News
05 Jul 2013
Tougher EU penalties for cyber crime not enough, say security experts
The European Parliament has adopted a draft directive to toughen up EU penalties for cyber crime, but security experts say this is not enough on its own Continue Reading
-
News
05 Jul 2013
Security Think Tank: Prism unlikely to change much
Does the data collected by Prism put the US Government at risk from other state or non-state sponsored activists? Continue Reading
-
News
05 Jul 2013
UK joins EU demands for Google to rewrite privacy policy
The UK’s privacy watchdog has joined data protection authorities in France, Spain, Germany and Italy in demanding changes to Google’s privacy policy Continue Reading
-
News
05 Jul 2013
NSA Prism scandal could hit US cloud providers, says EC vice-president
EC vice-president Neelie Kroes says US cloud services providers could lose business because of fears over US Prism surveillance programme Continue Reading
-
News
02 Jul 2013
Senior MPs flout EU cookie law
Two years after the EU cookie regulation and UK law came into force, not all UK websites are compliant, including the sites of 13 senior MPs Continue Reading
-
News
24 Jun 2013
Identity management key to browser-based IT strategy
A cloud-based identity management system is key to enabling a browser-based IT strategy at online recruitment firm Reed.co.uk Continue Reading
-
Opinion
18 Jun 2013
The challenges of information governance in our increasingly litigious age
Formulating the right enterprise-wide information governance policies is essential in heading off potential legal and compliance costs Continue Reading
-
News
11 Jun 2013
UK links to US internet surveillance remain unclear
The government insists that UK spy agencies operate within the law, but questions remain Continue Reading
-
News
07 Jun 2013
PM urged to criminalise internet rape porn
Campaigners are calling for the criminalisation of possessing internet pornography depicting rape Continue Reading
-
News
05 Jun 2013
Human error causes most data breaches, Ponemon study finds
Human errors and system problems caused two-thirds of data breaches in 2012, according to a study from Symantec and the Ponemon Institute Continue Reading
-
News
21 May 2013
Privileged accounts key to most APT attacks, says Cyber-Ark
The theft, misuse and exploitation of privileged accounts is becoming an increasingly key tactic in advanced persistent threat attacks Continue Reading
-
News
15 May 2013
Microsoft declares conformance with ISO 27034-1
Microsoft has declared conformance with ISO 27034-1, the first part of an international standard for secure software development Continue Reading
-
News
13 May 2013
Cyber criminals hack Washington court system
Hackers gain access to the personal data of 160,000 US citizens after compromising Washington State court service servers Continue Reading
-
News
07 May 2013
Symantec helps NHS trust cut security costs by a quarter
The Royal Liverpool and Broadgreen University Hospitals NHS Trust cut security costs by 25% in its partnership with security supplier Symantec Continue Reading
-
News
03 May 2013
Netherlands considers hacking powers for police
The Netherlands government considers legislation to give police powers to hack into computers, install spyware and read emails Continue Reading
-
News
03 May 2013
Computer Weekly European User Awards for Security: Winners
The winners are in for the Computer Weekly European User Awards for Security. See who made the top spots. Continue Reading
-
News
01 May 2013
CW buyer's guide: context-aware security
This 11-page Computer Weekly buyer's guide looks at how organisations should approach context-aware security technologies and what business benefits they can deliver. Continue Reading
-
News
01 May 2013
CW Special Report on CSC
This 16-page report from Computer Weekly analyses the challenges facing CSC, its financial performance, the services it offers, its place in the IT market and its future strategy. Continue Reading
-
News
30 Apr 2013
Big data security: getting a grip on multiple data sources
Big data analyses multiple data points, but how do you ensure that ecosystem is secure? In this podcast, Mathieu Gorge, CEO of Vigitrust, outlines the key steps in achieving big data security Continue Reading
-
News
29 Apr 2013
Another online firm hit by data breach
Online deals service LivingSocial is the latest company to report a breach of its computer systems that may mean attackers accessed customer details Continue Reading
-
News
25 Apr 2013
Lib Dems will block Snoopers’ Charter, says Nick Clegg
The draft Communications Data Bill will not go ahead while the Lib Dems are in government, says deputy prime minister Nick Clegg Continue Reading
-
News
24 Apr 2013
Protecting against modern password cracking
This article in our Royal Holloway Security Thesis series explains just how insecure passwords are and offers advice on alternative methods of security. Continue Reading
-
Feature
16 Apr 2013
How to create a good information security policy
Information security policies provide vital support to security professionals, yet few organisations take the time to create decent policies Continue Reading
-
News
15 Apr 2013
Google reaches deal with EU competition authorities
Google has reportedly reached a deal with European Union (EU) competition authorities over concerns about its business practices Continue Reading
-
News
12 Apr 2013
Google has another go at allaying EU competition concerns
Google has submitted a fresh set of proposals to address European concerns about its business practices and avoid punitive action Continue Reading
-
News
03 Apr 2013
Case Study: 192business switches to tokenisation to speed up business processes
Online payment card verification firm 192business uses tokenisation to speed up its processes and protect credit card details from fraud Continue Reading
-
News
02 Apr 2013
Google closer to action from European privacy regulators
Google is another step closer to action by privacy regulators across Europe for failing to change the way it manages user data Continue Reading
-
Opinion
25 Mar 2013
Securing the hypervisor: expert tips
There are many potential security issues with the various components of a virtualised infrastructure, and nowhere is this more of a concern than with the hypervisor platforms that host virtual systems and application instances Continue Reading
-
News
22 Mar 2013
Six security issues to tackle before encrypting cloud data
Concern about security and privacy is likely to drive adoption of cloud encryption, but there are six security issues businesses should tackle Continue Reading
-
News
28 Feb 2013
RSA 2013: Suppliers need to prepare for new security vulnerability handling standards
Software makers and online service providers need to prepare for two ISO standards on vulnerability handling processes due by the end of 2013 Continue Reading
-
News
18 Feb 2013
The Demise in Effectiveness of Signature and Heuristic Based Antivirus
Anti-virus technology is failing to protect organisations from malicious attacks. Security professionals should look at alternative strategies, the NNC group argues in this report. Continue Reading
-
News
11 Feb 2013
IT expert in Microsoft monopoly case faces £2.5m legal fight
A computer expert who advised the European Commission in its investigation into anti-competitive behaviour by Microsoft faces £2.5bn legal battle Continue Reading
-
Feature
07 Feb 2013
Social media: A security challenge and opportunity
Generation Y workers are posing increasing security challenges to their employers as they share data unreservedly Continue Reading
-
News
06 Feb 2013
EU cyber strategy aimed at boosting preparedness and cooperation
The European cyber security strategy addresses insufficient national preparedness and boosting co-operation in the region, says the EC Continue Reading
-
News
06 Feb 2013
Business avoids cloud over fear of government snooping
Almost half of IT professionals are deterred from keeping sensitive data in the cloud because of fear of government intervention and possible legal action, a survey has revealed Continue Reading
-
E-Zine
06 Feb 2013
Technology in the dock
In this issue of CW Europe we take a look at tablet security, through a range of case studies, highlighting the benefits and downfalls of mobile computing. You will also find information about the European Parliament’s decision to provide a new single patent law regulation and one court to cover intentions across the continent. Continue Reading
-
News
24 Jan 2013
ICO hits Sony with £250,000 data breach penalty
The Information Commissioner’s office (ICO) has fined Sony Computer Entertainment Europe £250,000 for breaching the Data Protection Act Continue Reading
-
News
10 Jan 2013
Software piracy international in scope, says Fast
The scale of software piracy is both international in scope and military in its execution, says the Federation Against Software Theft (Fast) Continue Reading