Regulatory compliance and standard requirements
-
Opinion
01 May 2025
Signalgate: Learnings for CISOs securing enterprise data
A leak of information on American military operations caused a major political incident in March 2025. The Security Think Tank considers what can CISOs can learn from this potentially fatal error. Continue Reading
By- Todd Thiemann, Senior Analyst
-
News
01 May 2025
Thomas Herdman’s legal battle over Sky ECC encrypted phone distribution set to enter fifth year
Computer Weekly speaks to Julie Kawai Herdman, daughter of Thomas Herdman, the only person in custody for distributing Sky ECC encrypted phones Continue Reading
By- Bill Goodwin, Computer Weekly
- Rebecca Tidy
-
News
14 Sep 2015
RSA Group flags ID theft risk to Lloyds Bank customers following datacentre storage theft
International insurance group has seen 500 customers take up offer of identity theft protection in wake of datacentre theft Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
10 Sep 2015
Cloudian boosts object storage HyperStore compliance features
Distributed object storage software maker Cloudian upgrades HyperStore with added granularity of data protection features that can help meet compliance requirements Continue Reading
By- Antony Adshead, Storage Editor
-
Opinion
25 Aug 2015
Life’s a breach: How to handle the press after a hacking attack
Emily Dent, specialist in crisis PR, offers some advice to organisations that unexpectedly find themselves in the headlines Continue Reading
By- Emily Dent
-
News
21 Aug 2015
ICO orders Google to remove links to right to be forgotten takedowns
The Information Commissioner's Office (ICO) says Google must remove newer links that reveal the same details as previously removed links Continue Reading
-
News
20 Aug 2015
Broadband Stakeholder Group to review UK net neutrality policy
The Broadband Stakeholder Group commissions an independent review into the UK’s industry-led approach to net neutrality and the open internet Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 Aug 2015
Mobile phone users at risk as hackers bug and track victims
An investigation by Australian TV show 60 Minutes demonstrates how hackers based thousands of miles away in Germany were able to record the calls of an Australian senator and track his movements Continue Reading
By- Ross Coulthart, 60 Minutes Australia
-
News
29 Jul 2015
Technology experts warn of dangers of artificial intelligence arms race
An open letter signed by more than 12,000 technology experts calls for a ban on artificial intelligence (AI) to manage weapons “beyond meaningful human control” Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
27 Jul 2015
SaaS criteria to track for business outcomes
Organisations should evolve their SaaS selection criteria to focus on newer metrics that are better indicators of supplier performance Continue Reading
By- Liz Herbert
-
News
20 Jul 2015
UK considers 10-year jail sentences for online piracy
The UK government is considering new measures to increase the sanctions for criminals who infringe the rights of copyright holders for large-scale financial gain Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Jul 2015
Wi-Fi enhances guest experience and profitability for Belgian theme park
Bobbejaanland, one of the largest theme parks in Belgium, is using a Fortinet Wi-Fi network to offer visitors access on the go, and improve its management capabilities Continue Reading
By- Xavier Mertens
-
News
02 Jul 2015
Facebook wins first round in European privacy battle
Facebook has welcomed a Vienna court’s rejection of a 25,000-strong class action lawsuit against the social networking firm for allegedly breaching European privacy laws Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
09 Jun 2015
How to cull old, potentially risky data
Unused data is a potential security risk, with old spreadsheets, reports and email containing industry secrets and laced with company gossip. If it's no longer useful, it's time to delete it Continue Reading
By- Christian Cawley
-
News
01 Jun 2015
Most of more than 733,000 police communications data requests approved
Big Brother Watch is calling for a curb on the scale of police access to communications data and greater transparency in the use of this data Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 May 2015
PSNGB rebrands to drive information sharing across PSN
PSNGB, the trade association set up to promote the Public Services Network, rebrands itself as Innopsis and says its work is far from over Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Apr 2015
EU data protection regulation will drive privacy by design, says KuppingerCole
The EU data protection regulation will drive privacy by design in companies with European clients, says KuppingerCole analyst Karsten Kinast Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
25 Apr 2015
Bill Binney, the ‘original’ NSA whistleblower, on Snowden, 9/11 and illegal surveillance
Always a patriot: Computer Weekly talks to Bill Binney, the senior NSA official who blew the whistle before Edward Snowden Continue Reading
-
News
22 Apr 2015
Collaboration key to cyber security, says US homeland security chief
Collaboration between governments and with the private sector key to improving global cyber security Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 Apr 2015
Banks hide cyber crime losses, says City of London Police
Banks obscure the amount of money lost to cyber fraudsters – preferring to write off cyber theft as operating losses – says the City of London Police Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
14 Apr 2015
Security risk potential linked to young, mobile users
A study conducted by wireless supplier Aruba Networks has identified a distinct cohort of high-risk, security-agnostic workers Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
14 Apr 2015
Can legislation stop cyber crime?
Rising cyber crime suggests criminal law does not deter criminals and that a better legal solution is required to prevent further rises Continue Reading
By- Stewart James
-
Feature
10 Apr 2015
NHS data security: Lessons to be learned
The NHS does not always provide a trusted repository for patient data, but some trusts are examples of good practice in action Continue Reading
By -
News
31 Mar 2015
AWS gets EU approval for data replication outside of Europe
The European Union Data Protection Authorities has approved Amazon Web Services’ Data Processing Agreement Continue Reading
By- Cliff Saran, Managing Editor
-
News
26 Mar 2015
Samsung targets business with Microsoft tools integration
Samsung has pre-installed Microsoft OneNote, OneDrive, and Skype on the new Galaxy S6 and Galaxy S6 edge, as it expands into business Continue Reading
By- Cliff Saran, Managing Editor
-
News
27 Feb 2015
Case study: Norwegian insurer invests in Darktrace machine-learning cyber defence
Shipping insurance company DNK hopes to inspire the rest of the shipping industry to adopt Darktrace’s cyber defence system Continue Reading
-
News
20 Feb 2015
BlackBerry 10.3.1 review: Access Android apps and Blend
BlackBerry has finally released version 10.3.1 of its mobile operating system, which gives access to the Amazon Android app store Continue Reading
By- Cliff Saran, Managing Editor
-
News
11 Feb 2015
General election 2015: Major parties focus on tech agenda
With advancements around data protection and state surveillance of internet traffic, the UK is heading into its first tech-aware general election Continue Reading
By- Cliff Saran, Managing Editor
-
News
05 Feb 2015
FCC’s Tom Wheeler offers up net neutrality plan
The Federal Communications Commission (FCC) may rule in favour of a strong regulatory environment to preserve the open internet Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Jan 2015
Obama calls for single US data breach notification law
The US president is calling for a single US data breach notification law as part of proposed legislation to improve data security Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Jan 2015
Attackers bypass conventional security, says FireEye study
Hackers breach most conventional, signature-based security technologies, with 27% involving advanced threats Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Jan 2015
IT fails to get a grip on shadow applications
IT managers are unaware how much shadow IT is used by their business, the Cloud Security Alliance has warned Continue Reading
By- Cliff Saran, Managing Editor
-
News
17 Dec 2014
Cabinet Office begins procurement for next stage of Gov.uk Verify
The Cabinet Office has submitted a tender notice for a £150m three-year framework for the provision of identity assurance services Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
17 Dec 2014
US interception in the EU faces new legal challenges
US government orders against Microsoft to hand over email data 'infringes privacy legislation' in other countries Continue Reading
By- Fiona O’Cleirigh
-
News
12 Dec 2014
Care.data faces more delays over concerns about patients
The NHS’s Care.data scheme may face more delays due to concerns over lack of publicity and clarity of the proposed programme Continue Reading
By- Clare McDonald, Business Editor
-
News
28 Nov 2014
CGI secures communications between pilots and air traffic control
Satellite communications firm Inmarsat has outsourced the provision of security IT and services to CGI Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
07 Nov 2014
Police forces use private cloud to access Holmes database
Police forces across the UK will access the Holmes major investigation system via a private cloud service Continue Reading
By- Cliff Saran, Managing Editor
-
News
27 Oct 2014
Cloud providers rush to build European datacentres over data sovereignty
Cloud providers IBM and Google build datacentres in the EU as enterprises insist on keeping their data in Europe Continue Reading
By- Archana Venkatraman, Datacentre Editor
-
News
13 Oct 2014
UK ranks third in right to be forgotten requests to Google
The UK has made the third-highest number of requests for links to be removed from Google's search results Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Oct 2014
Azure CTO Mark Russinovich's top ten public cloud security risks
Microsoft Azure cloud CTO Mark Russinovich identified ten key security risks of public cloud services Continue Reading
By- Archana Venkatraman, Datacentre Editor
-
News
08 Oct 2014
Malware being used to steal cash from ATMs
Criminals are using malware to steal cash from ATMs without debit and credit cards Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
01 Oct 2014
European firms far from ready for new data rules, study shows
As European authorities aim to ratify revised data protection rules by 2015, many firms have a lot to do to comply Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Sep 2014
Case study: Deutsche Post DHL develops software contract templates to reduce costs
Deutsche Post DHL has created contract templates to manage software costs. Computer Weekly speaks to the people leading the initiative Continue Reading
By- Cliff Saran, Managing Editor
-
News
15 Sep 2014
WikiLeaks reveals Australian police are using surveillance software
Australia's New South Wales police are using spyware that has been linked to repressive states, according to leaked documents Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Aug 2014
Local authorities can improve data protection, says ICO audit
There is room for improvement in how local authorities protect personal data, says an audit report by the ICO Continue Reading
By- Warwick Ashford, Senior analyst
-
News
31 Jul 2014
Paddy Power hit by data breach in 2010
Gambling firm Paddy Power owns up to 2010 data breach after recovering a compromised dataset in Canada Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Jul 2014
Hacker and UFO hunter Gary McKinnon launches SEO business
Hacker Gary McKinnon has set up a search engine optimisation business after winning a 10-year battle against extradition to the US Continue Reading
-
News
25 Jul 2014
Search firms meet EU regulators over right to be forgotten
Google, Microsoft and Yahoo have met EU data protection authorities to discuss the implications of the right to be forgotten ruling Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Jul 2014
Privacy key to UK business opportunity, says KPMG
Finding the right balance between privacy and business insight could help UK firms take the lead in innovative online services, says KPMG Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
16 Jul 2014
The legal considerations of the internet of things
As with many new technologies, there are a number of tricky legal challenges to consider as part of widespread IoT adoption Continue Reading
By- Kim Walker
-
News
04 Jul 2014
Barclays passes government’s ‘internet-born threat’ test
Barclays Bank has been awarded the government’s cyber security certificate for digital banking services after independent tests of services such as Pingit Continue Reading
-
News
04 Jul 2014
Security Think Tank: The dos and don’ts of a good incident response plan
What does a good information security incident response plan look like? Continue Reading
By- Tim Holman, 2-sec
-
News
01 Jul 2014
Most people keen to share biometric data for smoother travel
A study has revealed that 89% of citizens agree with the use of biometric identification to aid travel Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
27 Jun 2014
Wearable tech must comply with privacy laws, warns ICO
Wearable technology must comply with UK data privacy laws, warns the ICO Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Jun 2014
Google begins complying with European takedown requests
Google has begun removing search results in response to takedown requests from European citizens Continue Reading
By- Warwick Ashford, Senior analyst
-
Podcast
18 Jun 2014
Voice recording compliance: What it is and how to achieve it
Voice recording compliance is subject to the regulation by the FSA, PCI, and Data Protection and Freedom of Information Acts Continue Reading
By- Antony Adshead, Storage Editor
-
News
06 Jun 2014
Vodafone blows lid on government spy networks
Vodafone reveals secret mobile phone-tapping network and joins Microsoft and Cisco in calling for debate on electronic surveillance Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
28 May 2014
Principles of compliance in the financial services industry
Compliance in financial services can appear a staggeringly complex web of laws and regulations, but some key principles apply, says Mathieu Gorge of Vigitrust Continue Reading
By- Antony Adshead, Storage Editor
-
News
28 Apr 2014
US judge orders Microsoft to hand over email data held in Dublin
A US Judge has ordered Microsoft to give the District Court access to the contents of one of its customer’s emails stored on a server located in Dublin Continue Reading
By- Archana Venkatraman, Datacentre Editor
-
News
01 Apr 2014
UK update to copyright law imminent
The UK is to update its 1988 copyright law for the digital age in line with a nearly three-year-old review Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 Mar 2014
Google says government data requests are up 120% since 2009
Government requests for information about Google customers, have increased by 120% since 2009 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Mar 2014
Customer privacy an ongoing challenge, says Unilever
Unilever has set up a programme to address the continually evolving challenge of privacy issues relating to customer data Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
14 Mar 2014
Hacktivism: good or evil?
IT lawyer Dai Davis looks at the rise of hacktivism and its impact on business and international politics Continue Reading
By- Dai Davis, Percy Crow Davis & Co
-
News
04 Mar 2014
IT Security Salary Index (UK)
Are you being paid the right rate for the job? Check out this IT Security salary index from Acumin. Continue Reading
-
News
04 Mar 2014
Governance, Risk Management and Compliance (GRC)
Ensuring that all the stakeholders' information needs are met requires a holistic approach to managing information – the creation of a GRC platform, say analysts Clive Longbottom and Rob Bamforth. Continue Reading
-
Opinion
17 Feb 2014
Should you allow a bring your own device policy?
Employers are realising there are challenges presented by BYOD which, if not dealt with, could have a serious impact on the business Continue Reading
By- Sarah Burke
-
News
11 Feb 2014
Rights groups call on White House to open privacy review
A coalition of 25 rights groups is calling for a 90-day US government review of big data and the future of privacy to be opened up to the public Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Feb 2014
Bank of England publishes Waking Shark II cyber security exercise results
Bank of England publishes the results of its Waking Shark II security exercise, which tested financial institutions' contingency plans for cyber attack Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
17 Jan 2014
Internet at risk of 'cybergeddon' says WEF
Internet is at risk of fragmenting amid concerns over spying and cyber crime, says World Economic Forum Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
14 Jan 2014
Top European IT initiative to support business in 2014?
Expanding IT to support business growth is one of the biggest areas of focus for IT departments in 2014, so what does this mean? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Jan 2014
Security considerations for UK enterprises
This Research Snapshot from Vanson Bourne looks at IT security spending trends, awareness of cyber-threats, and the factors perceived as the biggest security risks for organisations. Continue Reading
-
News
03 Jan 2014
Facebook faces lawsuit over monitoring private messages
Facebook is facing a lawsuit that claims it scans the contents of private messages to profile the user’s online activity Continue Reading
By- Warwick Ashford, Senior analyst
-
News
24 Dec 2013
Top 10 IT privacy stories of 2013
Stories related to whistleblower Edward Snowden’s revelations about internet mass surveillance programmes by the US and the UK have dominated this year Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Dec 2013
UK citizen wins legal round against Facebook over Prism leaks
A British citizen has applied for a judgement against Facebook in a case that will test the right of tech firms to give UK personal data to the NSA. Continue Reading
By- Fiona O’Cleirigh
-
Podcast
11 Dec 2013
What’s new in ISO 27001: 2103 for storage and backup?
This year, ISO 27001: 2013 was published, putting more emphasis on mapping risk to an ever-expanding and mobile IT infrastructure. But what is new in ISO 27001: 2013? Continue Reading
By- Antony Adshead, Storage Editor
-
News
05 Dec 2013
UK citizen sues Microsoft over Prism private data leak to NSA
A court action brought in the UK will test Microsoft's legal right to disclose private data on UK citizens to US intelligence services Continue Reading
By- Fiona O’Cleirigh
-
News
04 Dec 2013
The Guardian denies Snowden stories damaged national security
Guardian editor Alan Rusbridger defends decision to publish stories on documents leaked by whistleblower Edward Snowden Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Nov 2013
NCA changed UK cyber crime fighting, says NCCU head
The NCA has changed the UK law enforcement landscape, says Andy Archibald, head of the NCA’s National Cyber Crime Unit Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Nov 2013
Government lays out 2014 cyber security agenda
The UK government has reiterated its commitment to addressing cyber security and laid out some plans for 2014 at the Cyber Security Summit 2013 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Nov 2013
FTSE 350 firms complete cyber risk assessment
Most FTSE 350 companies put cyber risk on the board agenda, but many need to improve how they manage that risk Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Nov 2013
Report highlights poor UK attitudes to mobile security
Businesses should note that many UK mobile users do not take security precautions and do not know how to guard against data theft Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Nov 2013
Google reaches $17m multi-state settlement over Safari snooping
Google has reached a $17m settlement agreement with 10 US states for bypassing Apple Safari privacy settings Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Nov 2013
Mass surveillance a bad idea, says Information Commissioner Christopher Graham
Information Commissioner Christopher Graham says issues of national security must not overshadow concerns of legitimate public interest Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Nov 2013
Web surveillance not a good idea, says Info Commissioner
Information Commissioner Christopher Graham says issues of national security cannot be allowed to overshadow concerns of legitimate public interest Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Nov 2013
Global profiles of the fraudster
Computers, rather than conmen, are set to be the future face of fraud, as criminals turn to robotics in an effort to avoid detection, this report from KPMG reveals. Continue Reading
-
News
24 Oct 2013
Thales launches critical infrastructure cyber security lab
Thales has set up a cyber security lab dedicated to help improve the security of critical national infrastructure, government and business Continue Reading
By- Warwick Ashford, Senior analyst
-
News
23 Oct 2013
US publishes draft cyber security framework
The US has published a draft framework of voluntary cyber security standards aimed at reducing risks to critical national infrastructure Continue Reading
By- Warwick Ashford, Senior analyst
-
News
17 Oct 2013
Government overhauls security classification to fit digital age
In its first overhaul since World War II the government is consolidating six security bands to three with a system deemed more appropriate in the digital age. Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Opinion
16 Oct 2013
Who owns your LinkedIn account?
It is common for employees to use personal social networking accounts for work, but who actually owns those accounts? Continue Reading
By- Sarah Burke
-
News
16 Sep 2013
Risk assessment key to cloud adoption, says Isaca
There is mass confusion among small and medium businesses about cloud computing, says Amar Singh, chair of Isaca UK Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Sep 2013
Windows 2012 Server Network Security
This book chapter offers an introduction to Windows 8 and Windows Server 2012 network security and IPv6. It includes a 30% discount code for Computer Weekly readers. Continue Reading
-
News
05 Sep 2013
Windows Server 2012 Security from End to Edge and Beyond
This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask. Continue Reading
-
News
05 Sep 2013
Printing: a false sense of security?
Louella Fernandes and Bob Tarzey show how secure printing technology can provide authentication, authorisation and accounting capabilities, helping businesses improve document security and meet compliance regulations. Continue Reading
-
News
23 Aug 2013
Box.com forges new cloud security model
Service providers and consumers need to move to a security model better suited to the cloud computing, says Box.com Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Aug 2013
Targeted attacks and how to defend against them
Analysts Bob Tarzey and Louella Fernandes assess the scale and real impact of targeted attacks the measures being taken to defend against them. Continue Reading
-
News
30 Jul 2013
ICO to investigate sale of online dating profiles
The UK’s data protection watchdog is to investigate the sale of 10,000 online dating profiles to the BBC’s Panorama programme Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
29 Jul 2013
An introduction to cyber liability insurance cover
Cyber liability insurance cover has been around for 10 years, but most security professionals seem to have not heard of it or know that it exists Continue Reading
By -
News
22 Jul 2013
UK to block online porn by default
The UK is to block online pornography by default to all new internet users, David Cameron is to announce Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Jul 2013
IT security case studies
Four critical IT security case-studies selected from the winners of Computer Weekly's European User Awards for security Continue Reading
-
News
18 Jul 2013
Needle in a Datastack: The rise of big security data
This research from McAfee investigates how well organisations are positioned to address the challenges of managing security in a world of ever increasing amounts and types of data. Continue Reading
-
News
17 Jul 2013
IT Security Case Studies
Warwick Ashford presents 4 essential IT security case-studies selected from the winners of Computer Weekly's European User Awards. Continue Reading
-
News
11 Jul 2013
OpenCorporates makes company data public
Company data is being made available as part of an initiative to place more government data in the public domain Continue Reading