Security policy and user awareness
-
News
27 May 2025
US makes fresh indictments over DanaBot, Qakbot malwares
US charges the operators of two malwares, DanaBot and Qakbot, whose actions led to millions of dollars worth of cyber theft and fraud Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 May 2025
Armed forces charity steps in to address cyber mental health crisis
CIISec and military charity PTSD Resolution hope to address a gathering mental health crisis among frontline cyber professionals Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Feb 2020
Mac-based security threats outpacing Windows
Security threats targeting Apple endpoints are growing more quickly than those targeting Windows machines, according to Malwarebytes Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Feb 2020
Chinese military personnel accused of Equifax hack
A US federal grand jury has indicted four Chinese army personnel over the 2017 Equifax breach Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Feb 2020
What should be in Australia’s next cyber security strategy
The Australian government is reviewing the nation’s cyber security strategy, but is it looking at the right issues? Continue Reading
-
Opinion
10 Feb 2020
Security Think Tank: Zero trust is complex, but has rich rewards
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero-trust architecture? Continue Reading
By- Bhanu Jagasia
-
News
07 Feb 2020
RobbinHood ransomware tricks Windows into deleting defences
By subverting kernel memory settings in Windows 7, Windows 8 and Windows 10, the RobbinHood ransomware can now delete cyber security defences from target systems Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Feb 2020
Joaquin Phoenix’s Joker is ‘most dangerous’ movie
Ahead of the 2020 Oscars, Kaspersky researchers say they found more than 300 files masquerading as the Joker movie Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
07 Feb 2020
Security Think Tank: No trust in zero trust need not be a problem
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero-trust architecture? Continue Reading
By- Silvano Sogus
-
News
06 Feb 2020
Maastricht University pays €200,000 to Russian hackers
A Dutch university has taken the difficult decision to pay hundreds of thousands of Euros to Russian hackers that compromised its systems through a ransomware attack Continue Reading
By- Kim Loohuis
-
News
06 Feb 2020
Stressed, overworked CISOs losing £23k a year in unpaid overtime
Nominet’s latest CISO Stress Report has revealed the extent to which organisations are taking advantage of their security staff, and the deleterious effects of overwork and stress on mental health Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Feb 2020
Scammers using fake PayPal emails stole over £1m in the UK in last quarter
Fraudsters tricked Brits into sending over £1m worth of goods to them that they hadn't paid for Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
05 Feb 2020
Web app ubiquity gives cyber criminals new opportunities
The popularity and ubiquity of web-based apps such as Office 365 and Salesforce is a temptation too good to miss for cyber criminals Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Feb 2020
IoT network flaw left Philips Hue bulbs open to attack
Vulnerabilities in the ZigBee internet of things networking protocol have left market-leading smart devices, including Philips Hue lightbulbs, open to exploitation Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
05 Feb 2020
Security Think Tank: Zero trust is not the answer to all your problems
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero-trust architecture? Continue Reading
-
Opinion
04 Feb 2020
The fight against cyber crime: Why cooperation matters
With the WEF’s Global Risk Report 2019 ranking cyber attack in the top five global risks, we now see rising consensus at institutional level that no individual stakeholder can address the breadth of security challenges we face today Continue Reading
By- Elisabetta Zaccaria
-
Opinion
04 Feb 2020
Security Think Tank: Facing the challenge of zero trust
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero-trust architecture? Continue Reading
By -
Opinion
03 Feb 2020
Security Think Tank: Zero trust – just another name for the basics?
In theory, the elimination of trust on the network simplifies IT security, but zero trust also brings new complications and new challenges. How should CISOs go about moving their organisations from traditional network security to a zero-trust architecture? Continue Reading
By- Tim Holman, 2-sec
-
News
31 Jan 2020
Davos: The clock is ticking on climate change but cyber crime and emerging technologies add to risks
Climate change, natural disasters, extreme weather and loss of biodiversity are the greatest risks we face. With cyber conflicts, state-sponsored hacking and internet fragmentation, doing nothing is not an option, says the World Economic Forum Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
30 Jan 2020
NCSC launches study on cyber security diversity
The UK’s National Cyber Security Centre wants to improve the diversity of the cyber security sector Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Jan 2020
First coronavirus cyber threats seen in the wild
Kaspersky has reported the first incidences of cyber security threats playing on fears of the emerging coronavirus Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Jan 2020
UK cyber security sector worth more than £8bn
The UK’s cyber security industry employs 43,000 full-time workers, and contributed nearly £4bn to the UK economy in 2019, according to DCMS Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Jan 2020
NHS suffers fewer ransomware attacks, but threat persists
Ransomware attacks against the NHS have tapered off dramatically, according to statistics obtained under FoI legislation, but this does not mean the threat has diminished Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Jan 2020
Fintechs fear deepfake fraud
New research reveals the majority of CISOs working in the financial services sector are increasingly concerned about the potential use of deepfakes Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Jan 2020
Organisations losing control of cloud data
Data is more widely dispersed in enterprise clouds than most organisations think, and as a result they are at risk of losing control of it, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Jan 2020
Data privacy benefits outweigh spend, says Cisco
Cisco’s 2020 data privacy study shows organisations can generate substantial returns on their data privacy and protection spending Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Jan 2020
UK in catch-22 decision over Huawei security
The UK’s final decision on whether to permit mobile operators to use Huawei equipment is expected imminently, and its decision will have ramifications far beyond the technology sphere Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Jan 2020
Government tightens law around IoT cyber security
New legislation developed by DCMS and the NCSC may help guarantee the security and privacy of users of consumer IoT devices Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
27 Jan 2020
Security Think Tank: Bug bounties are changing the image of hackers
The traditional picture of a hacker is of a script kiddie in a hoodie hunched over a computer keyboard, but this stereotype is stale and outdated. Is it time to move away from a fear-based approach to security? Continue Reading
By- Paul Holland, Information Security Forum
-
News
27 Jan 2020
SANS Institute calls on Manchester security pros
Manchester will play host to a week-long cyber security training event during February Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Jan 2020
NHS alerted to severe vulnerabilities in GE health equipment
A series of vulnerabilities in patient monitoring equipment manufactured by General Electric could have left patient data exposed in hospitals around the world, including the UK Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Jan 2020
CISOs fear becoming the next Travelex
Poll of security professionals by the organisers of the Infosecurity Europe trade fair highlights huge gaps in incident response capabilities Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Jan 2020
End-user security ignorance laid bare in new report
Proofpoint’s 2020 State of the Phish report highlights an urgent need for better user training and reporting Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
23 Jan 2020
Startup uses machine learning to support GDPR’s right to be forgotten
Non-intrusive algorithms enable users to track which companies hold their data, so they can take it back Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
22 Jan 2020
Citrix releases IoC scanner for ADC and Gateway vulnerabilities
As patches for its compromised NetScaler ADC and Gateway products begin to roll out, Citrix enlists FireEye Mandiant to develop an indicator of compromise scanner for end-users Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Jan 2020
Internal error left Microsoft customer service data exposed
Customer service and support records of nearly 250 million Microsoft customers left exposed after database misconfiguration Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Jan 2020
5G builders test vulnerabilities in Finnish hackathon
University hackathon puts 5G security to the test as new wireless technology’s roll-out nears Continue Reading
By- Gerard O'Dwyer
-
News
20 Jan 2020
Exposed AWS buckets again implicated in multiple data leaks
A series of data leaks in the past week have once again implicated poorly secured Amazon S3 buckets, which are supposed to be private by default Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Jan 2020
GDPR nets more than €100m in fines, with more to come
Fines totalling €114m have already been collected under GDPR, and this figure will spike in 2020 if the UK regulator succeeds in imposing record fines on BA and Marriott Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
20 Jan 2020
Security Think Tank: Teens in basements don’t represent a positive security culture
The traditional picture of a hacker is of a script kiddie in a hoodie hunched over a computer keyboard, but this stereotype is stale and outdated. Is it time to move away from a fear-based approach to security? Continue Reading
By- Maxine Holt, Omdia
-
News
17 Jan 2020
NCSC makes final call for entries to CyberFirst Girls contest
Entry to the National Cyber Security Centre’s CyberFirst Girls 2020 competition is about to close Continue Reading
By- Alex Scroxton, Security Editor
-
News
17 Jan 2020
Emotet reinvigorated after Christmas break
The high-volume Emotet campaign is back in action after the Christmas holidays, and is just as dangerous as ever Continue Reading
By- Alex Scroxton, Security Editor
-
News
17 Jan 2020
CAA debuts aviation cyber security assurance scheme
Civil Aviation Authority and Crest announce the first companies to be accredited under the CAA’s new cyber security oversight scheme, Assure Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 Jan 2020
A quarter of users will fall for basic phishing attacks
Phishing emails that appear to be security alerts are the most effective method of compromise, says KnowBe4 Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
16 Jan 2020
Security Think-Tank: Tackle insider threats to achieve data-centric security
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but what does this mean for security professionals? Continue Reading
By- Mike Yeomans, Information Security Forum
-
News
16 Jan 2020
Thailand gets ready for data protection law
Thailand’s personal data protection law comes into effect in May 2020, subjecting organisations to new rules that safeguard the personal data of individuals Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
15 Jan 2020
LGBTQ+ social app Grindr accused of breaching GDPR
Norwegian Consumer Council files complaints about LGBTQ+ social networking app, alleging it is in breach of the General Data Protection Regulation Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Jan 2020
NSA Windows 10 security disclosure raises questions
In an unprecedented move, the NSA has got out in front of a critical cryptographic flaw in Windows 10, but in doing so has raised multiple questions Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Jan 2020
Threat landscape grew in complexity in 2019, no respite in sight
Check Point’s annual state of security report shares some 2019 trends and looks ahead to 2020 Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Jan 2020
Two-thirds of UK healthcare organisations breached last year
The majority of healthcare organisations in the UK experienced a cyber security incident during 2019, with almost half the result of viruses and malware introduced on third party devices Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Jan 2020
Cyber criminals spend three months lurking in target networks
Cyber criminals are spending longer hiding in target networks before launching their attacks, as more organised groups turn to business disruption to achieve their objectives Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Jan 2020
Turn the end of Windows 7 support into a security advantage
CISOs can take advantage of the end of support for Microsoft Windows 7 by making the case for more investment in cyber security Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Jan 2020
Citrix NetScaler vulnerabilities won’t be patched until end of January
Some vulnerabilities identified in Citrix products will not be fully patched until the end of January 2020 Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Jan 2020
Sextortion campaign hits Nest home security cameras
Owners of Google’s Nest home security cameras are being targeted in a sextortion scam by criminals playing on fears over IoT security Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Jan 2020
Travelex to begin restoring foreign exchange services two weeks after ‘Sodinokibi’ attack
Travelex says it is making “good progress” in its recovery and is to begin restoring electronic foreign exchange services, but is silent about whether it has agreed to pay hackers a $6m ransom to decrypt computer files Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
10 Jan 2020
National Lottery hacker jailed for nine months
Small-time cyber criminal jailed for his role in a cyber attack on lottery operator Camelot that netted him just £5 Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
10 Jan 2020
Learning from the Travelex cyber attack: Failing to prepare is preparing to fail
The key lesson to take from the Travelex breach is that an effective response to a breach is a critical business function and no longer the sole province of the IT department Continue Reading
By- Brian Honan, BH Consulting
-
Opinion
10 Jan 2020
Security Think Tank: Hooded hackers? More like ruthless competitors
The traditional picture of a hacker is of a script kiddie in a hoodie hunched over a computer keyboard, but this stereotype is stale and outdated. Is it time to move away from a fear-based approach to security? Continue Reading
By- Vladimir Jirasek, Foresight Cyber
-
News
09 Jan 2020
Travelex hackers threaten to sell credit card data on dark web
Sodinokibi cyber gangsters have threatened to sell Travelex customers’ private data on a Russian underground cyber crime forum if it fails to pay a $6m ransom Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
09 Jan 2020
Don’t become the next Travelex: Get ready for ransomware
With Travelex’s IT still in disarray and banks and travellers left without access to funds more than a week after it was hit by a ransomware attack, we ask what others can learn from the foreign exchange services company’s response to the incident Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Jan 2020
PowerTrick backdoor used to target high-value businesses
Threat actors are exploiting a PowerShell-based backdoor called PowerTrick to go after high-value targets, warns SentinelLabs Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
09 Jan 2020
Whisper it… but could a cyber attack be good for your career?
All too often it’s the CISO who carries the can for an enterprise security failure, but this might not be a bad thing. There’s lots of evidence to suggest that falling victim to a cyber attack may actually enhance your CV Continue Reading
By -
News
09 Jan 2020
New GDPR service aims to ease compliance challenges
Security consultants claim their software platform will address a pressing need for an effective and efficient means of complying with data protection rules Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
09 Jan 2020
Security Think Tank: Changing attitudes to cyber is a team sport
The traditional picture of a hacker is of a script kiddie in a hoodie hunched over a computer keyboard, but this stereotype is stale and outdated. Is it time to move away from a fear-based approach to security? Continue Reading
By -
News
08 Jan 2020
Half of UK citizens want tighter data regulations
Over 50% of UK citizens believe the gathering and use of personal data should be subject to more stringent government oversight, according to Fujitsu Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Jan 2020
TikTok video-sharing app left user data exposed
Check Point uncovered serious vulnerabilities in the TikTok video-sharing app that left users exposed Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
08 Jan 2020
Security Think Tank: Hero or villain? Creating a no-blame culture
The traditional picture of a hacker is of a script kiddie in a hoodie hunched over a computer keyboard, but this stereotype is stale and outdated. Is it time to move away from a fear-based approach to security? Continue Reading
-
News
07 Jan 2020
Facebook to ban deepfake videos
New policy closes some loopholes around misinformation, but seems to leave others wide open Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
07 Jan 2020
Security Think Tank: Get your users to take pride in security
The traditional picture of a hacker is of a script kiddie in a hoodie hunched over a computer keyboard, but this stereotype is stale and outdated. Is it time to move away from a fear-based approach to security? Continue Reading
By- Cate Pye, PA Consulting
-
News
06 Jan 2020
Iran likely to hit back with cyber attacks, security experts warn
The possibility of cyber attack by threat groups acting on behalf of the Iranian government has dramatically increased following US actions in Iraq Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
06 Jan 2020
Security Think Tank: Let’s call time on inciting fear among users
The traditional picture of a hacker is of a script kiddie in a hoodie hunched over a computer keyboard, but this stereotype is stale and outdated. Is it time to move away from a fear-based approach to security? Continue Reading
By- Andrew Morris, Turnkey Consulting
-
News
03 Jan 2020
Suspected ransomware attack causes worldwide disruption for Travelex
Travelex switches off computer systems and resorts to cash-only currency sales after malware attack. Insiders claim the currency exchange chain has been hit by ransomware which has left critical files containing customer data encrypted Continue Reading
By- Bill Goodwin, Computer Weekly
-
Opinion
03 Jan 2020
Security Think Tank: Put information at the heart of security
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but what does this mean for security professionals? Continue Reading
By- Maxine Holt, Omdia
-
News
03 Jan 2020
How Darktrace is riding the AI boom
Cyber security firm known for its artificial intelligence smarts doubled its headcount across Asia-Pacific last year in key markets including Australia and South Korea Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
02 Jan 2020
California’s CCPA an opportunity for security industry to do better
California’s consumer protection and data privacy laws came into effect on 1 January 2020, and present a golden opportunity for the cyber security practitioners Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Dec 2019
Top 10 cyber crime stories of 2019
Here are Computer Weekly’s top 10 cyber crime stories of 2019 Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Dec 2019
Top 10 cyber security stories of 2019
Here are Computer Weekly’s top 10 cyber security stories of 2019 Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Dec 2019
Finnish government supports local authorities in cyber security initiative
The Finnish government has committed resources to a cyber security project aimed at local authorities Continue Reading
By- Gerard O'Dwyer
-
Blog Post
19 Dec 2019
20,000 new police will not make UK law enforcement fit for the Internet Age
Over a decade ago the EURIM-IPPR study into “Partnership Policing for the Information Society” identified that the police would never have more than a fraction of the resources necessary to address ... Continue Reading
By- Philip Virgo, Winsafe Ltd
-
Feature
19 Dec 2019
Human factors are critical to securing digital transformation
Sourcing the latest cyber security technology to support digital transformation projects is all well and good, but it’s meaningless if you fail to address your organisational culture and the people within it Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Dec 2019
Top 10 Australia IT stories of 2019
Here are Computer Weekly’s top 10 Australia IT stories of 2019 Continue Reading
By- Aaron Tan, Informa TechTarget
-
Opinion
16 Dec 2019
Security Think Tank: Data-centric security requires a holistic approach
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but what does this mean for security professionals? Continue Reading
By- James Walsh, Fieldfisher
-
News
16 Dec 2019
Barco fixes ClickShare wireless flaw, but users still at risk
Supplier patches a major vulnerability in its popular ClickShare wireless presentation system with a firmware upgrade, but experts warn that users are not out of the woods yet Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
16 Dec 2019
We can’t allow fake news and disinformation to upend our democracy
Fake news, misinformation and cyber attacks are part of our political process – now is the time to act Continue Reading
By- Andrew Roughan, Plexal
-
News
13 Dec 2019
Alarm bells ring, the IoT is listening
With Christmas bearing down on us, a series of vulnerability disclosures has drawn attention to the parlous state of IoT security, and serves as a timely warning to people planning to buy smart devices as gifts Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
13 Dec 2019
Security Think Tank: Data-centric security requires context and understanding
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but what does this mean for security professionals? Continue Reading
By -
Opinion
11 Dec 2019
Security Think Tank: Risk-based response critical to protect data
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but what does this mean for security professionals? Continue Reading
By- Simon Persin, Turnkey Consulting
-
News
09 Dec 2019
Public sector still losing user devices in high numbers
The Ministry of Justice has lost 354 smartphones, PCs, laptops and tablets in the past 12 months, according to a Freedom of Information request, and other government departments are in the same boat Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Dec 2019
China bans foreign computing kit from government contracts
All government offices and public institutions must eliminate foreign hardware and software within three years, according to a leaked directive dubbed 3-5-2 Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Dec 2019
How commodities firm ED&F Man solved its threat detection challenges
After a minor server breach, leading commodities trader turned to Vectra’s Cognito service to expose hidden threats, spot privilege misuse, and conduct conclusive investigations Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Dec 2019
Dutch government must facilitate and coordinate a broad eID system
The Dutch government should push for an electronic ID system for its citizens that works across the public and private sectors, according to a report Continue Reading
By- Kim Loohuis
-
Opinion
06 Dec 2019
Security Think Tank: Is data more or less secure in the cloud?
Misconfigured cloud environments are increasingly identified as the source of damaging data breaches and leaks, raising serious questions for enterprises. Where does responsibility for data security in the cloud lie, and how can security professionals best work with their teams and cloud providers to resolve the problem? Continue Reading
By- Benoit Heynderickx, Information Security Forum
-
Opinion
05 Dec 2019
Security Think Tank: Time for a devolution of responsibility
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but what does this mean for security professionals? Continue Reading
-
News
05 Dec 2019
Two Russians indicted over Dridex and Zeus malware
The US Department of Justice has indicted two Russian citizens over their alleged role in the distribution of the virulent Bugat, or Dridex, and Zeus banking trojans Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Dec 2019
Cyber Girls First volunteers encourage girls to think high-tech
More than 80 schoolgirls spent a day learning about computer hackers and rocket science – Cyber Girls First hopes they will become the next generation of technologists Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
05 Dec 2019
Black Hat Europe: Mental health websites are leaking user data
At Black Hat Europe in London, researchers reveal the extent to which confidential data is being leaked to third parties by online mental health websites Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Dec 2019
Black Hat Europe: Red teams and blue teams must evolve in the 2020s
The red team versus blue team dichotomy is somewhat arbitrary and risks pigeonholing skilled security professionals into certain roles, says Facebook’s Amanda Rousseau Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
04 Dec 2019
Security Think Tank: Optimise data-centric strategies with AI
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but what does this mean for security professionals? Continue Reading
By- Stuart Lyons, PA Consulting
-
Opinion
03 Dec 2019
Cyber security: How to avoid a disastrous PICNIC
Fieldfisher’s David Lorimer examines how individual employees often facilitate cyber attacks, and what can be done to reduce the risk Continue Reading
By- David Lorimer, Fieldfisher
-
News
03 Dec 2019
Tenable buys Indegy to integrate IT and OT security
Acquisition of industrial security specialist Indegy will create a unified, risk-based platform spanning both IT and OT security for Tenable Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
03 Dec 2019
Security Think Tank: In-depth protection is a matter of basic hygiene
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but what does this mean for security professionals? Continue Reading
By -
News
03 Dec 2019
Chinese web users take more risks than Brits or Americans
A research paper published by the University of Birmingham seems to show that differences in cultural values have an impact both on risky behaviour online and legal regulation Continue Reading
By- Alex Scroxton, Security Editor