News
Identity and access management products
-
April 04, 2014
04
Apr'14
Cabinet Office vetoed Home Office plans for 'critical' e-Borders replacement
Home Office plans for IT systems to replace ageing border security systems that contain “critical vulnerabilities” were vetoed by the Cabinet Office
-
March 12, 2014
12
Mar'14
Government finally ends e-Borders programme
The government has formally ended the troubled e-Borders programme, with its intended functions merged into a new project
-
February 27, 2014
27
Feb'14
Microsoft takes aim at passwords
Microsoft says it is determined to solve the problem of ineffective authentication that relies on usernames and passwords
-
February 05, 2014
05
Feb'14
Bank of England publishes Waking Shark II cyber security exercise results
Bank of England publishes the results of its Waking Shark II security exercise, which tested financial institutions' contingency plans for cyber attack
-
January 15, 2014
15
Jan'14
The IT risks facing Universal Credit
Despite Iain Duncan Smith's robust defence of his flagship welfare reform policy, Universal Credit, evidence to the contrary continues to mount
-
October 30, 2013
30
Oct'13
Identity assurance system moves into beta test phase
The Government Digital Service has started testing of a key system to support plans for citizens to securely prove their identity when accessing online public services
-
October 17, 2013
17
Oct'13
Government overhauls security classification to fit digital age
In its first overhaul since World War II the government is consolidating six security bands to three with a system deemed more appropriate in the digital age.
-
September 26, 2013
26
Sep'13
Small businesses must encrypt customer data, says ICO
The Information Commissioner’s Office (ICO) urges small businesses to encrypt customer data after a sole trader was fined for failing to do so
-
July 22, 2013
22
Jul'13
Insider threat: Balancing security with privacy
How can organisations increase security without affecting productivity or encroaching on employees’ right to privacy?
-
June 24, 2013
24
Jun'13
Identity management key to browser-based IT strategy
A cloud-based identity management system is key to enabling a browser-based IT strategy at online recruitment firm Reed.co.uk
-
April 29, 2013
29
Apr'13
Another online firm hit by data breach
Online deals service LivingSocial is the latest company to report a breach of its computer systems that may mean attackers accessed customer details
-
April 25, 2013
25
Apr'13
Spam SMS messages drop following ICO penalty
The number of spam SMS messages has significantly reduced since government regulator ICO issued £440,000 fines last year
-
April 19, 2013
19
Apr'13
Conficker makes way for web-based attacks, says Microsoft
Web attacks emerge as top threat as businesses finally begin to win the battle against Conficker and other worms, says Microsoft
-
March 06, 2013
06
Mar'13
What is RSA's build, buy, partner strategy?
Computer Weekly takes a closer look at RSA's build, buy, partner strategy
-
February 06, 2013
06
Feb'13
Twitter strengthens login security after hacker attack
Days after a hacking attack, it has emerged that Twitter plans to strengthen its login security with two-factor authentication
-
January 28, 2013
28
Jan'13
Why has NAC, like DLP, failed to take off?
Why are organisations not investing in systems that are designed to keep malicious actors out of their networks?
-
January 22, 2013
22
Jan'13
BYOD: People pay for devices to use for work
Over half of employees buy their own devices for work use, according to new report from mobile device management specialist Good Technology
-
December 14, 2012
14
Dec'12
Mazars outsources access management
Global accountancy firm Mazars has outsourced the management of access to Oracle and Sharepoint applications for 6000 global staff
-
October 25, 2012
25
Oct'12
Government expected to unveil eight IDA suppliers for online services
The government is to announce suppliers – including PayPal, BT and the Post Office – to provide identity assurance (IDA) for online public services
-
October 16, 2012
16
Oct'12
Organisations need alternative data protection as security models fail
Organisations' security models are failing - so could it be time to adopt an intelligence-led approach to data protection and fighting cyber crime?
-
October 11, 2012
11
Oct'12
RSA Europe: Thousands of unprotected virtual servers exposed to the web
Organisations are failing to protect data in virtual environments, says Jason Hart, vice-president cloud solutions, SafeNet
-
October 11, 2012
11
Oct'12
RSA Europe: Security concerns whole supply chain, says Misha Glenny
Targeted attacks affect the whole supply chain, not just big corporations, author Misha Glenny tells RSA Conference Europe 2012 attendees
-
October 10, 2012
10
Oct'12
DWP to announce identity assurance suppliers
The Department for Work and Pensions (DWP) is to announce the first providers in the government’s identity assurance (IDA) scheme at the end of October
-
October 05, 2012
05
Oct'12
Security firm warns against Samsung Galaxy Tab for enterprise use
Security specialist Context Information Security says vulnerabilities in the Samsung Galaxy Tab make it unsuitable for use in the enterprise
-
October 02, 2012
02
Oct'12
HMRC deploys Becrypt off-the-shelf encryption
HMRC will use Becrypt Disk protect, which has recently been certified under the government’s Commercial Product Assurance (CPA) Scheme.
-
September 20, 2012
20
Sep'12
Dell SecureWorks uncovers cyber espionage targeting energy firms
Dell SecureWorks researchers have discovered a cyber espionage campaign targeting several companies, including two in the energy sector
-
September 13, 2012
13
Sep'12
Government launches £3.8m cyber security institute
The government has ramped up moves to tackle growing cyber security threats by launching a £3.8m research institute.
-
September 05, 2012
05
Sep'12
FBI denies link to leaked Apple device codes
The FBI says there is no evidence that Anonymous gained access to 12 million identity codes for Apple devices by hacking an FBI agent's laptop
-
September 04, 2012
04
Sep'12
Anonymous claims a million Apple IDs in FBI breach
Hacking group Anonymous claims to have released over a million Apple Unique Device Identifiers (UDIDs) obtained from breaching FBI networks
-
September 03, 2012
03
Sep'12
Powerful cyber attack tools widely available, say researchers
More low-level cyber criminals are getting access to sophisticated attack tools, say cyber intelligence specialists
-
August 31, 2012
31
Aug'12
Businesses worldwide fail to prepare for cyber threats, says Kaspersky Lab
Companies around the world have failed to address cyber threats, according to a survey from security organisation Kaspersky Lab
-
August 21, 2012
21
Aug'12
At least 9 out of 10 top mobile apps hacked, study shows
An average of 96% of the top 100 paid mobile apps have been hacked, a study has revealed
-
August 20, 2012
20
Aug'12
More than 1,000 school application details leaked on the internet
Personal information about more than 1,000 children has been published on the UK Independent Schools Guide website after an alleged cyber attack
-
August 08, 2012
08
Aug'12
Good data protection can be cheap and easy, says ICO
The ICO says charities and third sector organisations stand to benefit most from a data protection check-up.
-
August 06, 2012
06
Aug'12
LinkedIn data breach costs more than $1m
LinkedIn says the forensic investigation and other recovery costs of the data breach in June could have topped $1m.
-
July 31, 2012
31
Jul'12
Cyber threats affect banks worldwide
Nearly a quarter of the world's banks were hit by security breaches in the past year, a study shows
-
July 27, 2012
27
Jul'12
Twitter users targeted by Blackhole malware
Twitter users are being targeted by tweets containing malicious links that claim recipients are pictured in an online photo
-
July 26, 2012
26
Jul'12
Australian telco AAPT confirms Anonymous data breach
Australian telecoms firm AAPT confirms business customer data was breached by hacktivist group Anonymous at an external service provider
-
July 19, 2012
19
Jul'12
Many global firms unaware of online risk, finds KPMG
Many global organisations could do a lot more to protect their private data and reduce exposure to attacks by hackers, according to KPMG
-
July 16, 2012
16
Jul'12
Sophos combines endpoint security and UTM
Security firm Sophos combines endpoint protection and unified threat management (UTM) products into a single physical or virtual appliance
-
July 09, 2012
09
Jul'12
Google Android OS Trojan virus hits 100K devices in China
Trojan malware has hit 100,000 devices using the Google Android operating system (OS) in China, say security researchers
-
July 04, 2012
04
Jul'12
BT extends cyber security agreement with MoD
BT is to extend its cyber security agreement with the Ministry of Defence (MoD) in a deal to expand its cyber defence service
-
June 27, 2012
27
Jun'12
White House cyber security coordinator Howard Schmidt joins Qualys
Former White House cyber security coordinator Howard Schmidt is to join the board of security and compliance company Qualys
-
June 27, 2012
27
Jun'12
Network security: Is new technology bypassing traditional controls?
Network security practices are among the most mature, but can businesses be sure network traffic is not sneaking past traditional controls?
-
June 27, 2012
27
Jun'12
FTC sues Wyndham Worldwide hotel group over data breaches
The US Federal Trade Commission (FTC) is suing hotel group Wyndham Worldwide over claims it failed to secure customer data
-
June 18, 2012
18
Jun'12
Ethiopian government blocks Tor Network online anonymity
The Ethiopian government is blocking access to the Tor Network that enables online anonymity, according to Reporters Without Borders
-
June 12, 2012
12
Jun'12
2012: Will this be the year TPM finally comes of age?
Will 2012 be the year that TPM finally delivers on its potential to provide a hardware-based "root of trust" for enterprise information security?
-
June 11, 2012
11
Jun'12
Flame malware gets kill command
The controllers of Flame, the most powerful cyber weapon discovered to date, have recently sent a kill command that removes the malware from some infected computers
-
June 08, 2012
08
Jun'12
eHarmony, Last.fm join LinkedIn with password leaks
Online dating site eHarmony and Last.fm have joined LinkedIn with password leaks, as hackers focus on social networks
-
June 06, 2012
06
Jun'12
Top 10 tips for IPv6 security
Many organisations are being misled about the complexities surrounding IPv6 security, according to security firm Stonesoft