News
Identity and access management products
-
August 01, 2014
01
Aug'14
Fingerprint scanners most popular alternative to banking passwords
Fingerprint scanning technology is the most favoured biometric security alternative to passwords for UK bank customers
-
July 31, 2014
31
Jul'14
Paddy Power hit by data breach in 2010
Gambling firm Paddy Power owns up to 2010 data breach after recovering a compromised dataset in Canada
-
July 29, 2014
29
Jul'14
Tackle IAM with a risk-based approach, says KPMG
A risk-based approach is the best way to tackle identity and access management, says KPMG
-
July 09, 2014
09
Jul'14
Why using voice biometrics is a good idea
Banks and other organisations are turning to voice biometrics, but why do they believe the technology is good idea?
-
July 04, 2014
04
Jul'14
Barclays passes government’s ‘internet-born threat’ test
Barclays Bank has been awarded the government’s cyber security certificate for digital banking services after independent tests of services such as Pingit
-
July 01, 2014
01
Jul'14
Most people keen to share biometric data for smoother travel
A study has revealed that 89% of citizens agree with the use of biometric identification to aid travel
-
June 24, 2014
24
Jun'14
Benefits of accessing data outweigh privacy risks for chronically ill
Over half of UK patients with chronic health conditions want access to their medical records and believe the benefits outweigh privacy risks
-
April 17, 2014
17
Apr'14
Datacentre lessons learnt from Heartbleed bug
The Heartbleed bug, an OpenSSL flaw affecting millions of websites, has some lessons for datacentre providers and operators
-
April 08, 2014
08
Apr'14
Law Society advises legal industry's IT teams over cloud
The Law Society has published best-practice advice for legal firms' IT teams that are considering using cloud computing, following increased use of the cloud to store data
-
April 04, 2014
04
Apr'14
Cabinet Office vetoed Home Office plans for 'critical' e-Borders replacement
Home Office plans for IT systems to replace ageing border security systems that contain “critical vulnerabilities” were vetoed by the Cabinet Office
-
March 12, 2014
12
Mar'14
Government finally ends e-Borders programme
The government has formally ended the troubled e-Borders programme, with its intended functions merged into a new project
-
February 27, 2014
27
Feb'14
Microsoft takes aim at passwords
Microsoft says it is determined to solve the problem of ineffective authentication that relies on usernames and passwords
-
February 05, 2014
05
Feb'14
Bank of England publishes Waking Shark II cyber security exercise results
Bank of England publishes the results of its Waking Shark II security exercise, which tested financial institutions' contingency plans for cyber attack
-
January 15, 2014
15
Jan'14
The IT risks facing Universal Credit
Despite Iain Duncan Smith's robust defence of his flagship welfare reform policy, Universal Credit, evidence to the contrary continues to mount
-
October 30, 2013
30
Oct'13
Identity assurance system moves into beta test phase
The Government Digital Service has started testing of a key system to support plans for citizens to securely prove their identity when accessing online public services
-
October 17, 2013
17
Oct'13
Government overhauls security classification to fit digital age
In its first overhaul since World War II the government is consolidating six security bands to three with a system deemed more appropriate in the digital age.
-
September 26, 2013
26
Sep'13
Small businesses must encrypt customer data, says ICO
The Information Commissioner’s Office (ICO) urges small businesses to encrypt customer data after a sole trader was fined for failing to do so
-
July 22, 2013
22
Jul'13
Insider threat: Balancing security with privacy
How can organisations increase security without affecting productivity or encroaching on employees’ right to privacy?
-
June 24, 2013
24
Jun'13
Identity management key to browser-based IT strategy
A cloud-based identity management system is key to enabling a browser-based IT strategy at online recruitment firm Reed.co.uk
-
April 29, 2013
29
Apr'13
Another online firm hit by data breach
Online deals service LivingSocial is the latest company to report a breach of its computer systems that may mean attackers accessed customer details
-
April 25, 2013
25
Apr'13
Spam SMS messages drop following ICO penalty
The number of spam SMS messages has significantly reduced since government regulator ICO issued £440,000 fines last year
-
April 19, 2013
19
Apr'13
Conficker makes way for web-based attacks, says Microsoft
Web attacks emerge as top threat as businesses finally begin to win the battle against Conficker and other worms, says Microsoft
-
March 06, 2013
06
Mar'13
What is RSA's build, buy, partner strategy?
Computer Weekly takes a closer look at RSA's build, buy, partner strategy
-
February 06, 2013
06
Feb'13
Twitter strengthens login security after hacker attack
Days after a hacking attack, it has emerged that Twitter plans to strengthen its login security with two-factor authentication
-
January 28, 2013
28
Jan'13
Why has NAC, like DLP, failed to take off?
Why are organisations not investing in systems that are designed to keep malicious actors out of their networks?
-
January 22, 2013
22
Jan'13
BYOD: People pay for devices to use for work
Over half of employees buy their own devices for work use, according to new report from mobile device management specialist Good Technology
-
December 14, 2012
14
Dec'12
Mazars outsources access management
Global accountancy firm Mazars has outsourced the management of access to Oracle and Sharepoint applications for 6000 global staff
-
October 25, 2012
25
Oct'12
Government expected to unveil eight IDA suppliers for online services
The government is to announce suppliers – including PayPal, BT and the Post Office – to provide identity assurance (IDA) for online public services
-
October 16, 2012
16
Oct'12
Organisations need alternative data protection as security models fail
Organisations' security models are failing - so could it be time to adopt an intelligence-led approach to data protection and fighting cyber crime?
-
October 11, 2012
11
Oct'12
RSA Europe: Thousands of unprotected virtual servers exposed to the web
Organisations are failing to protect data in virtual environments, says Jason Hart, vice-president cloud solutions, SafeNet
-
October 11, 2012
11
Oct'12
RSA Europe: Security concerns whole supply chain, says Misha Glenny
Targeted attacks affect the whole supply chain, not just big corporations, author Misha Glenny tells RSA Conference Europe 2012 attendees
-
October 10, 2012
10
Oct'12
DWP to announce identity assurance suppliers
The Department for Work and Pensions (DWP) is to announce the first providers in the government’s identity assurance (IDA) scheme at the end of October
-
October 05, 2012
05
Oct'12
Security firm warns against Samsung Galaxy Tab for enterprise use
Security specialist Context Information Security says vulnerabilities in the Samsung Galaxy Tab make it unsuitable for use in the enterprise
-
October 02, 2012
02
Oct'12
HMRC deploys Becrypt off-the-shelf encryption
HMRC will use Becrypt Disk protect, which has recently been certified under the government’s Commercial Product Assurance (CPA) Scheme.
-
September 20, 2012
20
Sep'12
Dell SecureWorks uncovers cyber espionage targeting energy firms
Dell SecureWorks researchers have discovered a cyber espionage campaign targeting several companies, including two in the energy sector
-
September 13, 2012
13
Sep'12
Government launches £3.8m cyber security institute
The government has ramped up moves to tackle growing cyber security threats by launching a £3.8m research institute.
-
September 05, 2012
05
Sep'12
FBI denies link to leaked Apple device codes
The FBI says there is no evidence that Anonymous gained access to 12 million identity codes for Apple devices by hacking an FBI agent's laptop
-
September 04, 2012
04
Sep'12
Anonymous claims a million Apple IDs in FBI breach
Hacking group Anonymous claims to have released over a million Apple Unique Device Identifiers (UDIDs) obtained from breaching FBI networks
-
September 03, 2012
03
Sep'12
Powerful cyber attack tools widely available, say researchers
More low-level cyber criminals are getting access to sophisticated attack tools, say cyber intelligence specialists
-
August 31, 2012
31
Aug'12
Businesses worldwide fail to prepare for cyber threats, says Kaspersky Lab
Companies around the world have failed to address cyber threats, according to a survey from security organisation Kaspersky Lab
-
August 21, 2012
21
Aug'12
At least 9 out of 10 top mobile apps hacked, study shows
An average of 96% of the top 100 paid mobile apps have been hacked, a study has revealed
-
August 20, 2012
20
Aug'12
More than 1,000 school application details leaked on the internet
Personal information about more than 1,000 children has been published on the UK Independent Schools Guide website after an alleged cyber attack
-
August 08, 2012
08
Aug'12
Good data protection can be cheap and easy, says ICO
The ICO says charities and third sector organisations stand to benefit most from a data protection check-up.
-
August 06, 2012
06
Aug'12
LinkedIn data breach costs more than $1m
LinkedIn says the forensic investigation and other recovery costs of the data breach in June could have topped $1m.
-
July 31, 2012
31
Jul'12
Cyber threats affect banks worldwide
Nearly a quarter of the world's banks were hit by security breaches in the past year, a study shows
-
July 27, 2012
27
Jul'12
Twitter users targeted by Blackhole malware
Twitter users are being targeted by tweets containing malicious links that claim recipients are pictured in an online photo
-
July 26, 2012
26
Jul'12
Australian telco AAPT confirms Anonymous data breach
Australian telecoms firm AAPT confirms business customer data was breached by hacktivist group Anonymous at an external service provider
-
July 19, 2012
19
Jul'12
Many global firms unaware of online risk, finds KPMG
Many global organisations could do a lot more to protect their private data and reduce exposure to attacks by hackers, according to KPMG
-
July 16, 2012
16
Jul'12
Sophos combines endpoint security and UTM
Security firm Sophos combines endpoint protection and unified threat management (UTM) products into a single physical or virtual appliance
-
July 09, 2012
09
Jul'12
Google Android OS Trojan virus hits 100K devices in China
Trojan malware has hit 100,000 devices using the Google Android operating system (OS) in China, say security researchers