News
Network security management
-
October 23, 2013
23
Oct'13
US publishes draft cyber security framework
The US has published a draft framework of voluntary cyber security standards aimed at reducing risks to critical national infrastructure
-
October 17, 2013
17
Oct'13
Government overhauls security classification to fit digital age
In its first overhaul since World War II the government is consolidating six security bands to three with a system deemed more appropriate in the digital age.
-
October 17, 2013
17
Oct'13
The challenges of using mobile devices in the public sector
The government is allowing the public sector to implement BYOD schemes, but the guidelines are limiting and challenges still remain
-
October 16, 2013
16
Oct'13
Neustar to host first DDoS awareness day
Communications firm Neustar is to host the first international awareness day on distributed denial of service (DDoS) attacks
-
October 02, 2013
02
Oct'13
McAfee Focus 2013: McAfee leadership upbeat about Stonesoft acquisition
Intel-owned security firm McAfee is upbeat about its acquisition of Stonesoft and its future capability to tackle security differently
-
September 30, 2013
30
Sep'13
MoD announces specialist programme to fend off cyber attacks
The Ministry of Defence (MoD) has announced a strategy to defend UK national security from the threat of cyber attacks
-
September 27, 2013
27
Sep'13
Top 10 cyber crime stories of 2013
Cyber crime featured heavily in security news coverage in 2013, with cyber criminals and cyber law enforcers upping their games with each passing month
-
September 06, 2013
06
Sep'13
NSA and GCHQ unlock online privacy encryption
UK and US intelligence agencies have unlocked the technology used to encrypt online services, including email, online banking and medical records.
-
August 22, 2013
22
Aug'13
Charlie McMurdie joins PwC’s cyber practice
Charlie McMurdie, former head of the Metro Police central e-crime unit, is joining business consultancy firm PwC as its senior crime adviser
-
August 05, 2013
05
Aug'13
Websites hacked to show child abuse images
More than 25 business websites worldwide have been hacked to show illegal images of child sex abuse
-
July 29, 2013
29
Jul'13
Continual vigilance key to security, says Damballa
UK businesses must update their approach to cyber security to look for signs of compromise continually
-
July 08, 2013
08
Jul'13
UK takes cyber threats to infrastructure seriously
The UK is taking seriously potential cyber threats to critical national infrastructure, according to GCHQ head Iain Lobban
-
July 05, 2013
05
Jul'13
Security Think Tank: Prism unlikely to change much
Does the data collected by Prism put the US Government at risk from other state or non-state sponsored activists?
-
June 21, 2013
21
Jun'13
UK businesses failing to secure virtual environments, study finds
Most UK businesses are failing to secure data in virtual environments, a survey of IT decision makers has revealed
-
June 10, 2013
10
Jun'13
Telefonica Digital forms security group Eleven Paths
The business division of mobile operator Telefonica launches Eleven Paths, an independent company working on security issues in the workplace
-
May 21, 2013
21
May'13
Privileged accounts key to most APT attacks, says Cyber-Ark
The theft, misuse and exploitation of privileged accounts is becoming an increasingly key tactic in advanced persistent threat attacks
-
May 01, 2013
01
May'13
What’s to be done about data breach discovery?
The time from first contact by cyber attackers to the victim learning of it is still measured in months and years, not hours and days
-
April 29, 2013
29
Apr'13
Another online firm hit by data breach
Online deals service LivingSocial is the latest company to report a breach of its computer systems that may mean attackers accessed customer details
-
April 25, 2013
25
Apr'13
Spam SMS messages drop following ICO penalty
The number of spam SMS messages has significantly reduced since government regulator ICO issued £440,000 fines last year
-
April 22, 2013
22
Apr'13
Infosec 2013: University research challenges reliability of IPS
Research shows intrusion prevention systems (IPS) are not as effective at detecting malicious activity as some might think
-
April 19, 2013
19
Apr'13
Conficker makes way for web-based attacks, says Microsoft
Web attacks emerge as top threat as businesses finally begin to win the battle against Conficker and other worms, says Microsoft
-
April 11, 2013
11
Apr'13
Bots and web apps among top threats to data security, says Check Point
Bots, viruses, breaches and attacks are a constant and real threat to the information security of organisations
-
April 11, 2013
11
Apr'13
Porn websites pose malware risk, says researcher
Browsing popular pornography internet sites pose a growing risk of malware infection, according to a security researcher
-
April 03, 2013
03
Apr'13
Anonymous threatens to declare cyber war on North Korea
Anonymous hacktivist collective has threatened North Korea with cyber war if leader Kim Jong-un does not resign and install free democracy
-
March 27, 2013
27
Mar'13
UK government sets up cyber security fusion cell
A cyber security “fusion cell” for cross-sector threat data sharing aims to put government, industry and information security analysts side-by-side
-
March 26, 2013
26
Mar'13
Employees ignore security rules, say infosec pros
Most information security professionals believe corporate employees wilfully ignore security rules, survey at RSA Conference 2013 reveals
-
March 20, 2013
20
Mar'13
Case study: Hamilton Fraser embraces BYOD with MobileIron
How insurance firm Hamilton Fraser is using MobileIron to enable employees to bring their own devices while following company policy
-
March 06, 2013
06
Mar'13
What is RSA's build, buy, partner strategy?
Computer Weekly takes a closer look at RSA's build, buy, partner strategy
-
January 28, 2013
28
Jan'13
Why has NAC, like DLP, failed to take off?
Why are organisations not investing in systems that are designed to keep malicious actors out of their networks?
-
January 24, 2013
24
Jan'13
ICO hits Sony with £250,000 data breach penalty
The Information Commissioner’s office (ICO) has fined Sony Computer Entertainment Europe £250,000 for breaching the Data Protection Act
-
January 22, 2013
22
Jan'13
Why has DLP never taken off?
Why is data loss prevention (DLP) technology not being adopted if it provides the very protection most businesses need?
-
November 13, 2012
13
Nov'12
Many UK firms underestimate cost of data breaches, study finds
Many UK organisations are still failing to understand the implications and costs of data breaches, a study has revealed
-
November 12, 2012
12
Nov'12
Hacking attempts to top one billion in Q4, predicts NCC Group
One billion hacking attempts will be made globally in the final quarter of 2012, according to information assurance firm NCC Group
-
November 07, 2012
07
Nov'12
Police arrest man for DDoS attacks on Theresa May sites
Police have arrested a 41-year-old man in connection with a cyber attack on websites connected to home secretary Theresa May
-
October 31, 2012
31
Oct'12
‘VM-aware’ viruses on the rise
Viruses targeting virtual machines (VM) are growing in numbers and will soon be the dominant force in the world of cyber crime, says Kaspersky
-
October 30, 2012
30
Oct'12
IT security budgets mismatched to hacker targets, study shows
IT security budgets are not being used to provide defence technologies in some areas most likely to be targeted by hackers, a study shows
-
October 25, 2012
25
Oct'12
ICO hits Stoke-on-Trent City Council with £120,000 fine
Stoke City Council has breached the Data Protection Act, for the second time in two years, after details of a child protection legal case were emailed to the wrong person.
-
October 17, 2012
17
Oct'12
ZTE targets local government for UK growth
Despite security controversy, Chinese firm ZTE’s UK head of sales tells Computer Weekly one of its first targets will be local government
-
October 16, 2012
16
Oct'12
Organisations need alternative data protection as security models fail
Organisations' security models are failing - so could it be time to adopt an intelligence-led approach to data protection and fighting cyber crime?
-
October 11, 2012
11
Oct'12
RSA Europe: Thousands of unprotected virtual servers exposed to the web
Organisations are failing to protect data in virtual environments, says Jason Hart, vice-president cloud solutions, SafeNet
-
October 11, 2012
11
Oct'12
RSA Europe: Security concerns whole supply chain, says Misha Glenny
Targeted attacks affect the whole supply chain, not just big corporations, author Misha Glenny tells RSA Conference Europe 2012 attendees
-
October 05, 2012
05
Oct'12
Security firm warns against Samsung Galaxy Tab for enterprise use
Security specialist Context Information Security says vulnerabilities in the Samsung Galaxy Tab make it unsuitable for use in the enterprise
-
October 02, 2012
02
Oct'12
Hackers target White House military network
Hackers using computers in China have infiltrated an “unclassified” network in the US White House, believed to be used for issuing nuclear commands.
-
September 27, 2012
27
Sep'12
Izz ad-Din al-Qassam hackers launch cyber attack on US bank Wells Fargo
A hacker group connected to Hamas says it attacked US bank Wells Fargo in reaction to the video 'Innocence of Muslims' posted on YouTube
-
May 18, 2012
18
May'12
MDM, security vendors scramble to address BYOD security issues
Organisations are looking beyond NAC and MDM to resolve BYOD security issues; MDM, security and hybrid vendors are responding with new products.
-
March 30, 2012
30
Mar'12
SIEM deployment case study shows patience is required
Williams Lea’s SIEM is already helping reduce manual log reviews. But there’s still a lot of work to be done before the SIEM can be fully deployed.
-
October 12, 2011
12
Oct'11
New batch of IDS, IPS evasion techniques are hitting their targets
Stonesoft has discovered 163 new advanced evasion techniques (AET), claiming these AETs can pass below the radar of some IDS, IPS products.
-
October 14, 2008
14
Oct'08
Using Wireshark to monitor and secure your network
Learn how to use packet analyser, Wireshark, in this illustrated tutorial.
-
March 27, 2008
27
Mar'08
Getting the best bargain on network vulnerability scanning
When it comes to enterprise network analysis, is it best to use a commercial vulnerability scanner or an open source product? Mike Chapple explains.
-
March 06, 2008
06
Mar'08
Losing the war to lock down networks might help enterprises innovate
While security concerns cannot be set aside, users unwilling to leave their own applications at home might bring some innovation to the office.