Business continuity planning
Business continuity is an organization's ability to maintain critical business functions during and after a disaster has occurred.. See complete definition.
-
Feature
19 Nov 2024
Storage technology explained: Ransomware and storage and backup
We look at ransomware attacks, and the importance of good backup practice as well as immutable snapshots, air-gapping, network segmentation, AI anomaly detection and supplier warranties Continue Reading
By- Antony Adshead, Storage Editor
-
Opinion
19 Nov 2024
Overcoming the cyber paradox: Shrinking budgets – growing threats
The challenging macro environment has left security budgets stretched thin even while new tech like AI presents a threat multiplier. In the face of these challenges, it becomes vital for security leads to do more to maintain funding Continue Reading
-
Opinion
16 Jan 2020
Security Think-Tank: Tackle insider threats to achieve data-centric security
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but what does this mean for security professionals? Continue Reading
By- Mike Yeomans, Information Security Forum
-
News
15 Jan 2020
NSA Windows 10 security disclosure raises questions
In an unprecedented move, the NSA has got out in front of a critical cryptographic flaw in Windows 10, but in doing so has raised multiple questions Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Jan 2020
Threat landscape grew in complexity in 2019, no respite in sight
Check Point’s annual state of security report shares some 2019 trends and looks ahead to 2020 Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Jan 2020
Turn the end of Windows 7 support into a security advantage
CISOs can take advantage of the end of support for Microsoft Windows 7 by making the case for more investment in cyber security Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Jan 2020
Travelex to begin restoring foreign exchange services two weeks after ‘Sodinokibi’ attack
Travelex says it is making “good progress” in its recovery and is to begin restoring electronic foreign exchange services, but is silent about whether it has agreed to pay hackers a $6m ransom to decrypt computer files Continue Reading
By- Bill Goodwin, Computer Weekly
-
Opinion
10 Jan 2020
Learning from the Travelex cyber attack: Failing to prepare is preparing to fail
The key lesson to take from the Travelex breach is that an effective response to a breach is a critical business function and no longer the sole province of the IT department Continue Reading
By- Brian Honan, BH Consulting
-
News
09 Jan 2020
Travelex hackers threaten to sell credit card data on dark web
Sodinokibi cyber gangsters have threatened to sell Travelex customers’ private data on a Russian underground cyber crime forum if it fails to pay a $6m ransom Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
09 Jan 2020
Don’t become the next Travelex: Get ready for ransomware
With Travelex’s IT still in disarray and banks and travellers left without access to funds more than a week after it was hit by a ransomware attack, we ask what others can learn from the foreign exchange services company’s response to the incident Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
09 Jan 2020
DRaaS decisions: Key choices in disaster recovery as a service
We examine the key decisions when considering DRaaS. Whether to go full self-service, assisted or managed will depend on what you need to protect and your in-house resources Continue Reading
-
Feature
08 Jan 2020
Five ways that backup has changed since the days of tape
Back in the day, all this was tape, but times have changed, with cloud-to-cloud backup, cloud storage, virtual and physical backup appliances and myriad endpoint hardware Continue Reading
By -
News
06 Jan 2020
Cyber gangsters demand payment from Travelex after ‘Sodinokibi’ attack
Cyber criminals are demanding payment to decrypt Travelex’s computer files after a devastating malware attack. New questions have been raised about the security of Travelex’s computer network after it emerged the company waited eight months to patch vulnerable VPN servers Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
06 Jan 2020
Iran likely to hit back with cyber attacks, security experts warn
The possibility of cyber attack by threat groups acting on behalf of the Iranian government has dramatically increased following US actions in Iraq Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Dec 2019
Top 10 cyber crime stories of 2019
Here are Computer Weekly’s top 10 cyber crime stories of 2019 Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Dec 2019
Top 10 cyber security stories of 2019
Here are Computer Weekly’s top 10 cyber security stories of 2019 Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Dec 2019
Finnish government supports local authorities in cyber security initiative
The Finnish government has committed resources to a cyber security project aimed at local authorities Continue Reading
By- Gerard O'Dwyer
-
Opinion
11 Dec 2019
Security Think Tank: Risk-based response critical to protect data
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but what does this mean for security professionals? Continue Reading
By- Simon Persin, Turnkey Consulting
-
News
09 Dec 2019
Public sector still losing user devices in high numbers
The Ministry of Justice has lost 354 smartphones, PCs, laptops and tablets in the past 12 months, according to a Freedom of Information request, and other government departments are in the same boat Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Dec 2019
China bans foreign computing kit from government contracts
All government offices and public institutions must eliminate foreign hardware and software within three years, according to a leaked directive dubbed 3-5-2 Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Dec 2019
How commodities firm ED&F Man solved its threat detection challenges
After a minor server breach, leading commodities trader turned to Vectra’s Cognito service to expose hidden threats, spot privilege misuse, and conduct conclusive investigations Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Dec 2019
Cyber security takes its place alongside UK’s armed services
Head of armed services says cyber security will take its place alongside the army, navy and air force as a key pillar of the UK’s defence strategy Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
06 Dec 2019
Security Think Tank: Is data more or less secure in the cloud?
Misconfigured cloud environments are increasingly identified as the source of damaging data breaches and leaks, raising serious questions for enterprises. Where does responsibility for data security in the cloud lie, and how can security professionals best work with their teams and cloud providers to resolve the problem? Continue Reading
By- Benoit Heynderickx, Information Security Forum
-
Opinion
05 Dec 2019
Security Think Tank: Time for a devolution of responsibility
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but what does this mean for security professionals? Continue Reading
-
Opinion
04 Dec 2019
Security Think Tank: Optimise data-centric strategies with AI
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but what does this mean for security professionals? Continue Reading
By- Stuart Lyons, PA Consulting
-
Opinion
03 Dec 2019
Cyber security: How to avoid a disastrous PICNIC
Fieldfisher’s David Lorimer examines how individual employees often facilitate cyber attacks, and what can be done to reduce the risk Continue Reading
By- David Lorimer, Fieldfisher
-
News
03 Dec 2019
Tenable buys Indegy to integrate IT and OT security
Acquisition of industrial security specialist Indegy will create a unified, risk-based platform spanning both IT and OT security for Tenable Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
03 Dec 2019
Security Think Tank: In-depth protection is a matter of basic hygiene
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but what does this mean for security professionals? Continue Reading
By -
Feature
28 Nov 2019
Five essential steps to a sound disaster recovery plan
We walk through the key steps to develop a disaster recovery plan – from risk assessment and setting recovery objectives, to the plan itself and a testing regime to keep it fresh Continue Reading
-
News
27 Nov 2019
Security skills gap will take a decade to fill
The British education systems cannot move fast enough to address the security skills crisis, and in the absence of government action increased reliance on automation may be the least worst solution Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Nov 2019
Mimecast blocked 99 billion suspicious emails in third quarter
Latest threat intelligence report reveals the scale of the threat posed by malicious emails, with the transport, legal and financial sectors hit hardest Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Nov 2019
Massive increase in fraud attacks on TSB customers during IT meltdown
There was a massive spike in attempts by fraudsters to steal from TSB customers when the bank’s IT systems failed in 2018 Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
15 Nov 2019
Notorious hackers claim responsibility for Labour DDoS
Hackers claiming to represent Lizard Squad say they were behind a distributed denial of service attack on the UK’s Labour Party Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Nov 2019
Business leaders fibbing to cover up lax security posture
Nominet study finds evidence that many businesses tout the robustness of their security posture as a selling point even though their security teams lack confidence in themselves Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Nov 2019
Attack on Labour shows need for DDoS defence but should alarm few
After being hit by two DDoS attacks in the space of 24 hours, many commentators are convinced the UK’s Labour Party is the victim of foreign interference in the General Election campaign. It probably isn’t Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Nov 2019
Nordic SMEs lack the money needed for cyber security
Businesses and governments in Denmark and Norway are working together to address a cyber security shortfall for SMEs in each country Continue Reading
By- Gerard O'Dwyer
-
Opinion
08 Nov 2019
Security Think Tank: Base cloud security posture on your data footprint
Misconfigured cloud environments are increasingly identified as the source of damaging data breaches and leaks, raising serious questions for enterprises. Where does responsibility for data security in the cloud lie, and how can security professionals best work with their teams and cloud providers to resolve the problem? Continue Reading
By- Rob Clyde, Isaca
-
Opinion
07 Nov 2019
Security Think Tank: Cloud security is a shared responsibility
Misconfigured cloud environments are increasingly identified as the source of damaging data breaches and leaks, raising serious questions for enterprises. Where does responsibility for data security in the cloud lie, and how can security professionals best work with their teams and cloud providers to resolve the problem? Continue Reading
-
News
06 Nov 2019
Global security workforce must more than double to meet demand
There are about 2.8 million cyber security professionals working today, and the world needs four million more Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
04 Nov 2019
Security Think Tank: Secure the cloud when negotiating contracts
Misconfigured cloud environments are increasingly identified as the source of damaging data breaches and leaks, raising serious questions for enterprises. Where does responsibility for data security in the cloud lie, and how can security professionals best work with their teams and cloud providers to resolve the problem? Continue Reading
By -
News
29 Oct 2019
NordVPN enlists ethical hackers, launches bug bounty programme
Breached consumer VPN supplier details steps it is taking to shore up its cyber security posture after an unknown actor gained access to one of its servers Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Oct 2019
Take responsibility for cyber security basics, urges NCSC CEO
At the launch of its third annual review, NCSC head Ciaran Martin appealed for individuals and businesses to address the fundamentals of cyber security hygiene to help lighten the load Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
17 Oct 2019
Security Think Tank: Focus on metrics to manage risk
How can security professionals help their organisations move from traditional governance, risk and compliance to integrated risk management that integrates risk activities from across an organisation to enable better strategic decision making? Continue Reading
By -
Opinion
14 Oct 2019
Security Think Tank: Consider risk holistically, not just from an IT angle
How can security professionals help their organisations move from traditional governance, risk and compliance to integrated risk management that integrates risk activities from across an organisation to enable better strategic decision making? Continue Reading
-
Feature
10 Oct 2019
Data management strategies are evolving – so must enterprises
A growing number of data-driven initiatives, alongside heightened demand for security in governance, data management and compliance, has led to the rise of a more holistic approach – integrated risk management Continue Reading
-
Opinion
09 Oct 2019
Security Think Tank: The operational approach to integrated risk management
How can security professionals help their organisations move from traditional governance, risk and compliance to integrated risk management that integrates risk activities from across an organisation to enable better strategic decision-making? Continue Reading
By- Simon Persin, Turnkey Consulting
-
Opinion
07 Oct 2019
Security Think Tank: Risk is unavoidable in digital transformation
How can security professionals help their organisations move from traditional governance, risk and compliance to integrated risk management that integrates risk activities from across an organisation to enable better strategic decision-making? Continue Reading
By- Maxine Holt, Omdia
-
News
27 Sep 2019
GDPR compliance: Whose job is it and is it really possible?
Nobody seems to have a good handle on business GDPR compliance, how many businesses are compliant, or indeed what compliance really is, but according to security experts, it very much depends on who you talk to Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Sep 2019
Overinvestment breeds overconfidence among security pros
CISOs have made an abundance of security investments in multiple suppliers, but this might not be the right approach Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Sep 2019
Government seeks views on post-Brexit security alignment
The government has called for views on its proposals to align the UK’s post-Brexit cyber security policy to that of the European Union Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Aug 2019
UK firms getting on top of IT downtime costs
Despite data breach headlines, UK firms are generally improving in their data protection, business continuity, cyber preparedness and understanding of downtime costs, study shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
14 Aug 2019
DCMS funding aims to increase diversity in cyber sector
A funding round has been announced as part of the Cyber Skills Immediate Impact Fund (CSIIF) with aims of encouraging more diverse talent into the UK’s cyber security sector Continue Reading
By- Clare McDonald, Business Editor
-
News
14 Aug 2019
Digital domain identified as major security threat by Norway’s intelligence service
Norway's intelligence services has revealed the extent of the threat posed to the country by cyber attacks Continue Reading
By- Gerard O'Dwyer
-
News
08 Aug 2019
Ransomware a continued threat to business, report warns
Businesses are increasingly becoming the most popular targets for ransomware, which remains a top cyber threat around the world, especially in the US, a report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Aug 2019
Most UK firms lack confidence in disaster recovery
Only a third of UK firms are confident in their ability to recover from cyber attacks and other disasters, with business continuity still relatively low on the agenda, a study reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Aug 2019
DDoS on the rise, warns Kaspersky
Security researchers at Kaspersky are among those warning business that, more than ever, mitigation of distributed denial of service attacks needs to be a key element of cyber defence strategies Continue Reading
By- Warwick Ashford, Senior analyst
- 30 Jul 2019
-
Opinion
25 Jul 2019
Why investment is needed in the cyber insurance market
The number of cyber insurance policies on offer is beginning to grow, but insurers still have a long way to go to develop policies that address market concerns Continue Reading
By- Michael Aminzade, 6point6
-
News
23 Jul 2019
Data breach costs on the rise, IBM study shows
Data breach costs have risen in the past decade, and the financial impact can be felt for years. Breaches posing a growing risk for small businesses, a study shows, underlining the importance of incident response Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Jun 2019
Dutch bank and researchers begin defence against quantum computing’s dark side
ABN Amro is working with QuTech to ensure that banks can protect data against quantum computers in the future Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Feature
21 Jun 2019
Disaster planning: How to expect the unexpected
Focusing too much on specific disasters rather than considering an organisation’s data protection, network security and process requirements, can lead to unpredicted vulnerabilities Continue Reading
-
News
21 Jun 2019
CIOs experience stress, verbal and physical abuse during IT failures
Business continuity involves more than the investment in resilient IT – staff and their families need support too Continue Reading
By- Cliff Saran, Managing Editor
-
Tip
17 Jun 2019
A good business disaster recovery plan considers IT, staffing
Not sure if your disaster recovery plan takes business needs into account? A good plan should cover business operations, as well as technology and staffing requirements. Continue Reading
-
Opinion
17 Jun 2019
Security Think Tank: Top infosec task is getting on board agenda
How can security professionals communicate effectively with the board and senior business leaders – what works and what doesn’t? Continue Reading
By -
News
17 Jun 2019
Asco breaks silence on ransomware attack
A week after reportedly being hit by a ransomware attack, Belgium-based mechanical equipment manufacturer Asco has finally provided some details Continue Reading
-
News
07 Jun 2019
NotPetya offers industry-wide lessons, says Maersk’s tech chief
There are several key industry-wide lessons to be learned from the NotPetya attack in 2017, according to the information chief at one of the companies most heavily impacted Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 May 2019
Norwegian industry and state must combine to counter cyber threats
Norway has been targeted by two large ransomware attacks in recent months – and public and private organisations must react in a coordinated way Continue Reading
By- Gerard O'Dwyer
-
News
03 May 2019
Norsk Hydro urges caution as it counts cost of cyber attack
Norwegian aluminium giant Norsk Hydro is urging partners to be cautious in the wake of a damaging ransomware attack in March as financial impact estimates come in above initial estimates Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
01 May 2019
Protecting your digital assets: Why it pays to invest in cyber insurance
Cyber insurance offers financial protection against the worst happening to a company’s data and digital assets, and is something few businesses can afford to be without Continue Reading
By -
Opinion
16 Apr 2019
Security Think Tank: Surviving the existential cyber punch
How should businesses plan to survive a potential cyber attack extinction event? Continue Reading
By- Gregory Touhill, ISACA
-
Opinion
15 Apr 2019
Security Think Tank: Seven steps to manage risk of catastrophic cyber attack
How should businesses plan to survive a potential cyber attack extinction event? Continue Reading
By- Simon Persin, Turnkey Consulting
-
News
11 Apr 2019
Most organisations still lack incident response plans
Most companies lack incident response plans, others fail to test them and nearly half are not GDPR compliant, but some report improved security through automation, a study shows Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
10 Apr 2019
Security Think Tank: Incident response vital to guard against catastrophic cyber attack
How should businesses plan to survive a potential cyber attack extinction event? Continue Reading
By- Maxine Holt, Omdia
-
Opinion
08 Apr 2019
Security Think Tank: How to reduce the impact of a potential cyber extinction event
How should businesses plan to survive a potential cyber attack extinction event? Continue Reading
By- Andy Jones, Information Security Forum (ISF)
-
News
26 Mar 2019
Nominet urges SMEs to register .uk domains to thwart squatters
The automatic right of .co.uk domain name holders to register the shorter .uk domains ends in June Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Mar 2019
IT Priorities 2019: APAC keeping pace with digital transformation
Digital transformation is well underway among APAC enterprises which are looking to spend more on refreshing their IT infrastructure and technologies that improve employee productivity Continue Reading
By- Aaron Tan, TechTarget
-
News
21 Feb 2019
Toyota Australia under cyber attack
The company has confirmed the attempted attack that took out its email system, forcing employees to turn to other forms of communication to continue working Continue Reading
By- Aaron Tan, TechTarget
-
News
29 Jan 2019
Global cyber attack could cost up to $193bn, study shows
A coordinated global cyber attack could have an economic impact of up to $193bn, an insurance industry-backed report claims Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Jan 2019
UK police target hundreds of DDoS attackers
National Crime Agency is investigating hundreds of suspected users of a distributed denial of service-for-hire site that was taken down by an international law enforcement operation Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Jan 2019
Budding UK cyber strategists gear up for national competition
Teams of UK university students are preparing to compete for the second time in analysing the threat of a simulated cyber attack to develop policies and strategies Continue Reading
By- Warwick Ashford, Senior analyst
-
Blog Post
09 Jan 2019
How Brexit-friendly are your SaaS contracts?
If you think Brexit will be advantageous for the UK economy and the British people, this post is not for you. If your assessment of the available information, like mine, is that our economy will ... Continue Reading
By- Dale Vile, Freeform Dynamics
-
Opinion
31 Dec 2018
Security Think Tank: Pay attention to attribute-based system access permissions
At the close of 2018, we asked CW Security Think Tank contributors to name one thing predicted for 2018 that did not happen, one thing that was not predicted and did happen and one thing that should happen in 2019, but probably will not Continue Reading
By- Simon Persin, Turnkey Consulting
-
News
07 Dec 2018
O2 outage highlights importance of software certificate audits
A major outage on the O2 4G mobile network was caused by an expired certificate and could easily have been avoided, it has emerged Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Nov 2018
E-commerce sites warned of heightened DDoS threat
E-commerce sites are being urged to ensure that they have adequate DDoS protection ahead of the vital holiday trading season after attacks ramped up on Black Friday and Cyber Monday Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 Nov 2018
UK firms in the dark around the impact of cyber attacks
UK firms have a long way to go in building the business resilience required to withstand cyber threats and other major disruptions, a study shows Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
12 Nov 2018
GCHQ offers help to embryonic Irish cyber security organisation
Ciaran Martin head of the UK's National Cyber Security Centre, part of GCHQ, builds bridges with the Republic of Ireland's intelligence community during an official visit to Dublin Continue Reading
By -
News
26 Oct 2018
DNS attacks cost finance firms millions of pounds a year
Average cost of recovering from a single DNS attack is $924,390 for a large financial services company, survey shows Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
15 Oct 2018
Cost of WannaCry attack to NHS set at £92m
Department for Health and Social Care estimates the immediate cost of the May 2017 WannaCry attack on the NHS was £92m, and says it will have spent about £275m on improvements to its cyber security infrastructure by the end of 2021 Continue Reading
By- Alex Scroxton, Security Editor
-
News
01 Oct 2018
Keeping Commvault on its toes in ASEAN
Backup and data protection software supplier is going after mid-sized companies and renewing its focus on partners to make deeper inroads in Southeast Asia Continue Reading
By- Aaron Tan, TechTarget
-
News
28 Sep 2018
Data analytics cuts queues and flight delays at Rome’s Fiumicino Airport
Aeroporti di Roma’s CIO, Emiliano Sorrenti, describes how the city’s main airport is using data analytics technology to reduce delays and queue times, securing it an industry award for customer service Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
27 Sep 2018
Norwegian state discusses vulnerabilities with IT sector
Government is collaborating with the country’s IT industry to improve the availability of security expertise Continue Reading
By- Gerard O'Dwyer
-
News
19 Sep 2018
Equifax fined by ICO for security failings
The Information Commissioners Office has fined Equifax UK in relation to a data breach at its UK parent last year Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
18 Sep 2018
Disaster recovery as a service: what you need to know
Technological advances make disaster recovery as a service possible, but Computer Weekly investigates whether it is practical option for all businesses. Continue Reading
-
News
10 Sep 2018
Cyber criminals outspend businesses in cyber security battle
Cybercriminals are flexing their financial might and UK organisations are facing more attacks as a result Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
21 Aug 2018
Malaysia’s financial sector warms up to cloud, but lacks security leadership
Almost two-thirds of Malaysia’s financial services firms are developing a cloud strategy, but not all have a security plan in place Continue Reading
By- Aaron Tan, TechTarget
-
News
14 Aug 2018
UK banks under pressure to improve downtime reporting under new FCA rules
To make it easier for customers to compare and switch between current account providers, UK banks are under pressure to improve their reporting processes for downtime and security incidents Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
13 Aug 2018
UK firms concerned about cyber arms race
Continuous investment and activity are key in the cyber arms race, according to Databarracks, as research shows UK firms are worried about keeping up with security challenges Continue Reading
By- Warwick Ashford, Senior analyst
-
News
31 Jul 2018
SamSam ransomware reaps $5.9m and counting
In just two and a half years, SamSam campaigns are believed to have netted nearly $6m for cyber criminals, an analysis of this adaptive and evasive strain of active ransomware reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Jul 2018
ERP applications are under cyber attack, research confirms
ERP applications are increasingly being targeted by cyber criminals, hacktivists and nation-state actors, a report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Jul 2018
Application attacks demand new security approach
Applying security software updates is an ineffective way to deal with application layer cyber attacks and businesses should change their approach, security experts advise Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Jul 2018
Ransomware concern drops despite being top cost
Fewer organisations are worried about ransomware even though it remains one of the most costly cyber attacks Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
18 Jul 2018
CW ASEAN: Defend against disruption
The security of industrial control systems (ICS) has come under the spotlight with several high-profile incidents affecting power plants and other critical infrastructure in recent years. What are the threats to these systems in ASEAN, and what is the common approach to securing ICS systems? In this month’s issue of CW ASEAN, we take a closer look at how ICS operators are improving the visibility of ICS environments without jeopardizing operations, addressing security vulnerabilities and enhancing cooperation between IT and operational technology teams. Read the issue now. Continue Reading