Business continuity planning
Business continuity is an organization's ability to maintain critical business functions during and after a disaster has occurred.. See complete definition.
-
News
19 Dec 2024
Latest attempt to override UK’s outdated hacking law stalls
Amendments to the Data Bill that would have given the UK cyber industry a boost by updating restrictive elements of the Computer Misuse Act have failed to progress beyond a Lords committee Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
19 Dec 2024
Innovation, insight and influence: the CISO playbook for 2025 and beyond
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Mandy Andress, Elastic
-
News
28 Mar 2017
Threats grow in Saudi Arabia’s cyber sector
Saudi Arabia's wealth makes it an attractive target for cyber criminals, but what have been the recent trends in cyber crime? Continue Reading
By- Triska Hamid
-
E-Zine
16 Mar 2017
CW ASEAN: Raising national security standards
In this month’s CW ASEAN, we describe how Singapore is improving its cyber security defenses and preparations through a partnership with British security company BAE Systems. We also find out why the Thai military plans to recruit civilian cyber warriors and we take a look at evolving security approaches. Read the issue now. Continue Reading
-
News
14 Mar 2017
CIO interview: Simon McCalla, Nominet
Nominet, the registry for more than 10 million of the UK’s internet domains, is expanding into the internet of things and internet security services Continue Reading
By- Bill Goodwin, Computer Weekly
-
E-Zine
09 Mar 2017
CW Europe: Technology poses new risks to jobs, economies and society
Rapid advances in technology could have destabilising effects on employment and economic growth, and could exacerbate social unrest, the World Economic Forum (WEF) warned. Society’s failure to keep pace with technology change was a key risk under discussion at Davos in January. Continue Reading
-
News
03 Mar 2017
Cyber attack on Barts NHS trust exploited zero-day vulnerability
A cyber attack that forced parts of Barts NHS trust offline in January 2017 has been blamed on previously unknown malware that was able to bypass the antivirus systems, highlighting a common weakness in cyber defences Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Mar 2017
Businesses blame rivals for DDoS attacks
Industrial sabotage is considered to be the most likely reason behind a distributed denial of service attack, a study has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 Feb 2017
Too many high-risk vulnerabilities leave CISOs scrabbling to patch
Too many critical flaws are given high priority, leading to a patch overload that CISOs cannot keep up with, according to F-Secure Continue Reading
By- Cliff Saran, Managing Editor
-
E-Zine
31 Jan 2017
Visionary technology transforming healthcare
In this week’s Computer Weekly, find out how a visionary approach to technology is transforming healthcare at London’s world-leading Moorfields Eye Hospital. The UK tech sector has set out its priorities for the forthcoming Brexit negotiations – we take a look at the key issues. And our new buyer’s guide examines the latest trends in datacentre management. Read the issue now. Continue Reading
-
News
23 Jan 2017
Lloyds Bank hit by massive DDoS attack
It has emerged that UK banks have been targeted by a DDoS campaign that affected services intermittently only at the Lloyds Banking Group Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Dec 2016
Top 10 ANZ enterprise IT stories of 2016
Here is a rundown of Computer Weekly’s most popular ANZ enterprise IT articles for 2016 Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Feature
30 Nov 2016
Disaster recovery testing: A vital part of the DR plan
Disaster recovery provision is worthless unless you test out your plans. In this two-part series, Computer Weekly looks at disaster recovery testing in virtualised datacentres Continue Reading
By -
News
28 Nov 2016
IBM blamed for Australian census website crash
Computer giant reportedly pays $30m to Australian government as reports are released from two inquiries into DDoS attacks on census website Continue Reading
-
News
15 Nov 2016
Amber Rudd orders Lauri Love extradition to US to face hacking charges
Engineering student Lauri Love faces trials in three US states and a possible 99-year jail sentence for allegedly hacking into US government computer systems as part of a political protest, despite concerns over his health Continue Reading
-
E-Zine
03 Nov 2016
CW ASEAN: SMEs present security weakness
In this month's CW ASEAN, we look at how the cyber security defences at small and medium-sized enterprises in Southeast Asia may have some vulnerabilities, resulting in cyber security attacks on the large corporations they work with. We also consider the need to educate users of smartphones and tablets across the region as card fraud rates rise, with high use of mobile devices considered a contributing factor. Read the issue now. Continue Reading
-
E-Zine
03 Nov 2016
CW ANZ: Using gamification to build cyber security skills
In this month's CW ANZ, we look at how PwC is using an online game to give its customers first-hand experience of what it means to face a cyber attack. We also look at how identity is gaining greater prominence in the security debate in Australia as the DTO takes the wraps off plans for a national identity system. Read the issue now. Continue Reading
-
E-Zine
20 Oct 2016
Reinventing Bahrain’s Kanoo Group through digital technology
In this quarter’s CW Middle East ezine, we feature the IT journeys of three companies in the region with detailed analysis of recent IT projects that were designed to support business transformation in a changing world. We hear how Bahrain-based conglomerate Kanoo Group is dealing with a company-wide digital transformation, Zahid Group’s biggest-ever IT investment, and how Rotana Hotels is centralising security. Continue Reading
-
News
04 Oct 2016
DDoS attacks consistent, relentless and costly, report shows
The latest global DDoS report from Neustar underlines the importance of investing in appropriate defences as the high volume of attacks looks set to increase Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Sep 2016
Cyber attack aimed at destruction, says TV5Monde
TV5Monde counting the cost of not being adequately prepared for a cyber attacked that downed the network in 2015 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Sep 2016
MaidSafe secure internet concept enters testing phase
Scottish internet startup MaidSafe brings its vision for a more private and secure approach to the web a step closer to reality Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
30 Aug 2016
Get protected: The importance of security
It is not uncommon for computer systems to be compromised by a company’s own employees. In this week’s issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls. Our CIO interview is TalkTalk’s CTO, Gary Steen, and we have a report from the Intel Developer Forum on the chipmaker’s future plans. Continue Reading
-
News
24 Aug 2016
UK second only to US in DDoS attacks
Distributed denial of service attacks on UK organisations have eased from a peak in the fourth quarter of 2015, but the UK remains the world’s second most targeted country Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
18 Aug 2016
CW Benelux: Painting by numbers
In this issue of CW Benelux, we describe how data scientists in the Netherlands have applied technology to art. The Dutch are renowned for being creative with technology and the country has a deep history in art, boasting some of the most celebrated painters. It is therefore apt that the combined tech brains of ING, Microsoft, the Technical University of Delft and other contributors have created The Next Rembrandt, which serves as a visual showcase for big data. The new portrait in the style of Rembrandt van Rijn was put together by a combination of big data technology and 3D printing. All of Rembrandt’s 346 paintings were analysed using data analytics, making it possible to create a seemingly genuine Rembrandt image, while a 3D printer made accurate emulation of his paint patterns and textures a reality. Also in the Netherlands, we feature a case study about how The Hague is solving a bike parking headache with a mobile app. Continue Reading
-
News
16 Aug 2016
Cerber ransomware service reaps $195,000 profit in a month
Franchises such as Cerber are making highly profitable ransomware available to a broader range of cyber criminals, according to a report by security firm Check Point Continue Reading
By- Warwick Ashford, Senior analyst
-
News
08 Aug 2016
IT failure grounds Delta flights worldwide
US airline Delta has temporarily grounded flights worldwide after a power failure took key IT systems offline in its home base of Atlanta, Georgia Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Aug 2016
One in five businesses hit by ransomware are forced to close, study shows
More than half of UK companies have been hit by ransomware in the past year, a study on the impacts of this popular attack method has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Jul 2016
IBM sets up security centre in Canberra
IBM leads the charge as large private businesses invest heavily in security resources across Australia in an attempt to close the security gap Continue Reading
-
E-Zine
07 Jul 2016
CW ASEAN: July 2016
Lessons from the Philippine government hack: In this issue we ask why a hack on the Philippine Commission on the Elections (Comelec) was allowed to happen and what organisations in Southeast Asia can learn from this breach of security. Retailers in the region are concerned – read how the theft of customer data is their biggest worry. Continue Reading
-
E-Zine
07 Jul 2016
CW ANZ: July 2016
Australia knows it has a cyber security problem, but not the scale. In this month’s CW ANZ we describe how Australia's $230m security strategy serves as a wake-up call to enterprises. We also reveal the techniques and technologies being used to protect one Australian school, as well as a more general look at the main cyber threats to orgainsations in Australia. Read the issue now. Continue Reading
-
News
30 Jun 2016
LizardStresser IoT botnet launches 400Gbps DDoS attack
Attack groups using the LizardStresser botnet are exploiting IoT devices to mount massive DDoS attacks without using amplification techniques, say researchers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 Jun 2016
Lauri Love suicide risk if extradited to US over hacking allegations
Westminster Magistrates’ Court hears evidence from medical experts that alleged hacker Lauri Love is at risk of suicide if extradited to the US Continue Reading
By- Bill Goodwin and Fiona O'Cleirigh
-
News
20 Jun 2016
Lower average cost of Australian data breaches is not a sign of comfort
The average cost of a data breach to Australian organisations dropped in 2015, according to research Continue Reading
-
News
12 Jun 2016
Philippines government data breach is a warning to Asean region
Security is a rising concern in the Asean region, with fears fuelled by incidents such as the recent hacking incident in Manila Continue Reading
By -
News
29 Apr 2016
Cyber security in Belgium will gain prominence after terror attacks
Belgium’s physical security has been branded inadequate, so how does the country’s cyber security measure up? Continue Reading
By- Stef Gyssels
-
News
15 Apr 2016
Israeli volunteers ready their cyber defences as Anonymous affiliates attack
Every April, Israel braces itself for an onslaught from pro-Palestinian hackers, but the occupants of a small conference room in Tel Aviv stand in their way Continue Reading
By- Niv Lilien
-
News
31 Mar 2016
Adwind at centre of cyber attack on Singapore bank
Kaspersky Lab has revealed that the Adwind malware-as-a-service platform was at the centre of an attack on a Singapore bank Continue Reading
By -
News
23 Mar 2016
US hospital claims to have fought off a ransomware attack
A hospital in Kentucky claims to have regained control of its IT systems five days after cyber criminals hit it with a ransomware attack Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
23 Feb 2016
Surviving broadband failure
In this week’s Computer Weekly, after the recent BT broadband outage, we examine the options to keep your communications in place in the event of a failure, to ensure business continuity. We look at the prospects for the OpenStack open source cloud platform in the enterprise. And we see how Ireland is making progress on delivering a digital health service. Read the issue now. Continue Reading
-
News
01 Feb 2016
DDoS is most common cyber attack on financial institutions
January’s attack on HSBC is typical for the financial sector, but no business should consider itself unlikely to be targeted in this way, say security experts Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Jan 2016
HSBC online services hit by DDoS attack
HSBC was hit by a distributed denial of service (DDoS) attack, which targeted its online personal banking services. Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
E-Zine
26 Jan 2016
Beyond India – the emerging outsourcing destinations
In this week’s Computer Weekly, we look at the growing number of offshore alternatives to the dominant outsourcing destination of India and assess their relative merits. We examine how to respond if your organisation is affected by a data breach. And we analyse how virtualisation technology can help improve your disaster recovery strategy. Read the issue now. Continue Reading
-
E-Zine
21 Jan 2016
CW Europe - January 2016
This month, CW Europe looks in-depth at an issue that is set to affect people across all 28 European Union member states – the abolition of mobile roaming charges, set for mid-2017. Continue Reading
-
News
18 Jan 2016
Chinese university targeted by Islamic State hacktivist
Beijing’s Tsinghua University is the latest organisation to be attacked by hackers with a social or political agenda Continue Reading
By- Warwick Ashford, Senior analyst
-
News
14 Jan 2016
GMB takes concerns over British Airways IT outsourcing to MPs
Trade union fears that the expansion of IT outsourcing at BA is a risk to security and will see UK jobs disappear Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
12 Jan 2016
Police take action against cyber extortion gang DD4BC
Police have made one arrest and gathered evidence in searches of properties in an international operation aimed at cyber extortion gang DD4BC Continue Reading
By- Warwick Ashford, Senior analyst
-
News
24 Dec 2015
Top 10 IT security stories of 2015
Computer Weekly looks back at the most significant stories on IT security in the past 12 months Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Dec 2015
Glasgow city email disruption continues after datacentre crash
Glasgow's IT woes continue following a shutdown of its datacente on Tuesday Continue Reading
By- Cliff Saran, Managing Editor
-
Feature
10 Dec 2015
How to deal with the aftermath of a data breach
Considering that a data breach could happen to any company, at any time, a plan of action is the best tactic Continue Reading
By -
Feature
10 Dec 2015
Disaster recovery planning: Where virtualisation can help
The disaster recovery planning process is not fundamentally technology-centric, so when can virtualisation make it quicker and easier to restore services after an unplanned outage? Continue Reading
By -
News
07 Dec 2015
Cyber attacks an increasing concern for Asean countries
Organisations in the Association of Southeast Asian Nations are increasingly the targets for cyber criminals, according to a report focused on the region Continue Reading
By -
Feature
15 Oct 2015
The true cost of a cyber security breach in Australia
The costs of cyber security breaches can quickly add up with fines, reputational damage and overhauls to network security all hitting the coffers. The case of one Australian firm shows why paying a ransom to a hacker might be tempting. Continue Reading
-
News
18 Sep 2015
Public-private co-operation in the Nordics tackles growing cyber crime threat
Nordic governments and businesses are putting cyber security at the centre of their planning as threats increase Continue Reading
By -
News
16 Sep 2015
BT launches ethical hacking service for bankers
BT introduces a certified Crest Star ethical hacking test service for financial services customers Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Sep 2015
Most DDoS attacks hiding something more sinister, Neustar warns
Smaller DDoS attacks can be more dangerous than a powerful attack that knocks a company offline but does not install malware or steal data, warns Neustar Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Sep 2015
DD4BC cyber extortion gang adds social media to arsenal
Cyber extortion gang DD4BC is using social media campaigns to garner more attention for its ability to create service disruptions by publicly embarrassing large organisations Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 Sep 2015
DDoS attack on NCA highlights need to be prepared, says Barracuda Networks
A Lizard Squad DDoS attack the NCA says is a fact of life highlights the need for organisations to be prepared, according to Barracuda Networks Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
25 Aug 2015
Computer Weekly – 25 August 2015: Coping with a crisis
In this week’s Computer Weekly, IT leaders discuss their experiences of dealing with disaster and the importance of planning to ensure business continuity. Jaeger’s CIO talks about bring the iconic fashion brand into the digital age. And we look at the issues around writing supplier contracts for agile software development. Read the issue now. Continue Reading
-
News
29 May 2015
Computer Weekly European User Awards 2015 shortlist
Find out who made the Computer Weekly European User Awards 2015 shortlist Continue Reading
By- Kayleigh Bateman, Computer Weekly
-
News
20 May 2015
BT Openreach turns to Crimestoppers to catch cable thieves
Openreach extends its partnership with crime-fighting charity Crimestoppers to tackle cable theft Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 May 2015
Businesses should prepare for black swans, says resiliency consultant
While black swan events are random and unexpected, businesses can still prepare for them, according to a resiliency consultant Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Apr 2015
Vodafone sends network in a backpack to Nepal earthquake zone
Vodafone’s charitable arm, the Vodafone Foundation, deploys instant mini networks to help restore communications in quake-hit Nepal Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Apr 2015
EU data protection regulation will drive privacy by design, says KuppingerCole
The EU data protection regulation will drive privacy by design in companies with European clients, says KuppingerCole analyst Karsten Kinast Continue Reading
By- Warwick Ashford, Senior analyst
-
News
31 Mar 2015
DDoS losses potentially £100k an hour, survey shows
DDoS attacks could expose 40% of businesses to losses of £100,000 or more an hour at peak times, a survey shows Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
06 Mar 2015
How to secure the SDN infrastructure
As more enterprises look to deploy software-defined networking, the need for security from the ground up should not be underestimated Continue Reading
By -
News
27 Feb 2015
Case study: Norwegian insurer invests in Darktrace machine-learning cyber defence
Shipping insurance company DNK hopes to inspire the rest of the shipping industry to adopt Darktrace’s cyber defence system Continue Reading
-
E-Zine
09 Feb 2015
Tackling security with quantum physics
In this week's Computer Weekly, we examine research that promises to deliver new levels of encrypted communications using quantum teleportation. IBM has announced its latest mainframe – but will the company's problems hinder its future? And we find out how one company has used the low-cost Raspberry Pi in its enterprise IT. Read the issue now. Continue Reading
-
News
12 Jan 2015
Sony Pictures admits it was unprepared for November’s cyber attack
Sony Pictures admits it was not prepared for the nature and extent of the cyber attack that hit the company last November Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
09 Jan 2015
How to make applications resilient on AWS
Cloud services are susceptible to network and other outages. There is no silver bullet to boost the resilience of an AWS-hosted application Continue Reading
By- Guido Soeldner
-
News
17 Dec 2014
Cabinet Office begins procurement for next stage of Gov.uk Verify
The Cabinet Office has submitted a tender notice for a £150m three-year framework for the provision of identity assurance services Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
28 Nov 2014
CGI secures communications between pilots and air traffic control
Satellite communications firm Inmarsat has outsourced the provision of security IT and services to CGI Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
27 Nov 2014
How resilient is the public cloud?
The recent downtime that affected some Azure services following an update illustrates the precarious balance CIOs face in the cloud era Continue Reading
By- Cliff Saran, Managing Editor
-
News
10 Oct 2014
Azure CTO Mark Russinovich's top ten public cloud security risks
Microsoft Azure cloud CTO Mark Russinovich identified ten key security risks of public cloud services Continue Reading
By- Archana Venkatraman, Datacentre Editor
-
News
08 Oct 2014
Malware being used to steal cash from ATMs
Criminals are using malware to steal cash from ATMs without debit and credit cards Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
17 Sep 2014
KPMG: IoT, 3D printing and healthcare IT to have most impact
Internet of things (IoT), 3D printing and biotech or healthcare IT are among the IT trends that will change the way people work and live Continue Reading
By- Archana Venkatraman, Datacentre Editor
-
News
11 Aug 2014
USB-connected devices present cyber vulnerabilities
Connecting devices to computers using a USB port could lead to security breaches, say Berlin-based researchers Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
16 Jul 2014
Total internet failure: are you prepared?
A total internet failure could stop any business in its tracks, yet few are preparing for this possibility, KPMG has warned Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Jul 2014
Barclays passes government’s ‘internet-born threat’ test
Barclays Bank has been awarded the government’s cyber security certificate for digital banking services after independent tests of services such as Pingit Continue Reading
-
News
04 Jul 2014
Security Think Tank: The dos and don’ts of a good incident response plan
What does a good information security incident response plan look like? Continue Reading
By- Tim Holman, 2-sec
-
Feature
28 Apr 2014
Erasure coding vs Raid as a data protection method
Erasure coding is mooted as a potential successor to Raid and backup software Continue Reading
By -
News
25 Apr 2014
Cyber threat detection paramount, says SANS fellow
Cyber threat prevention is ideal, but detection is a must, says Eric Cole, SANS Institute fellow Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Apr 2014
Cabinet Office vetoed Home Office plans for 'critical' e-Borders replacement
Home Office plans for IT systems to replace ageing border security systems that contain “critical vulnerabilities” were vetoed by the Cabinet Office Continue Reading
By- Bryan Glick, Editor in chief
-
Feature
14 Mar 2014
Hacktivism: good or evil?
IT lawyer Dai Davis looks at the rise of hacktivism and its impact on business and international politics Continue Reading
By- Dai Davis, Percy Crow Davis & Co
-
News
12 Mar 2014
More than 162,000 WordPress sites used in DDoS attack
Security researchers have uncovered a DDoS attack that used more than 162,000 legitimate and unwitting WordPress websites Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Mar 2014
Governance, Risk Management and Compliance (GRC)
Ensuring that all the stakeholders' information needs are met requires a holistic approach to managing information – the creation of a GRC platform, say analysts Clive Longbottom and Rob Bamforth. Continue Reading
-
News
05 Feb 2014
Bank of England publishes Waking Shark II cyber security exercise results
Bank of England publishes the results of its Waking Shark II security exercise, which tested financial institutions' contingency plans for cyber attack Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
10 Jan 2014
Security considerations for UK enterprises
This Research Snapshot from Vanson Bourne looks at IT security spending trends, awareness of cyber-threats, and the factors perceived as the biggest security risks for organisations. Continue Reading
-
News
30 Dec 2013
Bank robberies down 90% thanks to technology, says report
Robberies at British banks have fallen by over 90% in two decades, according to a report by the British Bankers’ Association Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
09 Dec 2013
Computer system failure delays hundreds of UK flights
Hundreds of flights at several UK airports were delayed or cancelled at the weekend because of a computer failure at National Air Traffic Services (NATS) Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Nov 2013
Investec CISO warns that legacy tapes will fail on new hardware
Many organisations may find that years of irreplaceable tape backups are inaccessible because modern machines cannot handle legacy format Continue Reading
By- Cliff Saran, Managing Editor
-
News
12 Nov 2013
Global profiles of the fraudster
Computers, rather than conmen, are set to be the future face of fraud, as criminals turn to robotics in an effort to avoid detection, this report from KPMG reveals. Continue Reading
-
News
16 Oct 2013
Neustar to host first DDoS awareness day
Communications firm Neustar is to host the first international awareness day on distributed denial of service (DDoS) attacks Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Sep 2013
Software acquisition is risk acquisition, says industry panel
New software often means new security vulnerabilities, panel tells the (ISC)2 Security Congress 2013 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Sep 2013
Lloyds website continuity hit as TSB launches
Lloyds Banking Group websites, including the new standalone TSB, have been hit by problems on TSB launch day Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Sep 2013
Windows 2012 Server Network Security
This book chapter offers an introduction to Windows 8 and Windows Server 2012 network security and IPv6. It includes a 30% discount code for Computer Weekly readers. Continue Reading
-
News
05 Sep 2013
Windows Server 2012 Security from End to Edge and Beyond
This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask. Continue Reading
-
News
05 Sep 2013
Printing: a false sense of security?
Louella Fernandes and Bob Tarzey show how secure printing technology can provide authentication, authorisation and accounting capabilities, helping businesses improve document security and meet compliance regulations. Continue Reading
-
News
03 Sep 2013
Disinfecting PCs false security, says security expert
Many companies proud of their ability to identify and clean malware infected machines are missing a trick, says veteran security expert Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Aug 2013
Targeted attacks and how to defend against them
Analysts Bob Tarzey and Louella Fernandes assess the scale and real impact of targeted attacks the measures being taken to defend against them. Continue Reading
-
News
25 Jul 2013
MI5 and GCHQ call for FTSE 350 cyber health check
Intelligence agencies MI5 and GCHQ call on UK’s top listed companies to take part in a cyber governance health check Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Jul 2013
IT security case studies
Four critical IT security case-studies selected from the winners of Computer Weekly's European User Awards for security Continue Reading
-
News
18 Jul 2013
Needle in a Datastack: The rise of big security data
This research from McAfee investigates how well organisations are positioned to address the challenges of managing security in a world of ever increasing amounts and types of data. Continue Reading