Cloud security
-
News
19 Nov 2024
AI readiness stalls in APAC
Despite significant investment in AI, only 15% of organisations in Asia-Pacific are ready to deploy the technology today, according to Cisco’s latest regional AI readiness survey Continue Reading
-
Feature
19 Nov 2024
Storage technology explained: Ransomware and storage and backup
We look at ransomware attacks, and the importance of good backup practice as well as immutable snapshots, air-gapping, network segmentation, AI anomaly detection and supplier warranties Continue Reading
By- Antony Adshead, Storage Editor
-
News
18 Nov 2024
AWS widening scope of MFA programme after early success
AWS reports strong take-up of multi-factor authentication among customers since making it compulsory for root users earlier this year, and plans to expand the scope of its IAM programme in spring 2025 Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Nov 2024
More data stolen in 2023 MOVEit attacks comes to light
Over a year since the infamous MOVEit Transfer cyber attacks affected thousands of organisations, more new victims have come to light after an anonymous threat actor leaked their data on the dark web Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
12 Nov 2024
Strengthening cyber: Best IAM practices to combat threats
The Security Think Tank considers best practices in identity and access management and how can they be deployed to enable IT departments to combat cyber-attacks, phishing attacks and ransomware Continue Reading
By- Andrew Peel, Scott Swalling, PA Consulting
-
Blog Post
12 Nov 2024
How To "Vawlt" Superclouds
For those of us in the Northern Hemisphere, it might appear to be the season of autumn approaching winter but, for me, it’s been very much the vaulting, or vawlting season. Note – this has nothing ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
News
07 Nov 2024
Google Cloud MFA enforcement meets with approval
Latest Google Cloud policy to enforce multifactor authentication across its user base is welcomed by security professionals Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
05 Nov 2024
User-centric security should be core to cloud IAM practice
The Security Think Tank considers best practices in identity and access management and how can they be deployed to enable IT departments to combat cyber-attacks, phishing attacks and ransomware Continue Reading
-
Blog Post
01 Nov 2024
The network is dead - long live the network
It’s been a good week for "reinventing networking" conversations. And not before time – I mean, look at all the changes we’ve seen in IT in the past decade, from data types and scale thereof, ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
Opinion
30 Oct 2024
IAM best practices for cloud environments to combat cyber attacks
The Security Think Tank considers best practices in identity and access management and how can they be deployed to enable IT departments to combat cyber-attacks, phishing attacks and ransomware Continue Reading
By- Varun Prasad, ISACA
-
News
28 Oct 2024
Inside Google Cloud’s secure AI framework
Google Cloud’s secure AI framework that’s integrated into its Vertex AI platform offers practical tools and guidance to manage the lifecycle, data governance and operational risks of AI Continue Reading
By- Aaron Tan, TechTarget
-
News
25 Oct 2024
Dutch critical infrastructure at risk despite high leadership confidence
Stark paradox in Dutch cyber security landscape has business leaders expressing high confidence in their IT infrastructure as cyber attacks rise Continue Reading
By- Kim Loohuis
-
Blog Post
24 Oct 2024
Aryaka's Sassy Additions - The SASE Bandwagon Continues To Gather Pace Five Years On...
I’ve talked a lot about SASE in this ‘ere blog, including the SASE Network Scorecard I developed earlier in the year. For those who didn’t see that, here’s an example of one vendor completing it: ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
News
22 Oct 2024
Danish government reboots cyber security council amid AI expansion
Denmark’s government relaunches digital security initiative to protect business sectors and society at large Continue Reading
By- Gerard O'Dwyer
-
Feature
16 Oct 2024
How to build an incident response plan, with examples, template
With cyberthreats and security incidents growing by the day, every organization needs a solid incident response plan. Learn how to create one for your company. Continue Reading
By -
Feature
15 Oct 2024
Reinventing security operations for the modern threat landscape
The growing pace of digital transformation has opened new avenues for attackers, making traditional security measures obsolete. Organisations must modernise their security operations to fortify their defences and navigate the evolving threat landscape Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
11 Oct 2024
Robust cloud IAM should align to zero-trust principles
The Security Think Tank considers best practices in identity and access management and how can they be deployed to enable IT departments to combat cyber-attacks, phishing attacks and ransomware. Continue Reading
By- Ricky Simpson, Quorum Cyber
-
Blog Post
10 Oct 2024
The Complexities Of Reinventing The Mainframe “Easy Life”
Just got back from a Commvault event in London (where I saw more people in 10 seconds than I do in a month in Devon!) which also gave me the opp to catch-up with old PR mate Ben Ralph. In between ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
News
07 Oct 2024
IBM: Data breach cost in ASEAN hits new high
The average cost of a data breach in ASEAN grew by 7% from last year, as organisations grapple with increasingly distributed IT environments and complex security systems Continue Reading
By- Aaron Tan, TechTarget
-
News
03 Oct 2024
Ex-PSNI officer seeking legal advice over comments made at Investigatory Powers Tribunal
Ex PSNI officer ‘deeply angered’ by comments made by a former detective at a tribunal investigating allegations of unlawful surveillance against journalists Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
03 Oct 2024
Nutanix courts VMware customers in APAC amid Broadcom concerns
Nutanix is driving double-digit growth across the region by capitalising on the evolving cloud landscape with its hybrid cloud and artificial intelligence offerings, as well as anxieties about the future direction of VMware under Broadcom’s ownership Continue Reading
By- Aaron Tan, TechTarget
-
News
01 Oct 2024
Detective reported journalist’s lawyers to regulator in ‘unlawful’ PSNI surveillance case
Former Durham detective Darren Ellis told the Investigatory Powers Tribunal that he had concerns about lawyers acting for journalists placed under surveillance by Northern Irish police Continue Reading
By- Bill Goodwin & Cormac Kehoe
-
Definition
27 Sep 2024
What is a cloud access security broker (CASB)?
A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Dan Sullivan
-
News
25 Sep 2024
Splunk and Cisco integration moving apace
Splunk is rapidly integrating with Cisco’s technology to enable seamless transitions between their platforms while delivering advanced threat detection capabilities Continue Reading
By- Aaron Tan, TechTarget
-
News
23 Sep 2024
Microsoft shares progress on Secure Future Initiative
Microsoft has published a progress report on its Secure Future Initiative, launched last year in the wake of multiple security incidents, and made a series of commitments to improve its internal cyber culture Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Sep 2024
Cyber workforce must almost double to meet global talent need
Research from ISC2 finds global cyber workforce needs additional 4.8 million people to fully secure businesses Continue Reading
By- Clare McDonald, Business Editor
-
Definition
05 Sep 2024
What is shared responsibility model?
A shared responsibility model is a cloud security framework that dictates the security obligations of a cloud computing provider and its users to ensure accountability. Continue Reading
By- Kathleen Casey, Site Editor
- Stephen J. Bigelow, Senior Technology Editor
-
News
30 Aug 2024
Norwegian Refugee Council leverages Okta for Good cyber scheme
Pietro Galli, CIO of the Norwegian Refugee Council, reveals how the globally distributed NGO has been taking advantage of the Okta for Good CSR programme to improve its own cyber security and data protection practice, and elevate good practice in the third sector Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Aug 2024
Global cyber spend to rise 15% in 2025, pushed along by AI
Security spending will increase at pace in 2025, with artificial intelligence, cloud and consultancy services all pushing outlay to new highs, according to Gartner Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Aug 2024
How Kaspersky is driving growth in APAC
Kaspersky is leveraging its threat intelligence capabilities and local market knowledge to navigate geopolitical tensions and expand its footprint across the Asia-Pacific region Continue Reading
By- Aaron Tan, TechTarget
-
News
27 Aug 2024
Palo Alto Networks bets on ‘precision AI’
Palo Alto Networks’ regional leader, Steven Scheurmann, explains how machine learning, neural networks and generative AI can help to prevent breaches in what it calls ‘precision AI’ Continue Reading
By- Aaron Tan, TechTarget
-
News
20 Aug 2024
Phishing links becoming bigger threat than email attachments
Phishing techniques are evolving away from malicious email attachments, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 Aug 2024
Thousands of NetSuite customers accidentally exposing their data
Misconfigured permissions across live websites are leaving thousands of NetSuite users open to having their valuable customer data stolen, researchers say Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
15 Aug 2024
With the right tools and strategy, public cloud should be safe to use
Despite the complexity and evolving nature of threats, with the right strategy, tools, and constant vigilance, businesses can safely and securely leverage public cloud services Continue Reading
By- Jason Lau
-
Blog Post
06 Aug 2024
Cloud Storage Revisited: What has the last decade taught us?
It is clear that cloud storage has become an important component of modern IT infrastructure. Nearly every IT professional is faced with rapidly growing data volumes, and in many instances they are ... Continue Reading
By- Tony Lock, Freeform Dynamics
-
Blog Post
06 Aug 2024
Forget "Let's Look At What You Could Have Won" - Let's Look At What You CAN Win!
Well, it’s hard to believe it’s that time of year again already – no, not Christmas, though I’m sure The Range already has a wall of Rudolph-related items of no exact definition lined up at the ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
Feature
29 Jul 2024
8 blockchain-as-a-service providers to have on your radar
You don't have to build your blockchain project from the ground up. These cloud-based service providers can provide the necessary infrastructure, networking and development tools. Continue Reading
By- Christine Campbell, The Alpha Content Company
- Tony Kontzer
-
Feature
29 Jul 2024
CrowdStrike update chaos explained: What you need to know
A botched software update at cyber security firm CrowdStrike has caused IT chaos around the world. Learn more about the global CrowdStrike update outage as it develops Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
26 Jul 2024
Cloud security challenges not just technological
The Computer Weekly Security Think Tank considers how CISOs and security practitioners should ensure that the business can make use of public cloud services safely and securely and avoid accidental or deliberate data leakage. Continue Reading
By- Temi Akinlade
-
Opinion
19 Jul 2024
What happens when the IT infrastructure is too big to fail?
Today’s global outage of Microsoft is rapidly sending shockwaves across all sectors, demonstrating the risk of having a single point of failure Continue Reading
By- Owen Sayers, Secon Solutions
-
News
19 Jul 2024
CrowdStrike security update fails Windows PCs globally
An update to the security firm’s Falcon service has led to many Windows users being unable to work this morning. Microsoft 365 is also affected Continue Reading
By- Cliff Saran, Managing Editor
-
News
16 Jul 2024
Incubator Plexal heads to Singapore for CyberBoost
Cyber startup hub Plexal expands its presence to Singapore through a new initiative, and sets its sights on helping new UK businesses break into the booming Asia-Pacific market Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 Jul 2024
Cloud spend trumps AI but data, security and cost a common headache
Nasuni-sponsored survey finds cloud projects higher on the to do list than AI, but data management, security and cost reduction are common themes in all areas of investment Continue Reading
By- Antony Adshead, Storage Editor
-
News
15 Jul 2024
How Snowflake is tackling AI challenges
Snowflake’s regional leader Sanjay Deshmukh outlines how the company is helping customers to tackle the security, skills and cost challenges of AI implementations Continue Reading
By- Aaron Tan, TechTarget
-
News
12 Jul 2024
AT&T loses ‘nearly all’ phone records in Snowflake breach
Hackers have stolen records of virtually every call made by AT&T's customers during a six-month period in 2022, after compromising the US telco's Snowflake data environment Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Jul 2024
Dutch research firm TNO pictures the SOC of the future
In only a few years, security operations centres will have a different design and layout, and far fewer will remain Continue Reading
By- Kim Loohius
-
E-Zine
09 Jul 2024
How data drives decisions at BAE Systems
In this week’s Computer Weekly, we talk to the chief data officer of one of the UK’s biggest manufacturers, BAE Systems, about data strategy and diversity. Microsoft’s claims over sovereign cloud for government IT are under scrutiny – we examine the issues. And our latest buyer’s guide looks at trends in cloud databases. Read the issue now. Continue Reading
-
Blog Post
02 Jul 2024
Whatever you do, don't press the big red button...
I’m not sure if anyone has figures to hand (or the desire to find out) exactly how many cyber security vendors there are out there, but some rough stats suggest that there are verging on 6,000 in ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
Opinion
02 Jul 2024
Security Think Tank: Securing today's ubiquitous cloud environment
The Computer Weekly Security Think Tank considers how CISOs and security practitioners should ensure that the business can make use of public cloud services safely and securely and avoid accidental or deliberate data leakage Continue Reading
By- Kashil JagmohanSingh
-
E-Zine
02 Jul 2024
UKtech50 2024: The most influential people in UK technology
In this week’s Computer Weekly, we reveal the 50 most influential people in UK technology for 2024, in our annual UKtech50 list. We talk to Post Office scandal campaigner Alan Bates, voted the most influential person in tech this year. Plus, we find out why a bunch of mobile app startups jumped into a freezing lake near the Arctic Circle. Read the issue now. Continue Reading
-
Feature
01 Jul 2024
Security in the public cloud explained: A guide for IT and security admins
In this guide, IT security and industry experts share their top recommendations for protecting public cloud deployments Continue Reading
By- Cliff Saran, Managing Editor
-
News
28 Jun 2024
How Recorded Future is operationalising threat intelligence
Recorded Future is investing in APIs to enable automated security workflows, among other measures, to help organisations overcome the hurdles of operationalising threat intelligence Continue Reading
By- Aaron Tan, TechTarget
-
News
27 Jun 2024
Gulf Edge to operate Google Distributed Cloud in Thailand
The Gulf Energy subsidiary will offer Google’s sovereign cloud service in Thailand with a focus on air-gapped configurations Continue Reading
By- Aaron Tan, TechTarget
-
News
26 Jun 2024
Police Scotland did not consult ICO about high-risk cloud system
Police Scotland chose not to formally consult with the data regulator about the risks identified with a cloud-based digital evidence sharing system, while the regulator itself did not follow up for nearly three months Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
E-Zine
25 Jun 2024
A revolution in space
In this week’s Computer Weekly, we talk to astronaut Tim Peake about the imminent revolution in space tech and what it means for IT leaders. AI is set to transform the movie industry – we hear from the producers of the latest Mad Max film about how it’s already changed the process for them. And we find out about plans for Neom, the Saudi Arabian smart city in the desert. Read the issue now. Continue Reading
-
News
21 Jun 2024
ICO police cloud guidance released under FOI
Long-awaited guidance from the UK data regulator on police cloud deployments highlights some potential data transfer mechanisms it thinks can clear up ongoing legal issues, but tells forces it’s up to them to decide if the measures would work Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Blog Post
19 Jun 2024
How To Avoid Global RAGged AI Delivery Woes....
If Q1 of this year for me was the season of “newbies” – speaking to, and working with, new vendor clients, then Q2 has definitely been the season of “catch-ups”. The essence of “catch-ups” is the ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
E-Zine
18 Jun 2024
General election 2024 – the digital policies examined
In this week’s Computer Weekly, we examine the digital policies revealed in the three main political parties’ general election manifestos. Our new buyer’s guide looks at the latest trends in cloud security. And we find out about the EU’s plans for a digital single market that could span the globe. Read the issue now. Continue Reading
-
Opinion
17 Jun 2024
Cloud security: Finding the right provider to protect your data
This month, the Computer Weekly Security Think Tank considers how CISOs and security practitioners should ensure that the business can make use of public cloud services safely and securely and avoid accidental or deliberate data leakage. Continue Reading
By- Stephen McDermid
-
Opinion
17 Jun 2024
Gartner: Navigating incident response in the cloud
In the rapidly evolving landscape of cloud security, incident response strategies must be as dynamic and flexible as the environments they protect Continue Reading
By- Carlos De Sola Caraballo
-
Opinion
13 Jun 2024
Data leakage in the cloud – can data truly be safe in the cloud?
This month, the Computer Weekly Security Think Tank considers how CISOs and security practitioners should ensure that the business can make use of public cloud services safely and securely and avoid accidental or deliberate data leakage. Continue Reading
By- Scott Swalling
-
Definition
13 Jun 2024
cloud security
Cloud security, also known as 'cloud computing security,' is a set of policies, practices and controls deployed to protect cloud-based data, applications and infrastructure from cyberattacks and cyberthreats. Continue Reading
By- Kinza Yasar, Technical Writer
- Andrew Froehlich, West Gate Networks
- Sharon Shea, Executive Editor
-
Opinion
12 Jun 2024
How to ensure public cloud services are used safely and securely
This month, the Computer Weekly Security Think Tank considers how CISOs and security practitioners should ensure that the business can make use of public cloud services safely and securely and avoid accidental or deliberate data leakage. Continue Reading
By- Beji Jacob
-
Opinion
11 Jun 2024
True cloud security requires in-depth understanding
This month, the Computer Weekly Security Think Tank considers how CISOs and security practitioners should ensure that the business can make use of public cloud services safely and securely and avoid accidental or deliberate data leakage. Continue Reading
By- Elliott Wilkes
-
News
07 Jun 2024
Sophos uncovers Chinese state-sponsored campaign in Southeast Asia
Sophos found three distinct clusters of activity targeted at a high-level government organisation that appeared to be tied to Chinese interests in the South China Sea Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
04 Jun 2024
Security Think Tank: The cloud just got more complicated
This month, the Computer Weekly Security Think Tank considers how CISOs and security practitioners should ensure that the business can make use of public cloud services safely and securely and avoid accidental or deliberate data leakage. Continue Reading
By- Rob Dartnall, SecAlliance
-
News
03 Jun 2024
97 FTSE 100 firms exposed to supply chain breaches
Between March 2023 and March 2024, 97 out of 100 companies on the UK’s FTSE 100 list were put at risk of compromise following supply chain breaches at third-party suppliers Continue Reading
By- Alex Scroxton, Security Editor
-
News
02 Jun 2024
Ticketek Australia hit by data breach
Customer names, dates of birth and email addresses of Ticketek Australia account holders reportedly impacted in latest data breach affecting event ticketing firm Continue Reading
By- Aaron Tan, TechTarget
-
News
17 May 2024
Akamai’s cloud computing play gains momentum
The company’s compute business could eventually account for the majority of its revenues, surpassing its security and content delivery businesses, says CEO Tom Leighton Continue Reading
By- Aaron Tan, TechTarget
-
Blog Post
14 May 2024
Complying With Automation
Thinking back to the early 2000s (I refuse to call them “the noughties”) it seemed that whatever technology you were talking about, the word “security” always came into the equation. Fast forward ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
E-Zine
07 May 2024
Casting a critical eye on HMRC’s IR35 checker tool
In this week’s Computer Weekly, we investigate what has been going on with HMRC’s Check Employment Status for Tax (CEST) tool. We also speak to the CIO of Danfoss about making datacentres greener and explore the issue of restoring data and system backups after a ransomware or cyber attack. Read the issue now. Continue Reading
-
News
06 May 2024
Microsoft beefs up cyber initiative after hard-hitting US report
Microsoft is expanding its recently launched Secure Future Initiative in the wake of a hard-hitting US government report on recent nation state intrusions into its systems Continue Reading
By- Alex Scroxton, Security Editor
-
News
02 May 2024
How Okta is fending off identity-based attacks
Okta has been bolstering the security of its own infrastructure and building new tools to scan customer environments for vulnerable identities, among other efforts to fend off identity-based attacks Continue Reading
By- Aaron Tan, TechTarget
-
News
30 Apr 2024
Keeper to help Williams F1 keep up with cyber challenges
Keeper Security signs up to support F1 team Williams Racing with credential management ahead of the 2024 Miami Grand Prix Continue Reading
By- Alex Scroxton, Security Editor
-
Tip
29 Apr 2024
Top 11 cloud security challenges and how to combat them
Before jumping feet first into the cloud, understand the new and continuing top cloud security challenges your organization is likely to face -- and how to mitigate them. Continue Reading
By- Sharon Shea, Executive Editor
-
News
25 Apr 2024
Zero trust is a strategy, not a technology
Zero-trust security should be seen as a strategy to protect high-value assets and is not tied to a specific technology or product, says the model’s creator John Kindervag Continue Reading
By- Aaron Tan, TechTarget
-
News
24 Apr 2024
Cyber training leader KnowBe4 to buy email security firm Egress
Security awareness training and phishing simulation specialist KnowBe4 is to buy email security expert Egress Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Apr 2024
CSA warns of emerging security risks with cloud and AI
Few users appreciate the security risks of cloud and have the expertise to implement the complex security controls, says CSA chief executive David Koh Continue Reading
By- Aaron Tan, TechTarget
-
News
10 Apr 2024
Breakthrough may herald secure home quantum computing
An emerging approach to quantum security dubbed blind quantum computing may one day help spur mass adoption of quantum computing safely and securely, using technology that is already available today Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Apr 2024
Obituary: Professor Ross Anderson, pioneer in security engineering and campaigner
Ross Anderson, a titan in the field of security engineering and campaigner for privacy and security, has passed away Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
28 Mar 2024
UK plc going backwards on cyber maturity, Cisco report claims
Fewer UK organisations believe their cyber security postures have reached a mature level than did so 12 months ago, as they struggle to keep up with new challenges and a fast-evolving threat landscape Continue Reading
By- Alex Scroxton, Security Editor
-
Tip
27 Mar 2024
Private vs. public cloud security: Benefits and drawbacks
Uncover the differences between private vs. public cloud security -- as well as hybrid cloud security and multi-cloud security -- before deciding on an enterprise deployment model Continue Reading
By- Andrew Froehlich, West Gate Networks
- Sharon Shea, Executive Editor
-
News
27 Mar 2024
Cyber spies, not cyber criminals, behind most zero-day exploitation
Analysis from Google has found that zero-day vulnerabilities are much more heavily exploited for espionage purposes than for financially motivated cyber crime Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
21 Mar 2024
Challenging the traditional boundaries between IAM and UEM
It's always refreshing to engage with vendors who aren't bound by the rigid category definitions that large analyst firms often impose on the market. At Freeform Dynamics, our view is that it's ... Continue Reading
By- Dale Vile, Freeform Dynamics
-
News
19 Mar 2024
EMEA security spend will have another boom year in 2024
Cyber security services and technology will once again be the focus of major investment across EMEA during 2024, according to the latest Technology Spending Intentions study from TechTarget and ESG Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Mar 2024
Australia’s cyber security spending to grow 11.5% this year
Highly publicised cyber attacks and growing regulatory obligations are keeping security and risk top of mind for Australian organisations this year, says Gartner Continue Reading
By- Aaron Tan, TechTarget
-
News
12 Mar 2024
More DDoS attacks launched against APAC financial firms
The financial sector in Asia-Pacific saw more DDoS attacks in 2023, but no notable impact was reported, according to a report by Akamai and FS-ISAC Continue Reading
By- Aaron Tan, TechTarget
-
Answer
08 Mar 2024
Cloud security vs. network security: What's the difference?
While network security focuses on solely protecting networks, cloud security provides protection for networks, servers, containers, apps and more. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Tip
07 Mar 2024
5-step IaaS security checklist for cloud customers
Get expert advice on patching, data encryption, and identity and access management responsibilities in this enterprise IaaS security checklist. Continue Reading
By- Ed Moyle, Drake Software
-
News
01 Mar 2024
APAC firms bullish on IT spending
More than half of organisations plan to spend more on key areas such as cyber security, generative AI and cloud in a sign of growing optimism across the region Continue Reading
By- Aaron Tan, TechTarget
-
News
27 Feb 2024
Cozy Bear and other APTs changing tack as cloud adoption increases
A change in APT tactics has been observed resulting from greater adoption of cloud-based services, according to the NCSC Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Feb 2024
Storage and backup spend in 2024 targets risk and resilience
The TechTarget and ESG spending intentions survey finds big bias towards averting risk and building organisational resilience, but on-premise storage a significant planned outlay Continue Reading
By- Antony Adshead, Storage Editor
-
News
22 Feb 2024
Cyber experts alarmed by ‘trivial’ ConnectWise vulns
The disclosure of two dangerous vulnerabilities in the popular ConnectWise ScreenConnect product is drawing comparisons with major cyber incidents, including the 2021 Kaseya attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 Feb 2024
Poor data and IT hamper cross-government working, PAC report finds
Report cites inadequate data, poor IT systems and departmental silos as major barriers to cross-government working, and calls on government to do better Continue Reading
By -
E-Zine
15 Feb 2024
CW APAC: February to April 2024 – Trend Watch: CIO trends
Organisations have plenty of technologies to keep track of when digitising their operations. In this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly looks at IT predictions for 2024, how India’s space missions will propel tech and Australia’s advances in cyber security. Continue Reading
-
News
14 Feb 2024
Security experts: Investigatory powers plans will delay security updates
Cyber security experts warn that government proposals to amend the Investigatory Powers Act will limit tech companies’ ability to respond to security threats and could hamper the use of end-to-end encryption Continue Reading
By- Bill Goodwin, Computer Weekly
-
Blog Post
05 Feb 2024
New Optimisation Kid On The Block Puts Hybrid Users On The Cloudbrink Of Performance...
As many of you will know, one of my major focus areas since Stone Age Man (almost) has been network optimisation in its broadest sense. It seems ironic that, in 2024, optimisation is required more ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
Blog Post
31 Jan 2024
SASE Evaluation - The Thoughts Of A Founding Father
Now here’s something a little different. On this ‘ere blog, you are used to hearing my views on the world of networking, comms, security and occasionally wine. You may also have read my recent ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
Opinion
30 Jan 2024
Microsoft hack: Five questions enterprises should ask their IT leaders
Following the news about a Russia-backed hacking group infiltrating Microsoft's systems, enterprises may want to seek assurances from their IT and security leaders about the implications of the attack for them Continue Reading
By- Owen Sayers, Secon Solutions
-
Feature
29 Jan 2024
Top 10 types of information security threats for IT teams
Know thine enemy -- and the common security threats that can bring an unprepared organization to its knees. Learn what these threats are and how to prevent them. Continue Reading
-
Opinion
25 Jan 2024
Mitigating the risks of modern application development
Organisations need to have visibility over their software supply chain, secure and monitor interfaces to legacy systems and adopt zero trust to mitigate the risks of modern application development Continue Reading
By- Peter Lees
-
News
24 Jan 2024
Inside Cisco’s security platform strategy
Raj Chopra, senior vice-president of Cisco’s security business, outlines the company’s security platform strategy and how it brought different products together into a single platform Continue Reading
By- Aaron Tan, TechTarget