Endpoint security
-
News
20 Nov 2024
Apple addresses two iPhone, Mac zero-days
Two zero-day vulnerabilities uncovered in Apple’s operating systems could have allowed for arbitrary code execution and cross-site scripting attacks Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Nov 2024
Microsoft Ignite: A $4m zero-day reward plus $349 thin client
A $4m cyber hackathon prize was revealed at Ignite as part of Microsoft’s latest IT security efforts, as well as a new locked-down client device called Windows 365 Link Continue Reading
By- Cliff Saran, Managing Editor
-
News
20 Jan 2015
Younger users prefer biometrics to passwords
Younger bank customers would rather use biometrics than PINs and passwords for security, according to Visa Europe Continue Reading
By- Clare McDonald, Business Editor
-
E-Zine
05 Jan 2015
CW Europe – January 2015 Edition
As we start another new year we look back at what technology has been playing a vital role in keeping Europe safe. Headlines are regularly filled with threats about cyber wars and attacks which, although are important to bring to light, can sometimes overshadow the role technology plays in keeping us safe. Continue Reading
-
News
05 Jan 2015
Hackers can exploit free mobile apps to steal data, study shows
Hackers can access private data by exploiting vulnerabilities mainly in free mobile apps, according to security researchers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
17 Dec 2014
Cabinet Office begins procurement for next stage of Gov.uk Verify
The Cabinet Office has submitted a tender notice for a £150m three-year framework for the provision of identity assurance services Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
Feature
11 Dec 2014
The state of mobile back end as a service
Common mobile application services are increasingly being hosted on central back-end servers – but what does that mean for the enterprise? Continue Reading
By- Janakiram MSV
-
News
04 Dec 2014
Cyber criminals are targeting smartphone supply chains, warn researchers
A new mobile trojan dubbed “DeathRing” is being pre-loaded onto smartphones somewhere in the supply chain, warn researchers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 Nov 2014
CGI secures communications between pilots and air traffic control
Satellite communications firm Inmarsat has outsourced the provision of security IT and services to CGI Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Photo Story
31 Oct 2014
The real story behind The Imitation Game film
The life of Alan Turing is being celebrated on the big screen this month. The Imitation Game from Studio Canal opens on November 14th 2014 and tells the story of the war hero who’s achievements until recently were largely unknown. Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
13 Oct 2014
Embedded SIMs key to unlocking internet of things
GSMA’s eUICC Embedded SIM Specification will help M2M communications and the IoT become mainstream, say analysts Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Oct 2014
Azure CTO Mark Russinovich's top ten public cloud security risks
Microsoft Azure cloud CTO Mark Russinovich identified ten key security risks of public cloud services Continue Reading
By- Archana Venkatraman, Datacentre Editor
-
News
08 Oct 2014
Malware being used to steal cash from ATMs
Criminals are using malware to steal cash from ATMs without debit and credit cards Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
24 Sep 2014
BlackBerry Passport delivers a real keyboard and high-res screen to business
BlackBerry has introduced its Passport smartphone featuring a 4.5in hi-res screen, a qwerty keyboard and 13MP camera Continue Reading
By- Cliff Saran, Managing Editor
-
News
15 Sep 2014
Salesforce issues advice on avoiding Dyreza attack
Salesforce has issued a set of guidelines on tightening security after a number of its customers were targeted by the Dyreza email virus Continue Reading
By- Cliff Saran, Managing Editor
-
News
09 Sep 2014
EY seeks tech startups to address challenges of right to be forgotten
Professional services firm Ernst & Young is looking for startups to find technology solutions to the ‘right to be forgotten’ regulation Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
08 Sep 2014
Ransomware on the rise, warns cyber threat report
The first half of 2014 saw an increase in online attacks that lock up user data and hold it for ransom, reports F-Secure Labs Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Sep 2014
Barclays bank launches biometric authentication
Barclays bank plans to launch biometric readers that read users' finger veins to authenticate customers Continue Reading
By- Clare McDonald, Business Editor
-
Feature
20 Aug 2014
The internet of things is coming: Is your datacentre ready?
Gartner estimates the IoT will see 26 billion units installed by 2020 – channelling huge volumes of data traffic into datacentres Continue Reading
-
Feature
18 Aug 2014
What ingredients go into the successful app store?
An enterprise app store should provide the controlled availability of apps for employees.We look at what is available for organisations to use Continue Reading
By- Bernt Ostergaard , Quocirca
-
News
11 Aug 2014
USB-connected devices present cyber vulnerabilities
Connecting devices to computers using a USB port could lead to security breaches, say Berlin-based researchers Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
05 Aug 2014
Cyber Security Challenge UK takes on the internet of things
The latest level of the Cyber Security Challenge will involve participants hacking devices connected to the internet of things Continue Reading
By- Clare McDonald, Business Editor
-
E-Zine
04 Aug 2014
Driving virtualisation into pole position in Formula One
In this week’s Computer Weekly, we find out how the Caterham F1 team has used virtualisation in its trackside technology to help improve race performance. We analyse how growing competition in the cloud market is affecting Amazon Web Services’ dominant position. And we look at silicon photonics, an emerging datacentre technology that promises better connectivity and reduced complexity. Read the issue now. Continue Reading
-
E-Zine
28 Jul 2014
Going mobile in financial services
In this week’s Computer Weekly, in a highly-regulated sector such as financial services, enabling staff mobility is a challenge – we hear from IT leaders that have made it work. We ask why small businesses are so poorly prepared for cyber attacks. And we examine the key storage technologies in the Openstack cloud platform. Read the issue now. Continue Reading
-
E-Zine
21 Jul 2014
Time to get serious about endpoint security
In this week’s Computer Weekly, with billions of devices joining corporate networks every year, our latest buyer’s guide looks at endpoint security. IBM and Apple have announced plans to work together on corporate mobility – we analyse what the deal means for IT leaders. And we take an in-depth look at in-memory databases. Read the issue now. Continue Reading
-
News
16 Jul 2014
IBM partners with Apple to deliver enterprise services for iOS
IBM has given Apple a major boost in the enterprise, through a partnership that will see it provide services and software for iOS Continue Reading
By- Cliff Saran, Managing Editor
-
Feature
14 Jul 2014
A guide to smart home automation
Unless it is a new build, the challenge in creating a smart home is that technology must work irrespective of the age of the property Continue Reading
By- Cliff Saran, Managing Editor
-
Feature
07 Jul 2014
The pros and cons of iPads in the enterprise
The iPad is often the first platform for which developers produce apps – but it is substantially more expensive than its competitors Continue Reading
By- JP Gownder
-
News
04 Jul 2014
Barclays passes government’s ‘internet-born threat’ test
Barclays Bank has been awarded the government’s cyber security certificate for digital banking services after independent tests of services such as Pingit Continue Reading
-
News
03 Jul 2014
Netflix releases its AWS monitoring tool Security Monkey into the wild
Netflix has made Security Monkey, the AWS tracker tool it built for itself, freely available to other Amazon cloud users Continue Reading
By- Archana Venkatraman, Datacentre Editor
-
News
03 Jul 2014
Facebook apologises over psychological experiments
Facebook has apologised over the controversial psychological experiments carried out on 689,000 users without their consent in 2012 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Jun 2014
IT departments unprepared for internet of things
Only 41% of IT professionals are working on projects to prepare their business for the internet of things Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
27 May 2014
Android Outlook app has privacy issues, warn researchers
Microsoft’s Outlook.com app for Android is exposing users' data, warn security researchers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 May 2014
Shell thinks technology first in preparation for internet of everything
Shell is reshaping its business to think technology first as it uses the internet of everything to change its business processes Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
Feature
14 Mar 2014
Hacktivism: good or evil?
IT lawyer Dai Davis looks at the rise of hacktivism and its impact on business and international politics Continue Reading
By- Dai Davis, Percy Crow Davis & Co
-
News
10 Mar 2014
Dark web key enabler for cyber criminals, say McAfee researchers
The dark web is a key conduit for the malware industry to refine and distribute its products and services, say security researchers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Mar 2014
IT Security Salary Index (UK)
Are you being paid the right rate for the job? Check out this IT Security salary index from Acumin. Continue Reading
-
Photo Story
18 Feb 2014
UK IT spending to outpace rest of Europe in 2014
Computer Weekly research reveals the IT spending priorities for UK and European organisations in 2014. Continue Reading
By- Bill Goodwin, Computer Weekly
-
Opinion
17 Feb 2014
Should you allow a bring your own device policy?
Employers are realising there are challenges presented by BYOD which, if not dealt with, could have a serious impact on the business Continue Reading
By- Sarah Burke
-
News
05 Feb 2014
Bank of England publishes Waking Shark II cyber security exercise results
Bank of England publishes the results of its Waking Shark II security exercise, which tested financial institutions' contingency plans for cyber attack Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
Feature
04 Feb 2014
Create a mobile policy employees can trust
With Gartner predicting a fifth of all enterprise BYOD projects would fail by 2016, we look at how businesses can embrace mobility successfully Continue Reading
By- Sean McGrath, Senior reporter
-
News
17 Jan 2014
Internet at risk of 'cybergeddon' says WEF
Internet is at risk of fragmenting amid concerns over spying and cyber crime, says World Economic Forum Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
16 Jan 2014
Microsoft extends XP security updates by 15 months
Microsoft has caved in to user concerns over XP end of support and will now extend security updates by another 15 months Continue Reading
By- Cliff Saran, Managing Editor
-
News
14 Jan 2014
Top European IT initiative to support business in 2014?
Expanding IT to support business growth is one of the biggest areas of focus for IT departments in 2014, so what does this mean? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Jan 2014
More than 1,100 DWP workers disciplined over benefits snooping
More than 1,100 employees at the Department for Work and Pensions have received official warnings since 2008 for prying into benefits records Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
10 Jan 2014
Security considerations for UK enterprises
This Research Snapshot from Vanson Bourne looks at IT security spending trends, awareness of cyber-threats, and the factors perceived as the biggest security risks for organisations. Continue Reading
-
News
03 Jan 2014
FireEye acquires Mandiant in $1bn deal
Security firm FireEye has bought Mandiant in a deal worth just over $1bn Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Dec 2013
Bank robberies down 90% thanks to technology, says report
Robberies at British banks have fallen by over 90% in two decades, according to a report by the British Bankers’ Association Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
E-Zine
16 Dec 2013
Can BlackBerry restore its business appeal?
In this week’s issue of Computer Weekly, we examine whether former Sybase chief, John Chen, will be able to stem the decline of BlackBerry and reinvent the the smartphone maker as a software business for the “bring your own device” (BYOD) era. Our buyer’s guide to the internet of things concludes with a look at how universal connectivity will yield insights in fields as diverse as aviation and hospitality. And we analyse Google’s attempts to compete with Amazon Web Services in public cloud. Continue Reading
-
News
11 Dec 2013
Research reveals widespread mobile app hacking
The top 100 paid Android apps and 56% of the top 100 paid Apple iOS apps have been hacked, research has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Nov 2013
European Parliament closes Wi-Fi after man-in-the-middle attack
A number of mailboxes have been compromised and users’ smartphones could be at risk following a man-in-the-middle attack on the European Parliament’s public Wi-Fi Continue Reading
By- Jennifer Scott, TechTarget
-
News
26 Nov 2013
White hat Wi-Fi hacking shows vulnerability of business data
Whitehat hackers have shown that senstitive data can be sniffed easily from public Wi-Fi hotspots Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Nov 2013
Report highlights poor UK attitudes to mobile security
Businesses should note that many UK mobile users do not take security precautions and do not know how to guard against data theft Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Nov 2013
Global profiles of the fraudster
Computers, rather than conmen, are set to be the future face of fraud, as criminals turn to robotics in an effort to avoid detection, this report from KPMG reveals. Continue Reading
-
News
17 Oct 2013
Government overhauls security classification to fit digital age
In its first overhaul since World War II the government is consolidating six security bands to three with a system deemed more appropriate in the digital age. Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
17 Oct 2013
Dexter payment card malware variant hits South Africa
The Dexter payment card skimming malware discovered last year has resurfaced in South Africa, resulting in millions of pounds lost to fraud Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 Oct 2013
The ICO issues BYOD warning after breach
The ICO is calling on organisations to ensure data protection policies reflect how employees are using personal devices for work Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Sep 2013
MoD announces specialist programme to fend off cyber attacks
The Ministry of Defence (MoD) has announced a strategy to defend UK national security from the threat of cyber attacks Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
26 Sep 2013
Small businesses must encrypt customer data, says ICO
The Information Commissioner’s Office (ICO) urges small businesses to encrypt customer data after a sole trader was fined for failing to do so Continue Reading
-
News
06 Sep 2013
NSA and GCHQ unlock online privacy encryption
UK and US intelligence agencies have unlocked the technology used to encrypt online services, including email, online banking and medical records. Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
05 Sep 2013
Windows 2012 Server Network Security
This book chapter offers an introduction to Windows 8 and Windows Server 2012 network security and IPv6. It includes a 30% discount code for Computer Weekly readers. Continue Reading
-
News
05 Sep 2013
Windows Server 2012 Security from End to Edge and Beyond
This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask. Continue Reading
-
News
05 Sep 2013
Printing: a false sense of security?
Louella Fernandes and Bob Tarzey show how secure printing technology can provide authentication, authorisation and accounting capabilities, helping businesses improve document security and meet compliance regulations. Continue Reading
-
News
21 Aug 2013
Case study: Keeping it private at Beth Israel Deaconess after the Boston Marathon Attacks
Doctor and healthcare CIO shares his lessons learned from the Boston Marathon attacks and how to protect patient data Continue Reading
By- Kayleigh Bateman, Computer Weekly
-
News
20 Aug 2013
Targeted attacks and how to defend against them
Analysts Bob Tarzey and Louella Fernandes assess the scale and real impact of targeted attacks the measures being taken to defend against them. Continue Reading
-
Feature
19 Aug 2013
Top 10 Android security tips
As Android becomes more prevalent in the enterprise, Computer Weekly gives you 10 top tips for keeping your devices secure Continue Reading
By- Paul Marchant
-
Opinion
13 Aug 2013
The dangers of internet cafés
Businesses need clear computer use policies and need to ensure staff are properly trained in data protection, writes Garry Mackay Continue Reading
By- Garry Mackay
-
Feature
30 Jul 2013
Big data journalism exposes offshore tax dodgers
How journalists harnessed big data to challenge offshore financial secrecy Continue Reading
By- Duncan Campbell and Craig Shaw
-
News
19 Jul 2013
IT security case studies
Four critical IT security case-studies selected from the winners of Computer Weekly's European User Awards for security Continue Reading
-
News
18 Jul 2013
Needle in a Datastack: The rise of big security data
This research from McAfee investigates how well organisations are positioned to address the challenges of managing security in a world of ever increasing amounts and types of data. Continue Reading
-
News
17 Jul 2013
IT Security Case Studies
Warwick Ashford presents 4 essential IT security case-studies selected from the winners of Computer Weekly's European User Awards. Continue Reading
-
News
04 Jul 2013
FBI warns of increased spear phishing attacks
The FBI has issued a warning about an increase in spear-phishing attacks targeting multiple industry sectors Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Jun 2013
BES extends MDM to Android and iPhones
Aiming to rekindle interest in the Blackberry Enterprise Server (BES), Blackberry has extended the platform to support Android and iOS Continue Reading
By- Cliff Saran, Managing Editor
-
News
10 Jun 2013
Telefonica Digital forms security group Eleven Paths
The business division of mobile operator Telefonica launches Eleven Paths, an independent company working on security issues in the workplace Continue Reading
By- Jennifer Scott, TechTarget
-
News
03 Jun 2013
Information Governance
This research from AIIM looks at the risk profile around electronic records, the keep-all versus delete-all options, e-discovery, and the implications of social, mobile and cloud on risk management policies. Continue Reading
-
News
07 May 2013
Symantec helps NHS trust cut security costs by a quarter
The Royal Liverpool and Broadgreen University Hospitals NHS Trust cut security costs by 25% in its partnership with security supplier Symantec Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 May 2013
CW buyer's guide: context-aware security
This 11-page Computer Weekly buyer's guide looks at how organisations should approach context-aware security technologies and what business benefits they can deliver. Continue Reading
-
News
01 May 2013
CW Special Report on CSC
This 16-page report from Computer Weekly analyses the challenges facing CSC, its financial performance, the services it offers, its place in the IT market and its future strategy. Continue Reading
-
News
25 Apr 2013
Spam SMS messages drop following ICO penalty
The number of spam SMS messages has significantly reduced since government regulator ICO issued £440,000 fines last year Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
Feature
22 Apr 2013
The internet of things is set to change security priorities
IT leaders must protect against the security risks introduced by the growing interaction between technology and the physical world. Continue Reading
By- Andrew Rose
-
News
19 Apr 2013
Conficker makes way for web-based attacks, says Microsoft
Web attacks emerge as top threat as businesses finally begin to win the battle against Conficker and other worms, says Microsoft Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Apr 2013
Bots and web apps among top threats to data security, says Check Point
Bots, viruses, breaches and attacks are a constant and real threat to the information security of organisations Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Apr 2013
Porn websites pose malware risk, says researcher
Browsing popular pornography internet sites pose a growing risk of malware infection, according to a security researcher Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Apr 2013
US Army practises poor data security on mobile devices
Pentagon inspector general finds smartphones and tablets the US Army buys are not configured to protect sensitive data and allow remote wipe Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Mar 2013
Case study: Hamilton Fraser embraces BYOD with MobileIron
How insurance firm Hamilton Fraser is using MobileIron to enable employees to bring their own devices while following company policy Continue Reading
By- Jennifer Scott, TechTarget
-
News
06 Mar 2013
What is RSA's build, buy, partner strategy?
Computer Weekly takes a closer look at RSA's build, buy, partner strategy Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Mar 2013
Enterprise Security Architecture – an outsourcer's view
Alan Jenkins, chief security officer of outsourcing specialist, T Systems, explains the company's approach to enterprise security architecture. Continue Reading
-
News
05 Mar 2013
Enterprise Security Architecture
Mark Brown, Director for Advisory Risk & Information Security at Ernst & Young offers advice to security leaders on developing a robust Enterprise Security Architecture. Continue Reading
-
News
05 Mar 2013
Security the future: Keeping up with the business
Gareth Lindahl-Wise, group information security manager at British American Tobacco, explains the company's approach to enterprise security architecture. Continue Reading
-
Photo Story
04 Mar 2013
How to configure Mac OS X Server
How to secure Mac OS X Server using global password policies and data loss prevention Continue Reading
By- Rob Buckley
-
News
27 Feb 2013
350,000 different types of spam SMS messages were targeted at mobile users in 2012
350,000 different variants of unsolicited spam SMS messages were accounted for in 2012, with 53,000 variants logged for December alone Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
27 Feb 2013
Health records should be protected like bank details, says BCS
The BCS and NHS say people should protect their online medical records in the same way they look after their bank details Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
26 Feb 2013
Virtualization Security: Protecting Virtualized Environments
This extract from the book Virtualization Security, includes a 30% discount for Computer Weekly readers. Continue Reading
-
News
18 Feb 2013
The Demise in Effectiveness of Signature and Heuristic Based Antivirus
Anti-virus technology is failing to protect organisations from malicious attacks. Security professionals should look at alternative strategies, the NNC group argues in this report. Continue Reading
-
Feature
07 Jan 2013
Business priorities: what to protect, monitor and test
How information security professionals can prioritise what to protect, monitor and test in the light of current budget and resource constraints Continue Reading
-
Feature
17 Dec 2012
Shore up your organisation’s fleet with the right MDM
There are many mobile device management products, but approaches vary. We outline how to choose the right one for your business Continue Reading
-
Photo Story
13 Dec 2012
Securing Macs in the enterprise
A Mac can be more secure than Windows, yet just as insecure; it is harder to configure, easier to use; will not fit in the enterprise, but does not need to. Continue Reading
By- Rob Buckley
-
Feature
06 Dec 2012
How to secure Macs in the enterprise
Apple computers are becoming increasingly used in the enterprise - we look at how to securely introduce Macs in the corporate network Continue Reading
By- Rob Buckley
-
News
06 Dec 2012
2012 Cost of Cyber Crime Study: UK
The 2012 Cost of Cyber Crime Study: United Kingdom is independently conducted by Ponemon Institute. The benchmark study, sponsored by HP Enterprise Security is based on a representative sample of 38 organisations in various industry sectors. Continue Reading
-
News
03 Dec 2012
IT Security Purchasing Intentions 2013
This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe. Continue Reading
-
News
19 Nov 2012
Cyber criminals target Skype, Facebook and Windows users
Cyber criminals targeted users of Skype, Facebook and Windows using multiple Blackhole exploits in October, according to security firm GFI Software Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 Nov 2012
Nasa to encrypt data after latest breach
Nasa is to encrypt all its mobile computers after the loss of a laptop containing personal information about more than 10,000 staff Continue Reading
By- Warwick Ashford, Senior analyst