Endpoint security
-
News
18 Dec 2024
The Security Interviews: Martin Lee, Cisco Talos
Threat intel expert and author Martin Lee, EMEA technical lead for security research at Cisco Talos, joins Computer Weekly to mark the 35th anniversary of the first ever ransomware attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Dec 2024
Top 10 cyber security stories of 2024
Data breaches, data privacy and protection, and the thorny issue of open source security were all hot topics this year. Meanwhile, security companies frequently found themselves hitting the headlines, and not always for good reasons. Here are Computer Weekly's top 10 cyber security stories of 2024 Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Jul 2015
Symantec bets on simplicity, cloud and mobile
Symantec is not trying to be all things to all people, but is instead focusing on threats and protecting information in the mobile and cloud environments Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Jul 2015
The internet of things could save the honeybee from extinction
Gemalto’s M2M unit is developing an ambitious project with agricultural science firm Eltopia and the University of Minnesota. The objective: to save the honeybee from extinction Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Jul 2015
Wi-Fi enhances guest experience and profitability for Belgian theme park
Bobbejaanland, one of the largest theme parks in Belgium, is using a Fortinet Wi-Fi network to offer visitors access on the go, and improve its management capabilities Continue Reading
By- Xavier Mertens
-
News
29 Jun 2015
Cisco launches IoT System for enterprise and smart cities
Cisco unveils 15 products to address the growing complexity of internet of things deployments Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Jun 2015
Government Digital Service insists Verify safe despite claims of vulnerabilities
An academic paper suggests the Gov.uk Verify system could be used as a spy network, but the Government Digital Service (GDS) insists this is not the case Continue Reading
By- Clare McDonald, Business Editor
- Guide 30 May 2015
-
News
29 May 2015
Google announces security features for Android
Google announces better app permission controls and other Android security changes at its Google I/O developer conference Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 May 2015
Wi-Fi Global Congress: Hotspot 2.0 standard addresses wireless security holes
At Wi-Fi Global Congress, Ruckus Wireless announces it will be first to market with the second release of Hotspot 2.0 Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
05 May 2015
UK election special – who wins the digital vote?
In this week’s Computer Weekly, as the UK goes to the polls in the general election, we take an in-depth look at the political parties’ manifestos for technology, and examine what the IT sector wants from the next government. Our latest buyer’s guide covers collaboration software. And we analyse host identity protocol (HIP), an emerging standard for endpoint security. Read the issue now. Continue Reading
-
Feature
27 Apr 2015
Top tips for remote and mobile workers to improve their cyber security
Steps remote and mobile workers can take to improve cyber security on mobile devices, using public Wi-Fi and computers, and handling USB devices Continue Reading
By- Peter Wood, First Base Technologies LLP
-
Feature
25 Apr 2015
Bill Binney, the ‘original’ NSA whistleblower, on Snowden, 9/11 and illegal surveillance
Always a patriot: Computer Weekly talks to Bill Binney, the senior NSA official who blew the whistle before Edward Snowden Continue Reading
-
News
23 Apr 2015
Mobile malware overhyped, says security company Damballa
Mobile internet users are 1.3 times more likely to get struck by lightning than infected by mobile malware, research by security firm Damballa finds Continue Reading
By- Warwick Ashford, Senior analyst
-
News
14 Apr 2015
Security risk potential linked to young, mobile users
A study conducted by wireless supplier Aruba Networks has identified a distinct cohort of high-risk, security-agnostic workers Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
01 Apr 2015
Mobile device management (MDM) vs backup
MDM tackles the challenge of mobile devices flooding the enterprise, but it doesn’t mean you can stop worrying about mobile data protection Continue Reading
By -
News
26 Mar 2015
Samsung targets business with Microsoft tools integration
Samsung has pre-installed Microsoft OneNote, OneDrive, and Skype on the new Galaxy S6 and Galaxy S6 edge, as it expands into business Continue Reading
By- Cliff Saran, Managing Editor
-
News
13 Mar 2015
Lookout bets on big data analytics to secure enterprise mobiles
Mobile security SaaS provider Lookout is betting on its cloud-based big data analytics capability to attract enterprise customers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Feb 2015
Case study: Norwegian insurer invests in Darktrace machine-learning cyber defence
Shipping insurance company DNK hopes to inspire the rest of the shipping industry to adopt Darktrace’s cyber defence system Continue Reading
-
News
20 Feb 2015
BlackBerry 10.3.1 review: Access Android apps and Blend
BlackBerry has finally released version 10.3.1 of its mobile operating system, which gives access to the Amazon Android app store Continue Reading
By- Cliff Saran, Managing Editor
-
News
06 Feb 2015
Symantec continues cloud investment in spite of poor Q3 results
Symantec has reported third quarter 2015 revenue of $1.64bn, a drop of 4% compared with $1.70bn over the same period in 2014 Continue Reading
By- Cliff Saran, Managing Editor
-
E-Zine
26 Jan 2015
Why we need cyber war games
In this week’s Computer Weekly, the UK and US are starting a cyber war on each other – all in the name of testing each other’s defences. We look at why the cyber war games are needed. We examine what IT managers can learn from the car industry to improve supplier relationship management. And we find out why innovation should be top of the IT agenda in 2015. Read the issue now. Continue Reading
-
News
20 Jan 2015
Younger users prefer biometrics to passwords
Younger bank customers would rather use biometrics than PINs and passwords for security, according to Visa Europe Continue Reading
By- Clare McDonald, Business Editor
-
E-Zine
05 Jan 2015
CW Europe – January 2015 Edition
As we start another new year we look back at what technology has been playing a vital role in keeping Europe safe. Headlines are regularly filled with threats about cyber wars and attacks which, although are important to bring to light, can sometimes overshadow the role technology plays in keeping us safe. Continue Reading
-
News
05 Jan 2015
Hackers can exploit free mobile apps to steal data, study shows
Hackers can access private data by exploiting vulnerabilities mainly in free mobile apps, according to security researchers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
17 Dec 2014
Cabinet Office begins procurement for next stage of Gov.uk Verify
The Cabinet Office has submitted a tender notice for a £150m three-year framework for the provision of identity assurance services Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
Feature
11 Dec 2014
The state of mobile back end as a service
Common mobile application services are increasingly being hosted on central back-end servers – but what does that mean for the enterprise? Continue Reading
By- Janakiram MSV
-
News
04 Dec 2014
Cyber criminals are targeting smartphone supply chains, warn researchers
A new mobile trojan dubbed “DeathRing” is being pre-loaded onto smartphones somewhere in the supply chain, warn researchers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 Nov 2014
CGI secures communications between pilots and air traffic control
Satellite communications firm Inmarsat has outsourced the provision of security IT and services to CGI Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Photo Story
31 Oct 2014
The real story behind The Imitation Game film
The life of Alan Turing is being celebrated on the big screen this month. The Imitation Game from Studio Canal opens on November 14th 2014 and tells the story of the war hero who’s achievements until recently were largely unknown. Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
13 Oct 2014
Embedded SIMs key to unlocking internet of things
GSMA’s eUICC Embedded SIM Specification will help M2M communications and the IoT become mainstream, say analysts Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Oct 2014
Azure CTO Mark Russinovich's top ten public cloud security risks
Microsoft Azure cloud CTO Mark Russinovich identified ten key security risks of public cloud services Continue Reading
By- Archana Venkatraman, Datacentre Editor
-
News
08 Oct 2014
Malware being used to steal cash from ATMs
Criminals are using malware to steal cash from ATMs without debit and credit cards Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
24 Sep 2014
BlackBerry Passport delivers a real keyboard and high-res screen to business
BlackBerry has introduced its Passport smartphone featuring a 4.5in hi-res screen, a qwerty keyboard and 13MP camera Continue Reading
By- Cliff Saran, Managing Editor
-
News
15 Sep 2014
Salesforce issues advice on avoiding Dyreza attack
Salesforce has issued a set of guidelines on tightening security after a number of its customers were targeted by the Dyreza email virus Continue Reading
By- Cliff Saran, Managing Editor
-
News
09 Sep 2014
EY seeks tech startups to address challenges of right to be forgotten
Professional services firm Ernst & Young is looking for startups to find technology solutions to the ‘right to be forgotten’ regulation Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
08 Sep 2014
Ransomware on the rise, warns cyber threat report
The first half of 2014 saw an increase in online attacks that lock up user data and hold it for ransom, reports F-Secure Labs Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Sep 2014
Barclays bank launches biometric authentication
Barclays bank plans to launch biometric readers that read users' finger veins to authenticate customers Continue Reading
By- Clare McDonald, Business Editor
-
Feature
20 Aug 2014
The internet of things is coming: Is your datacentre ready?
Gartner estimates the IoT will see 26 billion units installed by 2020 – channelling huge volumes of data traffic into datacentres Continue Reading
-
Feature
18 Aug 2014
What ingredients go into the successful app store?
An enterprise app store should provide the controlled availability of apps for employees.We look at what is available for organisations to use Continue Reading
By- Bernt Ostergaard , Quocirca
-
News
11 Aug 2014
USB-connected devices present cyber vulnerabilities
Connecting devices to computers using a USB port could lead to security breaches, say Berlin-based researchers Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
05 Aug 2014
Cyber Security Challenge UK takes on the internet of things
The latest level of the Cyber Security Challenge will involve participants hacking devices connected to the internet of things Continue Reading
By- Clare McDonald, Business Editor
-
E-Zine
04 Aug 2014
Driving virtualisation into pole position in Formula One
In this week’s Computer Weekly, we find out how the Caterham F1 team has used virtualisation in its trackside technology to help improve race performance. We analyse how growing competition in the cloud market is affecting Amazon Web Services’ dominant position. And we look at silicon photonics, an emerging datacentre technology that promises better connectivity and reduced complexity. Read the issue now. Continue Reading
-
E-Zine
28 Jul 2014
Going mobile in financial services
In this week’s Computer Weekly, in a highly-regulated sector such as financial services, enabling staff mobility is a challenge – we hear from IT leaders that have made it work. We ask why small businesses are so poorly prepared for cyber attacks. And we examine the key storage technologies in the Openstack cloud platform. Read the issue now. Continue Reading
-
E-Zine
21 Jul 2014
Time to get serious about endpoint security
In this week’s Computer Weekly, with billions of devices joining corporate networks every year, our latest buyer’s guide looks at endpoint security. IBM and Apple have announced plans to work together on corporate mobility – we analyse what the deal means for IT leaders. And we take an in-depth look at in-memory databases. Read the issue now. Continue Reading
-
News
16 Jul 2014
IBM partners with Apple to deliver enterprise services for iOS
IBM has given Apple a major boost in the enterprise, through a partnership that will see it provide services and software for iOS Continue Reading
By- Cliff Saran, Managing Editor
-
Feature
14 Jul 2014
A guide to smart home automation
Unless it is a new build, the challenge in creating a smart home is that technology must work irrespective of the age of the property Continue Reading
By- Cliff Saran, Managing Editor
-
Feature
07 Jul 2014
The pros and cons of iPads in the enterprise
The iPad is often the first platform for which developers produce apps – but it is substantially more expensive than its competitors Continue Reading
By- JP Gownder
-
News
04 Jul 2014
Barclays passes government’s ‘internet-born threat’ test
Barclays Bank has been awarded the government’s cyber security certificate for digital banking services after independent tests of services such as Pingit Continue Reading
-
News
03 Jul 2014
Netflix releases its AWS monitoring tool Security Monkey into the wild
Netflix has made Security Monkey, the AWS tracker tool it built for itself, freely available to other Amazon cloud users Continue Reading
By- Archana Venkatraman, Datacentre Editor
-
News
03 Jul 2014
Facebook apologises over psychological experiments
Facebook has apologised over the controversial psychological experiments carried out on 689,000 users without their consent in 2012 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Jun 2014
IT departments unprepared for internet of things
Only 41% of IT professionals are working on projects to prepare their business for the internet of things Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
27 May 2014
Android Outlook app has privacy issues, warn researchers
Microsoft’s Outlook.com app for Android is exposing users' data, warn security researchers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 May 2014
Shell thinks technology first in preparation for internet of everything
Shell is reshaping its business to think technology first as it uses the internet of everything to change its business processes Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
Feature
14 Mar 2014
Hacktivism: good or evil?
IT lawyer Dai Davis looks at the rise of hacktivism and its impact on business and international politics Continue Reading
By- Dai Davis, Percy Crow Davis & Co
-
News
10 Mar 2014
Dark web key enabler for cyber criminals, say McAfee researchers
The dark web is a key conduit for the malware industry to refine and distribute its products and services, say security researchers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Mar 2014
IT Security Salary Index (UK)
Are you being paid the right rate for the job? Check out this IT Security salary index from Acumin. Continue Reading
-
Photo Story
18 Feb 2014
UK IT spending to outpace rest of Europe in 2014
Computer Weekly research reveals the IT spending priorities for UK and European organisations in 2014. Continue Reading
By- Bill Goodwin, Computer Weekly
-
Opinion
17 Feb 2014
Should you allow a bring your own device policy?
Employers are realising there are challenges presented by BYOD which, if not dealt with, could have a serious impact on the business Continue Reading
By- Sarah Burke
-
News
05 Feb 2014
Bank of England publishes Waking Shark II cyber security exercise results
Bank of England publishes the results of its Waking Shark II security exercise, which tested financial institutions' contingency plans for cyber attack Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
Feature
04 Feb 2014
Create a mobile policy employees can trust
With Gartner predicting a fifth of all enterprise BYOD projects would fail by 2016, we look at how businesses can embrace mobility successfully Continue Reading
By- Sean McGrath, Senior reporter
-
News
17 Jan 2014
Internet at risk of 'cybergeddon' says WEF
Internet is at risk of fragmenting amid concerns over spying and cyber crime, says World Economic Forum Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
16 Jan 2014
Microsoft extends XP security updates by 15 months
Microsoft has caved in to user concerns over XP end of support and will now extend security updates by another 15 months Continue Reading
By- Cliff Saran, Managing Editor
-
News
14 Jan 2014
Top European IT initiative to support business in 2014?
Expanding IT to support business growth is one of the biggest areas of focus for IT departments in 2014, so what does this mean? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Jan 2014
More than 1,100 DWP workers disciplined over benefits snooping
More than 1,100 employees at the Department for Work and Pensions have received official warnings since 2008 for prying into benefits records Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
10 Jan 2014
Security considerations for UK enterprises
This Research Snapshot from Vanson Bourne looks at IT security spending trends, awareness of cyber-threats, and the factors perceived as the biggest security risks for organisations. Continue Reading
-
News
03 Jan 2014
FireEye acquires Mandiant in $1bn deal
Security firm FireEye has bought Mandiant in a deal worth just over $1bn Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Dec 2013
Bank robberies down 90% thanks to technology, says report
Robberies at British banks have fallen by over 90% in two decades, according to a report by the British Bankers’ Association Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
E-Zine
16 Dec 2013
Can BlackBerry restore its business appeal?
In this week’s issue of Computer Weekly, we examine whether former Sybase chief, John Chen, will be able to stem the decline of BlackBerry and reinvent the the smartphone maker as a software business for the “bring your own device” (BYOD) era. Our buyer’s guide to the internet of things concludes with a look at how universal connectivity will yield insights in fields as diverse as aviation and hospitality. And we analyse Google’s attempts to compete with Amazon Web Services in public cloud. Continue Reading
-
News
11 Dec 2013
Research reveals widespread mobile app hacking
The top 100 paid Android apps and 56% of the top 100 paid Apple iOS apps have been hacked, research has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Nov 2013
European Parliament closes Wi-Fi after man-in-the-middle attack
A number of mailboxes have been compromised and users’ smartphones could be at risk following a man-in-the-middle attack on the European Parliament’s public Wi-Fi Continue Reading
By- Jennifer Scott, TechTarget
-
News
26 Nov 2013
White hat Wi-Fi hacking shows vulnerability of business data
Whitehat hackers have shown that senstitive data can be sniffed easily from public Wi-Fi hotspots Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Nov 2013
Report highlights poor UK attitudes to mobile security
Businesses should note that many UK mobile users do not take security precautions and do not know how to guard against data theft Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Nov 2013
Global profiles of the fraudster
Computers, rather than conmen, are set to be the future face of fraud, as criminals turn to robotics in an effort to avoid detection, this report from KPMG reveals. Continue Reading
-
News
17 Oct 2013
Government overhauls security classification to fit digital age
In its first overhaul since World War II the government is consolidating six security bands to three with a system deemed more appropriate in the digital age. Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
17 Oct 2013
Dexter payment card malware variant hits South Africa
The Dexter payment card skimming malware discovered last year has resurfaced in South Africa, resulting in millions of pounds lost to fraud Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 Oct 2013
The ICO issues BYOD warning after breach
The ICO is calling on organisations to ensure data protection policies reflect how employees are using personal devices for work Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Sep 2013
MoD announces specialist programme to fend off cyber attacks
The Ministry of Defence (MoD) has announced a strategy to defend UK national security from the threat of cyber attacks Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
26 Sep 2013
Small businesses must encrypt customer data, says ICO
The Information Commissioner’s Office (ICO) urges small businesses to encrypt customer data after a sole trader was fined for failing to do so Continue Reading
-
News
06 Sep 2013
NSA and GCHQ unlock online privacy encryption
UK and US intelligence agencies have unlocked the technology used to encrypt online services, including email, online banking and medical records. Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
05 Sep 2013
Windows 2012 Server Network Security
This book chapter offers an introduction to Windows 8 and Windows Server 2012 network security and IPv6. It includes a 30% discount code for Computer Weekly readers. Continue Reading
-
News
05 Sep 2013
Windows Server 2012 Security from End to Edge and Beyond
This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask. Continue Reading
-
News
05 Sep 2013
Printing: a false sense of security?
Louella Fernandes and Bob Tarzey show how secure printing technology can provide authentication, authorisation and accounting capabilities, helping businesses improve document security and meet compliance regulations. Continue Reading
-
News
21 Aug 2013
Case study: Keeping it private at Beth Israel Deaconess after the Boston Marathon Attacks
Doctor and healthcare CIO shares his lessons learned from the Boston Marathon attacks and how to protect patient data Continue Reading
By- Kayleigh Bateman, Computer Weekly
-
News
20 Aug 2013
Targeted attacks and how to defend against them
Analysts Bob Tarzey and Louella Fernandes assess the scale and real impact of targeted attacks the measures being taken to defend against them. Continue Reading
-
Feature
19 Aug 2013
Top 10 Android security tips
As Android becomes more prevalent in the enterprise, Computer Weekly gives you 10 top tips for keeping your devices secure Continue Reading
By- Paul Marchant
-
Opinion
13 Aug 2013
The dangers of internet cafés
Businesses need clear computer use policies and need to ensure staff are properly trained in data protection, writes Garry Mackay Continue Reading
By- Garry Mackay
-
Feature
30 Jul 2013
Big data journalism exposes offshore tax dodgers
How journalists harnessed big data to challenge offshore financial secrecy Continue Reading
By- Duncan Campbell and Craig Shaw
-
News
19 Jul 2013
IT security case studies
Four critical IT security case-studies selected from the winners of Computer Weekly's European User Awards for security Continue Reading
-
News
18 Jul 2013
Needle in a Datastack: The rise of big security data
This research from McAfee investigates how well organisations are positioned to address the challenges of managing security in a world of ever increasing amounts and types of data. Continue Reading
-
News
17 Jul 2013
IT Security Case Studies
Warwick Ashford presents 4 essential IT security case-studies selected from the winners of Computer Weekly's European User Awards. Continue Reading
-
News
04 Jul 2013
FBI warns of increased spear phishing attacks
The FBI has issued a warning about an increase in spear-phishing attacks targeting multiple industry sectors Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Jun 2013
BES extends MDM to Android and iPhones
Aiming to rekindle interest in the Blackberry Enterprise Server (BES), Blackberry has extended the platform to support Android and iOS Continue Reading
By- Cliff Saran, Managing Editor
-
News
10 Jun 2013
Telefonica Digital forms security group Eleven Paths
The business division of mobile operator Telefonica launches Eleven Paths, an independent company working on security issues in the workplace Continue Reading
By- Jennifer Scott, TechTarget
-
News
03 Jun 2013
Information Governance
This research from AIIM looks at the risk profile around electronic records, the keep-all versus delete-all options, e-discovery, and the implications of social, mobile and cloud on risk management policies. Continue Reading
-
News
07 May 2013
Symantec helps NHS trust cut security costs by a quarter
The Royal Liverpool and Broadgreen University Hospitals NHS Trust cut security costs by 25% in its partnership with security supplier Symantec Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 May 2013
CW buyer's guide: context-aware security
This 11-page Computer Weekly buyer's guide looks at how organisations should approach context-aware security technologies and what business benefits they can deliver. Continue Reading
-
News
01 May 2013
CW Special Report on CSC
This 16-page report from Computer Weekly analyses the challenges facing CSC, its financial performance, the services it offers, its place in the IT market and its future strategy. Continue Reading
-
News
25 Apr 2013
Spam SMS messages drop following ICO penalty
The number of spam SMS messages has significantly reduced since government regulator ICO issued £440,000 fines last year Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
Feature
22 Apr 2013
The internet of things is set to change security priorities
IT leaders must protect against the security risks introduced by the growing interaction between technology and the physical world. Continue Reading
By- Andrew Rose
-
News
19 Apr 2013
Conficker makes way for web-based attacks, says Microsoft
Web attacks emerge as top threat as businesses finally begin to win the battle against Conficker and other worms, says Microsoft Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Apr 2013
Bots and web apps among top threats to data security, says Check Point
Bots, viruses, breaches and attacks are a constant and real threat to the information security of organisations Continue Reading
By- Warwick Ashford, Senior analyst