IT for charity organisations
Charities have to operate at the lowest cost possible, and that includes the way they use IT. IT managers in the third sector have learned how to deploy cost-effective technology to support the critical work that charities and voluntary organisations do, and their experiences can offer relevant case studies for IT managers in other sectors.
-
News
19 Dec 2024
LockBit ransomware gang teases February 2025 return
An individual associated with the LockBit ransomware gang has broken cover to tease details of a new phase of the cyber criminal operation's activity, which they claim is set to begin in February 2025 Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Dec 2024
Latest attempt to override UK’s outdated hacking law stalls
Amendments to the Data Bill that would have given the UK cyber industry a boost by updating restrictive elements of the Computer Misuse Act have failed to progress beyond a Lords committee Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Jul 2024
CrowdStrike says most Falcon sensors now up and running
The vast majority of CrowdStrike Falcon sensors affected by a coding error have now been recovered, with a final resolution expected this week Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
26 Jul 2024
Mastering data privacy in the age of AI
AI continues to revolutionise how organisations operate, using vast amounts of personal data to make smart, informed decisions. However, this incredible potential comes with concerns about data privacy. DQM GRC's Mark James explores the issues. Continue Reading
By- Mark James
-
Opinion
26 Jul 2024
Cyber crisis? How good PR can save your brand
Cyber attacks and data breaches can happen to anybody and often bring reputational damage and a loss of customer trust. How organisations publicly respond to such incidents can make or break them, and the importance of a good PR strategy cannot be underestimated Continue Reading
By- Ed Coram-James
-
Opinion
26 Jul 2024
Cloud security challenges not just technological
The Computer Weekly Security Think Tank considers how CISOs and security practitioners should ensure that the business can make use of public cloud services safely and securely and avoid accidental or deliberate data leakage. Continue Reading
By- Temi Akinlade
-
News
24 Jul 2024
CrowdStrike blames outage on content configuration update
CrowdStrike publishes the preliminary findings of what will be a lengthy investigation into the root causes of the failed 19 July update that caused Windows computers to crash all over the world Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Jul 2024
Mimecast to buy insider threat specialist Code42
Mimecast is to buy fellow human-centred risk experts Code42 for an undisclosed sum to take advantage of its insider threat and data loss protection specialisms Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Jul 2024
NCSC: Beware of criminal CrowdStrike opportunists
Financially motivated cyber criminals are already conducting opportunistic attacks on organisations that leverage the CrowdStrike incident, and more targeted attacks are sure to follow Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Jul 2024
CrowdStrike chaos shows risks of concentrated ‘big IT’
The concentration of so much mission-critical technology in the hands of a few large suppliers makes incidents like the Microsoft-CrowdStrike outage all the more dangerous Continue Reading
By- Alex Scroxton, Security Editor
-
News
17 Jul 2024
UK Cyber Bill teases mandatory ransomware reporting
In the Cyber Security and Resilience Bill introduced in the King's Speech, the UK's new government pledges to give regulators more teeth to ensure compliance with security best practice and to mandate incident reporting Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Jul 2024
Dutch research firm TNO pictures the SOC of the future
In only a few years, security operations centres will have a different design and layout, and far fewer will remain Continue Reading
By- Kim Loohius
-
News
09 Jul 2024
Hyper-V zero-day stands out on a busy Patch Tuesday
Microsoft has fixed almost 140 vulnerabilities in its latest monthly update, with a Hyper-V zero-day singled out for urgent attention Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Jul 2024
Chinese spies target vulnerable home office kit to run cyber attacks
China’s APT40 is ramping up targeting of victims using vulnerable small and home office networking kit as command and control infrastructure, according to an international alert Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Jul 2024
Room to grow in UK for Tata Consultancy Services after half a century
Indian-headquartered IT giant has built a large UK footprint as part of its global network, a commitment which is helping it increase its business in the UK’s public sector Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
03 Jul 2024
NCA’s Operation Morpheus targets illicit Cobalt Strike use
International law enforcement operation targets cyber criminals using the Cobalt Strike penetration testing framework for dodgy purposes Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
02 Jul 2024
Security Think Tank: Securing today's ubiquitous cloud environment
The Computer Weekly Security Think Tank considers how CISOs and security practitioners should ensure that the business can make use of public cloud services safely and securely and avoid accidental or deliberate data leakage Continue Reading
By- Kashil JagmohanSingh
-
News
27 Jun 2024
UKtech50 2024: The most influential people in UK technology
Computer Weekly has announced the 14th annual UKtech50 – our definitive list of the movers and shakers in the UK tech sector Continue Reading
By -
Opinion
24 Jun 2024
AI and outsourcing: What’s the future for relationships and contracts? (Part two)
In the second part of this two-part series, two technology lawyers offer guidance on what the integration of artificial intelligence in IT outsourcing and business process outsourcing will mean for customers and providers in outsourcing relationships and contracts Continue Reading
By- Marl Lewis and Simon Bollans
-
Opinion
17 Jun 2024
Cloud security: Finding the right provider to protect your data
This month, the Computer Weekly Security Think Tank considers how CISOs and security practitioners should ensure that the business can make use of public cloud services safely and securely and avoid accidental or deliberate data leakage. Continue Reading
By- Stephen McDermid
-
News
13 Jun 2024
Black Basta ransomware crew may be exploiting Microsoft zero-day
A Microsoft vulnerability that was addressed without fanfare in March may in fact have been exploited as a zero-day by the notorious Black Basta ransomware gang, threat hunters warn Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
13 Jun 2024
Data leakage in the cloud – can data truly be safe in the cloud?
This month, the Computer Weekly Security Think Tank considers how CISOs and security practitioners should ensure that the business can make use of public cloud services safely and securely and avoid accidental or deliberate data leakage. Continue Reading
By- Scott Swalling
-
News
13 Jun 2024
Q&A: Adalbjorn Thorolfsson on IT project management in Iceland
With a small, but very sophisticated population, Iceland has unique ways of keeping up with the rest of the world in the IT sector. Adalbjorn Thorolfsson, president of the Icelandic Project Management Association, describes some lessons for the rest of the world Continue Reading
By- Pat Brans, Pat Brans Associates/Grenoble Ecole de Management
-
Opinion
12 Jun 2024
How to ensure public cloud services are used safely and securely
This month, the Computer Weekly Security Think Tank considers how CISOs and security practitioners should ensure that the business can make use of public cloud services safely and securely and avoid accidental or deliberate data leakage. Continue Reading
By- Beji Jacob
-
Opinion
11 Jun 2024
True cloud security requires in-depth understanding
This month, the Computer Weekly Security Think Tank considers how CISOs and security practitioners should ensure that the business can make use of public cloud services safely and securely and avoid accidental or deliberate data leakage. Continue Reading
By- Elliott Wilkes
-
News
11 Jun 2024
Pure Storage hit by Snowflake credential hackers
Pure Storage emerges as the latest victim of a fast-spreading breach of Snowflake customers targeting users with lax credential security measures in place Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Jun 2024
More than 160 Snowflake customers hit in targeted data theft spree
Mandiant reports that more than 160 Snowflake customers have been hit in a broad data theft and extortion campaign targeting organisations that have failed to pay proper attention to securing valuable credentials Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
04 Jun 2024
Security Think Tank: The cloud just got more complicated
This month, the Computer Weekly Security Think Tank considers how CISOs and security practitioners should ensure that the business can make use of public cloud services safely and securely and avoid accidental or deliberate data leakage. Continue Reading
By- Rob Dartnall, SecAlliance
-
News
04 Jun 2024
Invasive tracking ‘endemic’ on sensitive support websites
Websites set up by police, charities and universities to help people get support for sensitive issues like addiction and sexual harassment are deploying tracking technologies that harvest information without proper consent Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
03 Jun 2024
97 FTSE 100 firms exposed to supply chain breaches
Between March 2023 and March 2024, 97 out of 100 companies on the UK’s FTSE 100 list were put at risk of compromise following supply chain breaches at third-party suppliers Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Jun 2024
Uktech50 2024: The longlist of the UK’s influential tech leaders
UKtech50 received a record-breaking 434 nominations for the 2024 list. Unfortunately, there wasn’t space for everyone in the top 50, and as you can see for yourself in this year’s longlist, it was a difficult decision for the judges Continue Reading
By -
News
29 May 2024
Organisations value digital trust, but aren’t working at it
Three quarters of organisations believe digital trust is relevant to their businesses, yet clear gaps in strategies still seem to persist Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 May 2024
Executive Interview: Why Dell wants to be your one-stop AI shop
At Dell Technologies World in Las Vegas, artificial intelligence was the talk of the town as Dell staked out an all-encompassing strategy ahead of an anticipated goldrush. Dell’s Nick Brackney explains why the tech giant believes it's onto a winner Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 May 2024
UKtech50 2024: Vote for the most influential person in UK IT
Our judges have selected the top 50 leaders from a shortlist of more than 400 people – now it’s your chance to tell us who you think is the most influential person in UK technology Continue Reading
By -
News
15 May 2024
Critical SharePoint, Qakbot-linked flaws focus of May Patch Tuesday
A critical SharePoint vulnerability warrants attention this month, but it is another flaw that seems to be linked to the infamous Qakbot malware that is drawing attention Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 May 2024
CyberUK 24: UK insurance industry gets tough on ransomware
Three of the UK’s largest insurance associations have signed on to a new initiative spearheaded by the NCSC to try to bring down the number of ransomware payments being made Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
13 May 2024
The UK may not have a choice on a ransomware payment ban
In the wake of renewed calls for lawmakers to consider enacting legal bans on ransomware payments, the Computer Weekly Security Think Tank weighs in to share their thoughts on how to tackle the scourge for good. Continue Reading
By- Ian Thornton-Trump
-
News
09 May 2024
Cyber attack victims need to speak up, says ICO
The Information Commissioner’s Office is urging organisations to be transparent and learn from each other’s mistakes as it reveals most of the cyber attacks it responds to stem from the same core errors Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
09 May 2024
Enhance identity controls before banning ransomware payments
In the wake of renewed calls for lawmakers to consider enacting legal bans on ransomware payments, the Computer Weekly Security Think Tank weighs in to share their thoughts on how to tackle the scourge for good. Continue Reading
By- Stephen McDermid
-
Feature
07 May 2024
What does the Data Protection and Digital Information Bill mean for UK industry?
The Data Protection and Digital Information Bill is the first shift in the UK’s data protection regime since leaving the EU, but what could it mean for UK industry? Continue Reading
-
News
01 May 2024
EMEA CISOs must address human factors behind cyber incidents
The 17th annual Verizon report on data breaches makes for sobering reading for security pros, urging them to do more to address the human factors involved in cyber incidents, and highlighting ongoing issues with zero-day patching Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
01 May 2024
Better hygiene may mitigate the need to ban ransomware payments
In the wake of renewed calls for lawmakers to consider enacting legal bans on ransomware payments, the Computer Weekly Security Think Tank weighs in to share their thoughts on how to tackle the scourge for good. Continue Reading
By- Becky Gelder, Turnkey Consulting
-
News
30 Apr 2024
Persistent data breaches deny people with HIV dignity and privacy
The ICO has urged charities and healthcare organisations that work with people living with HIV to do better when it comes to protecting their personal data, after the HIV status of more than 100 people was accidentally disclosed by London’s Central YMCA Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
29 Apr 2024
Ransomware payment bans need universal buy-in
In the wake of renewed calls for lawmakers to consider enacting legal bans on ransomware payments, the Computer Weekly Security Think Tank weighs in to share their thoughts on how to tackle the scourge for good. Continue Reading
By- Jack Chapman
-
Opinion
26 Apr 2024
Security Think Tank: Maybe let's negotiate with terrorists
In the wake of renewed calls for lawmakers to consider enacting legal bans on ransomware payments, the Computer Weekly Security Think Tank weighs in to share their thoughts on how to tackle the scourge for good. Continue Reading
By- Mark Cunningham Dickie
-
Opinion
23 Apr 2024
Security Think Tank: Cyber sector, you have failed this community
In the wake of renewed calls for lawmakers to consider enacting legal bans on ransomware payments, the Computer Weekly Security Think Tank weighs in to share their thoughts on how to tackle the scourge for good. Continue Reading
By- Allan Liska
-
Feature
23 Apr 2024
Five reasons why – and when – cloud storage is the answer
We look at when cloud storage can be the best choice, with considerations that include performance, scalability and agility, cost, management simplicity, and security and resilience Continue Reading
-
Feature
22 Apr 2024
Securing the edge: A new battleground in mobile network security
Edge computing is transforming approaches to mobile network infrastructure, but failure to secure it can expose networks and data to cyber threats. Learn more about the dangers and potential solutions Continue Reading
By -
Feature
22 Apr 2024
Austrian AI: from academia to commercial success and beyond
Austria has established itself as a European frontrunner when it comes to artificial intelligence exploration and, importantly, deployment Continue Reading
-
News
22 Apr 2024
IT leaders hiring CISOs aplenty, but don’t fully understand the role
Most businesses now have a CISO, but perceptions of what CISOs are supposed to do, and confusion over the value they offer, may be holding back harmonious relations, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
18 Apr 2024
Security Think Tank: Approaches to ransomware need a course correction
In the wake of renewed calls for lawmakers to consider enacting legal bans on ransomware payments, the Computer Weekly Security Think Tank weighs in to share their thoughts on how to tackle the scourge for good. Continue Reading
-
News
16 Apr 2024
CISOs not yet convinced to invest in AI
CISOs say their eyes are fixed firmly on threats like ransomware and supply chain attacks, and while AI is becoming a threat that needs to be dealt with, it’s not yet an immediate spending priority Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
15 Apr 2024
Threat actors look to stolen credentials
In 2023, threat actors wrought havoc on corporate networks by logging in through valid accounts, and as bad actors begin investing in AI to help them identify priority targets, this problem is only expected to worsen in the future Continue Reading
By- Martin Borrett
-
News
12 Apr 2024
Apple iPhone security alert renews spyware concerns
An Apple security alert received by users in 92 countries raises fresh fears over ongoing campaigns by users of mercenary spyware products Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Apr 2024
UK plc failing on multiple cyber measures
Government report shows 50% of businesses and 32% of charities reported a cyber attack or breach in the past 12 months and organisations across the UK are failing on multiple cyber measures Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Apr 2024
UKtech50 2024 – help us find the most influential people in UK IT
Computer Weekly’s annual search for the 50 most influential people in UK IT is on – let us know who you would like to nominate for this year's list Continue Reading
By -
Opinion
03 Apr 2024
Security Think Tank: Banning ransomware payments is not so straightforward
In the wake of renewed calls for lawmakers to consider enacting legal bans on ransomware payments, the Computer Weekly Security Think Tank weighs in to share their thoughts on how to tackle the scourge for good. Continue Reading
By- John Scott
-
News
03 Apr 2024
RDP abused in over 90% of cyber attacks, Sophos finds
Threat actors continue to see great success using simple, tried and tested methods, and many defenders are failing to do the basics Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
02 Apr 2024
Security Think Tank: How to tackle the scourge of ransomware?
In the wake of renewed calls for lawmakers to consider enacting legal bans on ransomware payments, the Computer Weekly Security Think Tank weighs in to share their thoughts on how to tackle the scourge for good. Continue Reading
By- Toby Sibley and Louise Barber
-
Opinion
01 Apr 2024
Security Think Tank: Ransomware lessons from the armed forces
In the wake of renewed calls for lawmakers to consider enacting legal bans on ransomware payments, the Computer Weekly Security Think Tank weighs in to share their thoughts on how to tackle the scourge for good. Continue Reading
By- Rob Dartnall, SecAlliance
-
News
27 Mar 2024
Cyber spies, not cyber criminals, behind most zero-day exploitation
Analysis from Google has found that zero-day vulnerabilities are much more heavily exploited for espionage purposes than for financially motivated cyber crime Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Mar 2024
Qilin ransomware gang claims cyber attack on the Big Issue
A ransomware attack on the systems of publisher and social enterprise Big Issue Group has been claimed by the Qilin gang Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Mar 2024
Shareholders win when businesses do better at cyber
The more advanced a company’s cyber security performance, and the more engaged its board is with security issues, the greater the return for shareholders, a report has found Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Mar 2024
NCSC guidance to help CEOs work through cyber incidents
The NCSC has published in-depth guidance on how business leaders should respond to a cyber attack or data breach. Learn about some of the key steps you will need to follow Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Mar 2024
UK’s cyber resilience stagnates as more fall victim to attacks
The government is calling on businesses to ramp up their cyber protections as study shows improvements to resilience are stagnating amid an ever-growing volume of attacks Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Mar 2024
The Security Interviews: Alex Yampolskiy, SecurityScorecard
Alex Yampolskiy conceived the idea for risk management specialist SecurityScorecard after getting stung by a SaaS supplier that was being cavalier with its customer data. He tells his story to Computer Weekly Continue Reading
By- Alex Scroxton, Security Editor
-
News
17 Mar 2024
UK’s AI ambitions pointless while cyber security is still neglected
The UK’s AI ambitions may be at considerable risk without stronger cyber defences across the private and public sectors Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Mar 2024
Microsoft AI-powered cyber service to go live in April
After a year being previewed by beta customers, Microsoft’s much vaunted Copilot for Security service is about to go on general release, promising time savings and improved accuracy for hard-pressed security pros Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Mar 2024
March Patch Tuesday throws up two critical Hyper-V flaws
Two critical vulnerabilities in Windows Hyper-V stand out on an otherwise unremarkable Patch Tuesday Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Mar 2024
Interview: How a fundraiser became more data-savvy
We speak to a fundraiser in the charity sector about how an apprenticeship in data analytics has given her Excel, PowerBI and Power Query skills Continue Reading
By- Cliff Saran, Managing Editor
-
News
05 Mar 2024
Banning ransomware payments back on the agenda
The idea of banning ransomware payments to cyber criminals is back on the agenda, with former NCSC chief Ciaran Martin arguing that tougher measures need to be taken Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
01 Mar 2024
Ivanti vulnerabilities explained: Everything you need to know
A series of vulnerabilities in Ivanti products have caused concern worldwide. Delve into some of the key issues arising from the Ivanti disclosures, looking at the vulnerabilities and their impact, what affected users should do, and learn about new developments Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Feb 2024
75% of third-party breaches target software, IT supply chains
Data drawn from SecurityScorecard’s telemetry reveals how supply chain breaches are becoming a weapon of choice for threat actors Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Feb 2024
Users love their cyber teams, but find them frustrating
Despite strong support for security teams, a good number of ordinary workers see them as obstructive to business goals, and would like to see them operate more transparently Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Feb 2024
Black Basta and Bl00dy ransomware gangs exploiting ConnectWise vulns
More ransomware gangs have been observed exploiting two dangerous vulnerabilities in ConnectWise ScreenConnect software, prompting new warnings for users to get patching Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Feb 2024
VulnCheck bug listing to help track new threats quicker
Exploit intelligence firm VulnCheck launches a proprietary Known Exploited Vulnerabilities catalogue in hopes of improving end-user access to intel on emerging threats and reaching those that the likes of CISA do not Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Feb 2024
Majority of UK employees ‘willingly gamble’ with security
Human-centric threats originating from employees continue to damage organisations both financially and reputationally, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Feb 2024
ConnectWise users see cyber attacks surge, including ransomware
ConnectWise ScreenConnect users who have yet to patch against a critical vulnerability are now being targeted by a barrage of cyber attacks, including ransomware Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
22 Feb 2024
How can we adapt work practices to protect CISO mental health?
Cyber leaders are finding it harder to keep up with security requirements than just two years ago, risking a domino effect of dissatisfaction, burnout and eventually, resignation Continue Reading
By- Mick Baccio
-
News
21 Feb 2024
CVE volumes set to increase 25% this year
The number of reported Common Vulnerabilities and Exposures is likely to grow significantly in 2024, hitting a new high of almost 35,000, according to Coalition, a cyber insurance specialist Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Feb 2024
Microsoft patches two zero-days for Valentine’s Day
Two security feature bypasses impacting Microsoft SmartScreen are on the February Patch Tuesday docket, among more than 70 issues Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Feb 2024
Hunter-killer malware volumes seen surging
Latest Picus Security report on malware tactics, techniques and procedures reveals an increasing focus on disabling security defences Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
07 Feb 2024
Security Think Tank: The phishing forecast for 2024
Egress' Jack Chapman and James Dyer explore how phishing attacks are set to grow in their scope and sophistication this year, with generative AI playing a big role Continue Reading
By- Jack Chapman and James Dyer
-
News
06 Feb 2024
UK’s McPartland Cyber Review to probe trust in technology
The UK government has launched a cyber security review that will investigate how best to give businesses the confidence they need to use new technologies Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Feb 2024
Blackbaud blasted for failing to prevent customer breaches
A supply chain attack at software supplier Blackbaud in 2020 saw data on multiple UK organisations compromised. The US authorities are now taking steps to ensure it can’t happen again Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Jan 2024
Bugcrowd sees surge in vulnerability submissions, led by public sector
Crowdsourced vulnerability disclosure and bug bounty platform Bugcrowd says it saw a 151% uptick in submissions related to government and public sector organisations in 2023 Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Jan 2024
WebKit vulnerability sparks Apple’s first major security update of 2024
A zero-day in the open source WebKit browser engine that powers Safari has sparked Apple’s first major patch roll-out of the new year Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Jan 2024
AI will heighten global ransomware threat, says NCSC
The benefits of artificial intelligence to cyber criminals being well-known, the NCSC now assesses it’s likely AI will soon be widely used to enhance ransomware attacks Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Jan 2024
Treat cyber risk like financial or legal issue, says UK government
UK government and NCSC launch proposed code of practice on cyber security governance to help directors and business leaders toughen their defences Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Jan 2024
Leak of 26 billion records may prove to be ‘mother of all breaches’
The discovery of a dataset comprising 26 billion stolen records may prove to be record-breaking in both its size and the danger it poses to ordinary people Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
17 Jan 2024
Biometric revolution in IAM: The future of authentication
The IAM landscape is experiencing profound change thanks to the advent of biometrics. Learn about the latest advantages and key benefits of biometrics in identity Continue Reading
By -
Opinion
16 Jan 2024
The human toll of ransomware: how IT pros suffer during incidents
Any ransomware attack causes significant challenges for a business or organisation going through such incident. But ransomware attacks also have tremendous impact on the staff – especially IT teams – working on mitigating the attack’s effect Continue Reading
By- Pia Hüsch, Jamie MacColl and Gareth Mott
-
News
11 Jan 2024
Cisco fixes high-impact flaw in unified comms platform
Cisco unified comms customers are urged to patch a critical vulnerability in Unity Connection, a messaging and voicemail product Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Jan 2024
Windows Kerberos, Hyper-V vulns among January Patch Tuesday bugs
Microsoft starts 2024 right with another slimline Patch Tuesday drop, but there are some critical vulns to be alert to, including a number of man-in-the-middle attack vectors Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Jan 2024
Babuk Tortilla ransomware decryptor made available
A joint effort between Cisco Talos, Avast and the Dutch police will bring relief to many victims of a variant of the Babuk ransomware known as Tortilla Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Jan 2024
Artificial intelligence to the front in Sweden’s National Technology Strategy
Sweden focuses in on artificial intelligence in its latest far-reaching national IT strategy Continue Reading
By- Gerard O'Dwyer
-
Feature
28 Dec 2023
Decoding zero trust in endpoint security: A practical guide for CISOs
The exponential increase in endpoints has vastly expanded the average organisation’s attack surface – address this by applying zero-trust best practice to endpoints Continue Reading
By -
News
21 Dec 2023
Top 10 cyber crime stories of 2023
Ransomware gangs dominated the cyber criminal underworld in 2023, a year that will prove notable for significant evolutionary trends in their tactics Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
20 Dec 2023
Beyond the office walls: Safeguarding remote workers from attack
Remote working has enabled people to work from almost anywhere but has piled pressure on cyber pros. Three years after Covid, how are best practices evolving and what can we expect going forward? Continue Reading
By- Paul Lewis, Nominet
-
Opinion
20 Dec 2023
Zero-trust principles: Your gateway to securing remote workers
Remote working has enabled people to work from almost anywhere but has piled pressure on cyber pros. Three years after Covid, how are best practices evolving and what can we expect going forward? Continue Reading
By- Michael Healey, Turnkey Consulting
-
Opinion
20 Dec 2023
Evolving best practice: What next for securing remote work?
Remote working has enabled people to work from almost anywhere but has piled pressure on cyber pros. Three years after Covid, how are best practices evolving and what can we expect going forward? Continue Reading
By- Scott Burman
-
News
20 Dec 2023
ALPHV/BlackCat operation down, but maybe not out
Multinational law enforcement has targeted the operations of the notorious ALPHV/BlackCat cyber extortion gang, but the group’s members appear to remain defiant Continue Reading
By- Alex Scroxton, Security Editor