IT risk management
Risk management is an increasingly important discipline for IT leaders, with regulatory compliance an ever-present consideration and the amount of legislation and regulation concerning data security on the rise. We examine the issues around IT risk management and the best practices that IT managers need to know.
-
News
20 Nov 2024
Government issues strategic priorities for online safety regulator Ofcom
Technology secretary Peter Kyle sets out the government’s strategic priorities for how Ofcom should approach regulating online safety, including embedding safety by design and supporting innovation in technologies to help protect people online Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
19 Nov 2024
AI readiness stalls in APAC
Despite significant investment in AI, only 15% of organisations in Asia-Pacific are ready to deploy the technology today, according to Cisco’s latest regional AI readiness survey Continue Reading
-
News
28 Sep 2017
WannaCry an example of pseudo-ransomware, says McAfee
The global WannaCry and NotPetya attacks were both examples of pseudo-ransomware, according to McAfee researchers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Sep 2017
Global hacker botnet tops 6 million hijacked devices
A year after the first Mirai botnet attacks, the global botnet has grown, with many countries and cities unwittingly hosting large number of bot-infected devices Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Sep 2017
Mac OS passwords at risk of theft, researcher warns
Some Apple Mac users are at risk of password theft due to a zero-day vulnerability discovered in some versions of the operating system Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Sep 2017
Cage director found guilty of terrorism offence after refusing to disclose passwords
Muhammad Rabbani, international director of Cage, is convicted of an offence under the terrorism act after refusing to disclose his mobile phone PIN and laptop password under Terrorism Act Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
25 Sep 2017
NotPetya attack cost up to £15m, says UK ad agency WPP
Advertising giant was one of many companies hit in June 2017 by malware distributed through Ukrainian accounting software Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Sep 2017
Malware hidden in CCleaner targeted tech firms
Major tech firms were targeted by malware hidden in Avast’s Piriform CCleaner software, researchers have found, leading to speculation that it may have been state-sponsored espionage attack Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Sep 2017
Nation-state actors responsible for most cyber attacks
Companies of all sizes may find themselves faced with highly capable state-sponsored cyber attacks, but steps can be taken to shore up defences Continue Reading
By -
News
20 Sep 2017
Most UK councils hit by cyber attacks
A study has revealed that most UK local authorities have suffered cyber attacks in the past year, showing local government is a key target for cyber criminals and that legacy software is a top security concern Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Sep 2017
Cyber crime a significant risk to individuals and organisations
Cyber crime is still a significant risk to individuals and organisations, a report claims, with the top threats including business email compromise, ransomware, and banking and mobile malware Continue Reading
By- Warwick Ashford, Senior analyst
-
News
14 Sep 2017
Government aligns data laws with GDPR
The UK government announces details of its data protection law that will align with the EU’s GDPR Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
E-Zine
14 Sep 2017
CW Europe: The Macedonian surveillance scandal that brought down a government
In this issue, we look at evidence that Macedonia may have been running covert internet surveillance using sophisticated software supplied by a western technology company. We also look at how politics is changing IT buying habits in France, with French CIOs looking at alternatives to storing data with US-based suppliers as a result of one of President Trump’s executive orders. Download the issue now. Continue Reading
-
News
12 Sep 2017
Government wants to remain in EU cyber security club after Brexit
The UK government wants to maintain deep links with the European Union’s cyber security working groups following Britain’s exit from the bloc in 2019 Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Sep 2017
People with non-IT backgrounds could help fill cyber security skills gap
Organisations should look to fill cyber security roles with people who are curious and have work experience rather than focusing solely on graduates Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
30 Aug 2017
Researcher finds over 711 million compromised email accounts
A security researcher has discovered a spambot using more than 711 million compromised email accounts to spread data-stealing malware Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Aug 2017
Security professionals name top causes of breaches
Security professionals have named the top reasons for successful cyber attacks, which are affecting more than half of organisations Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
24 Aug 2017
CW Nordics: Banks and startups increase collaboration
First they were deemed a threat, now they are potential partners. According to a new report by Nordic accelerator Fintech Mundi, banks are increasingly turning to financial technology (fintech) startups in their hunt for new ideas and market opportunities. Also in this issue, read now Baker Brun, a bakery company in Norway, is modernising its business processes through the latest technologies, and hear how Stockholm’s CIO is relishing the challenge of trying to make the Swedish capital the smartest city in the world. Continue Reading
-
E-Zine
22 Aug 2017
How banking technology has changed since the crash
In this week’s Computer Weekly, 10 years after the financial crash, we examine how banking technology has changed as a result of the economic crisis. We look at how GDPR, the EU’s new data protection laws, will affect your data storage strategies. And we ask if the cryptocurrency boom will remain a niche pursuit or whether the underlying technologies can bring benefits for enterprise IT. Read the issue now. Continue Reading
-
News
21 Aug 2017
NotPetya highlights cyber risk in shipping industry
Malware attack has shown that the shipping industry is vulnerable to cyber attacks, with Danish shipping giant Maersk reporting potential cost of up to $300m Continue Reading
By- Warwick Ashford, Senior analyst
-
News
17 Aug 2017
Developers lack skills needed for secure DevOps, survey shows
The growing demand for developers with security skills is outpacing supply, but a survey reveals that a lack of formal security education and training by employers is contributing to the growing skills gap Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 Aug 2017
NotPetya attack cost up to $300m, says Maersk
Danish shipping line Maersk estimates that the NotPetya cyber attack in June cost the company up to $300m Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 Aug 2017
Hackers hit Holyrood with Westminster-style brute-force attack
The Scottish parliament has been hit by a cyber attack similar to the one that struck Westminster in June Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 Aug 2017
Leaked SMB exploits make malware powerful, warns Cylance
Four key exploits at the heart of hacking tools leaked by the Shadow Brokers have given malware authors a lot of power, say security researchers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Aug 2017
Malicious email spikes in Q2, reports Proofpoint
Malicious email campaigns saw a spike in volume and increased variety in the second quarter of 2017, a cyber security report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Aug 2017
IT pros urged to support ‘WannaCry hero’ Marcus Hutchins
Computer experts fear chilling effect on security research over US arrest of Marcus Hutchins who halted the spread of the WannaCry ransomware Continue Reading
By- Bill Goodwin and Julia Gregory
-
E-Zine
10 Aug 2017
CW Benelux: IoT Tech Day showcases innovation
Read about this year’s IoT Tech Day in Utrecht, Netherlands, which featured hobby projects such as light-sensing curtains that automatically open and close, but also showed that the IoT is growing up to encompass more serious applications. Also read about the lessons to be learned from the ‘Petya’ ransomware attack that has hit 60 countries, and find out how Dutch railway stations are monitoring the movement of travellers to reduce people jams. Continue Reading
-
News
07 Aug 2017
Gaming apps ‘main source’ of mobile phishing attacks, research shows
Analysis of 100,000 corporate devices shows more than a quarter of traffic going to phishing domains was from gaming apps Continue Reading
By- Zach Emmanuel, Computer Weekly
-
News
03 Aug 2017
Ransom DDoS attacks on the rise
The use of distributed denial of service (DDoS) attacks to extort money from organisations is on the rise, warns security firm Kaspersky Lab Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
01 Aug 2017
The fields of Athenry – how Apple’s datacentre plans are causing turmoil in a small Irish town
In this week’s Computer Weekly, we look into Apple’s controversial plans to build a huge datacentre in a small town in the west of Ireland, and hear the local arguments it has caused. We find out how the Met Office is managing the vast quantities of data it uses for weather forecasting. And we examine Google plans to bring artificial intelligence tools to the job recruitment market. Read the issue now. Continue Reading
-
News
01 Aug 2017
Why Facebook’s AI termination raises safety concerns
Revelations that researchers at Facebook had to switch off two bots that went rogue have raised questions about the safety of artificial intelligence Continue Reading
By- Cliff Saran, Managing Editor
-
News
28 Jul 2017
CIA hacking tools for Mac OS and Linux exposed by WikiLeaks
WikiLeaks has exposed hacking tools targeting the Mac and Linux operating systems in the latest of its series of leaks allegedly from the US Central Intelligence Agency Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Jul 2017
Big data means big risk, Swedish Transport Agency leak shows
The Swedish Transport Agency exposed sensitive information by transferring its databases to a third party cloud provider without following data protection procedures Continue Reading
By- Warwick Ashford, Senior analyst
-
News
24 Jul 2017
Tech disruption forces CEOs to rethink leadership
Headline figures from KPMG’s Outlook 2017 survey of 1500 CEOs shows that 40% expect technology innovation to cause major disruption Continue Reading
By- Cliff Saran, Managing Editor
-
News
20 Jul 2017
Retail data breaches still high as GDPR deadline looms
As the EU’s General Data Protection Regulation compliance deadline approaches, retail data breaches remain unacceptably high, a data threat report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
19 Jul 2017
CW ANZ: Cyber security plan bears fruit
Australia’s Cyber Security Strategy, aimed at protecting citizens, companies and critical infrastructure, has made significant headway over the past year, but the jury is still out on its long-term impact. In this month’s CW ANZ, we take a look at the progress of Australia’s national cyber security blueprint and what else needs to be done to better protect Australia’s interests in the global cyber security landscape. Also, read about what the Australian government is doing to better guard public sector IT systems against cyber attacks. Continue Reading
-
E-Zine
19 Jul 2017
CW ASEAN: Stay alert to threats
With cyber threats intensifying in recent years, from the global outbreak of ransomware to intrusions of university networks to access government data, the role of threat intelligence in anticipating and mitigating threats has become more important than ever. In this month’s CW ASEAN, learn how organizations can make the most out of threat data feeds in an intelligence-driven security strategy. Also, find out how companies can navigate the ominous cyber threat landscape by investing in cyber security technology and processes. Continue Reading
-
News
19 Jul 2017
Newcastle council data leak shows need for security automation
Leak of child adoption information by Newcastle City Council resulted from accidental email attachment by employee Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
18 Jul 2017
Airbus helps secure critical infrastructure
In this week's ezine, Computer Weekly explores how to secure industrial control systems, which have often lagged behind the leading edge of IT security and pose serious risks to critical national infrastructure. Airbus believes that despite the vulnerabilities of individual components, industrial control systems as a whole are quite resilient. We also speak to the head of technology at Centrica about how the utility company is becoming a specialist provider of data lake integration tools, and we explore the 802.11ac Wave 2 standard. Continue Reading
-
News
17 Jul 2017
IBM claims breakthrough in mainframe encryption
IBM says its new mainframe ushers in a new era of data protection in response to a call to action from chief information security officers and security experts worldwide Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 Jul 2017
Encryption keys too predictable, warn security researchers
Encryption keys are not as random as most people think, which means encrypting data is often not as secure as it could be, according to security researchers Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
13 Jul 2017
CW Middle East: How women can fill the tech skills gap
The growth of the IT sector continues to drive both innovation and employment in the Gulf, but women – as with all industries in the region – are under-represented in technology by significant margins, and could help to fill the tech skills gap. Also in this issue, read about growing threats in Saudi Arabia’s cyber sector, and how Dubai is becoming a world leader in smart city developments. Continue Reading
-
News
13 Jul 2017
Verizon denies data loss but admits potentially huge breach
Verizon has responded to reports of millions of customer records being exposed to the internet by saying no data was accessed by malicious third parties, but the incident raises thorny issues Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 Jul 2017
What Singapore can learn from Israel’s cyber security playbook
A former Unit 8200 captain from the Israel Defense Forces shares what Singapore can learn from Israel’s approach to cyber security Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
12 Jul 2017
Criminal law: Are Twitter threats taken seriously?
As threats of violence become increasingly common online, law enforcement is taking stronger action against the perpetrators Continue Reading
-
News
06 Jul 2017
Kaspersky researcher in Asia develops cyber forensics tool
The open source tool lets cyber forensics investigators access infected machines remotely to collect malware artefacts without compromising system integrity Continue Reading
By- Aaron Tan, TechTarget
-
Feature
30 Jun 2017
Why immutable buckets are a worthy risk management tool
Immutable buckets offer businesses benefits in terms of data compliance, backup, archiving and security Continue Reading
-
News
30 Jun 2017
Danish shipping giant Maersk recovering from major Petya cyber attack
Company confirms attack took down its IT system across multiple sites and business units, but has now been contained Continue Reading
By -
Opinion
29 Jun 2017
Security Think Tank: Focus on high risk by automating low-risk patching
How should organisations address the need to keep software up to date with security patches without it costing too much or being too labour intensive? Continue Reading
By -
News
29 Jun 2017
Key lessons from ‘Petya’ ransomware attack
While the cyber security community is still working to understand the latest ransomware attack that has reportedly hit 60 countries, there are key lessons to be learned Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
29 Jun 2017
Security Think Tank: Patching is vital and essentially a risk management exercise
How should organisations address the need to keep software up to date with security patches without it costing too much or being too labour intensive? Continue Reading
-
News
28 Jun 2017
Singapore authorities issue alert on Petya ransomware
The country’s emergency response team has called for users to boost their cyber defences as the Petya ransomware rages through IT systems in Asia and Australia Continue Reading
By- Aaron Tan, TechTarget
-
News
21 Jun 2017
Microsoft admits Windows 10 disables third-party security software
Microsoft has admitted Windows 10 disables some third-party security software, but claims this is purely because of compatibility issues Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Jun 2017
Pirated software used to spread malware in APAC
A regional study by a Singapore university has found that counterfeit software distributed through discs and file-sharing networks is plagued by malware Continue Reading
By- Aaron Tan, TechTarget
-
News
20 Jun 2017
Web hosting firm agrees to pay $1m ransomware demand
South Korean hosting firm Nayana agrees to pay more than $1m to restore data that was encrypted by a ransomware attack on its Linux servers on 10 June 2017 Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
20 Jun 2017
What it takes for the internet of things to take off in ASEAN
Besides lowering adoption costs, an ecosystem of governments, technology suppliers and telcos is necessary for the internet of things to flourish in Southeast Asia Continue Reading
By- Aaron Tan, TechTarget
-
News
19 Jun 2017
Abu Dhabi uses surveillance tech to protect Grand Prix
Police use surveillance technology and monitoring software to ensure public safety when Formula One visits the UAE each year Continue Reading
-
Feature
19 Jun 2017
The Macedonian surveillance scandal that brought down a government
Macedonia has been accused of using surveillance technology for covert spying - the subsequent political protests were instrumental in the ruling party losing power after 10 years Continue Reading
By -
News
16 Jun 2017
Australia’s decryption plan seen as untenable
Experts say efforts to get technology and social media firms to cooperate with the authorities in decrypting communications will be hard to achieve Continue Reading
-
News
16 Jun 2017
10 ways to prevent breaches and minimise impact
Attackers are continually adapting to security technologies to fly under the radar, but taking action in 10 key areas can reduce the risk of breaches and minimise their impact, according to a resilience expert Continue Reading
By- Warwick Ashford, Senior analyst
-
News
14 Jun 2017
SAP users look to software suppliers to help with fast-approaching GDPR
An SAP UK and Ireland user group survey has found user organisations crying out for help as GDPR approaches, with cloud delivery a special concern Continue Reading
By- Brian McKenna, Senior Analyst, Business Applications
-
News
14 Jun 2017
Microchips implanted in hands could be in use for payments in 20 years
UK consumers are becoming more accepting that biometric authentication will become the norm for payments Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
E-Zine
13 Jun 2017
Tips for buying hyper-converged systems
In this week’s Computer Weekly, we examine the growing market for hyper-converged infrastructure - combining processing, storage and networking into an integrated design - and assess the options available to IT leaders. We ask mature users of the cloud what’s next for their migration to off-premise systems. And we analyse how retail supply chains are developing to keep up with online and mobile shopping trends. Read the issue now. Continue Reading
-
News
09 Jun 2017
Infosec17: Society needs to address encryption dilemma
There needs to be a discussion about how to balance the interests of privacy, security and the tech industry, says Infosecurity Europe Hall of Fame inductee Continue Reading
By- Warwick Ashford, Senior analyst
-
News
08 Jun 2017
Islamic State supporters shun Tails and Tor encryption for Telegram
Confidential communications show terror group’s supporters are turning to simple mobile phone messaging apps to exchange messages and distribute propaganda Continue Reading
By- Bill Goodwin, Computer Weekly
-
Opinion
07 Jun 2017
Rethink risk through the lens of antifragility
Antifragility is an exciting alternative that fuses value and risk, and CIOs and IT executives are well positioned to help Continue Reading
By- Bill Murray, Leading Edge Forum
-
News
06 Jun 2017
Mainframe blindspots expose companies to insider threats
More than three-quarters of CIOs say their mainframe is more secure than other systems, but most admit they are still exposed to insider threats Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Jun 2017
UK firms stockpiling bitcoins for ransomware attacks
Large UK firms are prepared to pay out more than £136,000 on average to cyber criminals who launch ransomware attacks, a survey has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 Jun 2017
Enterprises struggle with emergency patching
Companies are struggling to maintain emergency patch cycles, despite the fact that enterprise reliance on legacy systems often means emergency patches are an everyday fact of life, a survey shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
31 May 2017
WannaCry shows validity of risk-based security, says RSA head
WannaCry and other recent cyber attacks underline the importance of adopting a risk-based approach to security, says RSA president Continue Reading
By- Warwick Ashford, Senior analyst
-
News
31 May 2017
Shadow Brokers prepares zero-day subscription service
Businesses may face an onslaught of zero-day attacks soon as the group that leaked the NSA exploits used in the WannaCry ransomware attacks prepares to release more stolen code Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 May 2017
People can be strongest link in cyber security, says NCSC
People are often seen as the weakest link when it comes to cyber security, but that must change, says the National Cyber Security Centre Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 May 2017
EternalRocks author throws in the towel after media attention
Security researcher who discovered worm that could have bigger impact than WannaCry says the author seems to have given up Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
25 May 2017
CW Nordics: The trouble with connected things
In this issue, Finnish cyber security expert Mikko Hyppönen talks about security in the Nordics, Russia and the trouble with connected devices. Also read how Icelandic airline Wow Air averted disaster through the use of application performance monitoring software when it embarked on a major expansion. And find out how, since December 2015, anyone playing popular sandbox game Minecraft has been able to build their worlds on the actual map of Sweden. Continue Reading
-
News
24 May 2017
Singapore government to spend S$2.4bn on technology initiatives
Funding will go towards building a national sensor platform, boosting the government’s cyber security capabilities and driving the use of robots Continue Reading
By- Aaron Tan, TechTarget
-
News
24 May 2017
Interview: Nick Bleech, head of information security, Travis Perkins
Last year, Travis Perkins implemented Splunk to help it to respond more quickly to security threats. Now, the business is looking into machine learning and a single customer view Continue Reading
By- Clare McDonald, Business Editor
-
News
23 May 2017
Economic and political uncertainty drives organisations to rethink IT strategies
CIO job satisfaction reaches a three-year high as organisations hire more IT staff and invest in innovative digital technology Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
23 May 2017
EternalRocks worm combines seven leaked NSA attack tools
Hard on the heels of the WannaCry ransomware attacks, a researcher has found a worm that combines four NSA exploits and associated attack tools, including EternalBlue used by WannaCry Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
23 May 2017
Global ransomware attack could be a security wake-up call
In this week’s Computer Weekly, we look at the global WannaCry ransomware attack that struck the NHS and spread across 150 countries – will it be the wake-up call that finally makes organisations take cyber security seriously? We find out how Moscow is leading the way in smart city digitisation. And our latest buyer’s guide examines customer experience management. Read the issue now. Continue Reading
-
News
22 May 2017
Windows 7 accounts for most WannaCry infections
Statistics show that computers running Windows 7 accounted for the biggest proportion of machines infected with the WannaCry ransomware, while NHS suppliers are blamed for hampering patching by NHS trusts Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 May 2017
Command and control communications key to detecting threats
Malware command and control (C&C) communications are key to detecting advanced threats, according to a security researcher Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 May 2017
Strong cyber security posture reduces impact of breaches
There is a direct correlation between data breaches and falls in stock prices, but the impact is lighter on companies with good cyber security, a study has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
18 May 2017
CW ASEAN: Rise of the machines
In this month’s CW ASEAN, we look at how artificial intelligence and machine learning is improving the way ASEAN businesses fend off cyber attacks and better predict how customers react to various marketing efforts. The growing interest in AI in the region has also spawned start-ups such as Singapore’s Adatos, which is pushing the bar by using declassified methodologies and software used by US defense and intelligence communities to produce data-driven insights. Read the issue now. Continue Reading
-
Podcast
16 May 2017
Toxic data: What it is and how to find it and deal with it
In this podcast, Mathieu Gorge, CEO of Vigitrust, looks at the management of legacy data and how to find and deal with toxic data that could expose your organisation to compliance breaches Continue Reading
By- Antony Adshead, Storage Editor
-
E-Zine
15 May 2017
Political turmoil threatens global IT services sector
In this week’s Computer Weekly, we examine the threats to the global IT services sector caused by US president Donald Trump’s protectionist rhetoric, and by the UK’s planned departure from the EU. Home Office IT chief Sarah Wilkinson discusses the challenges of digital transformation in a large government department. And we find out how business leaders need to improve their digital skills. Read the issue now. Continue Reading
-
Feature
15 May 2017
GDPR: a quick start guide
We look at how UK organisations can prepare for the General Data Protection Regulation Continue Reading
-
News
12 May 2017
Five cyber security imperatives for all companies
There are five things all companies should ensure they are doing in terms of cyber security Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 May 2017
Cognitive security is the future, says Martin Kuppinger
Modern computing capabilities combined with cognitive technology has huge potential for tackling unknown attack patterns and addressing the security skills shortage, says Martin Kuppinger Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
09 May 2017
Casting the IT skills net wider
In this week’s Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what’s stopping them from making the move and how cross-training can help. We analyse the key storage elements of building a private cloud. And Bloomberg’s head of data science talks about the benefits of machine learning. Read the issue now. Continue Reading
-
News
04 May 2017
Testing is key to IoT security, says researcher
Building an effective testing process across all elements associated with a product is key to securing the internet of things, according to a researcher in the field Continue Reading
By- Warwick Ashford, Senior analyst
-
News
02 May 2017
UBS applies data protection for compliance and competitive advantage
Swiss bank UBS aims to get greater value out of investments in sensitive data protection systems by using its security capabilities as a differentiator Continue Reading
By- Warwick Ashford, Senior analyst
-
News
02 May 2017
Intel urges business to patch critical remote-execution flaw
Intel advises business customers to apply a security update for some versions of its administration firmware for vPro processors to fix a remote execution flaw Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Apr 2017
Mastercard integrates biometric technology into cards
MasterCard tests out biometric technology embedded into payment cards, with further trials in Europe planned Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
20 Apr 2017
Banks suffer average of 85 attempted serious cyber attacks a year, and one-third are successful
Banks face daily cyber attacks, many of which succeed in stealing data, research finds Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
20 Apr 2017
Human interaction still key to cyber attacks, study reveals
An analysis of threats faced by organisations in the first quarter of 2017 reveals that cyber attackers still rely heavily on user interaction Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Apr 2017
Skype most popular communication channel for cyber criminals
The cyber criminal network is truly global and collaborative, making use of popular messaging services, a study has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 Apr 2017
Enterprise adoption of encryption accelerating, study shows
Cloud adoption and escalating threats are accelerating adoption of encryption, a study has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
13 Apr 2017
CW Middle East: UAE faces IT recruitment challenge
In this issue, read how organisations in the UAE face a challenge to attract and retain top-quality CIOs and other key IT staff as the region seeks to tackle a technology skills gap. Also, Dubai’s Roads and Transport Authority has revealed that plans to unveil passenger-flying cars are in the final stages, with the initiative expected to launch in July 2017. Meanwhile, the UAE is mirroring global trends by eagerly adopting virtual reality technology. Continue Reading
-
News
13 Apr 2017
Six key security weaknesses in industrial systems
Organisations should mitigate six key vulnerabilities in industrial control systems to reduce the risk of cyber attack, warns security firm FireEye Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Apr 2017
Security as a service on the rise in the UAE
Organisations in the United Arab Emirates are increasingly turning to security services Continue Reading
-
E-Zine
11 Apr 2017
Virtual reality in healthcare
In this week’s Computer Weekly, we find out how virtual reality technology is starting to be used to improve health and patient care. We examine the new UK tax laws that are causing IT contractors to quit government digital projects. And we analyse the software licensing issues arising from SAP’s recent court case over indirect access to its applications. Read the issue now. Continue Reading
-
News
10 Apr 2017
IAM a core building block for GDPR compliance
Identity and access management is key to enabling organisations to become compliant with the GDPR, increase security and improve customer relationships, according to a senior analyst at KuppingerCole Continue Reading
By- Warwick Ashford, Senior analyst