IT risk management
Risk management is an increasingly important discipline for IT leaders, with regulatory compliance an ever-present consideration and the amount of legislation and regulation concerning data security on the rise. We examine the issues around IT risk management and the best practices that IT managers need to know.
-
News
20 Nov 2024
Government issues strategic priorities for online safety regulator Ofcom
Technology secretary Peter Kyle sets out the government’s strategic priorities for how Ofcom should approach regulating online safety, including embedding safety by design and supporting innovation in technologies to help protect people online Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
19 Nov 2024
AI readiness stalls in APAC
Despite significant investment in AI, only 15% of organisations in Asia-Pacific are ready to deploy the technology today, according to Cisco’s latest regional AI readiness survey Continue Reading
-
News
10 Apr 2017
Outsourcing service left Scottrade Bank customer data exposed
Mistake by outsourcing service provider left the details of 20,000 Scottrade Bank customers vulnerable to theft Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Feature
07 Apr 2017
How UK organisations are leaving themselves open for cyber attack
UK organisations are leaving themselves wide open to cyber attack despite huge investments in cyber security systems, according to two former hackers now working in cyber defence Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Apr 2017
Interview: F-Secure’s Mikko Hyppönen on the Nordics, Russia and the internet of insecure things
Computer Weekly sat down with Finnish cyber security expert Mikko Hyppönen to talk about security in the Nordics, Russia and the trouble with connected devices Continue Reading
By -
News
04 Apr 2017
Chinese hacking group targeted firms through IT MSPs
Security researchers have uncovered a China-based cyber espionage campaign that targeted IT services firms and their customers, underlining the need for supply chain security Continue Reading
By- Warwick Ashford, Senior analyst
-
News
31 Mar 2017
How IT can be more defensible
A renowned Google engineer calls for the IT industry to build devices capable of being defended and for enterprises to take a balance sheet approach in managing risks Continue Reading
By- Aaron Tan, TechTarget
-
News
29 Mar 2017
Non-malware attacks pose bigger threat than malicious software
Malware-free cyber attacks are on the rise and artificial intelligence in cyber security is still far from replacing humans, according to most cyber security researchers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 Mar 2017
Threats grow in Saudi Arabia’s cyber sector
Saudi Arabia's wealth makes it an attractive target for cyber criminals, but what have been the recent trends in cyber crime? Continue Reading
By- Triska Hamid
-
News
20 Mar 2017
IBM cognitive assistant to help manage and secure devices
IBM has announced a cognitive assistant powered by IBM Watson to help businesses manage and secure endpoints, including devices making up the internet of things Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
16 Mar 2017
CW ASEAN: Raising national security standards
In this month’s CW ASEAN, we describe how Singapore is improving its cyber security defenses and preparations through a partnership with British security company BAE Systems. We also find out why the Thai military plans to recruit civilian cyber warriors and we take a look at evolving security approaches. Read the issue now. Continue Reading
-
News
15 Mar 2017
APAC topped the world in number of cyber attacks in 2016
The prevalent use of pirated software is one of the possible reasons for the APAC region’s poor showing in Trend Micro’s annual study on the state of cyber security Continue Reading
By- Aaron Tan, TechTarget
-
News
14 Mar 2017
CIO interview: Simon McCalla, Nominet
Nominet, the registry for more than 10 million of the UK’s internet domains, is expanding into the internet of things and internet security services Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
10 Mar 2017
Paying ransomware attackers perpetuates attacks, says researcher
Continually evolving ransomware is among the threats organisations need to factor into their cyber defences in 2017, but only once they have taken care of the basics, says Kaspersky Lab researcher Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
09 Mar 2017
CW Europe: Technology poses new risks to jobs, economies and society
Rapid advances in technology could have destabilising effects on employment and economic growth, and could exacerbate social unrest, the World Economic Forum (WEF) warned. Society’s failure to keep pace with technology change was a key risk under discussion at Davos in January. Continue Reading
-
News
08 Mar 2017
WhatsApp, Signal, ProtonMail safe from CIA hacking tools
Top secure messaging and email apps are said to be safe from CIA hacking tools, but organisations are urged to assess their own vulnerability if the tools were to fall into the hands of cyber criminals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
07 Mar 2017
Retail industry steps up the fight against rising cyber threats
UK retail body BRC publishes the first of its kind step-by-step guide on how to manage cyber security threats Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
07 Mar 2017
Industrial control systems pose big risk to security
In this week’s Computer Weekly, we examine the risks to critical national infrastructure from security vulnerabilities in legacy industrial control systems. DevOps is growing in popularity – we find out about the organisational, process and cultural approaches to make it succeed. And we ask CIOs how they are becoming hybrid IT and digital leaders. Read the issue now. Continue Reading
-
News
06 Mar 2017
More than a million Gmail and Yahoo account credentials on sale
Usernames, email addresses and plaintext passwords of more than a million Yahoo and Gmail accounts are reportedly on sale on the dark web, posing a threat to corporate security Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Feb 2017
Citizen Love: the story of an ordinary family's fight with the US government
Finnish documentary makers Raimo Uunila and Lauri Danska tell the behind-the-scenes story of activist Lauri Love’s battle with the US government – and the impact of the case on his family Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
24 Feb 2017
Banking malware, DDoS, ransomware and CEO fraud top UK cyber threats
Businesses need to be aware of the value of their data, how that data is likely to be attacked, and how to defend against particular attacks, says leading UK cyber cop Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
23 Feb 2017
CW Nordics: Top IT priorities for Nordic CIOs in 2017
In this first issue of CW Nordics in 2017 we take a look what CIOs in the region are expecting in the year ahead. We asked a select group of CIOs and analysts in Denmark, Finland, Norway and Sweden what IT projects are at the top their priority lists. Also read about the Nordic region as a hotspot for IT startups, with Sweden punching above its weight in financial technology. And find out how board executives at healthcare company Elekta are analysing workforce data to make better strategic decisions. Continue Reading
-
News
17 Feb 2017
RSAC17: Geopolitical changes driving encryption usage, survey shows
More organisations are planning to deploy encryption in response to geopolitical changes, but confidence in organisations’ ability to secure and protect encryption is low, a survey shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 Feb 2017
RSAC17: Infosec pros must help create business-driven security, says RSA CTO
The inability to draw connections between security details and business metrics is one of the biggest challenges facing most companies, according to RSA CTO Zulfikar Ramzan Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 Feb 2017
MobileIron: Corporate IT policy and mobile device security are mismatched
MobileIron report identifies a gap between security policy and the actual deployment of that policy on mobile devices Continue Reading
By- Cliff Saran, Managing Editor
-
Feature
13 Feb 2017
Breaking the cyber kill chain
Traditional antivirus is no longer good enough for fileless malware attacks that don’t leave a trace Continue Reading
By- Aaron Tan, TechTarget
-
E-Zine
09 Feb 2017
CW Benelux: Is there a Dutch digital delusion?
On government and business levels, the Netherlands aspires to be a digital leader in Europe, but it may be losing ground because of a lack of research and development investment. Also in this issue, IT decision makers based in the Benelux region are less confident than their European neighbours that IT budgets will increase in 2017, and Dutch bank ING, which used digital technology to reinvent itself after the financial crash, is about to reinvent itself again. Continue Reading
-
News
08 Feb 2017
How a Dublin court case could derail EU-US data privacy agreements
The Irish Commercial Court will consider whether privacy protection offered by standard contractual clauses for data transfers to the US from Europe is legally valid Continue Reading
By- Kevin Cahill and Dai Davis
-
News
31 Jan 2017
Data breach costs exceed 20% of revenue
The cost of data breaches topped 20% of revenue in the past year as cyber attacks became more sophisticated and defenders struggled to keep pace, the latest Cisco security report shows Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
31 Jan 2017
Visionary technology transforming healthcare
In this week’s Computer Weekly, find out how a visionary approach to technology is transforming healthcare at London’s world-leading Moorfields Eye Hospital. The UK tech sector has set out its priorities for the forthcoming Brexit negotiations – we take a look at the key issues. And our new buyer’s guide examines the latest trends in datacentre management. Read the issue now. Continue Reading
-
E-Zine
24 Jan 2017
World leaders discuss risks of social unrest from advances in technology
In this week’s Computer Weekly, we examine the fears raised at the World Economic Forum in Davos over the potential for social unrest as new technology such as AI transforms working practices and eliminates jobs. We hear from the CIO at the World Health Organization about how IT helped tackle the Ebola crisis. And we look at progress in companies adopting big data analytics. Read the issue now. Continue Reading
-
News
23 Jan 2017
Lloyds Bank hit by massive DDoS attack
It has emerged that UK banks have been targeted by a DDoS campaign that affected services intermittently only at the Lloyds Banking Group Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
19 Jan 2017
CW ANZ: The role of cognitive computing in data analytics
In this month’s CW ANZ, read why enterprises need to worry just as much – if not more – about the business implications, rather than the technical challenges, when implementing cognitive software. Read about the experiences of Dutch banking and financial services company Rabobank which has been using predictive analytics for years to predict which customers might default on their mortgage or abandon an account application midway through the process. We also take a look at why the future of Apple Pay Australia is still unresolved, how the Red Cross data breach has highlighted security shortcomings, and what Virgin Atlantic has gained from its use of Salesforce CRM software. Continue Reading
-
Feature
17 Jan 2017
How information security professionals can help business understand cyber risk
Information security is continually moving up business and board agendas, but information security professionals find it challenging to help business leaders to understand fully the cyber risks across increasingly digital businesses. Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
17 Jan 2017
RAC digitises driver assistance
In this week’s Computer Weekly, we speak to the RAC about its modernisation initiative, where it is using Microsoft Azure to digitise older cars and gather real-time data to alert members of faults before they result in roadside breakdowns. We also look at how a lack of diversity in organisations is costing the UK economy money, and how attacks against IoT devices are highlighting the vulnerabilities of specific devices but failing to provide a complete picture of the security challenges. Continue Reading
-
News
13 Jan 2017
Davos: Technology poses new risks to jobs, economies and society
Politicians and business leaders will discuss the risks posed by technology to jobs, political stability and cyber security at the World Economic Forum in Davos Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
12 Jan 2017
Flawed GoDaddy security certificates show need for control
Vulnerabilities in digital security certificates highlight the need for organisations to be able to exercise more control over those certificates Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
12 Jan 2017
CW Middle East: UAE takes lead in autonomous car trials
Self-driving cars are one of the most exciting developments in technology. Companies like Google and Tesla are pioneering the technology. But it might be countries in the Middle East, with the poorest road safety records in the world that could benefit most. Despite significant regional spending on safety campaigns, the UAE still clocks up 12.7 road deaths per 100,000 people, with 30.4 in Oman, 24.8 in Saudi Arabia, 16.5 in Kuwait, 14 in Egypt and 13.2 in Qatar. In September Dubai’s Road and Transport Authority (RTA) trialled a public driverless vehicle in the city’s Downtown area, running along a 700-metre trial route. Continue Reading
-
Opinion
10 Jan 2017
Security Think Tank: Top three DNS-related security risks
What are the main security risks associated with the domain name system and how are these best mitigated? Continue Reading
By- Richard Hollis
-
News
10 Jan 2017
Cyber security scare stories could sharpen focus at banks
There are continual cyber attacks on banks, and although most are repelled, there is significant room for improvement Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Feature
09 Jan 2017
Secure IoT before it kills us
Experts say more must be done to mitigate the potentially catastrophic threats presented by connected devices Continue Reading
-
News
21 Dec 2016
Top 10 IT security stories of 2016
Here are Computer Weekly’s top 10 IT security stories of 2016: Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
20 Dec 2016
Data danger: Cyber threats lurk inside every company
In this week’s issue, we investigate the hidden threats lurking in every company and discuss what options CIOs and heads of security have to limit damage. We also look at how CIOs can fund digital initiatives when costs are under pressure, and how Boots has built an SAP centre of expertise to take back control of the strategic direction of its IT organisation from its previously outsourced structure. Read the issue now. Continue Reading
-
News
15 Dec 2016
Typo allowed Russian hackers to access US Democratic Party emails
Typographical mistake in an email warning of a phishing attack on the US Democrats led to thousands of private emails being accessed and published by Russian-backed hackers Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
E-Zine
15 Dec 2016
European law enforcement seeking smart ways to fight cyber crime
Cyber criminals are always likely to be better resourced than law enforcement. Now, national and regional police forces in Europe are switching tactics to even the odds. Under-resourced law enforcement needs a smarter approach as cyber crime becomes increasingly prevalent and sophisticated, backed by the money and expertise of organised crime groups set up and run as well-resourced and efficient professional business organisations. Cyber crime operations typically have teams dedicated to looking at open source intelligence, targets’ physical environments, weaknesses in supply chains, and potential collaborators inside target organisations to enable sophisticated, blended attacks that involve a combination of actions against a range of vulnerabilities, making them difficult to detect and defend against. Continue Reading
-
News
08 Dec 2016
PowerShell security threats greater than ever, researchers warn
Administrators should upgrade to the latest version of Microsoft PowerShell and enable extended logging and monitoring capabilities in the light of a surge in related security threats, warn researchers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
08 Dec 2016
More than 2,000 TalkTalk routers hijacked by Mirai botnet variant
Security researchers are urging ISPs to issue emergency patches for Marai botnet infections after 2,374 TalkTalk routers were linked in a regional botnet Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
07 Dec 2016
Security Think Tank: Communication is key to cyber security in digital era
How can information security professionals help organisations to understand the cyber risks across increasingly digital businesses? Continue Reading
By- Ramses Gallego
-
News
06 Dec 2016
UK falls below global cyber security confidence
Global confidence in ability to accurately assess cyber risk has fallen in the past year, but the UK has fallen below the global average Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Dec 2016
Top 10 ANZ enterprise IT stories of 2016
Here is a rundown of Computer Weekly’s most popular ANZ enterprise IT articles for 2016 Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
28 Nov 2016
IBM blamed for Australian census website crash
Computer giant reportedly pays $30m to Australian government as reports are released from two inquiries into DDoS attacks on census website Continue Reading
-
News
25 Nov 2016
One in four Wi-Fi hotspots vulnerable to attack, study finds
At least one in four Wi-Fi hotspots are open to attack, a study by Kaspersky Lab reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Nov 2016
Alleged hacker Lauri Love’s ‘life will be destroyed’ under Trump regime
Supporters fear for activist Lauri Love if his extradition to face hacking charges to the US goes ahead Continue Reading
By- Fiona O'Cleirigh and Bill Goodwin
-
News
18 Nov 2016
Three breach highlights several security issues, says (ISC)2
Customer data breaches continue to demonstrate that companies are still not treating cyber risk like every other business risk, says Adrian Davis of (ISC)2 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 Nov 2016
Online identity needs to be fixed, says Microsoft’s Kim Cameron
Software giant’s identity architect calls on enterprises to professionalise the way they relate to customers to help replace online identity infrastructure that is not fit for purpose Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
15 Nov 2016
Counting the cost of financial cyber crime
In this week’s Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer’s guide, on server operating systems, looks at the new features in Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping motivate staff. Read the issue now. Continue Reading
-
News
15 Nov 2016
Amber Rudd orders Lauri Love extradition to US to face hacking charges
Engineering student Lauri Love faces trials in three US states and a possible 99-year jail sentence for allegedly hacking into US government computer systems as part of a political protest, despite concerns over his health Continue Reading
-
E-Zine
03 Nov 2016
CW ASEAN: SMEs present security weakness
In this month's CW ASEAN, we look at how the cyber security defences at small and medium-sized enterprises in Southeast Asia may have some vulnerabilities, resulting in cyber security attacks on the large corporations they work with. We also consider the need to educate users of smartphones and tablets across the region as card fraud rates rise, with high use of mobile devices considered a contributing factor. Read the issue now. Continue Reading
-
E-Zine
03 Nov 2016
CW ANZ: Using gamification to build cyber security skills
In this month's CW ANZ, we look at how PwC is using an online game to give its customers first-hand experience of what it means to face a cyber attack. We also look at how identity is gaining greater prominence in the security debate in Australia as the DTO takes the wraps off plans for a national identity system. Read the issue now. Continue Reading
-
News
02 Nov 2016
Pure-play cyber security has real value, says incoming McAfee head
Intel Security has outlined its strategy to protect the new digital economy as it gears up for innovation as a new independent pure-play security firm under the McAfee banner Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 Nov 2016
UK government re-announces £1.9bn cyber security spend
Five-year spending increase - announced by Chancellor Philip Hammond 12 months after George Osborne did so - will support new UK cyber security strategy Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Feature
31 Oct 2016
The cyber threats lurking within every company
Insider threats have been around for a long time, but it is only recently that people have begun to acknowledge the true danger they pose Continue Reading
-
News
27 Oct 2016
Information security set for steep trajectory, says (ISC)2
By helping to create a thriving, diverse and open information security community, (ISC)2 hopes to ensure a steep rise for the profession Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Oct 2016
Schneider Electric praised for positive response to ICS security flaw
Schneider Electric has patched a security flaw that highlights the vulnerability of industrial control systems to cyber attack Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
25 Oct 2016
25 years of Linux
In this week’s Computer Weekly, 25 years after Linus Torvalds released the Linux kernel, we look at how the open-source operating system has influenced modern-day IT. Our new buyer’s guide covers the fast growing technology of object storage. And we examine the rise of corporate wireless networking. Read the issue now. Continue Reading
-
News
20 Oct 2016
Lessons to be learned from attempted $1bn bank heist
Analysis of an attack aimed at stealing $1bn reveals important lessons for cyber defenders, says BAE Systems head of threat intelligence Adrian Nish Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
20 Oct 2016
Reinventing Bahrain’s Kanoo Group through digital technology
In this quarter’s CW Middle East ezine, we feature the IT journeys of three companies in the region with detailed analysis of recent IT projects that were designed to support business transformation in a changing world. We hear how Bahrain-based conglomerate Kanoo Group is dealing with a company-wide digital transformation, Zahid Group’s biggest-ever IT investment, and how Rotana Hotels is centralising security. Continue Reading
-
News
19 Oct 2016
Snowden: the IT analyst turned whistleblower who exposed mass surveillance
Oliver Stone's biopic on Edward Snowden reaches the heart of the ethical crisis posed by mass surveillance for the state and ordinary citizens Continue Reading
-
News
18 Oct 2016
Saving Lauri Love: activists plan their next move
An eclectic bunch of activists, charity workers and reformed hackers spent a rainy Sunday afternoon plotting their next move in a campaign to save Lauri Love from extradition to the US on hacking charges Continue Reading
By- Julia Gregory
-
News
18 Oct 2016
Most businesses vulnerable to cyber attacks through firmware, study shows
Company culture and overall attitude to security is a major contribution to vulnerability to cyber attack through firmware, a study by Isaca has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 Oct 2016
Almost two-thirds of US office workers unaware of ransomware threat
Nearly half of ransomware attacks are aimed at office workers, but almost two-thirds of those polled in the US are unaware of the threat Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
12 Oct 2016
Gary McKinnon: Why Lauri Love should be spared the nightmare of extradition
Computer activist Lauri Love should be spared a life sentence in a US jail, says former hacker Gary McKinnon Continue Reading
By- Gary McKinnon
-
News
10 Oct 2016
Smartwatches banned from UK Cabinet as EC plans IoT security standards
The EC is planning a security certification scheme for internet of things devices as the UK Cabinet bans smartwatches amid heightened fears of cyber espionage Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Oct 2016
DDoS attacks consistent, relentless and costly, report shows
The latest global DDoS report from Neustar underlines the importance of investing in appropriate defences as the high volume of attacks looks set to increase Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Sep 2016
NGOs challenge UK and US mass surveillance in human rights court
Privacy International, Liberty and the American Civil Liberties Union are among 10 human rights groups backing a landmark challenge to mass surveillance in the European Court of Human Rights Continue Reading
By- Bill Goodwin, Computer Weekly
-
E-Zine
27 Sep 2016
Digital knowledge at the British Library
In this week’s Computer Weekly, we find out about the technology plans at the British Library as it aims to store the UK’s printed and digital history. Graph database technology is being used to help improve food safety throughout the supply chain – we examine how it works. And tech leaders tell us how to architect IT infrastructure for moving to the cloud. Read the issue now. Continue Reading
-
News
22 Sep 2016
Cyber attack aimed at destruction, says TV5Monde
TV5Monde counting the cost of not being adequately prepared for a cyber attacked that downed the network in 2015 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Sep 2016
Business warned not to be complacent about cyber security
Lloyds of London survey reveals just how badly some European firms are failing in terms of cyber security and low levels of awareness about the role of cyber insurance Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Sep 2016
Consumers trust banks more than government for biometric security
UK citizens think banks are the best organisations to provide biometric authentication for payments Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
16 Sep 2016
Alleged hacker Lauri Love can be extradited to the US, court rules
Westminster Magistrates’ Court has ruled that alleged hacker, Lauri Love, can be extradited to the US, where he could face a 99-year prison sentence Continue Reading
-
Feature
16 Sep 2016
Lauri Love: the student accused of hacking the US
How did a brilliant but fragile computer science student from a rural English town end up facing life imprisonment in the US? Computer Weekly speaks to Lauri Love Continue Reading
By- Bill Goodwin and Niels Ladefoged
-
News
07 Sep 2016
Basic security could have prevented OPM breach, says report
Basic security controls and malware-detection tools could have prevented the breach of more than 21 million records at the US Office of Personnel Management in 2015, claims a congressional report Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Sep 2016
Use ransomware to get security buy-in, says Trend Micro CTO
Ransomware is one of the top cyber threats to business, but organisations should use that to engage stakeholders and review processes and defences, says Trend Micro CTO Raimund Genes Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 Sep 2016
Lessons from the Dropbox breach
Dropbox is the latest major company to confirm a data breach, albeit four years old, but – as with all recent data breaches by cloud-based services – it highlights some key security lessons Continue Reading
By- Warwick Ashford, Senior analyst
-
News
31 Aug 2016
Evidence of DNS tunnelling in two-fifths of business networks
Cyber criminals are capitalising on the failure of many businesses to examine their DNS traffic for malware insertion and data exfiltration, according to Infoblox Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Aug 2016
Encryption hiding malware in half of cyber attacks
Cyber attackers are using encryption to hide malicious activity, making it increasingly difficult to find as more organisations turn to encryption to protect data, a study has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
30 Aug 2016
Get protected: The importance of security
It is not uncommon for computer systems to be compromised by a company’s own employees. In this week’s issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls. Our CIO interview is TalkTalk’s CTO, Gary Steen, and we have a report from the Intel Developer Forum on the chipmaker’s future plans. Continue Reading
-
News
26 Aug 2016
Law firms planning litigation market for GDPR
Businesses should be preparing for the storm of litigation that is likely to be unleashed when the GDPR goes into force, warns Stewart Room of PwC Legal Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Aug 2016
Expect ransomware arrests soon, says bitcoin tracking firm Chainalysis
Law enforcement organisations are set to ramp up arrests of cyber criminals behind ransomware attacks, according to financial technology startup Chainalysis Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Aug 2016
Police arrest woman in connection with Sage data breach
A woman has been arrested on suspicion of fraud in connection with a data breach at accounting software firm Sage Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
18 Aug 2016
CW Benelux: Painting by numbers
In this issue of CW Benelux, we describe how data scientists in the Netherlands have applied technology to art. The Dutch are renowned for being creative with technology and the country has a deep history in art, boasting some of the most celebrated painters. It is therefore apt that the combined tech brains of ING, Microsoft, the Technical University of Delft and other contributors have created The Next Rembrandt, which serves as a visual showcase for big data. The new portrait in the style of Rembrandt van Rijn was put together by a combination of big data technology and 3D printing. All of Rembrandt’s 346 paintings were analysed using data analytics, making it possible to create a seemingly genuine Rembrandt image, while a 3D printer made accurate emulation of his paint patterns and textures a reality. Also in the Netherlands, we feature a case study about how The Hague is solving a bike parking headache with a mobile app. Continue Reading
-
News
16 Aug 2016
Cerber ransomware service reaps $195,000 profit in a month
Franchises such as Cerber are making highly profitable ransomware available to a broader range of cyber criminals, according to a report by security firm Check Point Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 Aug 2016
Financial sector faces era of cyber mega heists
Banks and other financial institutions are threatened by a new breed of elite cyber criminals running professional operations that will use any means to achieve their goals, says Barclays security chief Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 Aug 2016
Sage data breach underlines insider threat
Organisations need to take insider threats more seriously say security experts, as Sage warns that a data breach using an internal log-in may have compromised employee data at nearly 300 UK firms Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
10 Aug 2016
CW Nordics: Dealing with digital disruption
The Nordic countries are renowned for being home to thriving tech startup scenes, so it is hardly surprising that IT is a disruptive force in the region. In this quarter’s CW Nordics ezine we look more closely at how the Nordic region is being affected by technology disruption across industry sectors and how organisations are reacting to it. Continue Reading
-
News
10 Aug 2016
MI5 staff repeatedly overrode data surveillance rules
Security service MI5 is responsible for 210 “clear contraventions” over five years for the way it accessed private internet and telephone data Continue Reading
By -
News
08 Aug 2016
IT failure grounds Delta flights worldwide
US airline Delta has temporarily grounded flights worldwide after a power failure took key IT systems offline in its home base of Atlanta, Georgia Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Aug 2016
Strider cyber attack group deploying malware for espionage
Symantec security researchers have uncovered a spying campaign by a previously unknown group using modular malware as stealthware Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Aug 2016
Banner Health cyber breach underlines need for faster intrusion detection
A data breach at Banner Health has highlighted the importance of intrusion detection and prompted calls for greater cyber security investment in the increasingly targeted healthcare industry Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Aug 2016
Artificial intelligence takes centre stage in cyber security
Artificial intelligence-led cyber security technology has been in the spotlight at two major industry conferences in Las Vegas, signalling a firm trend in cyber defence research Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Aug 2016
One in five businesses hit by ransomware are forced to close, study shows
More than half of UK companies have been hit by ransomware in the past year, a study on the impacts of this popular attack method has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
28 Jul 2016
Six essential processes for keeping data secure
Data security is increasingly vital for organisations as the countdown begins for compliance with new rules imposed by the EU’s general data protection regulation Continue Reading
By- Christine Andrews