IT risk management
Risk management is an increasingly important discipline for IT leaders, with regulatory compliance an ever-present consideration and the amount of legislation and regulation concerning data security on the rise. We examine the issues around IT risk management and the best practices that IT managers need to know.
-
News
24 Dec 2024
Top 10 police technology stories of 2024
Here are Computer Weekly’s top 10 police technology stories of 2024 Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
20 Dec 2024
Top 10 data and ethics stories of 2024
Here are Computer Weekly’s top 10 data and ethics stories of 2024 Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
E-Zine
15 Nov 2016
Counting the cost of financial cyber crime
In this week’s Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer’s guide, on server operating systems, looks at the new features in Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping motivate staff. Read the issue now. Continue Reading
-
News
15 Nov 2016
Amber Rudd orders Lauri Love extradition to US to face hacking charges
Engineering student Lauri Love faces trials in three US states and a possible 99-year jail sentence for allegedly hacking into US government computer systems as part of a political protest, despite concerns over his health Continue Reading
-
E-Zine
03 Nov 2016
CW ASEAN: SMEs present security weakness
In this month's CW ASEAN, we look at how the cyber security defences at small and medium-sized enterprises in Southeast Asia may have some vulnerabilities, resulting in cyber security attacks on the large corporations they work with. We also consider the need to educate users of smartphones and tablets across the region as card fraud rates rise, with high use of mobile devices considered a contributing factor. Read the issue now. Continue Reading
-
E-Zine
03 Nov 2016
CW ANZ: Using gamification to build cyber security skills
In this month's CW ANZ, we look at how PwC is using an online game to give its customers first-hand experience of what it means to face a cyber attack. We also look at how identity is gaining greater prominence in the security debate in Australia as the DTO takes the wraps off plans for a national identity system. Read the issue now. Continue Reading
-
News
02 Nov 2016
Pure-play cyber security has real value, says incoming McAfee head
Intel Security has outlined its strategy to protect the new digital economy as it gears up for innovation as a new independent pure-play security firm under the McAfee banner Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 Nov 2016
UK government re-announces £1.9bn cyber security spend
Five-year spending increase - announced by Chancellor Philip Hammond 12 months after George Osborne did so - will support new UK cyber security strategy Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Feature
31 Oct 2016
The cyber threats lurking within every company
Insider threats have been around for a long time, but it is only recently that people have begun to acknowledge the true danger they pose Continue Reading
-
News
27 Oct 2016
Information security set for steep trajectory, says (ISC)2
By helping to create a thriving, diverse and open information security community, (ISC)2 hopes to ensure a steep rise for the profession Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Oct 2016
Schneider Electric praised for positive response to ICS security flaw
Schneider Electric has patched a security flaw that highlights the vulnerability of industrial control systems to cyber attack Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
25 Oct 2016
25 years of Linux
In this week’s Computer Weekly, 25 years after Linus Torvalds released the Linux kernel, we look at how the open-source operating system has influenced modern-day IT. Our new buyer’s guide covers the fast growing technology of object storage. And we examine the rise of corporate wireless networking. Read the issue now. Continue Reading
-
News
20 Oct 2016
Lessons to be learned from attempted $1bn bank heist
Analysis of an attack aimed at stealing $1bn reveals important lessons for cyber defenders, says BAE Systems head of threat intelligence Adrian Nish Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
20 Oct 2016
Reinventing Bahrain’s Kanoo Group through digital technology
In this quarter’s CW Middle East ezine, we feature the IT journeys of three companies in the region with detailed analysis of recent IT projects that were designed to support business transformation in a changing world. We hear how Bahrain-based conglomerate Kanoo Group is dealing with a company-wide digital transformation, Zahid Group’s biggest-ever IT investment, and how Rotana Hotels is centralising security. Continue Reading
-
News
19 Oct 2016
Snowden: the IT analyst turned whistleblower who exposed mass surveillance
Oliver Stone's biopic on Edward Snowden reaches the heart of the ethical crisis posed by mass surveillance for the state and ordinary citizens Continue Reading
-
News
18 Oct 2016
Saving Lauri Love: activists plan their next move
An eclectic bunch of activists, charity workers and reformed hackers spent a rainy Sunday afternoon plotting their next move in a campaign to save Lauri Love from extradition to the US on hacking charges Continue Reading
By- Julia Gregory
-
News
18 Oct 2016
Most businesses vulnerable to cyber attacks through firmware, study shows
Company culture and overall attitude to security is a major contribution to vulnerability to cyber attack through firmware, a study by Isaca has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 Oct 2016
Almost two-thirds of US office workers unaware of ransomware threat
Nearly half of ransomware attacks are aimed at office workers, but almost two-thirds of those polled in the US are unaware of the threat Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
12 Oct 2016
Gary McKinnon: Why Lauri Love should be spared the nightmare of extradition
Computer activist Lauri Love should be spared a life sentence in a US jail, says former hacker Gary McKinnon Continue Reading
By- Gary McKinnon
-
News
10 Oct 2016
Smartwatches banned from UK Cabinet as EC plans IoT security standards
The EC is planning a security certification scheme for internet of things devices as the UK Cabinet bans smartwatches amid heightened fears of cyber espionage Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Oct 2016
DDoS attacks consistent, relentless and costly, report shows
The latest global DDoS report from Neustar underlines the importance of investing in appropriate defences as the high volume of attacks looks set to increase Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Sep 2016
NGOs challenge UK and US mass surveillance in human rights court
Privacy International, Liberty and the American Civil Liberties Union are among 10 human rights groups backing a landmark challenge to mass surveillance in the European Court of Human Rights Continue Reading
By- Bill Goodwin, Computer Weekly
-
E-Zine
27 Sep 2016
Digital knowledge at the British Library
In this week’s Computer Weekly, we find out about the technology plans at the British Library as it aims to store the UK’s printed and digital history. Graph database technology is being used to help improve food safety throughout the supply chain – we examine how it works. And tech leaders tell us how to architect IT infrastructure for moving to the cloud. Read the issue now. Continue Reading
-
News
22 Sep 2016
Cyber attack aimed at destruction, says TV5Monde
TV5Monde counting the cost of not being adequately prepared for a cyber attacked that downed the network in 2015 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Sep 2016
Business warned not to be complacent about cyber security
Lloyds of London survey reveals just how badly some European firms are failing in terms of cyber security and low levels of awareness about the role of cyber insurance Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Sep 2016
Consumers trust banks more than government for biometric security
UK citizens think banks are the best organisations to provide biometric authentication for payments Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
16 Sep 2016
Alleged hacker Lauri Love can be extradited to the US, court rules
Westminster Magistrates’ Court has ruled that alleged hacker, Lauri Love, can be extradited to the US, where he could face a 99-year prison sentence Continue Reading
-
Feature
16 Sep 2016
Lauri Love: the student accused of hacking the US
How did a brilliant but fragile computer science student from a rural English town end up facing life imprisonment in the US? Computer Weekly speaks to Lauri Love Continue Reading
By- Bill Goodwin and Niels Ladefoged
-
News
07 Sep 2016
Basic security could have prevented OPM breach, says report
Basic security controls and malware-detection tools could have prevented the breach of more than 21 million records at the US Office of Personnel Management in 2015, claims a congressional report Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Sep 2016
Use ransomware to get security buy-in, says Trend Micro CTO
Ransomware is one of the top cyber threats to business, but organisations should use that to engage stakeholders and review processes and defences, says Trend Micro CTO Raimund Genes Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 Sep 2016
Lessons from the Dropbox breach
Dropbox is the latest major company to confirm a data breach, albeit four years old, but – as with all recent data breaches by cloud-based services – it highlights some key security lessons Continue Reading
By- Warwick Ashford, Senior analyst
-
News
31 Aug 2016
Evidence of DNS tunnelling in two-fifths of business networks
Cyber criminals are capitalising on the failure of many businesses to examine their DNS traffic for malware insertion and data exfiltration, according to Infoblox Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Aug 2016
Encryption hiding malware in half of cyber attacks
Cyber attackers are using encryption to hide malicious activity, making it increasingly difficult to find as more organisations turn to encryption to protect data, a study has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
30 Aug 2016
Get protected: The importance of security
It is not uncommon for computer systems to be compromised by a company’s own employees. In this week’s issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls. Our CIO interview is TalkTalk’s CTO, Gary Steen, and we have a report from the Intel Developer Forum on the chipmaker’s future plans. Continue Reading
-
News
26 Aug 2016
Law firms planning litigation market for GDPR
Businesses should be preparing for the storm of litigation that is likely to be unleashed when the GDPR goes into force, warns Stewart Room of PwC Legal Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Aug 2016
Expect ransomware arrests soon, says bitcoin tracking firm Chainalysis
Law enforcement organisations are set to ramp up arrests of cyber criminals behind ransomware attacks, according to financial technology startup Chainalysis Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Aug 2016
Police arrest woman in connection with Sage data breach
A woman has been arrested on suspicion of fraud in connection with a data breach at accounting software firm Sage Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
18 Aug 2016
CW Benelux: Painting by numbers
In this issue of CW Benelux, we describe how data scientists in the Netherlands have applied technology to art. The Dutch are renowned for being creative with technology and the country has a deep history in art, boasting some of the most celebrated painters. It is therefore apt that the combined tech brains of ING, Microsoft, the Technical University of Delft and other contributors have created The Next Rembrandt, which serves as a visual showcase for big data. The new portrait in the style of Rembrandt van Rijn was put together by a combination of big data technology and 3D printing. All of Rembrandt’s 346 paintings were analysed using data analytics, making it possible to create a seemingly genuine Rembrandt image, while a 3D printer made accurate emulation of his paint patterns and textures a reality. Also in the Netherlands, we feature a case study about how The Hague is solving a bike parking headache with a mobile app. Continue Reading
-
News
16 Aug 2016
Cerber ransomware service reaps $195,000 profit in a month
Franchises such as Cerber are making highly profitable ransomware available to a broader range of cyber criminals, according to a report by security firm Check Point Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 Aug 2016
Financial sector faces era of cyber mega heists
Banks and other financial institutions are threatened by a new breed of elite cyber criminals running professional operations that will use any means to achieve their goals, says Barclays security chief Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 Aug 2016
Sage data breach underlines insider threat
Organisations need to take insider threats more seriously say security experts, as Sage warns that a data breach using an internal log-in may have compromised employee data at nearly 300 UK firms Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
10 Aug 2016
CW Nordics: Dealing with digital disruption
The Nordic countries are renowned for being home to thriving tech startup scenes, so it is hardly surprising that IT is a disruptive force in the region. In this quarter’s CW Nordics ezine we look more closely at how the Nordic region is being affected by technology disruption across industry sectors and how organisations are reacting to it. Continue Reading
-
News
10 Aug 2016
MI5 staff repeatedly overrode data surveillance rules
Security service MI5 is responsible for 210 “clear contraventions” over five years for the way it accessed private internet and telephone data Continue Reading
By -
News
08 Aug 2016
IT failure grounds Delta flights worldwide
US airline Delta has temporarily grounded flights worldwide after a power failure took key IT systems offline in its home base of Atlanta, Georgia Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Aug 2016
Strider cyber attack group deploying malware for espionage
Symantec security researchers have uncovered a spying campaign by a previously unknown group using modular malware as stealthware Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Aug 2016
Banner Health cyber breach underlines need for faster intrusion detection
A data breach at Banner Health has highlighted the importance of intrusion detection and prompted calls for greater cyber security investment in the increasingly targeted healthcare industry Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Aug 2016
Artificial intelligence takes centre stage in cyber security
Artificial intelligence-led cyber security technology has been in the spotlight at two major industry conferences in Las Vegas, signalling a firm trend in cyber defence research Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Aug 2016
One in five businesses hit by ransomware are forced to close, study shows
More than half of UK companies have been hit by ransomware in the past year, a study on the impacts of this popular attack method has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
28 Jul 2016
Six essential processes for keeping data secure
Data security is increasingly vital for organisations as the countdown begins for compliance with new rules imposed by the EU’s general data protection regulation Continue Reading
By- Christine Andrews
-
News
28 Jul 2016
UK’s top security judges struggle to assess privacy threats
Technological advancements make it difficult for the Investigatory Powers Tribunal to assess privacy threats, say the tribunal’s own judges Continue Reading
-
News
26 Jul 2016
Date set for landmark hearing into EU-US data transfers
Irish court hearing triggered by Austrian law student Max Schrems could have huge implications for EU-US trade and the data privacy rights of millions of EU citizens Continue Reading
By- Computer Weekly Reporters
-
News
19 Jul 2016
Carbon Black bets on next-generation antivirus
Carbon Black is betting on next-generation antivirus technology by acquiring Confer to extend the capability and appeal of its endpoint protection offerings Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Jul 2016
Case study: Rémy Cointreau boosts security and productivity
Drinks firm Rémy Cointreau uses Centrify’s identity and mobile management to simplify security, improve business agility and reduce IT costs Continue Reading
By- Warwick Ashford, Senior analyst
-
News
14 Jul 2016
Cyber attacks cost UK business more than £34bn a year, study shows
Nearly half of UK firms lack advanced cyber defences, despite the high level of concern about cyber attacks and associated costs Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Jul 2016
IBM sets up security centre in Canberra
IBM leads the charge as large private businesses invest heavily in security resources across Australia in an attempt to close the security gap Continue Reading
-
E-Zine
07 Jul 2016
CW ASEAN: July 2016
Lessons from the Philippine government hack: In this issue we ask why a hack on the Philippine Commission on the Elections (Comelec) was allowed to happen and what organisations in Southeast Asia can learn from this breach of security. Retailers in the region are concerned – read how the theft of customer data is their biggest worry. Continue Reading
-
E-Zine
07 Jul 2016
CW ANZ: July 2016
Australia knows it has a cyber security problem, but not the scale. In this month’s CW ANZ we describe how Australia's $230m security strategy serves as a wake-up call to enterprises. We also reveal the techniques and technologies being used to protect one Australian school, as well as a more general look at the main cyber threats to orgainsations in Australia. Read the issue now. Continue Reading
-
Feature
07 Jul 2016
The problem of passwords and how to deal with it
Security experts have long recognised passwords as inadequate, but finally technology is offering some viable alternative authentication methods that businesses can explore to keep their data safe Continue Reading
-
News
06 Jul 2016
UK's Darktrace aims to lead the way to automatic cyber security
Darktrace hopes to be a leader in the move to automated cyber security to free up security professionals to focus on business risk and innovation Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
05 Jul 2016
How will UK IT adapt after Brexit?
In this week’s Computer Weekly, as the aftershocks continue from the UK’s decision to leave the European Union, we look at the implications and challenges for the UK technology community. Our latest buyer’s guide examines expense management software. And IT leaders discuss ethics in IT and debate the question – can you trust your technology? Read the issue now. Continue Reading
-
News
30 Jun 2016
LizardStresser IoT botnet launches 400Gbps DDoS attack
Attack groups using the LizardStresser botnet are exploiting IoT devices to mount massive DDoS attacks without using amplification techniques, say researchers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Jun 2016
Lauri Love using illness as a shield against extradition, claims prosecution
Prosecution lawyer questions whether activist Lauri Love is not fit enough to stand trial in the US over hacking charges,as expert witnesses warn that US prisons are ill-equipped for people with mental health problems. Continue Reading
By- Bill Goodwin and Fiona O'Cleirigh
-
News
28 Jun 2016
Lauri Love suicide risk if extradited to US over hacking allegations
Westminster Magistrates’ Court hears evidence from medical experts that alleged hacker Lauri Love is at risk of suicide if extradited to the US Continue Reading
By- Bill Goodwin and Fiona O'Cleirigh
-
News
21 Jun 2016
Cyber security industry mostly welcomes report on TalkTalk breach
Most of the recommendations of a government committee inquiry into the TalkTalk breach have been welcomed, but pundits have expressed reservations about some, particularly proposed new fines Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Jun 2016
Lower average cost of Australian data breaches is not a sign of comfort
The average cost of a data breach to Australian organisations dropped in 2015, according to research Continue Reading
-
E-Zine
14 Jun 2016
The password’s the problem – lessons from the LinkedIn breach
In this week’s Computer Weekly, after millions of LinkedIn users had their data compromised, we look at the lessons to be learned from this latest data breach incident. Our buyer’s guide looks at NoSQL technologies and compares the offerings from database leaders Microsoft and Oracle. And we examine the benefits of cloud-based data analytics and how to make it work for your organisation. Read the issue now. Continue Reading
-
News
13 Jun 2016
EU firms slow in detecting cyber attacks, study shows
European firms take an average of 469 days to discover a compromise, compared with an average of 146 days globally, according to Mandiant Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Jun 2016
Philippines government data breach is a warning to Asean region
Security is a rising concern in the Asean region, with fears fuelled by incidents such as the recent hacking incident in Manila Continue Reading
By -
News
10 Jun 2016
IoT security: Lack of expertise will hurt, says Bruce Schneier
Government action at national and international levels is essential for addressing IoT security issues, but the relevant expertise is lacking, according to security expert Bruce Schneier Continue Reading
By- Warwick Ashford, Senior analyst
-
News
07 Jun 2016
Millions of sensitive IT services exposed to the internet, study finds
Encryption should become the default as study reveals millions of sensitive services are exposed to the internet, says Rapid7 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 Jun 2016
MPs’ private emails are routinely accessed by GCHQ
Computer Weekly investigation reveals the extent of interception of MPs’ and peers’ email communications and data Continue Reading
By- Duncan Campbell and Bill Goodwin
-
Feature
01 Jun 2016
My first IoT project: A guide for businesses
We’ve all had a good giggle about having our fridges hacked – but now it’s time to get real. What are the first steps enterprises should take when implementing their first internet of things project? Continue Reading
By -
News
20 May 2016
NHS data security standards to be designed around technology, people and processes
The Care Quality Commission’s delayed review of NHS data security standards will encourage NHS organisations to have senior information risk owners and Caldicott Guardians at board level Continue Reading
By -
E-Zine
20 May 2016
CW Benelux: May-July 2016
Welcome to the Computer Weekly ezine focused on the Benelux region. This quarterly publication will look at the issues facing CIOs in Belgium, the Netherlands and Luxemburg. Continue Reading
-
News
19 May 2016
Lessons from LinkedIn data breach revelations
There are several important lessons to be learned from revelations about LinkedIn's 2012 data breach, say security experts Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
17 May 2016
Countdown begins to new EU data protection rules
In this week’s Computer Weekly, with the new EU data protection rules ready to become law, firms now have just two years to prepare for the stringent regulations – we assess the challenges. Manufacturing giant Rolls-Royce talks about why it moved its HR systems to the cloud and the lessons it learned. And we look back at 50 years of technology innovation in storage. Read the issue now. Continue Reading
-
News
13 May 2016
Time to shift information security focus away from prevention, says Swiss bank CISO
Organisations need a new approach which recognises security is “breakable”, according to Michael Meli Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 May 2016
Australian health sector an easy target for cyber criminals, says IBM
A push to encourage greater adoption of electronic health records has raised the spectre of online record theft Continue Reading
-
News
06 May 2016
Ransomware emerges as a top cyber threat to business
Security researchers at Kasperky Lab and FireEye confirm that the upward trend of ransomware is continuing and has emerged as a top threat to business Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Apr 2016
Cyber security in Belgium will gain prominence after terror attacks
Belgium’s physical security has been branded inadequate, so how does the country’s cyber security measure up? Continue Reading
By- Stef Gyssels
-
News
28 Apr 2016
Payment card industry issues data security standard update
PCI DSS version 3.2 introduces six new requirements for compliance, some additional guidance and a raft of clarifications Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Apr 2016
IPv6 alone will not secure IoT, warns GE CISO
It is important for all users of the internet of things to understand what they are getting into with IPv6, and to be aware of the risks and myths, says GE CISO Hanns Proenen Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Apr 2016
Business failing to learn lessons of past cyber attacks, report shows
Organisations are still failing to address basic security issues and well-known attack methods, Verizon’s latest Data Breach Investigations Report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Apr 2016
GCHQ told analysts to assume surveillance 'bulk data' is legal
Documents obtained by charity Privacy International reveal insights into GCHQ’s collection of sensitive bulk data, as lawyers question the impact of surveillance on legal privilege, fair trials and protection of whistleblowers Continue Reading
By- Alex Scroxton and Bill Goodwin
-
E-Zine
19 Apr 2016
The hunters who prey on cyber criminals
In this week’s Computer Weekly, we talk to the hunters – a new breed of security expert that proactively hunts down cyber attackers before they can strike. We visit Silicon Valley to meet some of the up-and-coming startups in data analytics and business intelligence. And we hear from IT leaders about the people, process and cultural aspects of managing digital transformation. Read the issue now. Continue Reading
-
News
19 Apr 2016
Employees’ use of personal devices puts firms at risk of malware infection, says report
Downloaders care about their own security while grabbing pirated content, not that of their employers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 Apr 2016
Israeli volunteers ready their cyber defences as Anonymous affiliates attack
Every April, Israel braces itself for an onslaught from pro-Palestinian hackers, but the occupants of a small conference room in Tel Aviv stand in their way Continue Reading
By- Niv Lilien
-
News
15 Apr 2016
BBC turns micro:bit computers into IoT devices
The BBC and Nominet demonstrate a new use case for the micro:bit computer and hope to turn Britain’s schoolchildren into internet of things pioneers Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Apr 2016
NCA attempts 'back door' access to obtain activist Lauri Love’s passwords
Court told that use of civil proceedings to force disclosure of alleged hacker Lauri Love's passwords is disproportionate and would breach human rights law Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
11 Apr 2016
QA launches cyber attack defence training facility in London
Training firm QA launches a cyber attack simulation facility in London to enable organisations to test and learn cyber defence skills Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Apr 2016
Activist Lauri Love faces order to disclose encryption keys
The UK’s National Crime Agency takes an unusual legal step to force a former university student accused of hacking to disclose encryption keys Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
11 Apr 2016
IT specialist sentenced for stealing NHS computer equipment
A former NHS IT worker is convicted of stealing hospital computer equipment from Doncaster and Bassetlaw Hospitals NHS Foundation trust and selling them on eBay Continue Reading
By -
News
05 Apr 2016
'Citizens will be stripped naked' by Turkey’s data law
Turkey's data protection law, introduced in March 2016, will make Turkey a near total surveillance state, yet the EU, apparently more concerned about securing Turkey's help in controlling immigration, is turning a blind eye Continue Reading
By- Craig Shaw & Zeynep Sentek
-
News
31 Mar 2016
DDoS attacks on universities normally performed by “disgruntled” students or employees
The majority of distributed denial of service attacks on universities are made by students or employees, says the head of infrastructure services at the University of London Continue Reading
By- Clare McDonald, Business Editor
-
News
30 Mar 2016
Security should be driven by business, says Corvid’s Andrew Nanson
Information security should be business-driven and investments assessed for their effectiveness and business value, according to Corvid CTO Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Mar 2016
Cyber criminals use Microsoft PowerShell in ransomware attacks
A newly discovered family of ransomware, dubbed PowerWare, uses Microsoft PowerShell to target organisations through macro-enabled documents Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
29 Mar 2016
Hunters: a rare but essential breed of enterprise cyber defenders
They wait, they watch, they search the outer reaches of networks and the darkest corners of the web, setting traps, crafting tools, collecting evidence and going in pursuit: they are the hunters Continue Reading
By- Warwick Ashford, Senior analyst
-
News
24 Mar 2016
Government warned of smart meter security threat back in 2012
The government was warned four years ago that its plans for a nationwide smart meter roll-out represented a “potentially significant” security and privacy threat, Computer Weekly has learned Continue Reading
By- Bryan Glick, Editor in chief
-
News
23 Mar 2016
US hospital claims to have fought off a ransomware attack
A hospital in Kentucky claims to have regained control of its IT systems five days after cyber criminals hit it with a ransomware attack Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
23 Mar 2016
How to manage IT access for external users
Identity and access management has extended from being solely an internal IT management process to focus on external business engagement too Continue Reading
By -
News
21 Mar 2016
Britain to pay billions for monster internet surveillance network
New questions raised about Britain’s snoopers’ charter after Denmark abandons its own UK-style surveillance programme for a second time Continue Reading
By- Duncan Campbell , 2QQ Ltd, Sussex University
-
News
21 Mar 2016
National Cyber Security Centre to be UK authority on information security
The UK’s National Cyber Security Centre (NCSC) is to be the UK's one-stop authority on infosec, based in London and led by GCHQ's Ciaran Martin Continue Reading
By- Warwick Ashford, Senior analyst