IT risk management
Risk management is an increasingly important discipline for IT leaders, with regulatory compliance an ever-present consideration and the amount of legislation and regulation concerning data security on the rise. We examine the issues around IT risk management and the best practices that IT managers need to know.
-
News
25 Oct 2024
Dutch critical infrastructure at risk despite high leadership confidence
Stark paradox in Dutch cyber security landscape has business leaders expressing high confidence in their IT infrastructure as cyber attacks rise Continue Reading
-
News
11 Jul 2024
Dutch research firm TNO pictures the SOC of the future
In only a few years, security operations centres will have a different design and layout, and far fewer will remain Continue Reading
-
News
29 Apr 2015
Vodafone sends network in a backpack to Nepal earthquake zone
Vodafone’s charitable arm, the Vodafone Foundation, deploys instant mini networks to help restore communications in quake-hit Nepal Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
27 Apr 2015
Top tips for remote and mobile workers to improve their cyber security
Steps remote and mobile workers can take to improve cyber security on mobile devices, using public Wi-Fi and computers, and handling USB devices Continue Reading
By- Peter Wood, First Base Technologies LLP
-
Feature
25 Apr 2015
Bill Binney, the ‘original’ NSA whistleblower, on Snowden, 9/11 and illegal surveillance
Always a patriot: Computer Weekly talks to Bill Binney, the senior NSA official who blew the whistle before Edward Snowden Continue Reading
-
News
23 Apr 2015
Mobile malware overhyped, says security company Damballa
Mobile internet users are 1.3 times more likely to get struck by lightning than infected by mobile malware, research by security firm Damballa finds Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Apr 2015
Destructive cyber attacks making security a business concern, says Microsoft
Destructive cyber attacks are driving a fundamental shift in the information security market, according to Microsoft Continue Reading
By- Warwick Ashford, Senior analyst
-
News
14 Apr 2015
Security risk potential linked to young, mobile users
A study conducted by wireless supplier Aruba Networks has identified a distinct cohort of high-risk, security-agnostic workers Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Apr 2015
Alleged White House hack highlights typical security failings, say experts
The alleged penetration of sensitive White House computer networks highlights typical security failings, say information security experts Continue Reading
By- Warwick Ashford, Senior analyst
-
News
31 Mar 2015
DDoS losses potentially £100k an hour, survey shows
DDoS attacks could expose 40% of businesses to losses of £100,000 or more an hour at peak times, a survey shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Mar 2015
Samsung targets business with Microsoft tools integration
Samsung has pre-installed Microsoft OneNote, OneDrive, and Skype on the new Galaxy S6 and Galaxy S6 edge, as it expands into business Continue Reading
By- Cliff Saran, Managing Editor
-
News
26 Mar 2015
UK attacks on crypto keys and digital certificates endemic
All UK security professionals polled in a global survey have responded to attacks on keys and certificates in past two years Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Mar 2015
Home devices threaten enterprise data security, warn researchers
Poor or lacking security on ADSL routers and other devices used by teleworkers a threat to global enterprise information security Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 Mar 2015
Lookout bets on big data analytics to secure enterprise mobiles
Mobile security SaaS provider Lookout is betting on its cloud-based big data analytics capability to attract enterprise customers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Mar 2015
Why IAM is topping security investments in 2015
It is not surprising identity and access management (IAM) is set to move to the fore in 2015 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Mar 2015
How to ensure your hot-desking colleagues keep their data secure
Once hot-desking is implemented, data security suddenly demands greater attention Continue Reading
By- Christian Cawley
-
Feature
06 Mar 2015
How to secure the SDN infrastructure
As more enterprises look to deploy software-defined networking, the need for security from the ground up should not be underestimated Continue Reading
By -
News
27 Feb 2015
Case study: Norwegian insurer invests in Darktrace machine-learning cyber defence
Shipping insurance company DNK hopes to inspire the rest of the shipping industry to adopt Darktrace’s cyber defence system Continue Reading
-
News
26 Feb 2015
Cloud security still needs a lot more work, say European experts
Security and privacy remain a stumbling block for cloud computing, according to information experts at the Trust in the Digital World conference Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Feb 2015
Intel Security warns of six social engineering techniques targeting businesses
An Intel Security report encourages businesses to address and educate employees on “six levers of influence” used by hackers Continue Reading
By- Warwick Ashford, Senior analyst
-
Tip
19 Feb 2015
Five ways to prepare a company board for a cyber breach
Five key things that boards need to do to stop their businesses leaking like sieves and potentially going to the wall Continue Reading
By- Neil Hare-Brown
-
News
12 Feb 2015
Damballa report highlights the limitations of prevention-centric security
Anti-virus (AV) suppliers can take more than six months to create signatures for malware, according to a report from security firm Damballa Continue Reading
By- Warwick Ashford, Senior analyst
-
Tip
03 Feb 2015
How to implement risk-based security
Implement a simple process to identify, analyse and prioritise risk without significant investment in time or money Continue Reading
By- Peter Wood, First Base Technologies LLP
-
Opinion
03 Feb 2015
Five questions every board should ask after Sony Pictures breach
What can the board do to avoid having to answer embarrassing questions at the next shareholder meeting? Continue Reading
By -
E-Zine
26 Jan 2015
Why we need cyber war games
In this week’s Computer Weekly, the UK and US are starting a cyber war on each other – all in the name of testing each other’s defences. We look at why the cyber war games are needed. We examine what IT managers can learn from the car industry to improve supplier relationship management. And we find out why innovation should be top of the IT agenda in 2015. Read the issue now. Continue Reading
-
News
16 Jan 2015
Security Think Tank: How to deal with wiper malware
How much should businesses worry about destructive, computer-killing malware, and what steps should they take to mitigate attacks? Continue Reading
By- Tim Holman, 2-sec
-
News
16 Jan 2015
FTSE 350 firms still have long way to go on cyber risk
Many FTSE 350 firms still have a long way to go to manage the risks of a cyber attack, a government-backed cyber governance health check has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Jan 2015
Attackers bypass conventional security, says FireEye study
Hackers breach most conventional, signature-based security technologies, with 27% involving advanced threats Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Jan 2015
Online money transfer provider Xoom suffers multimillion-dollar fraud
Digital money transfer provider Xoom has admitted to suffering a $30.8m loss at the hands of fraudsters Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
23 Dec 2014
What might North Korea v US cyberwarfare over Sony mean for other corporates?
North Korea behind Sony attack and US counter-penetration -- what now, asks SearchCIO's Francesca Sales. Continue Reading
-
News
18 Dec 2014
CIO interview: Mercedes AMG Petronas IT director on the need for speed in IT
When Matt Harris became IT director for F1 team Mercedes AMG Petronas in 2009, IT costs needed to be slashed Continue Reading
By- Cliff Saran, Managing Editor
-
News
17 Dec 2014
Cabinet Office begins procurement for next stage of Gov.uk Verify
The Cabinet Office has submitted a tender notice for a £150m three-year framework for the provision of identity assurance services Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
04 Dec 2014
Sony hack exposes poor security practices
Sony Pictures Entertainment remains tight-lipped about its recent cyber attack, but security lessons can be drawn from what is known Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 Nov 2014
CGI secures communications between pilots and air traffic control
Satellite communications firm Inmarsat has outsourced the provision of security IT and services to CGI Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
27 Nov 2014
BSI urges UK businesses to bolster cyber security
UK businesses are at risk of reputational damage due to lack of awareness on how to protect their data assets, BSI research shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Nov 2014
Russian webcam-spying site highlights common security failing
A Russian website collecting images from internet-connected cameras highlights a common security failing, say security professionals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Nov 2014
Microsoft releases emergency security patch for Windows and Windows Server
Microsoft emergency patch fixes a Windows and Windows Server vulnerability hackers are exploiting to compromise networks Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Nov 2014
Network firewalls as relevant to data security as ever, says industry pioneer Gil Shwed
Network firewalls are as relevant to data security today as they were 20 years ago, says industry pioneer Gil Shwed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
07 Nov 2014
Home Depot traces credit card data hack to supplier compromise
US retailer Home Depot reveals its recent data breach was linked to a compromised supplier’s credentials Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Oct 2014
Many firms still unprepared for cyber attack, EY survey shows
More than a third of organisastions have no real-time insight on cyber risks necessary to combat rising threats, a survey has shown Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Oct 2014
Firms at serious risk of data loss through file sharing, study shows
Businesses are at serious risk of data loss and compliance violations due to risky file-sharing practices, a study has shown Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 Oct 2014
Most businesses do not understand risks of data breaches, study finds
More than 70% of businesses do not understand fully the risks associated with data breaches, a study shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Oct 2014
Incident response: a common failing
Organisations hit by cyber attacks often lack an effective incident response plan. Why are so many unprepared? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Oct 2014
Cloud providers rush to build European datacentres over data sovereignty
Cloud providers IBM and Google build datacentres in the EU as enterprises insist on keeping their data in Europe Continue Reading
By- Archana Venkatraman, Datacentre Editor
-
E-Zine
27 Oct 2014
Securing critical industrial systems
In this week’s Computer Weekly, we examine the security threats to the industrial control systems that power the UK’s critical national infrastructure, and ask what can be done to better protect them. We look at the key considerations when choosing an infrastructure as a service supplier. And we compare six of the top hybrid flash array products from the leading storage hardware providers. Read the issue now. Continue Reading
-
News
16 Oct 2014
UK is prime target for cyber attacks, says FireEye
The UK has been greatest target of advanced cyber attacks in Europe, the Middle East or Africa in the first half of 2014, report shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 Oct 2014
Industrial control systems: What are the security challenges?
Targeted attacks on industrial control systems are the biggest threat to critical national infrastructure, says Kaspersky Lab Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Oct 2014
Azure CTO Mark Russinovich's top ten public cloud security risks
Microsoft Azure cloud CTO Mark Russinovich identified ten key security risks of public cloud services Continue Reading
By- Archana Venkatraman, Datacentre Editor
-
News
09 Oct 2014
WordPress most attacked application
Websites that run the WordPress content management system are attacked 24% more often than those using other systems Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
08 Oct 2014
Malware being used to steal cash from ATMs
Criminals are using malware to steal cash from ATMs without debit and credit cards Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
07 Oct 2014
Engineering company rolls out talent management software across 17 countries
Meggitt is deploying cloud-based HR technology as it seeks to integrate 60 diverse business units into a multinational operation Continue Reading
By- Bill Goodwin, Computer Weekly
-
E-Zine
03 Oct 2014
CW Europe - October 2014 Edition
BYOD policies: What’s allowed and what’s banned? As IT departments still try to come to terms with the notion of BYOD, CW Europe takes a look at what policies are being implemented to keep security under control. Continue Reading
-
News
01 Oct 2014
European firms far from ready for new data rules, study shows
As European authorities aim to ratify revised data protection rules by 2015, many firms have a lot to do to comply Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Sep 2014
Cyber Essentials for public sector IT suppliers: pros and cons
What are the pros and cons of the Cyber Essentials Scheme certification mandated for public sector IT suppliers? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Sep 2014
Bash bug could be bigger threat than Heartbleed
A bug in the Bash command prompt software used by many Unix computers could be a greater threat than Heartbleed. Continue Reading
-
News
22 Sep 2014
Conficker infections an indictment of IT security, says CWG
Conficker worm infections reflect the “sad state of affairs of IT security”, says the Conficker Working Group Continue Reading
By- Warwick Ashford, Senior analyst
-
News
17 Sep 2014
Risk management key to cyber strategy, says BP
Cyber attacks constitute a group-level risk that is managed as part of BP’s standard set of risk management processes, says group chief Continue Reading
By- Warwick Ashford, Senior analyst
-
News
08 Sep 2014
Ransomware on the rise, warns cyber threat report
The first half of 2014 saw an increase in online attacks that lock up user data and hold it for ransom, reports F-Secure Labs Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 Aug 2014
Microsoft re-releases security bulletin MS14-045
Microsoft has re-released a software security update that was withdrawn because it put some computers in endless reboot loops Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Aug 2014
Security experts identify top 10 software design flaws
The IEEE Center for Secure Design has published a report on how to avoid the top 10 software security design flaws Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Aug 2014
Load balancing supports Kent County Council's VDI project
Kent County Council picks Kemp Technologies load balancers to support a deployment of VMware Horizon View and Workspace across its estate Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
20 Aug 2014
The internet of things is coming: Is your datacentre ready?
Gartner estimates the IoT will see 26 billion units installed by 2020 – channelling huge volumes of data traffic into datacentres Continue Reading
-
News
11 Aug 2014
USB-connected devices present cyber vulnerabilities
Connecting devices to computers using a USB port could lead to security breaches, say Berlin-based researchers Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
05 Aug 2014
Cyber Security Challenge UK takes on the internet of things
The latest level of the Cyber Security Challenge will involve participants hacking devices connected to the internet of things Continue Reading
By- Clare McDonald, Business Editor
-
News
29 Jul 2014
Tackle IAM with a risk-based approach, says KPMG
A risk-based approach is the best way to tackle identity and access management, says KPMG Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 Jul 2014
Total internet failure: are you prepared?
A total internet failure could stop any business in its tracks, yet few are preparing for this possibility, KPMG has warned Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Jul 2014
Why using voice biometrics is a good idea
Banks and other organisations are turning to voice biometrics, but why do they believe the technology is good idea? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
07 Jul 2014
Smart light bulbs get security update
Smart light bulb maker LIFX has issued a firmware update after security researchers exposed a security weakness Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Jul 2014
Barclays passes government’s ‘internet-born threat’ test
Barclays Bank has been awarded the government’s cyber security certificate for digital banking services after independent tests of services such as Pingit Continue Reading
-
News
04 Jul 2014
Security Think Tank: The dos and don’ts of a good incident response plan
What does a good information security incident response plan look like? Continue Reading
By- Tim Holman, 2-sec
-
News
02 Jul 2014
ISPs take legal action against GCHQ over mass network infrastructure surveillance
Six global internet service providers (ISPs) have filed a legal complaint calling for a halt to GCHQ’s use of network infrastructure for surveillance Continue Reading
By- Alex Scroxton, Security Editor
-
News
01 Jul 2014
Industrial control systems increasingly under attack, says Kaspersky
Targeted attacks on industrial control systems take place on a regular and increasing basis, says Kaspersky Lab Continue Reading
By- Warwick Ashford, Senior analyst
-
News
17 Jun 2014
Domino’s breach underlines value of personal data, say experts
The latest cyber breach to hit a high-profile brand underlines the high value of personal data, say security experts Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 Jun 2014
Microsoft admits running out of IP addresses for Azure
Microsoft has assured US Azure customers data remains in the US, despite running out of US-registered IP addresses at times Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Jun 2014
IT departments unprepared for internet of things
Only 41% of IT professionals are working on projects to prepare their business for the internet of things Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
09 Jun 2014
Turing Test 2014 marks historic milestone in artificial intelligence
A computer program has made history by passing the artificial intelligence test set by computer science pioneer Alan Turing Continue Reading
By- Warwick Ashford, Senior analyst
-
News
02 Jun 2014
Cyber threats hiding in plain sight, says Palo Alto Networks
Cyber attackers exploit commonly used business applications to bypass security controls, research shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 May 2014
UK shoe retailer Office hit by data breach
Data breach at UK shoe retailer Office prompts calls for online firms to beef up security around customer details Continue Reading
-
News
27 May 2014
Android Outlook app has privacy issues, warn researchers
Microsoft’s Outlook.com app for Android is exposing users' data, warn security researchers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 May 2014
Internet of things security is relevant to business, says researcher
Internet of things is relevant to enterprise information security professionals, says researcher Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 May 2014
Orange data breach underlines need for encryption, say experts
The theft of 1.3 million customer records from Orange, France underlines the need for encryption, say experts Continue Reading
By- Warwick Ashford, Senior analyst
-
News
08 May 2014
Internet privacy could thwart data security, warns expert
Steps to improve online privacy could thwart data security, warns security expert Hugh Thompson Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Apr 2014
Infosec 2014: Threat knowledge is key to cyber security, say experts
Business should improve awareness of cyber risks to stay ahead of criminals, say experts Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Apr 2014
UK and Ireland cyber attacks up 300% in 2013, says FireEye
UK and Ireland enterprises were hit by an average of more than 70 new infections a day in 2013, a report shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 Apr 2014
US judge orders Microsoft to hand over email data held in Dublin
A US Judge has ordered Microsoft to give the District Court access to the contents of one of its customer’s emails stored on a server located in Dublin Continue Reading
By- Archana Venkatraman, Datacentre Editor
-
News
25 Apr 2014
Cyber threat detection paramount, says SANS fellow
Cyber threat prevention is ideal, but detection is a must, says Eric Cole, SANS Institute fellow Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Apr 2014
Heartbleed prompts tech firms to pledge open-source support
Top tech firms have joined forces to support open-source software to help prevent future bugs like Heartbleed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
17 Apr 2014
Datacentre lessons learnt from Heartbleed bug
The Heartbleed bug, an OpenSSL flaw affecting millions of websites, has some lessons for datacentre providers and operators Continue Reading
By- Archana Venkatraman, Datacentre Editor
-
News
27 Mar 2014
Security an unnecessary expense, say one in six techies
One in six IT professionals see security as an unnecessary expense, a study has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Mar 2014
Customer privacy an ongoing challenge, says Unilever
Unilever has set up a programme to address the continually evolving challenge of privacy issues relating to customer data Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Mar 2014
Pirated software malware to cost business $491bn in 2014, study shows
Malware deliberately loaded into pirated or counterfeit software is expected cost enterprises $491bn in 2014 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Mar 2014
Firms urged to take tough action on Unix-based cyber attack
Security researchers have urged businesses to take action on a cyber criminal campaign that has seized control of 25,000+ Unix servers worldwide Continue Reading
By- Warwick Ashford, Senior analyst
-
News
17 Mar 2014
SMEs believes they are immune to cyber attack
Most SMEs believe they are not at real risk of cyber attack, a survey has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
14 Mar 2014
Hacktivism: good or evil?
IT lawyer Dai Davis looks at the rise of hacktivism and its impact on business and international politics Continue Reading
By- Dai Davis, Percy Crow Davis & Co
-
News
12 Mar 2014
Government finally ends e-Borders programme
The government has formally ended the troubled e-Borders programme, with its intended functions merged into a new project Continue Reading
By- Bryan Glick, Editor in chief
-
News
12 Mar 2014
More than 162,000 WordPress sites used in DDoS attack
Security researchers have uncovered a DDoS attack that used more than 162,000 legitimate and unwitting WordPress websites Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
10 Mar 2014
Making data flow freely
In this week’s Computer Weekly, our latest buyer’s guide looks at open data and how it can improve public services – and even help prevent a repeat of the recent floods. We report from Cloud Expo on the reasons why public cloud is yet to be embraced by enterprise IT. And we look at the key issues for buying HR software in 2014. Read the issue now. Continue Reading
-
News
04 Mar 2014
IT Security Salary Index (UK)
Are you being paid the right rate for the job? Check out this IT Security salary index from Acumin. Continue Reading
-
News
04 Mar 2014
Governance, Risk Management and Compliance (GRC)
Ensuring that all the stakeholders' information needs are met requires a holistic approach to managing information – the creation of a GRC platform, say analysts Clive Longbottom and Rob Bamforth. Continue Reading
-
News
03 Mar 2014
Legal briefing: The Draft EU General Data Protection Regulation
This report from law firm Morrison & Foerster, sets out some of the most important changes for private sector organisations in the draft EU Data Protection Regulation. Continue Reading
-
News
21 Feb 2014
Employee mobiles expose firms to attack, says Webroot
Employees mobile devices expose companies to malicious applications and attacks, according to the latest mobile threat report from Webroot Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Feb 2014
UK firms see 1,000+ internal data breaches a day, study finds
Internal threats are not a high priority for UK firms despite more than 1,000 internal data breaches a day Continue Reading
By- Warwick Ashford, Senior analyst