IT risk management
Risk management is an increasingly important discipline for IT leaders, with regulatory compliance an ever-present consideration and the amount of legislation and regulation concerning data security on the rise. We examine the issues around IT risk management and the best practices that IT managers need to know.
-
News
25 Oct 2024
Dutch critical infrastructure at risk despite high leadership confidence
Stark paradox in Dutch cyber security landscape has business leaders expressing high confidence in their IT infrastructure as cyber attacks rise Continue Reading
-
News
11 Jul 2024
Dutch research firm TNO pictures the SOC of the future
In only a few years, security operations centres will have a different design and layout, and far fewer will remain Continue Reading
-
News
10 Jun 2013
Telefonica Digital forms security group Eleven Paths
The business division of mobile operator Telefonica launches Eleven Paths, an independent company working on security issues in the workplace Continue Reading
By- Jennifer Scott, TechTarget
-
Feature
10 Jun 2013
Manage identity and access to improve business processes
Streamlining identity and access management is essential to exploiting your organisation’s assets and employees’ productivity. Continue Reading
By- Andras Cser
-
News
05 Jun 2013
Human error causes most data breaches, Ponemon study finds
Human errors and system problems caused two-thirds of data breaches in 2012, according to a study from Symantec and the Ponemon Institute Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Jun 2013
Information Governance
This research from AIIM looks at the risk profile around electronic records, the keep-all versus delete-all options, e-discovery, and the implications of social, mobile and cloud on risk management policies. Continue Reading
-
News
21 May 2013
Privileged accounts key to most APT attacks, says Cyber-Ark
The theft, misuse and exploitation of privileged accounts is becoming an increasingly key tactic in advanced persistent threat attacks Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 May 2013
Microsoft declares conformance with ISO 27034-1
Microsoft has declared conformance with ISO 27034-1, the first part of an international standard for secure software development Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 May 2013
Cyber criminals hack Washington court system
Hackers gain access to the personal data of 160,000 US citizens after compromising Washington State court service servers Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
07 May 2013
Symantec helps NHS trust cut security costs by a quarter
The Royal Liverpool and Broadgreen University Hospitals NHS Trust cut security costs by 25% in its partnership with security supplier Symantec Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 May 2013
Computer Weekly European User Awards for Security: Winners
The winners are in for the Computer Weekly European User Awards for Security. See who made the top spots. Continue Reading
By- Kayleigh Bateman, Computer Weekly
-
News
01 May 2013
What’s to be done about data breach discovery?
The time from first contact by cyber attackers to the victim learning of it is still measured in months and years, not hours and days Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 May 2013
CW buyer's guide: context-aware security
This 11-page Computer Weekly buyer's guide looks at how organisations should approach context-aware security technologies and what business benefits they can deliver. Continue Reading
-
News
01 May 2013
Information Security Breaches Survey 2013
Security breaches cost large businesses an average of £850,000, the 2013 Information Security Breaches Survey reveals. Continue Reading
-
News
01 May 2013
CW Special Report on CSC
This 16-page report from Computer Weekly analyses the challenges facing CSC, its financial performance, the services it offers, its place in the IT market and its future strategy. Continue Reading
-
News
29 Apr 2013
Another online firm hit by data breach
Online deals service LivingSocial is the latest company to report a breach of its computer systems that may mean attackers accessed customer details Continue Reading
-
News
24 Apr 2013
Protecting against modern password cracking
This article in our Royal Holloway Security Thesis series explains just how insecure passwords are and offers advice on alternative methods of security. Continue Reading
-
News
22 Apr 2013
Infosec 2013: University research challenges reliability of IPS
Research shows intrusion prevention systems (IPS) are not as effective at detecting malicious activity as some might think Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Apr 2013
Security spend misaligned with threats, says security veteran
Security budget allocations have remained the same for the past 15 years, but threats have changed, says Shlomo Kramer, chief executive at security firm Imperva Continue Reading
-
News
19 Apr 2013
Conficker makes way for web-based attacks, says Microsoft
Web attacks emerge as top threat as businesses finally begin to win the battle against Conficker and other worms, says Microsoft Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
16 Apr 2013
How to create a good information security policy
Information security policies provide vital support to security professionals, yet few organisations take the time to create decent policies Continue Reading
By- Andi Scott
-
News
11 Apr 2013
Bots and web apps among top threats to data security, says Check Point
Bots, viruses, breaches and attacks are a constant and real threat to the information security of organisations Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
11 Apr 2013
Windows XP end of support: What to do next
CIOs may not wish to carry on running a 12-year-old desktop OS, but thousands of incompatible applications leave many with no choice Continue Reading
By- Cliff Saran, Managing Editor
-
News
11 Apr 2013
Porn websites pose malware risk, says researcher
Browsing popular pornography internet sites pose a growing risk of malware infection, according to a security researcher Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Apr 2013
Effective print security for SMBs
Analysts Louella Fernandes and Clive Longbottom discuss how integrated print management provides SMBs with a simple and scalable approach for print security. Continue Reading
-
News
03 Apr 2013
Case Study: 192business switches to tokenisation to speed up business processes
Online payment card verification firm 192business uses tokenisation to speed up its processes and protect credit card details from fraud Continue Reading
-
News
03 Apr 2013
US Army practises poor data security on mobile devices
Pentagon inspector general finds smartphones and tablets the US Army buys are not configured to protect sensitive data and allow remote wipe Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Apr 2013
Anonymous threatens to declare cyber war on North Korea
Anonymous hacktivist collective has threatened North Korea with cyber war if leader Kim Jong-un does not resign and install free democracy Continue Reading
-
News
26 Mar 2013
Employees ignore security rules, say infosec pros
Most information security professionals believe corporate employees wilfully ignore security rules, survey at RSA Conference 2013 reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
25 Mar 2013
Securing the hypervisor: expert tips
There are many potential security issues with the various components of a virtualised infrastructure, and nowhere is this more of a concern than with the hypervisor platforms that host virtual systems and application instances Continue Reading
By- Dave Shackleford, Voodoo Security
-
News
14 Mar 2013
CIO Interview: Matthew Oakeley, global IT head of Schroders
Matthew Oakeley talks to Karl Flinders about his role as global IT head at investment management company Schroders Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
12 Mar 2013
The Deloitte Consumer Review: A more secure customer
This report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond. Continue Reading
-
News
12 Mar 2013
Information security trends
This report from CompTIA, based on original research, assesses the current trends in information security. Continue Reading
-
News
11 Mar 2013
Microsoft releases four critical security updates
Microsoft is to release four “critical” patches in its monthly Patch Tuesday security update, according to the advance notice. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Mar 2013
Territorial Army on the hunt for information assurance professionals
TA to recruit IT security professionals into the Royal Signals to strengthen cyber operations Continue Reading
By- Kayleigh Bateman, Computer Weekly
-
News
06 Mar 2013
What is RSA's build, buy, partner strategy?
Computer Weekly takes a closer look at RSA's build, buy, partner strategy Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
05 Mar 2013
The security risk sweeping Europe
Never have we been so open about the information we share online, without so little concern for our privacy. Social media can be a threat to a company, not just to what information an employee chooses to disclose, but because social media sites are prime targets for cybercrime. In this issue of CW Europe read how the increase in social media usage has created new privacy concerns for businesses. Continue Reading
-
News
05 Mar 2013
Enterprise Security Architecture – an outsourcer's view
Alan Jenkins, chief security officer of outsourcing specialist, T Systems, explains the company's approach to enterprise security architecture. Continue Reading
-
News
05 Mar 2013
Enterprise Security Architecture
Mark Brown, Director for Advisory Risk & Information Security at Ernst & Young offers advice to security leaders on developing a robust Enterprise Security Architecture. Continue Reading
-
News
05 Mar 2013
Security the future: Keeping up with the business
Gareth Lindahl-Wise, group information security manager at British American Tobacco, explains the company's approach to enterprise security architecture. Continue Reading
-
Feature
04 Mar 2013
How to tackle big data from a security point of view
Before leaping into big data, companies must be clear what they are trying to achieve, otherwise their investment will be wasted Continue Reading
By- Peter Wood, First Base Technologies LLP
-
News
28 Feb 2013
RSA 2013: Suppliers need to prepare for new security vulnerability handling standards
Software makers and online service providers need to prepare for two ISO standards on vulnerability handling processes due by the end of 2013 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Feb 2013
350,000 different types of spam SMS messages were targeted at mobile users in 2012
350,000 different variants of unsolicited spam SMS messages were accounted for in 2012, with 53,000 variants logged for December alone Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
26 Feb 2013
RSA 2013: Obama cyber order will have significant effect, says DoHS
President Barack Obama’s executive order on cybersecurity is a “very big deal” says Mark Weatherford, deputy under-secretary for cybersecurity at the US Department of Homeland Security (DoHS). Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Feb 2013
The Demise in Effectiveness of Signature and Heuristic Based Antivirus
Anti-virus technology is failing to protect organisations from malicious attacks. Security professionals should look at alternative strategies, the NNC group argues in this report. Continue Reading
-
Feature
11 Feb 2013
How to find the most vulnerable systems on your internal network
Most corporate networks share common vulnerabilities, but many could be mitigated with education in “hacker thinking” for technical staff Continue Reading
By- Peter Wood, First Base Technologies LLP
-
News
06 Feb 2013
Twitter strengthens login security after hacker attack
Days after a hacking attack, it has emerged that Twitter plans to strengthen its login security with two-factor authentication Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 Jan 2013
Why has NAC, like DLP, failed to take off?
Why are organisations not investing in systems that are designed to keep malicious actors out of their networks? Continue Reading
By- Warwick Ashford, Senior analyst
-
Photo Story
28 Jan 2013
IT Security Purchasing Intentions 2013 - Europe
TechTarget surveyed 250+ IT pros about security media purchasing in Europe. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Jan 2013
Encryption is safe bet, says SafeNet
Encryption is the only thing that can give peace of mind to CIOs and CISOs, says Dave Hansen, president and CEO of security firm SafeNet Continue Reading
By- Warwick Ashford, Senior analyst
-
News
24 Jan 2013
ICO hits Sony with £250,000 data breach penalty
The Information Commissioner’s office (ICO) has fined Sony Computer Entertainment Europe £250,000 for breaching the Data Protection Act Continue Reading
-
News
22 Jan 2013
Why has DLP never taken off?
Why is data loss prevention (DLP) technology not being adopted if it provides the very protection most businesses need? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Jan 2013
Security visualisation
This article is guideline of how to generate a visual representation of a given dataset and use in the evaluation of known security vulnerabilities Continue Reading
-
News
14 Jan 2013
Oracle rushes out patches for Java zero days
Oracle has released two out-of-band security updates for the latest zero day vulnerabilities in Java Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Jan 2013
Disable Java to protect from latest zero-day
Security researchers are warning of a zero-day vulnerability in all versions of Java, including the latest Java 7 update 10 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Jan 2013
Software piracy international in scope, says Fast
The scale of software piracy is both international in scope and military in its execution, says the Federation Against Software Theft (Fast) Continue Reading
By- Warwick Ashford, Senior analyst
-
News
08 Jan 2013
Misuse of social media could wreak havoc, warns World Economic Forum
The rapid spread of false information through social media poses a growing threat to business and society, the World Economic Forum has warned Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
07 Jan 2013
Ernst & Young email keyword analysis identifies fraudsters
Fraud investigators have revealed the most common words used in email conversations by employees engaged in rogue trading and fraud Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
07 Jan 2013
Business priorities: what to protect, monitor and test
How information security professionals can prioritise what to protect, monitor and test in the light of current budget and resource constraints Continue Reading
-
Photo Story
13 Dec 2012
Securing Macs in the enterprise
A Mac can be more secure than Windows, yet just as insecure; it is harder to configure, easier to use; will not fit in the enterprise, but does not need to. Continue Reading
By- Rob Buckley
-
Feature
12 Dec 2012
How to preserve forensic evidence in the golden hour after a breach
There is a golden hour at the outset where a clear head and good planning can make or break any subsequent forensic investigation Continue Reading
By- Martin Roots, NIIP
-
Tip
10 Dec 2012
Audits and compliance requirements for cloud computing
Even as India Inc experiments with the cloud, security concerns play spoilsport. These cloud computing audit and compliance tips will make your journey easier. Continue Reading
By- Narendra Sahoo, Vista Infosec
-
News
06 Dec 2012
2012 Cost of Cyber Crime Study: UK
The 2012 Cost of Cyber Crime Study: United Kingdom is independently conducted by Ponemon Institute. The benchmark study, sponsored by HP Enterprise Security is based on a representative sample of 38 organisations in various industry sectors. Continue Reading
-
News
03 Dec 2012
IT Security Purchasing Intentions 2013
This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe. Continue Reading
-
News
26 Nov 2012
Security needs to be integral part of life, says McAfee
The world is becoming increasingly connected and security and privacy are integral to modern society, says Raj Samani, CTO of McAfee Europe Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Nov 2012
Deception, proactive defenses can better protect IP, says expert
Deceptive environments, phony data in the enterprise can fool attackers and increase the cost of hacking, says noted cybersecurity expert Paul Kurtz. Continue Reading
By- Robert Westervelt, TechTarget
-
News
19 Nov 2012
Cyber criminals target Skype, Facebook and Windows users
Cyber criminals targeted users of Skype, Facebook and Windows using multiple Blackhole exploits in October, according to security firm GFI Software Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 Nov 2012
Nasa to encrypt data after latest breach
Nasa is to encrypt all its mobile computers after the loss of a laptop containing personal information about more than 10,000 staff Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 Nov 2012
Many UK firms underestimate cost of data breaches, study finds
Many UK organisations are still failing to understand the implications and costs of data breaches, a study has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 Nov 2012
Mobile Security Strategies
This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise. Continue Reading
-
News
13 Nov 2012
Secure your data – protect your business
This guide for C-level executives explains the risks faced by businesses and the practical solutions they can take to secure their data. Continue Reading
-
News
13 Nov 2012
The Global State of Information Security Survey 2013: Key Findings
This global study examines the state of cyber-security and the impact of cyber crime and offers advice to businesses on reducing the risks. Continue Reading
-
News
12 Nov 2012
Hacking attempts to top one billion in Q4, predicts NCC Group
One billion hacking attempts will be made globally in the final quarter of 2012, according to information assurance firm NCC Group Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Nov 2012
Stuxnet hit Chevron’s systems, the energy giant admits
US energy giant Chevron has revealed that it was hit by the Stuxnet virus in 2010 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
07 Nov 2012
Police arrest man for DDoS attacks on Theresa May sites
Police have arrested a 41-year-old man in connection with a cyber attack on websites connected to home secretary Theresa May Continue Reading
By- Warwick Ashford, Senior analyst
-
News
31 Oct 2012
‘VM-aware’ viruses on the rise
Viruses targeting virtual machines (VM) are growing in numbers and will soon be the dominant force in the world of cyber crime, says Kaspersky Continue Reading
By- Jennifer Scott, TechTarget
-
News
31 Oct 2012
Free mobile apps a threat to privacy, study finds
Free mobile apps pose a serious threat to privacy because of their ability to capture large amounts of user information Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Oct 2012
IT security budgets mismatched to hacker targets, study shows
IT security budgets are not being used to provide defence technologies in some areas most likely to be targeted by hackers, a study shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
24 Oct 2012
CIO interview: Gerry Pennell, CIO, London 2012 Olympic Games
As the job of a lifetime nears its end, London 2012 CIO Gerry Pennell talks exclusively to Computer Weekly about his Olympic experience Continue Reading
-
News
22 Oct 2012
Cyber attacks launched at London 2012 Olympic Games every day
The IT supporting the London 2012 Olympics was hit by cyber attacks every day during the Games, says London 2012 CIO Gerry Pennell Continue Reading
By- Bryan Glick, Editor in chief
-
Opinion
18 Oct 2012
Security Think Tank: You can’t protect what you don’t know you’ve got
IP theft: who should be tackling it and how? Continue Reading
By- Adrian Wright
-
News
18 Oct 2012
Google offers Street View of datacentres
Google offers Street View of its datacentres and a virtual tour of how users' data is stored, with an emphasis on security practices Continue Reading
-
News
16 Oct 2012
Theresa May: Hacker Gary McKinnon to stay in UK
Hacker Gary McKinnon will stay in UK, home secretary Theresa May has told MPs Continue Reading
By- Cliff Saran, Managing Editor
-
News
11 Oct 2012
RSA Europe: Thousands of unprotected virtual servers exposed to the web
Organisations are failing to protect data in virtual environments, says Jason Hart, vice-president cloud solutions, SafeNet Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Oct 2012
RSA Europe: Security concerns whole supply chain, says Misha Glenny
Targeted attacks affect the whole supply chain, not just big corporations, author Misha Glenny tells RSA Conference Europe 2012 attendees Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Oct 2012
RSA Europe: Cloud key to future information security, says Qualys
Cloud computing is an opportunity information security professionals should not miss, says Philippe Courtot, CEO of security firm Qualys Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
10 Oct 2012
CW500: Managing the mobile workforce (part 1)
Mobile working has transformed Colt Telecommunications beyond recognition over the past three years Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
05 Oct 2012
Security firm warns against Samsung Galaxy Tab for enterprise use
Security specialist Context Information Security says vulnerabilities in the Samsung Galaxy Tab make it unsuitable for use in the enterprise Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
02 Oct 2012
HMRC deploys Becrypt off-the-shelf encryption
HMRC will use Becrypt Disk protect, which has recently been certified under the government’s Commercial Product Assurance (CPA) Scheme. Continue Reading
By- Cliff Saran, Managing Editor
-
News
02 Oct 2012
Hackers target White House military network
Hackers using computers in China have infiltrated an “unclassified” network in the US White House, believed to be used for issuing nuclear commands. Continue Reading
By- Cliff Saran, Managing Editor
-
News
27 Sep 2012
Izz ad-Din al-Qassam hackers launch cyber attack on US bank Wells Fargo
A hacker group connected to Hamas says it attacked US bank Wells Fargo in reaction to the video 'Innocence of Muslims' posted on YouTube Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Sep 2012
Dell SecureWorks uncovers cyber espionage targeting energy firms
Dell SecureWorks researchers have discovered a cyber espionage campaign targeting several companies, including two in the energy sector Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Sep 2012
Microsoft investigates IE zero-day flaw
Microsoft says it is investigating reports of a vulnerability in Internet Explorer 6, 7, 8, and 9 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Sep 2012
CW Buyer's Guide: Data Security
This in-depth buyer's guide offers advice to CISOs on keeping up with security best practice as new EU data protection rules come into force Continue Reading
-
News
17 Sep 2012
Android devices vulnerable to security breaches
More than 50% of devices running Google's Android OS have unpatched vulnerabilities, opening them up to malicious apps and other attacks Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
17 Sep 2012
IT security awareness needs to be company-wide, says (ISC)²
Information security awareness needs to be more robust, started as early as possible, continually reinforced and organisation-wide, says Julie Peeler, director, (ISC)² Foundation Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 Sep 2012
Government launches £3.8m cyber security institute
The government has ramped up moves to tackle growing cyber security threats by launching a £3.8m research institute. Continue Reading
By- Kathleen Hall, TechTarget
-
News
11 Sep 2012
Skills shortage means no unemployment in IT security, says (ISC)2
Zero unemployment in IT security shows a huge shortage of skills in the profession, says Hord Tipton, executive director of (ISC)2 Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
10 Sep 2012
HDFC Bank’s ISO 27004-compliant security metrics a boost toward GRC
An ISO/IEC 27004-compliant metrics program is a rarity in the Indian infosec circuit. Indian BFSI major HDFC Bank’s ISMS has been there, done that Continue Reading
By- Varun Haran, Reporter
-
Feature
05 Sep 2012
Setting up a botnet is easier than you think
Acquiring, installing, configuring and using a powerful data-stealing banking Trojan toolkit is not as difficult as it sounds Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Sep 2012
FBI denies link to leaked Apple device codes
The FBI says there is no evidence that Anonymous gained access to 12 million identity codes for Apple devices by hacking an FBI agent's laptop Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Sep 2012
Anonymous claims a million Apple IDs in FBI breach
Hacking group Anonymous claims to have released over a million Apple Unique Device Identifiers (UDIDs) obtained from breaching FBI networks Continue Reading