IT security
-
News
12 Nov 2024
More data stolen in 2023 MOVEit attacks comes to light
Over a year since the infamous MOVEit Transfer cyber attacks affected thousands of organisations, more new victims have come to light after an anonymous threat actor leaked their data on the dark web Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
12 Nov 2024
Strengthening cyber: Best IAM practices to combat threats
The Security Think Tank considers best practices in identity and access management and how can they be deployed to enable IT departments to combat cyber-attacks, phishing attacks and ransomware Continue Reading
-
News
09 Oct 2024
Five zero-days to be fixed on October Patch Tuesday
Stand-out vulnerabilities in Microsoft’s latest Patch Tuesday drop include problems in Microsoft Management Console and the Windows MSHTML Platform Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
09 Oct 2024
What is OPSEC (operations security)?
OPSEC (operations security) is an analytical process that military, law enforcement, government and private organizations use to prevent sensitive or proprietary information from being accessed inappropriately. Continue Reading
By- Robert Sheldon
- Linda Rosencrance
- Ben Cole, Executive Editor
-
News
09 Oct 2024
UK Cyber Team seeks future security professionals
Young people from across the UK have a chance to represent the country in international competitions and advance their future careers in cyber security Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Oct 2024
Secureworks: Ransomware takedowns didn’t put off cyber criminals
The number of active cyber criminal ransomware gangs has surged by almost a third in the space of 12 months, according to the latest intelligence from Secureworks Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Oct 2024
UK’s cyber incident reporting law to move forward in 2025
The UK government says that enforced cyber incident and ransomware reporting for critical sectors of the economy will help to build a better picture of the threat landscape and enable more proactive and preventative responses Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Oct 2024
IBM: Data breach cost in ASEAN hits new high
The average cost of a data breach in ASEAN grew by 7% from last year, as organisations grapple with increasingly distributed IT environments and complex security systems Continue Reading
By- Aaron Tan, TechTarget
-
News
04 Oct 2024
UK telcos including BT at risk from DrayTek router vulnerabilities
A series of vulnerabilities in DrayTek's Vigor router product lines affects multiple comms service providers in the UK, according to new analysis Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Oct 2024
NCSC celebrates eight years as Horne blows in
Outgoing NCSC interim leader Felicity Oswald shares her thoughts on the body’s work over the past eight years as she hands over the reins to incoming CEO Richard Horne Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Oct 2024
Cups Linux printing bugs open door to DDoS attacks, says Akamai
The Cups Linux printing vulnerabilities disclosed at the end of September would seem to have a nasty sting in their tail, according to researchers at Akamai Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Oct 2024
Detective wrongly claimed journalist’s solicitor attempted to buy gun, surveillance tribunal hears
Darren Ellis, who led a surveillance operation against journalists who exposed police failures, wrongly accused a solicitor of attempting to buy arms Continue Reading
By- Bill Goodwin and Cormac Kehoe
-
News
03 Oct 2024
Ex-PSNI officer seeking legal advice over comments made at Investigatory Powers Tribunal
Ex PSNI officer ‘deeply angered’ by comments made by a former detective at a tribunal investigating allegations of unlawful surveillance against journalists Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
03 Oct 2024
Microsoft files lawsuit to seize domains used by Russian spooks
Microsoft has been given permission to seize multiple domains used by the Russian state threat actor Star Blizzard as part of a coordinated disruption effort undertaken ahead of the US elections Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Oct 2024
SOC teams falling out of love with threat detection tools
Security operations centre practitioners are fed up of being flooded with pointless alerts and many no longer have much confidence in their threat detection tools, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
03 Oct 2024
Rise of the cyber clones: When seeing isn’t believing
It is frighteningly easy to clone someone else's identity using readily-available artificial intelligence tools Continue Reading
By- Jake Moore, ESET
-
News
03 Oct 2024
Nutanix courts VMware customers in APAC amid Broadcom concerns
Nutanix is driving double-digit growth across the region by capitalising on the evolving cloud landscape with its hybrid cloud and artificial intelligence offerings, as well as anxieties about the future direction of VMware under Broadcom’s ownership Continue Reading
By- Aaron Tan, TechTarget
-
News
02 Oct 2024
UK and Singapore to collaborate on supporting ransomware victims
At the fourth Counter Ransomware Initiative Summit in the US, both the UK and Singapore have committed to working on new guidance designed to better support victims and undermine cyber criminal business models Continue Reading
By- Alex Scroxton, Security Editor
-
News
02 Oct 2024
Detective behind ‘unlawful’ surveillance blamed Catholics for ‘perverse’ court decisions
A former detective claimed Irish judges were ‘sectarians in robes’ after a court found police had unlawfully arrested journalists who produced a film exposing collusion with paramilitary murderers Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
02 Oct 2024
Cyber UK’s quickest growing tech field, but skills gap remains
More people than ever are joining the cyber security profession in the UK, according to a report, but there is still a serious shortage even with a doubling in numbers Continue Reading
By- Alex Scroxton, Security Editor
-
News
02 Oct 2024
Amazon Mechanical Turk workers suspended without explanation
A likely glitch in Amazon Payments resulted in hundreds of Mechanical Turk workers being suspended from the platform without proper explanation or pay Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
01 Oct 2024
Detective reported journalist’s lawyers to regulator in ‘unlawful’ PSNI surveillance case
Former Durham detective Darren Ellis told the Investigatory Powers Tribunal that he had concerns about lawyers acting for journalists placed under surveillance by Northern Irish police Continue Reading
By- Bill Goodwin & Cormac Kehoe
-
News
01 Oct 2024
Unmasked: The Evil Corp cyber gangster who worked for LockBit
The NCA has named and shamed a prominent member of the Evil Corp cyber crime collective who also worked as an affiliate of the LockBit ransomware gang as the UK unveils new sanctions against 16 Russian cyber criminals Continue Reading
By- Alex Scroxton, Security Editor
-
News
01 Oct 2024
Businesses are getting some value from AI, but struggling to scale
Survey from KPMG reveals IT leaders struggling to keep up with the pace of technology innovation Continue Reading
By- Cliff Saran, Managing Editor
-
News
01 Oct 2024
Post Office ditches MoneyGram after cyber attack
The Post Office offered a short extension to enable it to asses the impact of the MoneyGram cyber incident, but the contract has now expired and MoneyGram services are no longer available in Post Office branches Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
01 Oct 2024
Cyber teams say they can’t keep up with attack volumes
Over 60% of European security pros say their teams are understaffed, and over 50% don’t have enough budget, according to data from ISACA Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
30 Sep 2024
The cyber industry needs to accept it can't eliminate risk
The Computer Weekly Security Think Tank panel considers incident response in the wake of the July CrowdStrike incident, sharing their views on what CrowdStrike got wrong, what it did right, and next steps Continue Reading
By- Paul Lewis, Nominet
-
Definition
30 Sep 2024
What is WPA3 (Wi-Fi Protected Access 3)?
WPA3, also known as Wi-Fi Protected Access 3, is the third iteration of a security certification standard developed by the Wi-Fi Alliance. WPA3 is the latest updated implementation of WPA2, which has been in use since 2004. Continue Reading
By- Gavin Wright
- Alexander S. Gillis, Technical Writer and Editor
-
Definition
27 Sep 2024
What is access control?
Access control is a security technique that regulates who or what can view or use resources in a computing environment. Continue Reading
By- Gavin Wright
- Ben Lutkevich, Site Editor
-
News
27 Sep 2024
UK on high alert over Iranian spear phishing attacks, says NCSC
The NCSC and counterpart agencies in the US have issued a warning over enhanced Iranian spear phishing activity targeting politicians, journalists, activists and others with an interest in Middle Eastern affairs Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Sep 2024
Printing vulnerability affecting Linux distros raises alarm
Security pros need to get in front of a series of vulnerabilities affecting the Cups Linux printing service after an apparently botched disclosure process saw technical details published in advance of a patch Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
27 Sep 2024
Defaulting to open: Decoding the (very public) CrowdStrike event
The Computer Weekly Security Think Tank panel considers incident response in the wake of the July CrowdStrike incident, sharing their views on what CrowdStrike got wrong, what it did right, and next steps Continue Reading
By- Elliott Wilkes, ACDS
-
Opinion
27 Sep 2024
Cyber companies need a best practice approach to major incidents.
The Computer Weekly Security Think Tank panel considers incident response in the wake of the July CrowdStrike incident, sharing their views on what CrowdStrike got wrong, what it did right, and next steps Continue Reading
By- Andy Bridden and Ashley Barker, PA Consulting
-
Definition
27 Sep 2024
What is a cloud access security broker (CASB)?
A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Dan Sullivan
-
News
27 Sep 2024
How UEM Sunrise is driving transformation with Salesforce and AI
Malaysian property developer UEM Sunrise is leveraging Salesforce and AI to boost sales and enhance customer experience while prioritising data sovereignty and a diversified cloud strategy Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
27 Sep 2024
Closing the curtain on cyber security theatre
Leaders must redefine expectations, rethink responsibility and eliminate unproductive practices to move towards real security, says Gartner vice-president analyst Richard Addiscott Continue Reading
By- Richard Addiscott
-
News
26 Sep 2024
Racist Network Rail Wi-Fi hack was work of malicious insider
Police have revealed that this week’s racist cyber attack on public Wi-Fi networks at stations across the UK appears to have been the work of a malicious insider, after arresting an employee of one of the service providers Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Sep 2024
Islamophobic cyber attack downs Wi-Fi at UK transport hubs
An apparent hacktivist attack disrupted public-facing Wi-Fi networks at UK rail stations to display Islamophobic content Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Sep 2024
CrowdStrike apologises to US government for global mega-outage
CrowdStrike executive Adam Meyers appears before a US government committee to explain the series of errors that led directly to one of the biggest IT outages in history Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Sep 2024
Splunk and Cisco integration moving apace
Splunk is rapidly integrating with Cisco’s technology to enable seamless transitions between their platforms while delivering advanced threat detection capabilities Continue Reading
By- Aaron Tan, TechTarget
-
News
24 Sep 2024
Money transfer firm MoneyGram rushes to contain cyber attack
Money transfer specialist MoneyGram services remain down several days after a network outage developed into a full-blown cyber security incident Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
24 Sep 2024
What is a business continuity plan (BCP)?
A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue operating during an unplanned event. Continue Reading
By- Cameron Hashemi-Pour, Site Editor
- Vicki-Lynn Brunskill
-
News
24 Sep 2024
Unique malware sample volumes seen surging
BlackBerry’s latest ‘Global threat intelligence’ report details a surge in unique malware samples as threat actors ramp up the pace of targeted attacks Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
24 Sep 2024
How to respond when your cyber company becomes the story
The Computer Weekly Security Think Tank panel considers incident response in the wake of the July CrowdStrike incident, sharing their views on what CrowdStrike got wrong, what it did right, and next steps Continue Reading
By- Stephen McDermid
-
News
23 Sep 2024
Microsoft shares progress on Secure Future Initiative
Microsoft has published a progress report on its Secure Future Initiative, launched last year in the wake of multiple security incidents, and made a series of commitments to improve its internal cyber culture Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
23 Sep 2024
Powering Britain’s economy – datacentres gain in status
In this week’s Computer Weekly, the UK government has finally classified datacentres as critical national infrastructure – we ask, what took it so long? We assess the impact of the EU’s new energy efficiency rules on datacentre operators. And we discuss the power of information and diversity with the chief data officer at Legal & General. Read the issue now. Continue Reading
-
Opinion
23 Sep 2024
Security Think Tank: Win back lost trust by working smarter
The Computer Weekly Security Think Tank panel considers incident response in the wake of the July CrowdStrike incident, sharing their views on what CrowdStrike got wrong, what it did right, and next steps Continue Reading
By- Vladimir Jirasek, Foresight Cyber
-
News
23 Sep 2024
Home Office eVisa scheme is ‘broken’, says Open Rights Group
Digital rights campaigners say the Home Office’s plan to make its new electronic Visa scheme a real-time online-only process is part and parcel of the 'hostile environment' around immigration status Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
23 Sep 2024
Gartner: Mitigating security threats in AI agents
Agents represent a step-change in the use of artificial intelligence in the enterprise - as attendees at Salesforce's annual conference saw first hand this month - but do not come without their risks Continue Reading
By- Avivah Litan, Gartner
-
News
23 Sep 2024
UK, US and Canada to collaborate on AI and cyber security
International collaboration agreement will see the governments of Canada, the UK and the US work together to research, evaluate and test new defence technologies Continue Reading
By -
News
23 Sep 2024
Medtech startup brings Oracle AI to bear on cancer drug research
Learn how Oracle Cloud Infrastructure and its cutting-edge AI features are bringing new benefits to cancer care by helping doctors identify better treatment options Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
20 Sep 2024
CrowdStrike incident shows we need to rethink cyber
The Computer Weekly Security Think Tank panel considers incident response in the wake of the July CrowdStrike incident, sharing their views on what CrowdStrike got wrong, what it did right, and next steps Continue Reading
-
News
19 Sep 2024
HSBC tests post-quantum VPN tunnel for digital ledgers
Encryption required for post-quantum cryptography will have a material impact on the performance of distributed ledgers Continue Reading
By- Cliff Saran, Managing Editor
-
News
18 Sep 2024
NCSC exposes Chinese company running malicious Mirai botnet
The NCSC and its Five Eyes allies have published details of the activities of a China-based cyber security company that is operating a Mirai IoT botnet in the service of government-backed intrusions Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Sep 2024
Europol provides detail on Ghost encrypted comms platform takedown
Law enforcement bodies from across the world have revealed how they collaborated to bring down encrypted network Ghost and the new ways of working that have been established with Europol at the centre Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
18 Sep 2024
Global AI regulation is heating up: can the UK afford to remain silent?
Why UK lawmakers should be pro-active about introducing AI regulation Continue Reading
By- Peter van der Putten, Director, AI Lab, Pegasystems
-
Definition
18 Sep 2024
What is email spam and how to fight it?
Email spam, also known as 'junk email,' refers to unsolicited email messages, usually sent in bulk to a large list of recipients. Humans send spam, but more often, botnets are responsible for sending it. Continue Reading
-
News
18 Sep 2024
Police make arrests after hacking Ghost encrypted comms app
An international police operation has penetrated an end-to-end encrypted communications service allegedly used by organised criminals in Australia, Ireland, Sweden and Italy Continue Reading
By- Bill Goodwin, Computer Weekly
-
Definition
17 Sep 2024
What is passive keyless entry (PKE)?
Passive keyless entry (PKE) is an automotive security system that operates automatically when the user is in proximity to the vehicle, unlocking the door on approach or when the door handle is pulled, and locking it when the user walks away or touches the car on exit. Continue Reading
-
Feature
17 Sep 2024
Misinformation runs deeper than social media
While social media may contribute to the increasing rapid spread and reach of misinformation, the root causes of the problem go much deeper than the role of a particular company or way of using technology to communicate Continue Reading
-
News
17 Sep 2024
Salesforce’s agentic AI platform to transform business automation
CRM giant’s Agentforce lets organisations build and deploy autonomous agents to automate business processes through advanced learning and data integration Continue Reading
By- Aaron Tan, TechTarget
-
News
17 Sep 2024
First CyberBoost Catalyse startup cohort named
The first group of companies named to a cyber incubator programme run by Plexal and the National University of Singapore includes two growing UK businesses Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
16 Sep 2024
Will autonomous weapons make humans passive participants in war?
Experts warn the emergence and adoption of AI-powered military systems may eventually push battlefield decision-making beyond the limits of human cognition Continue Reading
By- Kyle Hiebert, Computer Weekly
-
News
16 Sep 2024
Crest secures FCDO funding to help overseas countries increase their cyber-readiness
Non-profit Crest is launching an initiative to help overseas, private-sector firms get better prepared for cyber threats Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
Feature
16 Sep 2024
Automation driving SD-WAN optimisation
AIOps is being deployed to help manage highly distributed enterprise networking configurations Continue Reading
By- Cliff Saran, Managing Editor
-
News
15 Sep 2024
UK unites nations to discuss closing global cyber skills gap
The UK government invites representatives from around the world to a summit to discuss how to address global IT security skills gap Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
13 Sep 2024
UN-backed cyber security report highlights global shortfalls in preparedness
In the three years since the UN-backed cyber security report was published, countries have been making a concerted effort to protect themselves from cyber threats, but there’s more to do Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
13 Sep 2024
Cyber workforce must almost double to meet global talent need
Research from ISC2 finds global cyber workforce needs additional 4.8 million people to fully secure businesses Continue Reading
By- Clare McDonald, Business Editor
-
Feature
12 Sep 2024
Kubernetes disaster recovery: Five key questions
We look at disaster recovery for Kubernetes environments, the key challenges to deployment of K8s DR, the risks we aim to mitigate, how to build a plan and the key infrastructure requirements Continue Reading
-
News
12 Sep 2024
Teenager arrested in TfL cyber attack investigation
New security measures following the cyber attack, which took down some of TfL’s services, have led to delays in contactless roll-out Continue Reading
By- Cliff Saran, Managing Editor
-
News
12 Sep 2024
Lord introduces bill to regulate public sector AI and automation
A private members’ bill seeking to regulate the use of artificial intelligence (AI) and other automated technologies throughout the public sector has been brought to Parliament Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
12 Sep 2024
Data sharing for immigration raids ferments hostility to migrants
Data sharing between public and private bodies for the purposes of carrying out immigration raids helps to prop up the UK’s hostile environment by instilling an atmosphere of fear and deterring migrants from accessing public services Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
12 Sep 2024
European enterprise networking lacks hybrid maturity
Deploying a complex hybrid and multicloud IT architecture has an impact on enterprise network management Continue Reading
By- Cliff Saran, Managing Editor
-
News
11 Sep 2024
Datacentres granted critical national infrastructure status
The global IT outage caused by CrowdStrike has shown why keeping datacentres secure and safe is critical to the UK Continue Reading
By- Cliff Saran, Managing Editor
-
News
11 Sep 2024
September Patch Tuesday: Update before 1 October
Four critical remote code execution bugs in Windows and three critical elevated privileges vulnerabilities will keep admins busy Continue Reading
By- Cliff Saran, Managing Editor
-
News
11 Sep 2024
How Sonar is elevating code quality in the age of AI
Sonar’s code quality platform helps developers maintain secure, high-quality code amid the rise of artificial intelligence-based coding assistants, now expanding into the Asian market Continue Reading
By- Aaron Tan, TechTarget
-
News
11 Sep 2024
ICO and NCA sign MoU to provide joint support for cyber crime victims
UK data protection watchdog joins forces with law enforcement agency to provide more support for organisations that fall victim to cyber crime and ransomware attacks Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
10 Sep 2024
JFrog and GitHub unveil open source security integrations
Secure software specialist JFrog is working with code development service GitHub to integrate the onboard capabilities of its Software Supply Chain Platform service into GitHub’s platform Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Sep 2024
ANZ CIOs to prioritise cyber security investments in 2025
Cyber security remains high on the agenda for ANZ CIOs, followed by data analytics, cloud and generative AI Continue Reading
By- Aaron Tan, TechTarget
-
E-Zine
10 Sep 2024
The flight to data success
In this week’s Computer Weekly, we look at how Manchester Airport Group has set course to become the world’s most intelligent airport through its data-led approach. After much hype about artificial intelligence, we look at the failings of AI initiatives as the tech hits roadblocks, as well as explore what can be done to improve success. And we take a peek at what support networks are available to those new in the CISO role. Read the issue now. Continue Reading
- 09 Sep 2024
-
News
09 Sep 2024
Multiple Veeam vulns spark concern among defenders
Veeam users are urged to patch a series of vulnerabilities in the firm’s Backup & Replication product to get out ahead of potential exploitation by ransomware gangs Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
09 Sep 2024
Developing nations need the UN cyber crime treaty to pass
The UN cyber crime treaty is flawed but represents a move in the right direction for developing nations seeking greater digital sovereignty Continue Reading
By- Kyle Hiebert, Computer Weekly
-
News
06 Sep 2024
Longstanding Darktrace CEO Poppy Gustafsson to step down
Darktrace CEO Poppy Gustafsson is to leave the AI cyber company she helped build with Mike Lynch after more than a decade, following its acquisition by a private equity firm Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Sep 2024
Tencent Cloud debuts palm scanning tech in global markets
Tencent Cloud launches palm verification technology for global markets, offering AI-driven identity authentication to support contactless payments and security access management Continue Reading
By- Aaron Tan, TechTarget
-
Definition
05 Sep 2024
What is shared responsibility model?
A shared responsibility model is a cloud security framework that dictates the security obligations of a cloud computing provider and its users to ensure accountability. Continue Reading
By- Kathleen Casey, Site Editor
- Stephen J. Bigelow, Senior Technology Editor
-
News
05 Sep 2024
NCSC and allies call out Russia's Unit 29155 over cyber warfare
The NCSC and counterpart agencies from the US and other countries have exposed a long-running campaign of Russian cyber espionage and warfare conducted by GRU Unit 29155 Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
05 Sep 2024
What is an ESG score?
An ESG score is a way to assign a quantitative metric, such as a numerical score or letter rating, to the environmental, social and governance (ESG) efforts or an organization. Continue Reading
By- Cameron Hashemi-Pour, Site Editor
- Sean Michael Kerner
-
News
05 Sep 2024
Fog ransomware crew evolving into wide-ranging threat
The emergent Fog ransomware gang appears to be changing up its victimology in search of more cash-rich victims Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Sep 2024
Ongoing TfL cyber attack takes out Dial-a-Ride service
The Dial-a-Ride assisted transit service for disabled people had to temporarily suspend part of its operations as Transport for London deals with an ongoing cyber attack, but the service has now been recovered Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
05 Sep 2024
Resetting our relationship with data
We need to have an open and honest debate about data, data collection and, just as important, the timely disposal of the information when it is no longer needed.While there are many good reasons ... Continue Reading
By- Cliff Saran, Managing Editor
-
News
05 Sep 2024
Canadian arrested by France after cooperating with US on Sky ECC cryptophone investigation
Thomas Herdman, who faces charges in France over his involvement in distributing Sky ECC encrypted phones, was arrested by French police despite agreeing to cooperate with US law enforcement Continue Reading
By- Bill Goodwin & Morgan Ayre
-
News
04 Sep 2024
PyPI loophole puts thousands of packages at risk of compromise
Thousands of PyPI packages are at risk of an attack technique dubbed Revival Hijack, which exploits a loophole in the platform’s package naming feature Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Sep 2024
Retailers question using live facial recognition for shoplifting
Retailers praise benefits of retrospective over live facial recognition in dealing with shoplifting, but stress there are ongoing concerns around the ethical, legal and safety implications of using the technology in stores Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
04 Sep 2024
Fraud and scam complaints hit highest ever level in UK
The Financial Ombudsman Service says it recorded almost 9,000 complaints about fraud and scams from April to June, the most ever recorded Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
04 Sep 2024
Cyber firms need to centre their own resilience
The Computer Weekly Security Think Tank panel considers incident response in the wake of the July CrowdStrike incident, sharing their views on what CrowdStrike got wrong, what it did right, and next steps Continue Reading
By- Niel Harper
-
News
03 Sep 2024
Chief data officers highlight data integrity woes
In a report from the company co-founded by web inventor Tim Berners-Lee, CDOs discuss the challenges of artificial intelligence and using increasing amounts of personal data Continue Reading
By- Cliff Saran, Managing Editor
-
News
03 Sep 2024
Transport for London hit by cyber attack
London’s transport network provider TfL experiences cyber security incident, but reassures customers there is no impact on services Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
02 Sep 2024
UK and Ukraine digital trade deal comes into force
The UK eases access to the deep tech startup community in Ukraine through digital-only agreement Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
30 Aug 2024
Siegwerk strengthens global manufacturing operations with managed SD-WAN
Global manufacturer enhances operational security and digitisation with managed SD-WAN, managed security and professional services Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
30 Aug 2024
MEF association claims SASE milestone
Leading technology provider achieves first milestone in secure access service edge programme, with SASE certification now generally available to trade association’s technology and service provider members Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
30 Aug 2024
Norwegian Refugee Council leverages Okta for Good cyber scheme
Pietro Galli, CIO of the Norwegian Refugee Council, reveals how the globally distributed NGO has been taking advantage of the Okta for Good CSR programme to improve its own cyber security and data protection practice, and elevate good practice in the third sector Continue Reading
By- Alex Scroxton, Security Editor