IT security
-
News
12 Nov 2024
More data stolen in 2023 MOVEit attacks comes to light
Over a year since the infamous MOVEit Transfer cyber attacks affected thousands of organisations, more new victims have come to light after an anonymous threat actor leaked their data on the dark web Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
12 Nov 2024
Strengthening cyber: Best IAM practices to combat threats
The Security Think Tank considers best practices in identity and access management and how can they be deployed to enable IT departments to combat cyber-attacks, phishing attacks and ransomware Continue Reading
-
Feature
19 Oct 2021
Back on the office network: What are the risks for mobile users?
Many people are returning to offices and bringing their mobile devices with them. What are the cyber security implications of this? Continue Reading
-
Blog Post
18 Oct 2021
Time to take a step back on police use of facial recognition
We’ve all seen the detective shows on TV. The cops find a CCTV picture of the likely “perp”. The put-upon junior detective is tasked with wading through a database of photos in the hope of finding ... Continue Reading
By- Bryan Glick, Editor in chief
-
News
18 Oct 2021
How Samlesbury, Lancashire became the home of the National Cyber Force
The National Cyber Force, a new branch of the military, is gearing up to fight battles in cyber space from the fields of Lancashire. Its presence is expected to bring a high-tech renaissance to the region Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
18 Oct 2021
DCMS appoints Plexal to drive telecoms diversity strategy
Government chooses UK innovation company to understand and develop the role of SMEs in the telecoms market with particular reference to how to create a diverse market that supports the creation of home-grown, sovereign technology Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Opinion
18 Oct 2021
No easy fix for vulnerability exploitation, so be prepared
Vulnerability management and disclosure is a tricky business with ethical and business ramifications for software vendors, CISOs and ethical hackers alike – and CISOs sit right in the middle of this Continue Reading
By- Andrew Morris, Turnkey Consulting
-
Definition
15 Oct 2021
Uniform Resource Identifier (URI)
A Uniform Resource Identifier (URI) is a character sequence that identifies a logical (abstract) or physical resource -- usually, but not always, connected to the internet. A URI distinguishes one resource from another. Continue Reading
By- Rahul Awati
- Fred Churchville, TechTarget
-
Opinion
15 Oct 2021
Doing the right thing: How CISOs should approach responsible disclosure
Owen Wright, responsible for penetration testing and adversary simulation at Context, part of Accenture Security, advises how CISOs should approach responsible disclosure Continue Reading
By- Owen Wright, Accenture Security
-
News
14 Oct 2021
Apple scheme to detect child abuse creates serious privacy and security risks, say scientists
Apple’s plan to automatically scan photos to detect child abuse would unduly risk the privacy and security of law-abiding citizens and could open up the way to surveillance, say the world’s top cryptographic experts Continue Reading
By- Duncan Campbell , 2QQ Ltd, Sussex University
-
E-Zine
14 Oct 2021
CW APAC, October 2021: Tech Career Guide
Despite marked improvements, tech still faces a diversity problem. In this handbook, focused on cyber security’s gender gap in the Asia-Pacific region, Computer Weekly looks at the mentoring programmes aiming to combat the issue, the career path of IAG’s Elaine Muir, how hacking won Claudean Zheng a job and what else needs to be done to tackle the ongoing gender imbalance Continue Reading
-
News
14 Oct 2021
NHS Digital enhances in-house cyber awareness drive
Keep IT Confidential campaign aims to help NHS staff understand more about security threats and learn how to reduce risk Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
14 Oct 2021
Encryption protects the marginalised – and it’s under threat
Encryption keeps marginalised groups connected and safe, but new regulatory attempts to break it put them at risk Continue Reading
By- Callum Voge
-
News
14 Oct 2021
Generation Novel hybrid workers bring new demands and risks
Aruba survey warns business leaders that they must strike a balance between flexibility and security to address risky behaviours and evolving expectations of today’s tech-savvy workforce Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
13 Oct 2021
Google Cybersecurity Action Team springs into life
Google has announced a new Cybersecurity Action Team, with a mission to support security and digital transformation in governments, critical infrastructure, enterprises and small businesses Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Oct 2021
FCA warns over future hybrid working security risks
Earlier this week, the Financial Conduct Authority issued fresh guidance to regulated organisations on keeping hybrid workers safe and secure Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Oct 2021
Microsoft warns of MysterySnail on October Patch Tuesday
Microsoft has fixed a zero-day that is being actively exploited to deliver a new remote access trojan dubbed MysterySnail to targets Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Oct 2021
Former signals intel leader named godfather of UK security
Sixth annual Security Serious Unsung Heroes Awards honours former Royal Corps of Signals colonel and infosec pioneer John Doody Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Oct 2021
Australia unveils ransomware action plan
The Australian government has established a task force to address the ransomware menace and is proposing legislation to mandate reporting of ransomware incidents by businesses Continue Reading
-
News
12 Oct 2021
BCS calls on government to retain protections against AI
BCS, the Chartered Institute for IT, wants the government to retain protections that allow people to have decisions about them made by an AI reviewed by humans if needed Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Oct 2021
Ban UK police use of facial-recognition, House of Lords told
Experts giving evidence to the House of Lords have said that UK police use of facial-recognition technology is disproportionate and ineffective, and further questioned the utility of algorithmic crime ‘prediction’ tools Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
12 Oct 2021
Microsoft thwarts mega-DDoS attack on Azure platform
2.4Tbps DDoS attack on an undisclosed Microsoft Azure customer may have been the largest ever attempted against a single target Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Oct 2021
Malaysia’s highway authority improves DR capabilities
The Malaysian Highway Authority is now more resilient against cyber attacks through a local disaster-recovery-as-a-service offering powered by Veeam software Continue Reading
By -
News
11 Oct 2021
Covid-19 will loom over cyber strategy for years to come
In remarks delivered to a Chatham House conference, NCSC head Lindy Cameron reflects on the security challenges facing the UK, and sets out some plans for the future Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Oct 2021
Sensitive documents to stay with whistleblower after deadline for agreement for their return passes
A deadllne to agree the safe return of the sensitive banking details of former and current NatWest Group customers has passed without agreement Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
11 Oct 2021
Singapore refreshes cyber security strategy
The city-state updates its national cyber security strategy to shore up the security of critical infrastructure and enterprises while growing its cyber security industry, among other goals Continue Reading
By- Aaron Tan, TechTarget
-
News
08 Oct 2021
Craft beer specialist Brewdog fixes serious app vulnerability
Vulnerability in brewer’s mobile app could have resulted in serious consequences for its shareholders and customers Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Oct 2021
Fast-moving Ryuk campaign targets healthcare organisations
Newly designated FIN12 gang leverages the work of the cyber criminal ecosystem to conduct lightning-fast ransomware attacks Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Oct 2021
NatWest admits to weaknesses in anti-money laundering systems
Bank pleads guilty to failures concerning the laundering of hundreds of millions of pounds, but says it has since improved its anti-money laundering systems Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Opinion
07 Oct 2021
Addressing the backup dilemma to ransomware recovery
Everyone knows good backups are essential if one is to recover from a ransomware attack, but using them effectively poses challenges that IT teams need to know about Continue Reading
By- W Curtis Preston
-
News
07 Oct 2021
ICO expresses concerns over its future independence
In its response to the government’s data protection consultation, the Information Commissioner’s Office has raised worries over its future ability to function independently of government interference Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
07 Oct 2021
What is a next-generation firewall (NGFW)?
A next-generation firewall (NGFW) is part of the third generation of firewall technology that can be implemented in hardware or software. Continue Reading
By- Casey Clark, TechTarget
- Sharon Shea, Executive Editor
-
News
07 Oct 2021
Uber faces legal action over ‘racist’ facial verification system
Two UK-based unions are taking Uber to court, claiming their members have been unfairly dismissed as a result of misidentification by the company’s facial verification system Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
07 Oct 2021
Twitch data breach investigations continue
Investigations are ongoing into a 125GB data breach that hit livestreaming platform Twitch, apparently the work of hacktivists Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
07 Oct 2021
CW Middle East: Middle East hospitals accelerate take-up of healthcare technologies
The Middle East is accelerating its take-up of digital healthcare technologies following lessons learned during the Covid-19 pandemic, with regional government turning to technology to track disease trends and monitor treatment. Also read in this issue how the UAE’s National Program for Coders will offer ‘golden visas’ to 100,000 entrepreneurs, enterprise owners and startups. Continue Reading
-
News
06 Oct 2021
US lawmakers propose ransomware reporting rules
Former presidential candidate Elizabeth Warren lends her support to a bill that would require corporate ransomware victims to disclose more information about their attacks to the authorities Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
06 Oct 2021
Security Think Tank: Responsible vulnerability disclosure is a joint effort
By working hand-in-hand, developers and security researchers can both play a vital role in ensuring newly-discovered vulnerabilities are addressed appropriately, writes Paddy Francis of Airbus CyberSecurity Continue Reading
-
News
06 Oct 2021
Gaming service Twitch hacked, data leaked
Users of livestreaming platform Twitch may be at risk after a 125GB torrent of data was leaked Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Oct 2021
Apache web server users urged to patch immediately
New zero-day in Apache HTTP Server is already being actively exploited and must be addressed immediately Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Oct 2021
Auto-enrolment begins for Google multi-factor authentication
Google has started to turn on multi-factor authentication on consumer accounts by default, and aims to auto-enrol 150 million users by the end of 2021 Continue Reading
By- Alex Scroxton, Security Editor
-
Podcast
06 Oct 2021
Top women in UK tech, AI on puffin island – Computer Weekly Downtime Upload podcast
In this episode, Caroline Donnelly, Clare McDonald and Brian McKenna discuss CW’s annual programme to choose the most influential women in UK tech, as well as Newham Sparks, and puffin-counting AI Continue Reading
By- Caroline Donnelly, Senior Editor, UK
- Clare McDonald, Business Editor
- Brian McKenna, Senior Analyst, Business Applications
-
News
06 Oct 2021
Israeli Orca to invest in UK cyber scene
Tel Aviv-headquartered Orca Security wants to set up a new R&D centre in the UK Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
05 Oct 2021
New strategies needed to close the cyber security skills gap
Teaching cyber security in schools is a long-term solution to a present-day problem Continue Reading
By- Martin Smith, SASIG
-
News
05 Oct 2021
New Python-based ransomware attacks unfold in record time
Sophos researchers detail a new variety of Python-based ransomware attack targeting VMware ESXi-hosted VMs Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
05 Oct 2021
Invest in cyber security with confidence using a structured approach
Cyber security has never been more challenging or important in rapidly changing business, regulatory, IT and threat environments. There is a need for a more structured approach to investment Continue Reading
By- Warwick Ashford, Senior analyst
-
Definition
05 Oct 2021
Layer Two Tunneling Protocol (L2TP)
Layer Two Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling Protocol (PPTP) used by an internet service provider (ISP) to enable the operation of a virtual private network (VPN) over the internet. Continue Reading
By -
Opinion
05 Oct 2021
Keeping the UK in the global race to adopt digital identity
The UK government’s proposed digital ID trust framework is a step in the right direction, but more is needed to ensure the successful adoption of digital identity across the economy Continue Reading
By- Nick Mothershaw, OIX
-
Opinion
05 Oct 2021
ICO cookie consent: How will the plan affect businesses?
A data privacy and compliance expert considers what the ICO’s proposals for an overhaul of cookie consent procedures could mean for businesses Continue Reading
By- Peter Borner
-
News
05 Oct 2021
Facebook unplugged for six hours due to configuration error
A configuration change effectively disconnected Facebook from the internet, with billions affected by loss of services Continue Reading
By- Cliff Saran, Managing Editor
-
News
05 Oct 2021
Australian organisations lack maturity in responsible AI
Most Australian organisations are still in the early stages of their responsible artificial intelligence efforts despite growing use of AI by businesses and consumers, study finds Continue Reading
By- Aaron Tan, TechTarget
-
News
04 Oct 2021
Mandiant name returns to fore ahead of FireEye sale
Mandiant has completed its corporate rebrand pending the imminent sale of the FireEye products business to a private equity group Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Oct 2021
One Identity buys OneLogin for access management expertise
Acquisition of OneLogin adds access management solutions to One Identity’s Unified Identity Security platform Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Oct 2021
Two arrests made in European ransomware investigation
Unnamed ransomware operation was disrupted last week in Kiev, Ukraine, following a coordinated investigation Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
04 Oct 2021
Security Think Tank: Embracing vulnerability management for the greater good
When it comes to vulnerability management, CISOs should define a responsible disclosure policy so that they can receive and manage identified vulnerabilities transparently, practically and collaboratively, says Paul Watts of the ISF Continue Reading
By- Paul Watts, Information Security Forum
-
News
04 Oct 2021
How GYG Singapore moved to paperless contracts
The Singapore franchisee of Mexican cuisine specialist Guzman y Gomez has turned to electronic agreements and digital signatures to ease the administrative burden on its HR team Continue Reading
By- Aaron Tan, TechTarget
-
News
01 Oct 2021
Met Police purchase new retrospective facial-recognition system
Retrospective facial-recognition software purchased for £3m by the Met Police will be deployed in coming months amid continuing controversy around the use of biometric technologies by law enforcement bodies Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
01 Oct 2021
Amnesty International exploited in malware campaign
According to new intelligence from Cisco Talos, Amnesty International’s branding and profile is being used as part of a new malware campaign that exploits people’s fears of the notorious Pegasus spyware app Continue Reading
By- Alex Scroxton, Security Editor
-
News
01 Oct 2021
JVCKenwood hit by Conti ransomware attack
Nearly 2TB of data was stolen from Japanese electronics firm in a Conti ransomware hit Continue Reading
By- Alex Scroxton, Security Editor
-
News
01 Oct 2021
IR35: Giant Group cyber attack prompts renewed calls for statutory regulation of umbrella companies
As details about the fallout from the cyber attack on the Giant Group umbrella company emerge, stakeholders say the incident should prompt the government to expedite regulating contractor payroll processing firms Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
30 Sep 2021
Team leaders urged to address developer mental health
The pandemic led to many developers working from home, and many have experienced burnout Continue Reading
By- Cliff Saran, Managing Editor
-
News
30 Sep 2021
UK consumers would collectively pay over £1bn a year for control of their data
UK consumers are willing to pay a small fee per month to have control of the data they share with Google and Facebook Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
30 Sep 2021
NUS and Thales to develop quantum technologies
The National University of Singapore and Thales have joined hands to test quantum technologies for commercial applications in security and sensing Continue Reading
By- Aaron Tan, TechTarget
-
Definition
30 Sep 2021
Secure Electronic Transaction (SET)
Secure Electronic Transaction (SET) is a system and electronic protocol to ensure the integrity and security of transactions conducted over the internet. Continue Reading
By -
News
29 Sep 2021
Russia arrests prominent cyber security executive
Founder and CEO of cyber security firm Group-IB detained in Moscow on treason charges Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Sep 2021
FoggyWeb malware latest tool of dangerous Nobelium APT
Microsoft’s threat intelligence team warns of a new strain of malware being used by the Russia-linked Nobelium APT Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Sep 2021
Security boost in Windows 11 limits PC reuse
Microsoft has put a lot of emphasis on improving security in Windows 11, but this comes at a cost as old hardware is no longer supported Continue Reading
By- Cliff Saran, Managing Editor
-
News
29 Sep 2021
Dedicated number for victims of fraud launched amid national security threat
Consumers that suspect they are being targeted by fraudsters can call 159 to be directly linked to their bank, as part of a 12-month pilot Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
29 Sep 2021
The Security Interviews: How SolarWinds came through its darkest hour
In his first major UK press interview, SolarWinds CEO Sudhakar Ramakrishna tells Computer Weekly how a relentless focus on transparency saw the company safely through a nightmare cyber breach scenario Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Sep 2021
UK consumer trust in banks, retailers and telcos declines as scams increase
Consumers are blaming banks, retailers and social media for the huge increase in online scams, survey shows Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
28 Sep 2021
Digital regulators need discrete but cooperative remits
The UK’s information commissioner has told MPs that digital economy regulators need discrete remits backed up by strong information sharing powers to both provide clear focus as well as allow for greater cooperation between their disparate but interlinked regimes Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
28 Sep 2021
How one red team exercise averted a new SolarWinds-style attack
Palo Alto Networks shares details of how its red teamers found and sealed a customer vulnerability that could have led to another SolarWinds-style supply chain attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Sep 2021
Uber drivers strike over pay issues and unfair dismissal claims
Unionised Uber drivers take industrial action in response to ongoing disputes over pay and claims that drivers are being unfairly dismissed as a result of the company’s technologies Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
27 Sep 2021
Women and BAME people bear brunt of cyber crime impact
Cyber crime has a disproportionate impact on women and BAME people, according to a new report Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Sep 2021
Giant Umbrella contractors suffer salary payment delays following suspected ‘data breach’
Following the discovery of “suspicious network activity” in its systems, payroll processing firm Giant Umbrella has taken itself offline, leaving contractors to fume over missing salary payments Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
Definition
27 Sep 2021
brute-force attack
A brute-force attack is a trial-and-error method used by application programs to decode login information and encryption keys to use them to gain unauthorized access to systems. Continue Reading
-
News
27 Sep 2021
Dubai International Finance Centre’s data protection law to be boosted by new federal regulation
New UAE data protection regulation on the horizon a year after a Dubai-specific law came into force Continue Reading
By- Pat Brans, Pat Brans Associates/Grenoble Ecole de Management
-
News
26 Sep 2021
What it takes to attract and retain women in cyber security
The narrowing gender gap may be a cause for cheer, but more needs to be done to curb discrimination, and attract and retain women for cyber security roles in Asia-Pacific Continue Reading
By -
Video
24 Sep 2021
Empowering APAC women on the frontlines of cyber security
In this webinar, we discuss the issues facing women in cyber security, the challenges of breaking into the field and why it’s important to close the gender gap Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
24 Sep 2021
Facial recognition cannot be a standalone authentication method
As more organisations look to facial recognition to improve their digital identity practices, they must remember that it cannot stand in isolation Continue Reading
By- Amir Nooriala
-
News
24 Sep 2021
How Australia punches above its weight in cyber security
Australia is playing to its strengths in niche areas such as governance and deep tech to punch above its weight in the cyber security industry Continue Reading
By- Aaron Tan, TechTarget
-
News
23 Sep 2021
Fresh alert over Conti ransomware surge
Conti ransomware crew appears increasingly active, prompting fresh warnings from the US authorities Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Sep 2021
MoD in second leak of Afghan citizens’ data
A second breach of data relating to Afghan citizens at risk of Taliban reprisals has been reported by the Ministry of Defence Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Sep 2021
Threat actors target VMware vCenter Server users
Users of VMware vCenter Server are advised to patch a series of vulnerabilities post haste Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Sep 2021
Authorised push payment fraud sees huge increase as criminals switch tactics
Criminals tricking people into making payments through channels such as fake emails and websites have stolen more money than payment card fraudsters Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Blog Post
22 Sep 2021
Please protect us from our own stupidity
It seems like the simplest thing. Compose an email message and then CC colleagues. But,due to a Ministry of Defence blunder, this simple action, built into pretty much every piece of email client ... Continue Reading
By- Cliff Saran, Managing Editor
-
News
22 Sep 2021
AI cannot be regulated by technical measures alone
The regulation of artificial intelligence must address the power of tech companies, as technical measures alone will not be enough to prevent the harms caused by AI-driven technologies, says report Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
22 Sep 2021
UK data plans aim to boost growth but will they isolate the UK from its international friends?
The UK government has made strong statements about the nation’s post-Brexit data strategy but must be careful not to undermine its global credibility Continue Reading
By- Rita Flakoll and Herbert Swaniker
-
News
22 Sep 2021
UK government turns to Tim Berners-Lee startup for digital identity plan
As part of its new digital identity project, the Government Digital Service is using the Solid platform created by web inventor Berners-Lee, which helps users to manage their personal data better Continue Reading
By- Bryan Glick, Editor in chief
-
Opinion
21 Sep 2021
Managing cyber risk through integrated supply chains
High-profile supply chain cyber attacks have caused huge disruption this year. PA Consulting’s Carl Nightingale considers key questions business leaders should be asking of their organisations Continue Reading
By- Carl Nightingale
-
News
21 Sep 2021
US sanctions Suex crypto exchange over ransomware links
US Treasury cracks down on cryptocurrency exchange that supposedly facilitated proceeds from multiple ransomware gangs Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Sep 2021
Investigation launched after MoD email blunder
Exposure of PII on Afghan interpreters who worked with the UK may put hundreds at risk of Taliban reprisals Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
21 Sep 2021
key fob
A key fob is a small, programmable device that provides access to a physical object. Continue Reading
-
News
21 Sep 2021
Spanish police bust Mafia-linked phishing gang
A joint operation between European authorities has dismantled a cyber criminal gang with links to the Italian Mafia Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Sep 2021
BlackMatter gang ramps up attacks on multiple victims
A wave of new BlackMatter ransomware attacks is hitting organisations around the world, even as the US authorities mull new sanctions on ransom payment infrastructure Continue Reading
By- Alex Scroxton, Security Editor
-
21 Sep 2021
UK GDPR faces changes under planned reforms
DCMS is launching a major consultation on proposed changes to the UK’s data protection regime, under which several key elements of the GDPR are likely to change Continue Reading
-
E-Zine
21 Sep 2021
The cities planning for ethical use of AI
In this week’s Computer Weekly, we talk to tech leaders in Barcelona and London about a collaboration to ensure ethical use of AI in the era of smart cities. The UK government wants to reform data protection law – we assess the implications. And we examine the latest best practice in hybrid cloud. Read the issue now. Continue Reading
-
Definition
20 Sep 2021
runbook
Runbooks are a set of standardized written procedures for completing repetitive IT processes within a company. Continue Reading
-
Definition
17 Sep 2021
security policy
A security policy is a document that states in writing how a company plans to protect its physical and information technology (IT) assets. Continue Reading
By- Ben Lutkevich, Site Editor
-
Blog Post
17 Sep 2021
Do we really want a single digital identity system to access government services?
Is the UK government about to make a new announcement on its plans for a single digital identity for citizens to access online public services? On 22 September, two seemingly coordinated ... Continue Reading
By- Bryan Glick, Editor in chief
-
News
16 Sep 2021
Dutch education administrators underestimate threat of cyber crime
Research shows educational establishments in the Netherlands are becoming favoured targets of cyber criminals and administrators are underestimating the risks Continue Reading
By- Kim Loohuis
-
News
16 Sep 2021
Bitdefender launches free REvil ransomware decryptor
Working alongside law enforcement partners, Bitdefender has developed and released a tool to help REvil victims recover their data for free Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
16 Sep 2021
shadow password file
A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is accessible only to the root user, preventing unauthorized users or malicious actors from breaking into the system. Continue Reading
By