IT security
-
News
25 Oct 2024
Dutch critical infrastructure at risk despite high leadership confidence
Stark paradox in Dutch cyber security landscape has business leaders expressing high confidence in their IT infrastructure as cyber attacks rise Continue Reading
-
News
11 Jul 2024
Dutch research firm TNO pictures the SOC of the future
In only a few years, security operations centres will have a different design and layout, and far fewer will remain Continue Reading
-
News
16 Jun 2021
Cl0p ransomware gang clapped in irons, assets seized
Ukrainian police report they have taken down the Cl0p, aka Clop, ransomware operation following a lengthy investigation Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 Jun 2021
Organisations cannot rely on cyber insurance to cover losses
Ransomware attacks have become a big driver of cyber insurance claims, but insurance must not be relied upon as a failsafe, says a report Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Jun 2021
NHS Test and Trace picks Risk Ledger to secure supply chain
Risk Ledger’s technology promises ‘unparalleled’ visibility into NHS Test and Trace’s supply chain Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Jun 2021
Privacy pro salaries rise throughout pandemic, but at a cost
Data from the IAPP’s latest salary survey reveals some insight into how the pandemic impacted the privacy profession Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Jun 2021
Ransomware most insidious cyber threat facing UK
NCSC CEO urges organisations to do more to prepare for ransomware attacks Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Jun 2021
The Security Interviews: How to build a government model to ‘hack for good’
Kyle Hanslovan started Huntress to give back after a career in the intelligence sector. After US authorities took action to help people hit by the Microsoft Exchange attacks, we discussed how governments can ‘hack for good’ Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Jun 2021
Scottish government awards digital identity platform contract to Scott Logic
Supplier is working on a two-year project to create a digital identity service through a suite of common platforms that will be adopted across Scottish government Continue Reading
By -
News
15 Jun 2021
How healthcare organisations are tapping data analytics
Healthcare providers are harnessing data analytics to improve clinical and operational outcomes even as they continue to face challenges in data aggregation and data protection Continue Reading
By- Aaron Tan, TechTarget
-
News
14 Jun 2021
G7 commits to action on ransomware, digital privacy
The G7 urges Russia to do more to hold criminal ransomware gangs operating from within its borders to account as it commits to more action on the issue Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
14 Jun 2021
Europe’s proposed AI regulation falls short on protecting rights
The European Commission’s proposal for artificial intelligence regulation focuses on creating a risk-based, market-led approach replete with self-assessments, transparency procedures and technical standards, but critics warn it falls short of being able to protect people’s fundamental rights and mitigating the technology’s worst abuses Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
14 Jun 2021
HammondCare takes procurement to the cloud
The Australian health and aged care provider migrated its procurement and invoicing systems to the cloud in just six months to improve efficiency and security Continue Reading
By- Aaron Tan, TechTarget
-
News
11 Jun 2021
FBI planned a sting against An0m cryptophone users over drinks with Australian investigators
Australian Federal Police and the FBI came up with the idea over drinks: build a cryptophone network with a built-in backdoor and sell it to crime gangs around the world Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
11 Jun 2021
CMA secures commitments from Google on future of cookies
The Competition and Markets Authority is opening a consultation on commitments offered to it by Google to ensure its Privacy Sandbox proposals do not harm digital advertising markets Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
11 Jun 2021
Security Think Tank: To secure printers think process, technology and people
Though rarely discussed in a cyber context, the prevalence of connected printers and MFPs poses security risks both technological and physical. What does a print security strategy need to take into account? Continue Reading
By- Louise Barber, Turnkey Consulting
-
News
11 Jun 2021
UK promises tougher line on cyber crime
Speaking ahead of the G7 Summit, foreign secretary Dominic Raab says the UK is ready to take on cyber criminals and other malicious actors wherever they may be Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Jun 2021
Australia names ‘strategic’ datacentre operators
Australia’s Digital Transformation Agency certifies Macquarie Telecom, Canberra Data Centres and Australian Data Centres as strategic operators for hosting government data Continue Reading
By- Aaron Tan, TechTarget
-
Feature
10 Jun 2021
How the pandemic changed backup
The Covid-19 pandemic forced big changes in how people work – we look at impacts on backup, including increased reliance on the cloud, plus security and compliance vulnerabilities and ransomware Continue Reading
-
News
10 Jun 2021
Risk data shows UK energy sector most vulnerable to cyber attack
New report compiled by insurance firm Hiscox reveals the state of cyber preparedness in the UK and beyond Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
10 Jun 2021
CW Europe: Amsterdam reins back datacentre developments over environmental concern
The construction of datacentres in the Netherlands’ Amsterdam region has accelerated at such a pace that their demands for electricity are causing concern, prompting city authorities and datacentre operators to open a dialogue about sustainable datacentre industry expansion. Also in this issue, find out the state of play in the adoption of open banking across Europe. Continue Reading
-
Opinion
10 Jun 2021
Security Think Tank: Time to accept printers will leak data
Though rarely discussed in a cyber context, the prevalence of connected printers and MFPs poses security risks both technological and physical. What does a print security strategy need to take into account? Continue Reading
By- Andy Jones, Information Security Forum (ISF)
-
News
10 Jun 2021
Australian organisations face heightened cyber attacks
Nearly three in four Australian organisations experienced cyber attacks that largely resulted from a growing remote workforce in 2020 Continue Reading
By- Aaron Tan, TechTarget
-
News
09 Jun 2021
FBI arrests distributors accused of selling An0m encrypted phones to crime groups
Working with overseas law enforcement, the FBI has arrested eight people and named a further 13 accused of distributing An0m phones to organised crime groups Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
09 Jun 2021
Unit 42 warns of emergent Prometheus ransomware
Palo Alto’s Unit 42 shares intel on the emergent Prometheus ransomware gang, with apparent links to the Thanos crew Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Jun 2021
RSA spins out fraud and risk unit as Outseer
RSA Security is transitioning its fraud and risk intelligence work into a new business to be called Outseer Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
09 Jun 2021
Why agility is the key to secure software
Continuous delivery of software product releases demands continuous security. Businesses and regulators are right to wonder whether organisations are valuing cyber security by the design of their products Continue Reading
By- Raihan Islam, defineXTEND
-
News
09 Jun 2021
Microsoft fixes seven zero-days on its Patch Tuesday rounds
Fixes for six actively-exploited – and one yet-to-be-exploited – zero-day bugs are released in the June 2021 Patch Tuesday update Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Jun 2021
Colonial Pipeline ransom seizure is a win, but don’t relax yet
The security community is enthusiastic about the US authorities’ recovery of a significant part of the Colonial Pipeline ransomware payment, but this positivity should perhaps be somewhat tempered Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Jun 2021
NHS Digital delays data collection plans until September
NHS Digital has postponed its proposed collection of GP data for two months, to allow more time for the public to understand the process and opt out if wanted Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Jun 2021
We Open Tech community supports non-binary and trans security pros
New tech community established to advocate for the interests of non-binary people, trans and cis women, trans men, and other marginalised genders in security Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
08 Jun 2021
How cloud adoption is shaping digital identity trends in 2021
Expert Carla Roncato explains what organizations need to know about emerging digital identity and security trends for the cloud, including CASB, CIEM and zero trust. Continue Reading
By- Katie Donegan, Social Media Manager
-
News
08 Jun 2021
National data guardian calls for dialogue on NHS Digital GP plans
The UK’s national data guardian says it is important the public has clarity on how their confidential medical information will be used and kept secure under NHS data-sharing plans Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
08 Jun 2021
The rise and rise of supply chain attacks
Supply chain attacks in Asia-Pacific and elsewhere have intensified as cyber threat actors look to exploit the weakest links in business and digital supply chains Continue Reading
By- Aaron Tan, TechTarget
-
E-Zine
08 Jun 2021
The jobseekers turning to cyber crime in the pandemic
In this week’s Computer Weekly, security researchers say people left unemployed by the pandemic are turning to cyber crime – we find out why. We examine the confluence of distributed cloud and edge computing technologies. And controversial uses of facial recognition technology come under further scrutiny. Read the issue now. Continue Reading
-
08 Jun 2021
NGOs file complaints against Clearview AI in five countries
Privacy and human rights organisations have asked data protection regulators in the UK, France, Austria, Italy and Greece to investigate controversial facial recognition company Clearview AI Continue Reading
-
08 Jun 2021
Why some jobseekers have turned to cyber crime during the pandemic
Research shows that many people have been seeking cyber crime-related work on the dark web, but why? Continue Reading
-
News
07 Jun 2021
Police raids around world after investigators crack An0m cryptophone app in major hacking operation
Police in 16 countries carried out raids on after Australian Police and the FBI cracked an encrypted An0M communications network used by crime groups Continue Reading
By- Bill Goodwin, Computer Weekly
-
Opinion
07 Jun 2021
Security Think Tank: What must a secure print strategy take into account?
Though rarely discussed in a cyber context, the prevalence of connected printers and MFPs poses security risks both technological and physical. What does a print security strategy need to take into account? Continue Reading
By- Josh Foote
-
News
07 Jun 2021
EU privacy chief investigates use of US cloud services
Use of Amazon and Microsoft’s cloud services by public sector bodies in the European Union is being scrutinised by the bloc’s privacy watchdog Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
07 Jun 2021
Siloscape malware a risk to Windows containers, Kubernetes
Palo Alto’s Unit 42 reports on what appears to be the first-recorded malware targeting Kubernetes clusters through Windows containers Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Jun 2021
NCSC updates schools ransomware guidance amid surge
The National Cyber Security Centre says it is dealing with a renewed surge of ransomware attacks targeting schools, colleges and universities Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Jun 2021
IBM pushes back against US government data requests
Technology giant IBM says the US government has ‘no jurisdiction’ to request data from its European entities Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
07 Jun 2021
Campaigners plan legal action over NHS data sharing
Privacy coalition aims to force NHS Digital to push back its plans to scrape medical information on millions of patients into a central database Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
07 Jun 2021
NHS Digital’s GP data-scraping plan must be publicised and delayed
The UK government must launch a national awareness campaign and delay this month’s planned GP data slurp, say privacy consultants Ben Rapp and Sara Newman Continue Reading
By- Ben Rapp and Sara Newman
-
News
07 Jun 2021
Updated standard contractual clauses will provide ‘legal certainty’ for transfer of data
Organisations have 18 months to update data transfer agreements, known as standard contractual clauses, or SCCs, to continue sharing data outside the European Union Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
07 Jun 2021
DNS attacks on the rise in APAC
Attacks on the domain name system in Asia-Pacific grew by 15% last year, with Malaysian organisations seeing the sharpest rise in damages among countries in the region Continue Reading
By- Aaron Tan, TechTarget
-
Blog Post
04 Jun 2021
Towards Joined Up Action on On-line Harms, Fraud and Cybersecurity
We have to join up the debate and put cybersecurity into business, economic and social context. Hence the importance of the Digital Policy Alliance and its groups. Continue Reading
By- Philip Virgo, Winsafe Ltd
-
News
04 Jun 2021
HSBC offers all businesses scam awareness app
HSBC is sharing information on the latest scams and how to defend against them thorough its latest app, available to all businesses Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Opinion
04 Jun 2021
Security Think Tank: Printers can’t be an ‘add-on’ in your cyber strategy
Though rarely discussed in a cyber context, the prevalence of connected printers and MFPs does pose security risks both technological and physical. What does a print security strategy need to take into account? Continue Reading
By- Michael Howard and Kimberlee Ann Brannock, ISACA
-
News
04 Jun 2021
BCS: Lack of communication over NHS GPDPR ‘astonishing’
The Chartered Institute for IT has warned that millions of people are not being properly informed of NHS Digital plans to harvest their data Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Jun 2021
Secrecy around EncroChat cryptophone hack breaches French constitution, court hears
French lawyers claim that investigators are unlawfully withholding details of a cryptophone hacking operation in a case that could impact UK prosecutions Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
04 Jun 2021
Government action on ransomware epidemic gathers pace
The US government steps up action against ransomware operators, while the UK’s NCSC publishes guidance on preparing to deal with a ransomware attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Jun 2021
Reports raise alarm over Huawei access to Dutch networks
Espionage accusations raise security questions for Netherlands organisations using Chinese supplier’s equipment and services Continue Reading
By- Kim Loohuis
-
Definition
03 Jun 2021
social engineering
Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into breaking normal security procedures and best practices to gain unauthorized access to systems, networks or physical locations or for financial gain. Continue Reading
By- Linda Rosencrance
- Madelyn Bacon, TechTarget
-
Definition
03 Jun 2021
distributed denial-of-service (DDoS) attack
A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource. Continue Reading
By- Ben Lutkevich, Site Editor
- Kevin Beaver, Principle Logic, LLC
-
News
03 Jun 2021
Norway’s auditor general lifts lid on energy industry’s cyber security risks
Auditor General’s Office questions the security posture of Norway’s energy industry Continue Reading
By- Gerard O'Dwyer
-
News
03 Jun 2021
Tories fined over email data protection breaches
The Conservative Party broke the law by failing to properly keep records of who had unsubscribed from its mailing list Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Jun 2021
FireEye sold to private equity, Mandiant regains independence
FireEye has agreed to sell its products business and name to a private equity consortium, while Mandiant will spin out as an independent threat intel business Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Jun 2021
Pandemic a ‘once-in-a-lifetime’ chance to reshape security
The volume of remote working has made it hard to paint an accurate picture of the true state of enterprise cyber security, but it presents an opportunity to change things up Continue Reading
By- Alex Scroxton, Security Editor
-
News
02 Jun 2021
Scottish businesses missing out on Cyber Essentials benefits
More than a third of Scottish businesses do not believe they are adequately prepared to deal with a cyber security incident Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
02 Jun 2021
Security Think Tank: Steps to a coherent print security strategy
Though rarely discussed in a cyber context, the prevalence of connected printers and MFPs poses security risks both technological and physical. What does a print security strategy need to take into account? Continue Reading
-
Feature
02 Jun 2021
What the Telecommunications (Security) Bill means for UK industry
The Telecommunications (Security) Bill is intended to reinforce the security of the UK telecommunications infrastructure, but what are the implications for industry? Continue Reading
-
Feature
02 Jun 2021
Buying a VPN? Here’s what you need to know
VPNs are an effective cyber security tool for businesses and remote workers, but there are many things to consider before purchasing and implementing one. We explore some of these Continue Reading
-
Opinion
02 Jun 2021
Security Think Tank: Printer risks go deep into IT history
Though rarely discussed in a cyber context, the prevalence of connected printers and MFPs does pose security risks both technological and physical. What does a print security strategy need to take into account? Continue Reading
By- Mike Lloyd, RedSeal
-
Opinion
01 Jun 2021
Long-term thinking is vital to secure UK’s critical infrastructure
To face down the threat of cyber warfare against UK CNI, the government needs long-term thinking that looks beyond the next general election cycle, says Advent-IM’s Mike Gillespie Continue Reading
-
News
01 Jun 2021
European-led consortium investigates quantum cryptography
The arms race to a quantum internet is under way – the European Commission is looking at secure critical national infrastructure and member state comms Continue Reading
By- Cliff Saran, Managing Editor
-
News
01 Jun 2021
Exagrid pays $2.6m to Conti ransomware attackers
Backup appliance specialist hit by Conti ransomware in May with cyber criminals downloading employee and customer data, confidential contracts and source code Continue Reading
By- Valéry Rieß-Marchive, Rédacteur en chef
- Antony Adshead, Storage Editor
-
News
01 Jun 2021
Ex-IT manager stole over £800,000 from NHS trust
A former senior IT manager at an Essex NHS trust has pleaded guilty to defrauding his employer out of more than £800,000 Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
01 Jun 2021
Amazon Cognito
Amazon Cognito is an Amazon Web Services product that controls user authentication and access for mobile applications on internet-connected devices. Continue Reading
By- Rahul Awati
- David Carty, Site Editor
-
News
31 May 2021
Microsoft brings APAC policymakers together in security council
Microsoft’s APAC public sector security council will meet once a quarter to share threat intelligence and best practices for combating cyber threats Continue Reading
By- Aaron Tan, TechTarget
-
Feature
28 May 2021
Inept cybersecurity education and training feed into skills gap
Learn why former infosec instructor and author of 'How Cybersecurity Really Works' advocates for changes to security education and training to alleviate the industry skills gap. Continue Reading
By- Katie Donegan, Social Media Manager
-
Feature
28 May 2021
Network reconnaissance techniques for beginners
In this excerpt of 'How Cybersecurity Really Works,' author Sam Grubb breaks down common network reconnaissance techniques used by adversaries to attack wired networks. Continue Reading
By- Katie Donegan, Social Media Manager
- No Starch Press
-
Answer
28 May 2021
When should you use AWS IAM roles vs. users?
Access management is critical to securing the cloud. Understand the differences between AWS IAM roles and users to properly restrict access to AWS resources. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
News
28 May 2021
Privacy experts concerned over NHS data collection plans
Security and data privacy experts warn NHS Digital that its data collection plans could increase risk and cause a public backlash Continue Reading
By- Alex Scroxton, Security Editor
-
Guide
28 May 2021
Essential Guide: How APAC firms can ride out the pandemic
In this Essential Guide, we examine the impact of Covid-19 on Asia-Pacific businesses, how they have responded and important lessons that can be learned as they ready themselves for the post-pandemic world. Continue Reading
By- Aaron Tan, TechTarget
-
27 May 2021
Industry reflects on three years of GDPR
Looking back on 12 tumultuous months, we assess how GDPR has weathered the effects of the Covid-19 pandemic and Brexit, and consider what the coming year may hold for data protection Continue Reading
-
News
27 May 2021
Loss of 150,000 police records made worse by management failures
The loss of 150,000 records from a number of national policing systems was caused by a human coding error, but made worse by process and management failures Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
27 May 2021
Security ops teams struggle to switch off at home
Spiralling stress levels among SOC and IT security teams can be attributed mainly to alert overload, says Trend Micro Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
27 May 2021
CW Nordics: Denmark takes a top-down approach to gender equality in tech entrepreneurship
Tech Nordic Advocates has adopted a new approach to closing the gender gap in Danish technology startups, looking to emulate Canada’s top-down approach. Also in this issue, find out the state of play with the adoption of open banking in Europe. Continue Reading
-
News
27 May 2021
NGOs file complaints against Clearview AI in five countries
Privacy and human rights organisations have asked data protection regulators in the UK, France, Austria, Italy and Greece to investigate controversial facial recognition company Clearview AI Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
26 May 2021
More data stolen in January 2021 than in all of 2017, says report
The volume of data being stolen through breaches is growing steadily and shows no sign of slowing, according to a report from Imperva Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 May 2021
Millions of pounds lost to crypto fraud on social media
More than £63m has been lost nationally by victims of investment fraud via a social media platform, says Action Fraud Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
25 May 2021
Lessons from the Post Office Horizon Case
The presumption of the machine functioning properly in practice, means that the prosecution can rely on the presumption that a computer was operating reliably at all material times. It needs to be ... Continue Reading
By- Philip Virgo, Winsafe Ltd
-
News
25 May 2021
GCHQ bulk interception programme breached privacy rights, Strasbourg court rules
European Court of Human Rights finds that the UK’s bulk surveillance programme breached citizens’ privacy rights Continue Reading
By- Bill Goodwin, Computer Weekly
-
Opinion
25 May 2021
Policies key to revolutionising Identity Governance and Administration
The proliferation of digital identities, applications, data, security threats and compliance requirements means that Identity Governance and Administration (IGA) has never been more important, but not all organisations are approaching it in an effective and efficient way Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 May 2021
CyberSprinters game gives kids a head start, says NCSC
An online game for primary schools, clubs and youth organisations will teach children aged seven to 11 the fundamentals of staying safe online Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 May 2021
Threat of group GDPR legal action haunts CISOs
The vast majority of security leaders questioned for a new report say they are concerned about the possibility of group legal settlements against them following a serious data breach Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 May 2021
McAfee to change terms of auto-renewing consumer plans
Consumers who found their McAfee antivirus contracts auto-renewed will be able to get out of their contracts and get their money back Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 May 2021
Industry reflects on three years of GDPR
Looking back on 12 tumultuous months, we assess how GDPR has weathered the effects of the Covid-19 pandemic and Brexit, and consider what the coming year may hold for data protection Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 May 2021
Legacy vulnerabilities may be biggest enterprise cyber risk
While high-profile cyber attacks and zero-days grab headlines, statistics gathered by network security specialists Cato suggest CISOs should be addressing legacy threats Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 May 2021
Air India is latest victim of Sita hack
Data on millions of people who flew with Air India between 2011 and 2021 appears to have been compromised in the recent Sita supply chain attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 May 2021
Dutch researchers build security software to mimic human immune system
Software could help IT systems develop immunity to some cyber attacks in a similar way to how the body fights infection Continue Reading
By- Kim Loohuis
-
Feature
24 May 2021
How Bureau Veritas migrated 85% of its applications to the AWS cloud
In six years, France-based services giant BV has migrated 115 applications to the AWS cloud, mostly using in-house expertise. We talk to the company’s IT director Continue Reading
By- Gaétan Raoul, LeMagIT
- Antony Adshead, Storage Editor
-
News
24 May 2021
MEPs urge European Commission to revise UK adequacy decisions
Members of the European Parliament are calling for the European Commission to ensure EU citizens have greater privacy rights Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
24 May 2021
Why the security stack needs to move to the edge
Akamai’s chief technology officer Robert Blumofe makes the case for a decentralised security model to address cyber threats that are emanating from the network edge Continue Reading
By- Aaron Tan, TechTarget
-
Podcast
21 May 2021
CyberUK, bees and datacentres, Red Cross digital mapping – Computer Weekly Downtime Upload podcast
In this episode of the Computer Weekly Downtime Upload podcast, Caroline Donnelly and Brian McKenna are joined by Alex Scroxton, security editor, to discuss CyberUK, bees and datacentres, and the British Red Cross’ use of digital mapping to combat Covid-19 Continue Reading
By- Alex Scroxton, Security Editor
- Caroline Donnelly, Senior Editor, UK
- Brian McKenna, Senior Analyst, Business Applications
-
News
21 May 2021
Lack of developer attention to cloud security prompts alerts
The personal data of over 100 million Android users may have been put at risk through a variety of cloud service misconfigurations Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
21 May 2021
ethical hacker
An ethical hacker, or white hat hacker, is an information security expert authorized by an organization to penetrate computing infrastructure to find security vulnerabilities a malicious hacker could exploit. Continue Reading
-
Definition
21 May 2021
hacktivism
Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason. Continue Reading
By- Ben Lutkevich, Site Editor
- Madelyn Bacon, TechTarget
-
Tip
20 May 2021
Create a remote access security policy with this template
The expansion of remote work has created complicated security risks. Get help developing and updating a remote access security policy. Download our free template to get started. Continue Reading
By -
News
20 May 2021
Pandemic tech use heightens consumer privacy fears
Report on consumer attitudes to privacy finds evidence of a “heightened sense of fear” as digital footprints expand inexorably Continue Reading
By- Alex Scroxton, Security Editor