IT security
-
News
25 Oct 2024
Dutch critical infrastructure at risk despite high leadership confidence
Stark paradox in Dutch cyber security landscape has business leaders expressing high confidence in their IT infrastructure as cyber attacks rise Continue Reading
-
News
11 Jul 2024
Dutch research firm TNO pictures the SOC of the future
In only a few years, security operations centres will have a different design and layout, and far fewer will remain Continue Reading
-
Answer
09 Jun 2020
What are the risks of canceling an ERP project?
In response to the COVID-19 pandemic, many business and technology leaders are deciding whether to cancel or pause an ERP implementation. Here are some risks to factor into the decision. Continue Reading
By -
Blog Post
09 Jun 2020
Meet the Identity and Attributes Exchange – GDS’s future for digital identity after Verify
As the Government Digital Service (GDS) prepares for the winding down of its Gov.uk Verify service, its future plans for digital identity are becoming a little clearer. In recent weeks, GDS has ... Continue Reading
By- Bryan Glick, Editor in chief
-
News
09 Jun 2020
Honda investigates suspected Snake ransomware attack
Attack disrupts global operations at carmaker, with assembly lines falling silent and sales suspended Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Jun 2020
Cyber security needs more women role models, says report
A report compiled by security assurance organisation Crest highlights the progress made on gender diversity in cyber security, and offers pointers for next steps Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Jun 2020
Bankers say artificial intelligence will separate winners and losers
The application of artificial intelligence at banks will be the difference between the ones that succeed and the ones that fail in the coming years Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
09 Jun 2020
Poorly-secured AWS buckets used to launch Magecart attacks
Cyber criminals are exploiting misconfigured AWS S3 buckets to run credit card fraud and malvertising campaigns, according to new data Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
09 Jun 2020
How retailers are staying connected during their coronavirus shutdown
In this week’s Computer Weekly, we look at how the hard-hit retail sector has turned to technology to stay connected with staff during the coronavirus lockdown. Our latest buyer’s guide examines best practice in data quality and how to avoid “garbage in garbage out” syndrome. And we look at how remote working affects software development teams. Read the issue now. Continue Reading
-
News
08 Jun 2020
What it takes to get DevSecOps right
DevSecOps will drive at least 50% of new applications in Asia-Pacific by 2024, but getting it right will require change management, a collaborative mindset and the right automation tools Continue Reading
By- Aaron Tan, TechTarget
-
Blog Post
07 Jun 2020
Tackling the Covid Cyberfraud Pandemic
The Covid-19 lockdown has led to an explosion of fraud and abuse, both on-line and in the "real" world. Before Test and Trace is fully operational it is already being spoofed . The problems are ... Continue Reading
By- Philip Virgo, Winsafe Ltd
-
News
05 Jun 2020
Police chiefs working with Public Health England on contact-tracing security
Police force representatives are in talks with Public Health England over operational security concerns arising from the NHS Test and Trace coronavirus contact-tracing scheme Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Jun 2020
Ministry of Defence forms new cyber security regiment
The 13th Signal Regiment brings together personnel from across the armed forces to provide specialist security services Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
05 Jun 2020
Ask the expert: technical and ethical considerations of biometric security
In this month's Ask the Expert segment, Serkan Cetin, technical director at One Identity in Asia-Pacific and Japan, offers advice on the technical and ethical considerations of biometric security ... Continue Reading
By- Aaron Tan, TechTarget
-
News
04 Jun 2020
Dutch organisations invest heavily in compliance – but in vain
Despite the fact that companies in the Netherlands have invested heavily to comply with GDPR legislation introduced two years ago, 90% of them are still discovering fundamental weaknesses in their IT environment Continue Reading
By- Kim Loohuis
-
News
04 Jun 2020
Small businesses failing on remote worker protection
Only one-third of people working for small businesses have received any guidance from their employers on how to secure their remote working set-up Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Jun 2020
Data privacy groups pile in on UK contact-tracing app
UK-based digital privacy and free speech campaigning organisation files complaint with the Information Commissioner’s Office about contact-tracing app Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
04 Jun 2020
Black Lives Matter activists targeted by cyber attacks
Civil liberties organisations are being targeted by far-right trolls as protests over the murder of George Floyd spread worldwide Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Jun 2020
The Security Interviews: How the BSI protects the IoT from itself
David Mudd of the BSI reveals how a pragmatic and realistic approach to security vulnerabilities underpins its internet of things kitemark, helping give users the confidence to buy smart devices safely Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Jun 2020
Coronavirus: Cyber criminals target laid-off workers
Malicious actors are targeting workers laid-off or furloughed during the coronavirus pandemic Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
04 Jun 2020
Security Think Tank: Four steps to container security best practice
Adopting containers promises great organisational efficiency advantages, but the fast-evolving technology can be problematic for security teams. What do CISOs need to know to safeguard containers? Continue Reading
By- Alan Taberham and Niall Quinn
-
Opinion
04 Jun 2020
Why trust is the new currency
Businesses need to engender trust with customers amid the complexity of digital transactions involving multiple third parties, even as consumers are not fully cognizant of the importance of data privacy Continue Reading
By- Simon Piff
-
News
04 Jun 2020
Malaysian minister backtracks on spectrum allocation decision
Amid reports of a surreptitious decision to allocate spectrum to five Malaysian operators, the communications minister rescinds his own order, calling for a more transparent review of the allocation process Continue Reading
By -
News
03 Jun 2020
Sodinokibi data auctions highlight changing criminal tactics
The operators of the Sodinokibi ransomware strain are auctioning off swathes of stolen data in an apparent bid to raise cash. What is motivating this new tactic? Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Jun 2020
Security procurement framework goes live for NHS and public sector
Cyber Security Services Framework, developed by NHS Shared Business Services, has formally launched Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Jun 2020
Infosec 2020: Covid-19 an opportunity to change security thinking
The annual Infosecurity Europe is being held virtually this year, and speakers at an online panel session have been considering the impact of the pandemic on security awareness Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Jun 2020
Aston Martin swaps out legacy antivirus for AI-driven service
Luxury car manufacturer says the advent of artificial intelligence-powered services will revolutionise its security posture Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Jun 2020
Keeping IT operations running for remote workers
Measuring employee experience and enabling self-service are some of the ways businesses can manage and empower a remote workforce Continue Reading
By- Paul Mah
-
Opinion
02 Jun 2020
A view from the SOC: Maintaining security capabilities during the pandemic
What are the challenges of maintaining security event and incident detection capabilities in these challenging times? Continue Reading
By- Tom Hawcutt
-
News
02 Jun 2020
VMware vulnerability leaves private clouds open to takeover
Ethical hackers from Citadelo uncovered a vulnerability in VMware Cloud Director that left private cloud owners open to takeover Continue Reading
By- Alex Scroxton, Security Editor
-
News
02 Jun 2020
NIS security regulations proving effective, but more work to do
The UK’s NIS cyber security and risk regulations are proving somewhat effective, according to a government report Continue Reading
By- Alex Scroxton, Security Editor
-
02 Jun 2020
What are the security priorities for the post-coronavirus world?
The Covid-19 pandemic is forcing massive change across the business world and things may never go back to normal. What does security look like in this new world, and what will buyers be prioritising? Continue Reading
-
E-Zine
02 Jun 2020
What will be the IT security priorities of the post-coronavirus world?
In this week’s Computer Weekly, with the working world after the pandemic set to be very different, we assess the IT security priorities for the ‘new normal’. Facial recognition firms are racing to identify people wearing face masks. And how did Europe’s telecoms networks cope with the switch to remote working? Read the issue now. Continue Reading
-
News
01 Jun 2020
Privacy campaigners call for radical changes to contact-tracing app
Liberty, Privacy International and the Open Rights Group join calls for the government to either put in place better data protection policies or abandon its Covid-19 contact-tracing app altogether Continue Reading
By- Alex Scroxton, Security Editor
-
News
01 Jun 2020
WikiLeaks founder Julian Assange misses court hearing due to respiratory problems
The WikiLeaks founder is expected to call 21 witnesses during a three-week extradition hearing in September Continue Reading
By- Bill Goodwin, Computer Weekly
-
Opinion
01 Jun 2020
The impact of spycraft on how we secure our data
The history of cyber security owes much to the world of espionage, as a recent, pre-lockdown Science Museum exhibition showed Continue Reading
By- Mark Hughes
-
News
01 Jun 2020
How managed threat hunting helps bust malicious insiders
Managed threat hunting services can help take some of the pressure off security operations centres and help ensure potential breaches don’t escalate into something far worse. We explore one such case with a happy ending Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 May 2020
Government launches IoT security funding round
A £400,000 funding pot is on offer for innovators to design schemes that boost internet-of-things security Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 May 2020
Test and Trace has not passed data protection impact assessment
Public Health England failed to complete the required impact assessment before launching the Covid-19 Test and Trace programme Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 May 2020
How Sega Europe slashed incident response times using cloud SIEM
Gaming company’s SOC radically improves its operational efficiency with Sumo Logic’s cloud SIEM service Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 May 2020
Singapore’s contact-tracing app tops privacy study
Singapore’s TraceTogether is least intrusive in terms of privacy communications compared with similar apps in the region, study finds Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
29 May 2020
Security Think Tank: CISO stress – moving from recognition to action
Cyber criminals are enjoying a boom during the Covid-19 pandemic, and security teams are working overtime as a result. How can security professionals manage their increased workload, safeguard their mental well-being and avoid burnout? Continue Reading
By- Cath Goulding, Nominet
-
News
28 May 2020
Public Health England to keep contact-tracing data for 20 years
PHE will retain the data it collects via the NHS Test and Trace programme for 20 years Continue Reading
By- Alex Scroxton, Security Editor
-
Video
28 May 2020
How Zoom is keeping pace with demand for conferencing tools
Magnus Falk, CIO advisor at Zoom, offers insights on how the company is scaling up its resources to meet the growing usage of its service Continue Reading
By- Aaron Tan, TechTarget
-
News
28 May 2020
TSB Bank digitises banking forms in response to coronavirus lockdown
As part of its 2022 digital strategy, TSB has begun rolling out electronic forms designed in Adobe XD and processed using Adobe Sign Continue Reading
By- Cliff Saran, Managing Editor
-
News
28 May 2020
IoT buyers eye private network deployments for added security
Fully private, segregated networks for IoT deployments are becoming increasingly attractive to many organisations, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
27 May 2020
Australia is painting a big red cyber target on its critical infrastructure
Australia’s critical infrastructure is particularly vulnerable to cyber attacks right now because of years of under-investment in cyber security and ageing legacy systems Continue Reading
By- Carlo Minassian
-
News
27 May 2020
Revealed: Surveillance camera network that covered Dominic Cummings’ lockdown travel
A network of automatic number plate recognition and local authority traffic cameras could help police track Downing Street chief of staff Dominic Cummings’ journeys to Durham and Barnard Castle during the Covid-19 lockdown Continue Reading
By- Duncan Campbell , 2QQ Ltd, Sussex University
-
Feature
27 May 2020
GDPR at two: How far we’ve come, how far we still have to go
Marking two years of the General Data Protection Regulation, industry voices weigh in on the state of data protection and privacy, consider what has changed, and what still needs to change Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 May 2020
Enterprise clouds hammered by cyber attacks during pandemic
Remote workers logging onto enterprise cloud service accounts are an easy access point for attackers, says McAfee Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 May 2020
PropertyGuru touts 3D virtual viewings with StoryTeller
Southeast Asian property portal PropertyGuru rolls out new capability in its FastKey platform that lets developers showcase properties to prospective buyers through 3D visualisation Continue Reading
By- Aaron Tan, TechTarget
-
News
27 May 2020
Fears contact-tracing app will open the floodgates for cyber criminals
Study of UK consumers reveals worries over an uptick in cyber crime and a lack of trust in government Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 May 2020
Max Schrems accuses Ireland of ‘Kafkaesque’ delay in Facebook GDPR investigation
Privacy campaigner Max Schrems has urged the European Commission to intervene after the Irish Data Protection Commission allegedly used ‘Kafkaesque’ tactics to delay investigations into Facebook’s compliance with GDPR Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
26 May 2020
StrandHogg mobile vulnerability has evil twin
Variant of the dangerous StrandHogg vulnerability affecting Android phones could allow hackers to access almost all apps on a target device Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 May 2020
Android security vulnerabilities differ by country, say researchers
Manufacturers of Android devices including Huawei, Samsung and Xiaomi shipped devices with different levels of security in different regions, leaving their users exposed to attack Continue Reading
By- Alex Scroxton, Security Editor
-
26 May 2020
Can Lady Gaga and Madonna get people to take security seriously?
What does it take to get people to pay attention to cyber security? A celebrity law firm hack may hold some answers. Continue Reading
-
News
26 May 2020
The Security Interviews: Temper tantrums ahead as GDPR enters its terrible twos?
On the General Data Protection Regulation’s second birthday, Tim Hickman, a data protection lawyer and partner at White & Case LLP, discusses the regulation’s teething troubles and assesses how best to maintain optimum compliance Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
26 May 2020
Can Lady Gaga and Madonna get people to take IT security seriously?
In this week’s Computer Weekly, after hackers threatened to release data from a US law firm’s celebrity clients, will people finally take cyber security seriously? Designing software for older users makes systems better for all – we examine how. And the IT chief at TSB explains how the bank recovered from its 2018 IT disaster. Read the issue now. Continue Reading
-
News
25 May 2020
Coronavirus: Australia calls for stronger defences amid cyber attacks
The Australian Cyber Security Centre offers guidance for critical infrastructure operators to guard against cyber attacks which have already hit the healthcare sector Continue Reading
By- Aaron Tan, TechTarget
-
News
22 May 2020
EasyJet to be sued over customer data breach
If successful, airline’s potential liability for the loss of millions of customer records could be as high as £18bn Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
22 May 2020
How effective security training goes deeper than ‘awareness’
Cyber criminals are constantly developing their techniques and strategies, so security training needs to do the same Continue Reading
By- Adenike Cosgrove
-
News
22 May 2020
Covid-19 will leave organisations exposed to higher cyber risks
Hacking attacks and phishing emails could become the new norm, according to research by the World Economic Forum Continue Reading
By- Bill Goodwin, Computer Weekly
-
Opinion
22 May 2020
Identification and access management: some possible futures
Learn about how we might be using our heartbeats, brainwaves and eye movements to unlock our mobiles in the future Continue Reading
By- Francois Lasnier
-
News
22 May 2020
Hancock to Harman: No contact-tracing privacy law
Health secretary claims existing data protection law is good enough to guarantee the security of contact-tracing data Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 May 2020
Coronavirus: How MyIX is keeping Malaysians connected
Malaysia’s MyIX internet exchange has been classed as critical national infrastructure, with member telcos adding more capacity to meet the surge in demand for internet services Continue Reading
By -
Feature
21 May 2020
Top 5 VPN myths and misconceptions for IT organizations
Although VPN technology has its challenges, various misconceptions exist that can muddle IT teams' understandings of VPNs. Here are five common VPN misconceptions debunked. Continue Reading
By- Michaela Goss, Senior Site Editor
-
News
20 May 2020
NCSC discloses multiple vulnerabilities in contact-tracing app
National Cyber Security Centre has received mountains of feedback on the security of the government’s Covid-19 contact-tracing app, and has now taken the step of making multiple disclosures Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 May 2020
Serco exposes contact tracers’ data in email error
Error saw almost 300 coronavirus contact tracers’ email addresses made visible to other recipients of the message Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 May 2020
Personal devices putting Singapore employers at risk
More than half of Singapore respondents to a CrowdStrike-commissioned survey believe their devices are only somewhat secure against advanced cyber threats Continue Reading
By- Aaron Tan, TechTarget
-
News
20 May 2020
Responsible Cyber acquires Secucial in S$7m deal
Singapore startup Responsible Cyber plans to bolster its Immune platform with access control management capabilities, and sets out to expand its global footprint Continue Reading
By- Aaron Tan, TechTarget
-
News
19 May 2020
Microsoft Build 2020: Focus on protecting data for AI development
Microsoft Build is always a vital event for developers across the IT industry. This year, Microsoft has expanded its AI emphasis Continue Reading
By- Nicholas McQuire
-
Tip
19 May 2020
Supply chain recovery post-COVID-19: Risk, disruption and tech
The coronavirus pandemic exposed the fragility of global supply chains and leaders must turn their attention to boosting resiliency. Here's how to start. Continue Reading
-
News
19 May 2020
Cancelled NCSC CyberUK event gets green light for 2021
The NCSC’s popular CyberUK event has been rescheduled to next year, and will again take place in Newport in south Wales Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 May 2020
GDPR wholly inappropriate to govern contact-tracing data
Human Rights Committee Chair Harriet Harman says current data protection law is not up to the job of governing the data collected by the Covid-19 contact-tracing app Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 May 2020
Doubts mount over effectiveness of UK contact-tracing app
Studies from BCS and Anomali reveal that a significant proportion of the UK population is not prepared to download the Covid-19 contact-tracing app Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
19 May 2020
Nine million EasyJet customer details lost in data breach
Cyber attack on EasyJet’s systems originated from a highly sophisticated source, says the airline Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 May 2020
Sodinokibi cyber criminals plot to ‘auction’ Madonna data
The cyber criminal gang behind a recent attack on a New York law firm is planning to auction off its client data, one person at a time Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
19 May 2020
Blue tooth, not privacy, is the problem with NHSX
He would never enable Bluetooth on a mobile phone because of its inherent security problems. It is unclear how many of these have been fixed with the latest releases. But some are unlikely to be ... Continue Reading
By- Philip Virgo, Winsafe Ltd
-
News
19 May 2020
Huawei: US using technological strengths to ‘crush’ companies outside its own borders
Chinese tech giant hits back at White House decision to extend technology ban and says it will ultimately be self-harming Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
19 May 2020
GitLab makes foray into Southeast Asia
GitLab expands in Southeast Asia with a Singapore presence to shore up its growing footprint across the Asia-Pacific region Continue Reading
By- Aaron Tan, TechTarget
-
News
19 May 2020
Vast majority of cyber attacks are easy to stop, says Verizon
Almost 90% of data breaches are motivated by the prospect of financial gain, but cyber criminals have clearly defined breach pathways, giving the good guys an advantage if they care to use it Continue Reading
By- Alex Scroxton, Security Editor
-
18 May 2020
Contact tracing: The privacy vs protection debate
The Covid-19 pandemic has necessitated extreme measures not seen in peacetime for over 100 years. Contact-tracing apps are being developed as a tool for managing the pandemic, but are they a step too far? Continue Reading
-
News
18 May 2020
DevOps improve code quality, but security must happen sooner
GitLab survey finds developers are adopting DevOps to improve code quality, but more needs to be done on secure coding Continue Reading
By- Cliff Saran, Managing Editor
-
Feature
18 May 2020
Malaysia’s data protection practices still have some way to go
Some Malaysian firms are not using data protection tools to the fullest potential, while others only think about data protection after a breach Continue Reading
By -
News
18 May 2020
Why a pandemic-specific BCP matters
Many organisations still do not have scenario-specific business continuity plans, which are helpful when the situation requires a customised response, such as a pandemic, according to Forrester Continue Reading
By- Aaron Tan, TechTarget
-
Blog Post
17 May 2020
Protecting Data or “Saving Lives; Saving Livelihoods”: Which comes first in a post Covid World?
Almost every nation except for those which already had them as a legacy of SARS (e.g. Singapore, South Korea and Taiwan) has had to move fast to produce computer systems that will help support a ... Continue Reading
By- Philip Virgo, Winsafe Ltd
-
Tip
15 May 2020
Should COVID-19 halt your ERP implementation? 12 questions
The COVID-19 pandemic is casting doubt on whether ERP and enterprise business applications projects should move forward. Here's help on deciding. Continue Reading
By -
News
15 May 2020
Questions raised after UK’s electrical grid shrugs off cyber attack
Attack on Elexon was resolved within hours with no impact on the national electricity supply, but it could have been much worse Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 May 2020
Law firm hackers threaten to release dirt on Trump
A new ransom demand of $42m has been made against New York law firm Grubman, Shire, Meiselas and Sacks, and it may be the largest ever, say security experts Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 May 2020
Harman seeks to bring private member’s bill over contact tracing
Chair of Human Rights Committee aims to put the proposed Contact Tracing (Data Protection) Bill 2020 before parliament as a private member’s bill if necessary Continue Reading
By- Alex Scroxton, Security Editor
-
14 May 2020
Australian firms soldier on amid Covid-19 outbreak
From the largest financial institutions to small companies, Aussie firms have been dialling up their use of technology tools to keep their businesses humming during the coronavirus pandemic. Continue Reading
-
14 May 2020
How APAC firms are coping with the Covid-19 outbreak
The air of change looms large in companies operating in the Asia-Pacific region, with some doing better than others in keeping the lights on amid the coronavirus pandemic. Continue Reading
-
News
14 May 2020
Venafi buys cloud protection service Jetstack
Jetstack specialises in open source machine identity protection software for Kubernetes and cloud native ecosystems Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 May 2020
China targeting Covid-19 researchers through IT suppliers, claims US
The US CISA says it is seeing targeting and attempted network compromise of Covid-19 research centres by China Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 May 2020
UK’s contact-tracing app targeted by scammers
Even though it is only operational on the Isle of Wight as a beta test, the UK government’s coronavirus contact-tracing app has already attracted the attention of cyber criminals Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 May 2020
SK Telecom brings quantum security to the masses
The South Korean telco is readying the world’s first 5G smartphone equipped with a quantum random number generator chipset Continue Reading
By- Aaron Tan, TechTarget
-
Feature
13 May 2020
Surveillance capitalism in the age of Covid-19
Could the Covid-19 coronavirus pandemic further consolidate surveillance capitalist practices and enterprises? Author Shoshana Zuboff warns Computer Weekly it is possible Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
13 May 2020
Report reveals inadequate cyber security at Schiphol Airport
A report has revealed problems with critical security systems in Amsterdam’s Schiphol Airport Continue Reading
By- Kim Loohuis
-
Podcast
13 May 2020
Podcast: UK SME planning and compliance for ‘the new normal’
We look at how UK SMEs face a “new normal” following the coronavirus lockdowns and how they can plan for compliance with more remote working and a new data landscape Continue Reading
By- Antony Adshead, Storage Editor
-
Opinion
13 May 2020
Security Think Tank: Burnt out CISOs are a huge cyber risk
Cyber criminals are enjoying a boom during the Covid-19 pandemic, and security teams are working overtime as a result. How can security pros manage their increased workload, safeguard their mental wellbeing, and avoid burnout? Continue Reading
By- Cavan Arrowsmith, Turnkey Consulting
-
News
13 May 2020
Nation state APT groups prefer old, unpatched vulnerabilities
The Cybersecurity and Infrastructure Security Agency and the FBI have published details of the most commonly exploited vulnerabilities of recent years, and there are some “classics” on the list Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 May 2020
Can Lady Gaga and Madonna get people to take security seriously?
What does it take to get people to pay attention to cyber security? A celebrity law firm hack may hold some answers Continue Reading
By- Alex Scroxton, Security Editor