IT security
-
News
25 Oct 2024
Dutch critical infrastructure at risk despite high leadership confidence
Stark paradox in Dutch cyber security landscape has business leaders expressing high confidence in their IT infrastructure as cyber attacks rise Continue Reading
-
News
11 Jul 2024
Dutch research firm TNO pictures the SOC of the future
In only a few years, security operations centres will have a different design and layout, and far fewer will remain Continue Reading
-
News
06 Mar 2019
Cyber espionage group behind SingHealth attack
A cyber espionage group dubbed Whitefly has been identified as the perpetrators behind Singapore’s largest data breach to date Continue Reading
By- Aaron Tan, TechTarget
-
News
06 Mar 2019
5G one of several security challenges to CNI
5G technology is among the key security challenges facing critical national infrastructure and all other business organisations, according to the Information Security Forum Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
06 Mar 2019
Security Think Tank: Aim for business intelligence-driven system of risk indicators
What should be the key cyber security risk indicator for any business? Continue Reading
-
Blog Post
06 Mar 2019
NAO hammers another nail into Gov.uk Verify
It’s not commonly known outside Whitehall that by the time the National Audit Office (NAO) – Parliament’s independent spending watchdog – publishes a report, it will have been through several ... Continue Reading
By- Bryan Glick, Editor in chief
-
News
05 Mar 2019
US doubles down on Huawei fears as Chinese prepare to sue
US secretary of state Mike Pompeo has reinforced his attacks on Huawei as the firm apparently prepares to sue the US government over its federal-level ban Continue Reading
By- Alex Scroxton, Security Editor
-
05 Mar 2019
The rise of DevSecOps
The increasing complexity of security threats is leading enterprises to DevSecOps approaches, so that all of the business is involved in security operations Continue Reading
-
News
05 Mar 2019
IT Priorities 2019: What projects are IT professionals spending their budgets on?
The Computer Weekly/TechTarget IT Priorities 2019 survey finds that cloud maturity, security and automation are among the hot areas for spending Continue Reading
By- Cliff Saran, Managing Editor
-
Opinion
05 Mar 2019
Security Think Tank: Invest in proactive approach to security and digital risk
What should be the key cyber security risk indicator for any business? Continue Reading
By- Maxine Holt, Omdia
-
News
05 Mar 2019
Singapore can now certify security products based on Common Criteria
The city-state is has attained the status of a Certificate Authorising Nation, enabling it to evaluate and certify security products under the Common Criteria standard Continue Reading
By- Aaron Tan, TechTarget
-
News
04 Mar 2019
GDS cut expected benefits of troubled Gov.uk Verify system by 75%
In a highly critical report, the National Audit Office says it is 'difficult to conclude' that past decisions to continue with the flagship digital identity system have been justified Continue Reading
By- Bryan Glick, Editor in chief
-
News
04 Mar 2019
Cyber awareness of UK boards found wanting
Boards of many of the UK’s biggest firms must do more to be cyber aware, according to a government report. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Mar 2019
RSA Security bets on digital risk management
RSA Security chief predicts that managing digital risk is set to become increasingly important to organisations as they complete their journeys to digital transformation Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
04 Mar 2019
Security Think Tank: Cyber metrics need to be meaningful
What should be the key cyber security risk indicator for any business? Continue Reading
-
News
04 Mar 2019
Clearer North Korean link to global infrastructure malware campaign
Researchers have uncovered clearer links between a North Korean hacking group and a cyber espionage campaign targeting government, defence, nuclear, energy and financial organisations around the world Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Mar 2019
IT Priorities 2019: APAC keeping pace with digital transformation
Digital transformation is well underway among APAC enterprises which are looking to spend more on refreshing their IT infrastructure and technologies that improve employee productivity Continue Reading
By- Aaron Tan, TechTarget
-
News
02 Mar 2019
Facebook asked George Osborne to influence EU data protection law
Facebook COO Sheryl Sandberg invited one of the chancellor’s children to Facebook’s office as part of a intensive lobbying programme to influence European data protection legislation Continue Reading
By- Bill Goodwin, Duncan Campbell & Sebastian Klovig Skelton
-
News
01 Mar 2019
Facebook facing 10 GDPR investigations in Ireland
Ireland’s Data Protection Commission has revealed it has 10 active probes into Facebook, Instagram and WhatsApp, as well as Apple, LinkedIn and Twitter, on its books Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
01 Mar 2019
GDPR: Irish Data Protection Commission may show where the WWW is heading
The Irish Data Protection Commission's (DPC) annual report makes interesting reading, given that the World Wide Web is celebrating its 30th birthday this month. People regularly give away vast ... Continue Reading
By- Cliff Saran, Managing Editor
-
Feature
01 Mar 2019
Using simulated disaster management to tackle the security skills gap
With the increasing need for cyber security professionals, organisations are turning to new ways to address the skills gap facing the security sector Continue Reading
-
Feature
01 Mar 2019
What are the CDN options for enterprises?
We look at how content delivery networks can give your organisation’s web presence a literal edge Continue Reading
By -
News
01 Mar 2019
Teen becomes first millionaire through HackerOne bug bounties
A self-taught teen hacker from Argentina has become the first bug bounty hacker to become a millionaire by hacking to create a safer internet Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 Feb 2019
Supplier consolidation tops infosec goals for 2019
Supplier consolidation, collaboration between networking and security teams, and security awareness are the top priorities for information security professionals trying to prepare for the unknown, annual benchmark study shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 Feb 2019
London cyber security innovation centre issues open invitation
Government-backed cyber security innovation centre is calling for innovators to address key challenges facing the cyber security industry, offering a year of bespoke support to scale quickly Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 Feb 2019
Sextortion accounts for one in 10 spear-phishing emails
Email sextortion scams have increased in frequency and scope in the past four months, as well as evolving to bypass spam filters and trick recipients into reading the messages, research shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Feb 2019
Icann calls for community collaboration to protect the internet
The domain name system watchdog Icann has reaffirmed its commitment to engage in collaborative efforts to ensure the security, stability and resiliency of the internet’s global identifier systems Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Feb 2019
Chinese cyber attack group Bronze Union targeting weapons tech
Weapons technology is among the latest targets of a highly adaptable cyber espionage group that uses a wide range of publicly available and custom attack tools, presenting a challenge to network defenders Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Feb 2019
How CIOs can earn respect from business peers
CIOs recognise that standing out means being more like a business manager than a technology guru Continue Reading
By- Cliff Saran, Managing Editor
-
News
27 Feb 2019
Most UK consumers say Facebook should be regulated
Nearly three-quarters of UK consumers feel the social platform is damaging people’s mental health, survey shows Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
26 Feb 2019
Wearable technology in the workplace and data protection law
Wearable technology is slowly creeping into the workplace to monitor staff performance and health, but do employers understand the legal implications? We assess the data protection implications Continue Reading
By- Charlotte Allery, Coffin Mew
-
News
26 Feb 2019
Security is battling to keep pace with cloud adoption
Cloud-based business initiatives are accelerating more rapidly than security teams can secure them, a survey reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Feb 2019
Researchers identify 4G and 5G network protocol flaw
Attackers could identify the network cell a user’s device is located in and potentially steal its IMSI number Continue Reading
By- Cliff Saran, Managing Editor
-
News
26 Feb 2019
Cyber criminals earn $3bn a year exploiting social platforms
Businesses urged to respond to research findings that the ready availability of hacking tools, wildfire spread of malware and proliferation of cryptocurrency mining has seen a 300-fold increase in social media-enabled cyber crimes in two years Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Feb 2019
EU gathers momentum in cyber security legislation and cooperation
The past two years have seen a step-change in the rate at which the European Union is putting legislation in place to support improved cyber security standards, collaboration and sharing of resources, says digital commissioner’s representative Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Feb 2019
Cyber power needs wider discussion, says GCHQ director
The topic of cyber power needs wider discussion, says GCHQ head in a speech about the opportunities of digital innovation such as 5G, as well as the accompanying complexity and risk, with particular mention of China and Huawei Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Feb 2019
Android now Fido2 certified
Mobile operating system’s certification accelerates global migration beyond passwords, says Fido Alliance, which seeks to eliminate the world’s dependence on password-based security Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Feb 2019
Facebook planned to spy on Android phone users, internal emails reveal
Facebook planned to use its Android app to track the location of its customers and to allow advertisers to send political advertising and invites to dating sites to ‘single’ people, confidential documents show Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
22 Feb 2019
US may cut off countries that use Huawei in 5G networks
US secretary of state Mike Pompeo has said America may scale back or cut military and diplomatic ties with countries that use Huawei equipment in national 5G networks Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Feb 2019
BlackBerry acquires Cylance to cement security capability
BlackBerry moves forward with its plans to establish itself as an enterprise security firm, focusing on internet-connected endpoints Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Feb 2019
Thales to sell nCipher to Entrust Datacard
Thales eSecurity has announced that it is to sell HSM specialist nCipher, the UK-based encryption firm it acquired in 2008, after spinning it out as a separate business Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Feb 2019
Nato supports collaboration on cyber security
Nato supports collaboration and cooperation on cyber security as an organisation founded on the principle of collective defence, says representative Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Feb 2019
IT Priorities 2019: Security concerns top agenda for network buyers again
The ability to gain visibility into what is happening on enterprise networks has once again topped the agenda for network managers and buyers, according to the latest Computer Weekly/TechTarget IT Priorities survey Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Feb 2019
Businesses urged to prepare for extortion campaigns
C-level executives, lawyers and doctors are the top extortion targets of cyber criminals, a report by researchers tracking thousands of sextortion attempts reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Feb 2019
Cloud backup helps ASL Airlines evade ransomware and keep its business flying, says CIO
ASL Airlines took home the Best of Show prize at the Best of VMworld 2018 Awards after detailing how adopting a robust and resilient disaster recovery strategy is helping it evade ransomware threats Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
21 Feb 2019
UK committed to working with EU cyber security partners
NCSC CEO uses cyber security conference in Brussels to set out his agency’s position on Brexit, 5G security, Huawei, market incentives and international cooperation on active cyber defence Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
21 Feb 2019
CW Nordics: Sweden to test e-krona and plans cashless society
Sweden’s vision of a cashless society has gained traction after the Riksbank (central bank) rolled out plans to test a digital currency, the e-krona. Also read how the Nordic region’s longer-established companies are playing a forceful role to advance digital transformation, and how Finland’s IT sector has rebounded strongly after Microsoft’s takeover of Nokia’s mobile phones and smart devices business units in 2014. Continue Reading
-
News
21 Feb 2019
Cooperation a key theme of Brussels cyber security symposium
Fostering trust-based cooperation of like-minded cyber security stakeholders to create new strategies, policies and standards emerged as a key theme at a cyber security conference in Brussels Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Feb 2019
Toyota Australia under cyber attack
The company has confirmed the attempted attack that took out its email system, forcing employees to turn to other forms of communication to continue working Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
20 Feb 2019
Breaking the chains: How FUD is holding the cyber sector hostage
The cyber security industry must move past fear tactics and get back to the basics of good cyber security practice Continue Reading
By- Tom Kranz, Cyber Lab
-
News
20 Feb 2019
MWC 2019: Huawei claims massive lead on 5G readiness
At a pre-Mobile World Congress event in London, Huawei’s Ryan Ding shared details of the firm’s rapidly expanding 5G mobile portfolio, and laid into his competitors Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Feb 2019
Huawei faces battle to win Nordic trust
Nordic countries are investigating the spying allegations made against Chinese networking supplier Huiawei Continue Reading
By- Gerard O'Dwyer
-
News
20 Feb 2019
UK naïve to think China won’t try to exploit Huawei
A think-tank report has branded the UK government naïve at best, irresponsible at worst, over its use of Chinese networking equipment in critical national infrastructure Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
19 Feb 2019
Cybersecurity needs both psychologists and field marshals
Many cybersecurity professionals like military analogies. Indeed, some security pros are ex-military. But after a recent security exercise involving IBM’s new lorry-mounted SOC (security operations ... Continue Reading
By- Bryan Betts, Freeform Dynamics
-
News
19 Feb 2019
Activist Lauri Love’s computer ‘contained hacked data’, says judge
Lauri Love, who has been accused of hacking into US government computer systems, has lost a legal action against the NCA for the return of his computers and storage device Continue Reading
By- Bill Goodwin, Computer Weekly
-
Blog Post
19 Feb 2019
Putting print security on the C-Level agenda
Data breaches are rarely out of the headlines and compliance pressure, such as the introduction of GDPR, means security remains high on the corporate agenda. Cyber threats and data breaches are no ... Continue Reading
By- Louella Fernandes, Quocirca
-
News
19 Feb 2019
No More Ransom releases GandCrab decryption tool
Another free decryption tool is available that allows anyone infected with the latest versions of the GandCrab ransomware to regain control of their files and avoid paying the fee Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Feb 2019
IT Priorities 2019: Cyber security and risk management among top priorities for 2019
This year’s Computer Weekly/TechTarget IT Priorities research shows that cyber security and risk management are among the top investment priorities Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Feb 2019
Huawei’s Ren Zhengfei: US won’t crush us
Huawei CEO Ren Zhengfei has taken a more combative stance in the ongoing row over the firm’s alleged links to the Chinese intelligence services Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Feb 2019
Healthcare providers should press on with digital transformation
Healthcare providers should continue digitisation efforts with security in mind amid looming cyber threats, says a top T-Systems executive Continue Reading
By- Aaron Tan, TechTarget
-
News
19 Feb 2019
Finding security in the cloud
When choosing a cloud security provider, enterprises will need to consider the level of data privacy and data security risk involved Continue Reading
By- Krishna Balakrishnan
-
E-Zine
18 Feb 2019
When is it best to stick with paper?
In this week’s Computer Weekly, sometimes going digital is not necessarily the best thing to do – we weigh the pros and cons of paper versus technology. Our new buyer’s guide examines the challenges of asset management as you move IT infrastructure to the cloud. And we look at the growing role of software developers in the future of networking. Read the issue now. Continue Reading
-
Feature
18 Feb 2019
Collaborative security approaches underpin container success
Containers are helping organisations to accelerate age-old software development approaches, but success is underpinned by a constant and team-wide attention to security Continue Reading
-
News
18 Feb 2019
NCSC signals UK may take softer line on Huawei
The UK’s National Cyber Security Centre suggests Huawei will be allowed to form core elements of the country’s 5G mobile network infrastructure after all Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
18 Feb 2019
Fit for whose purpose? Submit your views on the Initial National Cybersecurity Skills Strategy
The meeting illustrated the difficulty of the task the DCMS team will have reconciling the need of MoD and GCHQ for patriotic cyberwarriors and the need of the rest of us for the skills to protect ... Continue Reading
By- Philip Virgo, Winsafe Ltd
-
News
15 Feb 2019
CISOs under increasing pressure, study shows
Cyber security professionals are under growing pressure from workloads and budget deficits, a study has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 Feb 2019
CaixaBank customers can use their faces to withdraw money at ATMs
Spanish bank begins roll-out of ATMs equipped with facial recognition technology, but customers can still use card and PIN Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
15 Feb 2019
(ISC)² invests in professional development of security workforce
Security industry association sets up Professional Development Institute to extend training offerings beyond certification Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
13 Feb 2019
Security Think Tank: UTM a key part of a well-rounded security strategy
How can organisations best use unified threat management tools to help stem the tide of data breaches? Continue Reading
By- Mary-Jo de Leeuw, (ISC)2
-
News
13 Feb 2019
Australian government warns of blockchain gaps
Digital Transformation Agency dispels some myths around blockchain, calling for government agencies to be cautious about using the technology Continue Reading
By- Aaron Tan, TechTarget
-
Blog Post
12 Feb 2019
Scoop! Symantec Acquisition Makes Sense Of Software Defined Perimeter Security...
OK - so that's probably not the perfect headline to be announced by anyone who whistles through their teeth... Been having some interesting conversations recently around the idea of zero trust ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
News
12 Feb 2019
Telegram bot gets users hooked
Popular social media service provides a rich set of features for cyber criminals, RSA warns Continue Reading
By- Cliff Saran, Managing Editor
-
E-Zine
12 Feb 2019
The Met Office storms ahead on data analytics
In this week’s Computer Weekly, we find out how the Met Office takes 2TB of weather data every hour and turns it into useful business insight. We examine whether Amazon’s presence in the retail market is putting off other retailers from using its public cloud services. And we look at the new 802.11ax wireless networking standard and analyse the benefits for enterprise IT. Read the issue now. Continue Reading
-
News
12 Feb 2019
Dutch developer offers businesses nuclear security option for communications
Startup that created the secure platform for communication between world leaders at the 2014 Nuclear Security Summit in the Netherlands seeks to revolutionise business mail Continue Reading
By- Kim Loohuis
-
Opinion
12 Feb 2019
Security Think Tank: No tech will ever counter-balance poorly implemented processes
How can organisations best use unified threat management tools to help stem the tide of data breaches? Continue Reading
By- Vladimir Jirasek, Foresight Cyber
-
News
12 Feb 2019
APAC healthcare providers losing $23m to cyber attacks
Healthcare organisations in the Asia-Pacific region could lose an average of $23.3m to cyber attacks, including losses from productivity and customer churn, a study finds Continue Reading
By- Aaron Tan, TechTarget
-
Answer
11 Feb 2019
What are the pros and cons of machine learning in network security?
The predictive nature of machine learning can benefit network security strategies. But it can also benefit those looking to break through secure network barriers. Continue Reading
By- David Jacobs, The Jacobs Group
-
News
11 Feb 2019
Lauri Love takes legal action against NCA for return of seized computers
Lauri Love, a former engineering student who won a battle with the US Department of Justice against extradition to the US to face hacking charges, is suing the UK's intelligence agency, the NCA, for the return of his seized computers Continue Reading
By- Bill Goodwin, Computer Weekly
-
Opinion
11 Feb 2019
Security Think Tank: Know strengths and weaknesses of UTM systems
How can organisations best use unified threat management tools to help stem the tide of data breaches? Continue Reading
By- Simon Persin, Turnkey Consulting
-
News
10 Feb 2019
Australia’s defence department keeps old PCs out of landfills
Department has securely wiped data from used devices and kept 1,300 tonnes of e-waste out of landfills Continue Reading
-
News
08 Feb 2019
Mumsnet denies 'thousands' affected by software glitch-induced data breach
Parenting advice site Mumsnet moves to clear up reports that thousands of users have been affected by its recent data breach Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
Feature
08 Feb 2019
A guide to choosing cloud-based security services
Cloud-based security services can help organisations with a growing cloud footprint to reduce cost and address the manpower crunch in cyber security Continue Reading
By- Aaron Tan, TechTarget
-
News
08 Feb 2019
NHS extends trials of digital identity system
The NHS in England is working with external organisations in new pilots to test its secure online login system for healthcare Continue Reading
By- Bryan Glick, Editor in chief
-
Opinion
08 Feb 2019
Security Think Tank: Approach UTM with caution
How can organisations best use unified threat management tools to help stem the tide of data breaches? Continue Reading
By- Simon McCalla, Nominet
- 07 Feb 2019
-
E-Zine
07 Feb 2019
CW Benelux: Google helps Dutch schools to teach computer skills
A programme in the Netherlands to help primary schools provide computational thinking and programming, developed with financial support from Google, is well on schedule. Also read about four Russians’ attempted hack into the networks of the Organisation for the Prohibition of Chemical Weapons in The Hague, and how Dutch delivery company PostNL is making savings by using robotic technology to automate administrative tasks. Continue Reading
-
Opinion
07 Feb 2019
Security Think Tank: UTM attractive to SMEs, but beware potential pitfalls
How can organisations best use unified threat management tools to help stem the tide of data breaches? Continue Reading
By- Maxine Holt, Omdia
-
News
07 Feb 2019
Data breaches in Australia show no sign of abating
Australia’s privacy watchdog recorded over 800 cases of data breaches, nearly one year into the country’s mandatory data breach notification regime Continue Reading
-
News
06 Feb 2019
Huawei: We are not spying on the UK
Huawei’s Ryan Ding tells the British government that the company has never, and will never, use its technology to assist the Chinese intelligence services Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Feb 2019
What is CIO best practice when it comes to cloud security?
As businesses increasingly adopt cloud-first strategies, how can they ensure their security is up to scratch? Computer Weekly asks the experts Continue Reading
By -
Opinion
06 Feb 2019
Security Think Tank: Focus UTM capabilities on security and business needs
How can organisations best use unified threat management tools to help stem the tide of data breaches? Continue Reading
By- Emma Bickerstaffe, Information Security Forum (ISF)
-
News
06 Feb 2019
Tech sector tells government that digital identity policy is 'urgently required'
The UK tech sector has urged the government to publish policy to support the creation of a “fully functioning” digital identity market, to boost the digital economy Continue Reading
By- Bryan Glick, Editor in chief
-
News
05 Feb 2019
Civil liberties groups to challenge bulk surveillance and intelligence sharing in Strasbourg
Coalition of campaigning groups wins the right to challenge the UK’s use of bulk surveillance powers, which allows suspicionless surveillance of the population and sharing of intercepted data with overseas intelligence agencies, in European Court of Human Rights Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
05 Feb 2019
Cambridge launches urban data IoT project
The city of Cambridge will use Telensa IoT sensors and a Microsoft Azure platform to better manage its urban data assets Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
05 Feb 2019
Security Think Tank: Many routes to UTM to boost security capabilities
How can organisations best use unified threat management tools to help stem the tide of data breaches? Continue Reading
By -
Opinion
04 Feb 2019
Security Think Tank: Arguments for and against unified threat management
How can organisations best use unified threat management tools to help stem the tide of data breaches? Continue Reading
-
News
04 Feb 2019
Massive uptick in cyber attacks targeting Student Loans Company
Cyber criminals used a range of techniques, as well as malware, malicious emails and calls, in attempts to access confidential financial data belonging to students, in massive uptick in attacks in the past year Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 Feb 2019
Met Police deploys live facial recognition technology for ninth time
Police say technology is helping to prevent and detect crime by identifying wanted criminals, but privacy groups have voiced their opposition Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
01 Feb 2019
Orange acquires UK’s SecureData
The Orange telecommunications group is to acquire UK cyber security firm SecureData to strengthen its leadership position in Europe in this sector Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 Feb 2019
Innocent people arrested following surveillance blunders, IPCO reveals
Interception of communications commissioner Adrian Fulford warns of “grave” repercussions for people wrongly identified as suspects due to errors made when government bodies access email, phone and telephone data Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
01 Feb 2019
ICO to audit Leave.EU and Eldon Insurance
UK privacy watchdog will audit the data protection practices at Leave.EU and Eldon Insurance and has confirmed fines for both companies for unlawful marketing messages Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 Feb 2019
New stolen credentials cache puts spotlight on authentication
The discovery of billions more stolen usernames and passwords in Collections #2 to #5 have prompted fresh calls for the implementation of better authentication methods across industry Continue Reading
By- Warwick Ashford, Senior analyst