IT security
-
News
25 Oct 2024
Dutch critical infrastructure at risk despite high leadership confidence
Stark paradox in Dutch cyber security landscape has business leaders expressing high confidence in their IT infrastructure as cyber attacks rise Continue Reading
-
News
11 Jul 2024
Dutch research firm TNO pictures the SOC of the future
In only a few years, security operations centres will have a different design and layout, and far fewer will remain Continue Reading
-
Opinion
02 Nov 2018
Security Think Tank: Deploy multiple defence layers to protect data-rich applications
What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? Continue Reading
By- Simon Persin, Turnkey Consulting
-
News
02 Nov 2018
Facebook to appeal EU-US data transfer ruling in Irish Supreme Court
Facebook will appeal a decision by the Irish High Court to refer questions over the legality of EU-US data transfers to the European Court of Justice in January, as the Dublin court rejects attempt by a UK IT expert to join the case Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
02 Nov 2018
Radisson hotel group could be GDPR test case
Privacy watchers say the breach of personal data of members of the Radisson Hotel Group’s loyalty scheme could be an interesting test case for how the GDPR will be applied Continue Reading
By- Warwick Ashford, Senior analyst
-
News
02 Nov 2018
Government fails in first attempt to hire chief security officer
The government’s initial recruitment campaign for the UK’s "biggest and most important security job” has been unsuccessful, Cabinet Office admits Continue Reading
By -
News
01 Nov 2018
Key elements to success in consumer identity management
Success in consumer identity management is not just about getting the technology right, it is also about keeping in mind the consumer needs, preferences and concerns, says KuppingerCole Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 Nov 2018
Microsoft chief urges industry to focus on ethics and privacy
Businesses must focus on GDPR and ethical AI if they are to become software firms, says Microsoft CEO Satya Nadella Continue Reading
By- Cliff Saran, Managing Editor
-
Opinion
01 Nov 2018
Security Think Tank: A three-pronged approach to application security
What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? Continue Reading
By -
News
31 Oct 2018
GDPR driving data protection maturity
The EU data protection laws are helping to drive data protection maturity internationally, but five months after enforcement many companies are still playing catch-up, says consultant Continue Reading
By- Warwick Ashford, Senior analyst
-
News
31 Oct 2018
Facebook emphasises security drive during third-quarter earnings call
Social media giant admits it has a lot of work to do to keep on top of security as it looks to extend payment option to Messenger Continue Reading
By- Cliff Saran, Managing Editor
-
News
31 Oct 2018
UK Post Office looks to enable reusable digital ID
The UK Post Office is investigating the possibility of enabling UK citizens to re-use their passport data for other applications where digital identity is a key component Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
31 Oct 2018
Think Tank: Application layer attack mitigation needs to start with risk analysis
What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? Continue Reading
By- Maxine Holt, Omdia
-
News
30 Oct 2018
Australia’s data breaches are a ‘sign of naiveté’
McAfee executive attributes Australia’s poor cloud security record to the lack of data protection measures amid “new and confusing” cloud configurations Continue Reading
-
News
30 Oct 2018
Aim for long-term customer identity relationship
Consumer identity management can deliver competitive advantage, but only if businesses follow some golden rules, says KuppingerCole Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
30 Oct 2018
Security Think Tank: Defend application layer with good security hygiene
What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? Continue Reading
-
Opinion
29 Oct 2018
Security Think Tank: Counter application layer attacks with automation
What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? Continue Reading
-
News
26 Oct 2018
British Airways data breach worse than thought
British Airways has admitted that up to 185,000 more people than first thought may have had personal details compromised in August’s data breach Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
26 Oct 2018
As data volumes grow, backup needs analytics, says StorageCraft CEO
Backup appliance maker’s CEO says backup needs analytics so customers can prioritise restore of critical data in a world where volumes increase by 50% a year Continue Reading
By- Antony Adshead, Storage Editor
-
News
26 Oct 2018
DNS attacks cost finance firms millions of pounds a year
Average cost of recovering from a single DNS attack is $924,390 for a large financial services company, survey shows Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Opinion
26 Oct 2018
Security Think Tank: Focus on security before app deployment
What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? Continue Reading
By- Richard Absalom, Information Security Forum
-
News
26 Oct 2018
IoT ecosystem needs to be investigated, say experts
A conference of IoT experts convened by Enisa and Europol has made key recommendations to ensure security vulnerabilities do not overshadow benefits Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
25 Oct 2018
Trusted nodes: The next generation in quantum key distribution
QKD is a form of protection against interception by quantum computers, but cost and technical limitations have made the technology impractical. Could trusted nodes make all the difference? Continue Reading
-
Opinion
25 Oct 2018
Mitigating third-party cyber risks in a new regulatory environment
GDPR and the NIS Directive increase the focus on managing cyber security throughout the supply chain. Organisations need to check their suppliers are compliant Continue Reading
By- Cavan Fabris
-
News
25 Oct 2018
MEPs call for action in wake of Facebook-Cambridge Analytica scandal
European members of parliament demand action to protect citizens’ privacy from abuses such as those uncovered in the Facebook-Cambridge Analytica data sharing scandal Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Oct 2018
Belgian startup makes a game of creating secure software code
A global tech startup has placed its research and development centre in Belgium, taking advantage of regional financial support as well as cooperations with local educational organisations Continue Reading
By- Kim Loohuis
-
News
25 Oct 2018
GandCrab decryption tool released by No More Ransom
Another decryption tool has been made available free of charge in the battle against ransomware to help victims avoid paying to release their data Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Oct 2018
ICO issues maximum £500,000 fine to Facebook
The UK privacy watchdog has confirmed that Facebook has escaped a fine of more than $1bn under the GDPR, but will face the maximum under the DPA for failing to protect users’ personal information Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Oct 2018
Cathay Pacific under fire over breach affecting 9.4 million passengers
Hong Kong-based airline reveals massive data breach of the most sensitive personal data of passengers five months after loss was confirmed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Oct 2018
Becrypt security platform helps ease cloud adoption
Becrypt’s secure operating system is driving a new service aimed at helping organisations reduce cost and increase agility in using cloud-based services and online applications Continue Reading
By- Warwick Ashford, Senior analyst
-
News
24 Oct 2018
Choose security tools wisely to gain upper hand
The cyber threat landscape is continually changing, but staying abreast of attacker and defender innovation can help business leaders gain the upper hand, says KuppingerCole Continue Reading
By- Warwick Ashford, Senior analyst
-
News
24 Oct 2018
Government can’t guarantee no-deal Brexit data-sharing agreement
Digital minister Margot James says there is no clear timetable on when the UK will secure a data adequacy decision from the EU, and cannot guarantee an agreement will be in place in the event of a no-deal Brexit Continue Reading
By -
News
24 Oct 2018
Sibos 2018: ‘Black swan’ cyber event is inevitable
With security experts and bankers expecting a 9/11-style cyber event, deeper collaboration between companies and governments is necessary to identify emerging threats before they occur Continue Reading
-
News
24 Oct 2018
Yahoo to pay at least $85m for data breach settlement
Yahoo has agreed to a settlement in a class action lawsuit on behalf of 200 million consumers affected by a data breach in 2013 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
24 Oct 2018
Datacentre glitches expose data loss risks
A new study has highlighted the fragility of corporate datacentres and the very real risk of data loss Continue Reading
By- Cliff Saran, Managing Editor
-
News
23 Oct 2018
Interview: Steve Grobman, McAfee CTO shares his views on some burning security questions
Cyber security technology innovator and veteran Steve Grobman shares his views on adversarial artificial intelligence, post-quantum cryptography and security for next-gen tech Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
23 Oct 2018
Where next for digital identity?
In this week’s Computer Weekly, as the UK government hands its digital identity service, Gov.uk Verify, to the private sector, we examine the history and prospects for the troubled system. Our latest buyer’s guide looks at cloud-native architecture. And we compare the flash storage capabilities of the leading cloud providers, AWS, Azure and Google. Read the issue now. Continue Reading
-
News
23 Oct 2018
Morrisons loses appeal against data breach liability ruling
Supermarket chain has lost its appeal against a High Court ruling that found it liable for a data leak by a former employee, underlining the importance of managing insider threats Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Oct 2018
Centralised identity risky and not web 3.0 friendly, says entrepreneur
User controlled identity is less risky than centralised identity and essential for the next evolution of the web, according to an entrepreneur and evangelist of self-sovereign identity and blockchain technologies Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Oct 2018
McAfee CTO raises concerns about election cyber security
The security industry needs to look at the security of election processes around the world as well as the security of voting and counting machines, says McAfee CTO Continue Reading
By- Warwick Ashford, Senior analyst
-
Answer
19 Oct 2018
Removable storage devices: Why are companies banning them?
IBM banned removable storage devices to encourage employees to use the company's internal file-sharing system. Learn how a ban like this can improve enterprise security. Continue Reading
By -
News
19 Oct 2018
Kaspersky advances plans to encourage women into cyber
Cyber security provider Kaspersky Lab has partnered with several other organisations to try to encourage more women into cyber Continue Reading
By- Clare McDonald, Business Editor
-
News
19 Oct 2018
McAfee combining threat intel with AI
Simulations show that threat intelligence and artificial intelligence is a powerful combination, according to McAfee’s technology head Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Oct 2018
Learn lessons from attacks, says McAfee investigations chief
Organisations should use every cyber attack as an opportunity to learn, identify weaknesses and improve security posture, according to McAfee’s head of cyber investigations Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Oct 2018
McAfee researchers uncover ‘significant’ espionage campaign
Researchers discover campaign targeting South Korea, the US and Canada with links to eight-year-old source code from a threat group that has been dormant for five years Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Oct 2018
NHS standards framework aims to set the bar for quality and efficiency
NHS Digital’s standards framework sets out renewed commitment to implement and use open standards across the NHS Continue Reading
By -
News
18 Oct 2018
Best of VMworld Europe 2018 Awards nominations now open until 26 October
Read the criteria for the Best of VMworld Europe User Awards and find out how to submit your nomination Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
18 Oct 2018
Time to implement new cyber security protections, says McAfee CEO Chris Young
Convergence of threats and technologies and an increasingly complex regulatory environment are driving the need to implement new cyber security protections, says McAfee chief Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Oct 2018
'Sealed cloud' promises better data security
TÜV SÜD’s Singapore Sealed Cloud does not grant administrators access to data, reducing the possibility of hackers breaking into databases using compromised administrator credentials Continue Reading
By- Aaron Tan, TechTarget
-
Answer
17 Oct 2018
How did the IcedID and TrickBot banking Trojans join forces?
The TrickBot banking Trojan joined forces with IcedID to form a dual threat that targets victims for money. Discover how this union occurred and how it has changed their behaviors. Continue Reading
By -
News
16 Oct 2018
APAC security spending tipped to reach new highs
Security services will be the largest and fastest-growing slice of the overall security pie in the Asia-Pacific region Continue Reading
By- Aaron Tan, TechTarget
-
16 Oct 2018
Detail of Dutch reaction to Russian cyber attack made public deliberately
Four Russian intelligence officials were expelled from the Netherlands after an attempted hack on the global chemical weapons watchdog. The Dutch government has been open about the detail. Continue Reading
-
E-Zine
16 Oct 2018
Drilling into AI at Shell
In this week’s Computer Weekly, we find out how oil giant Shell is using artificial intelligence and machine learning to boost workforce safety and productivity. We analyse the attempted Russian cyber attack revealed by the Dutch government. And we look at how blockchain is being used in the food and drink industry to improve supply chain management. Read the issue now. Continue Reading
-
News
16 Oct 2018
Zero-trust security model gaining traction
The zero-trust model of security is finally gaining traction as security professionals tap into new tools and executive buy-in to support this approach in an effort to improve security posture and practices Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 Oct 2018
UK faces 10 cyber attacks a week as hostile states step up hacking, says NCSC
The UK’s National Cyber Security Centre has thwarted more than 1,600 attacks over the past two years – many by hostile nation states Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
15 Oct 2018
Tech companies should not be under legal duty to remove terrorist material, says watchdog
The internet should not be a safe place for terrorists, but making it compulsory for technology companies to trawl for radical content risks interfering with the rights of innocent people, says Max Hill QC, the independent reviewer of terrorism legislation Continue Reading
By- Bill Goodwin & Fiona O'Cleirigh
-
News
15 Oct 2018
Good data governance is good business
Organisations are failing to understand the importance of getting their data relationship with customers right and seeing the business opportunities that it enables, an industry analyst warns Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 Oct 2018
Cost of WannaCry attack to NHS set at £92m
Department for Health and Social Care estimates the immediate cost of the May 2017 WannaCry attack on the NHS was £92m, and says it will have spent about £275m on improvements to its cyber security infrastructure by the end of 2021 Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Oct 2018
IoT firms sign up to UK security code of practice
Internet of things technology firms have begun signing up to a UK code of practice to strengthen the security of internet-connected devices. The code is expected to form the basis of an international standard Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 Oct 2018
Apple challenges Australia’s proposed decryption law
Tech giant Apple argued that the lack of judicial oversight could reduce customer trust and security, among other reservations over Australia’s draft decryption legislation Continue Reading
By- Aaron Tan, TechTarget
-
News
12 Oct 2018
FS-ISAC awards cyber security scholarships in Europe
Five women have been awarded cyber security scholarships at FS-ISAC’s 2018 EMEA Summit Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Oct 2018
WikiLeaks goes public with alleged list of AWS datacentre locations and code names
Whistle-blowing website claims to have obtained a confidential document detailing code names, locations and operational details of Amazon’s datacentre portfolio Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
12 Oct 2018
Some 10% of user-reported emails malicious
On average, 1 in 10 user-reported emails is identified as malicious, and more than half can be tied to credential phishing, a Cofense report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Oct 2018
Watchdog calls for clarity on Schedule 7 terrorism powers
The Independent Reviewer of Terrorism Legislation has called for greater clarity over police Schedule 7 powers to seize mobile phones and computers and question people without grounds for suspicion at ports and airports Continue Reading
By- Bill Goodwin, Computer Weekly
- Fiona O'Cleirigh
-
News
12 Oct 2018
AI is no silver bullet for cyber security
A security expert has called for businesses to manage the risks of adopting new technologies and improve their cyber hygiene, rather than see artificial intelligence as a panacea for their security woes Continue Reading
By- Aaron Tan, TechTarget
-
News
11 Oct 2018
Crypto-mining malware poses as Flash updates
Cryptocurrency mining malware is posing as Flash updates that appear to be legitimate, Palo Alto Networks security researchers warn Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Oct 2018
RATs and Mimikatz among top publicly available hacking tools
Remote access Trojans (RATs), web shells and Mimikatz among the top publicly available tools that are used in cyber attacks around the world, a five-nation cyber intelligence report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Oct 2018
The troublesome saga of Gov.uk Verify
As the government plans to hand over its flagship identity assurance programme to the private sector, Computer Weekly looks at the history of the troubled project and how Gov.uk Verify ended up on the chopping board Continue Reading
By -
News
11 Oct 2018
Nato to be fully operational in cyber space by 2023
Nato is aiming to achieve full operational readiness in cyber space within five years Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Oct 2018
MEPs urge Facebook to roll out election fraud prevention measures
Facebook is coming under pressure from European lawmakers to do more to prevent its user data from being misappropriated during elections Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
E-Zine
11 Oct 2018
CW Middle East: Middle East warms to humanoid robots
Countries in the Middle East are warming to humanoid robotics, robotic process automation and artificial intelligence as these technologies become widely accepted globally. Also in this issue, read why Saudi Arabia has called on London’s fintechs to set up in the country with the promise of government support, and find out how the Gulf Warehousing Company has introduced cloud-based technology to replace paper processes used by its HR department. Continue Reading
-
News
11 Oct 2018
Dropping commercial open source lowers PaaS costs at Fidelity
Investment company Fidelity has created an on-premise PaaS for its in-house developer teams using the open source Cloud Foundry platform Continue Reading
By- Cliff Saran, Managing Editor
-
News
11 Oct 2018
Optus to acquire Hivint in cyber security deal
The deal is expected to bolster the telco’s security pedigree in a market that is grappling with more data breaches and cyber incidents Continue Reading
By- Aaron Tan, TechTarget
-
News
10 Oct 2018
Detail of Dutch reaction to Russian cyber attack made public deliberately
Four Russian intelligence officials were expelled from the Netherlands after an attempted hack on the global chemical weapons watchdog. The Dutch government has been open about the detail Continue Reading
By -
Blog Post
10 Oct 2018
GDS must share the lessons of Verify - good and bad - to boost the digital identity ecosystem
Depending on your perspective, Gov.uk Verify is now either secure in its future at the heart of the UK’s emerging digital identity ecosystem, or it has one foot in the grave and is on the way to ... Continue Reading
By- Bryan Glick, Editor in chief
-
News
10 Oct 2018
Bug bounties not a silver bullet, Katie Moussouris warns
Targeted bug bounties have a role to play in cyber security, but they are not a "silver bullet", and run the risk of wiping out talent pipelines if poorly implemented, warns bug bounty pioneer Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Oct 2018
NCSC head says attribution of GRU attacks important
The head of the UK’s National Cyber Security Centre has described the attribution of a wave of cyber attacks to Russia’s military intelligence service as “historically important” at a conference in Poland Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Oct 2018
Singapore extends reach of digital ID system with cloud
GovTech is using AWS to host a developer platform that enables government agencies and businesses to develop services that build on the upcoming National Digital Identity system Continue Reading
By -
News
09 Oct 2018
Government to end investment in Gov.uk Verify digital identity system
Cabinet Office announces 18-month transition to hand troubled identity assurance programme over to private sector Continue Reading
By- Bryan Glick, Editor in chief
-
Tip
09 Oct 2018
Picking the right focus for web application security testing
Deciding which web applications on which to focus application security testing is a challenging task. Read this list of considerations to ensure you're addressing the right areas. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Opinion
09 Oct 2018
Security Think Tank: Monitoring key to outcomes-based security
What is the first step towards moving from a tick-box approach to security to one that is outcomes-based, and how can an organisation test if its security defences are delivering the desired outcome? Continue Reading
By- Ramsés Gallego, Isaca
-
News
09 Oct 2018
Cooperation vital in cyber security, says former Estonian minister
States acting alone cannot be efficient in cyber security and need to cooperate with others to build trust, says a former foreign minister of Estonia Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Oct 2018
Consumer Google+ dumped in favour of enterprise focus
Google+ will no longer be offered to consumers, following a security audit. Instead, the company plans to flesh out an enterprise social media strategy Continue Reading
By- Cliff Saran, Managing Editor
-
News
08 Oct 2018
High Court blocks Google iPhone privacy lawsuit
The UK High Court has thrown out a group action lawsuit against Google for tracking iPhone browsing data, but campaign group Google You Owe Us, which brought the litigation, will appeal the decision Continue Reading
By -
News
08 Oct 2018
NCSC head calls for technocratic partnership to fix cyber risks
The UK’s National Cyber Security Centre is appealing for collaboration with the technology industry to remedy key vulnerabilities in current IT Continue Reading
By- Warwick Ashford, Senior analyst
-
News
08 Oct 2018
Airbus secures European institutions against cyber threat
Airbus CyberSecurity has partnered with Atos to help protect 17 European government institutes from cyber attacks Continue Reading
By- Cliff Saran, Managing Editor
-
News
08 Oct 2018
ICO hits Heathrow Airport with £120,000 data breach fine over lost USB stick
Information Commissioner’s Office fines airport after a member of the public came across a USB stick containing sensitive personal information about airport staff Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
Opinion
08 Oct 2018
Customers need to be at the centre of GDPR plans
Responding to a breach is not just about data, it is about taking care of, and protecting, customers Continue Reading
By- Dominic Cockram, Deloitte
-
Opinion
08 Oct 2018
Security Think Tank: Enable outcomes-based security in software development
What is the first step towards moving from a tick box approach to security to one that is outcomes based, and how can an organisation test if its security defences are delivering the desired outcome? Continue Reading
By- Bruce Beam , (ISC)²
-
News
08 Oct 2018
Google Safety Center goes live in the UK
Google says its commitment to transparency is as strong as ever as its new Safety Center goes live in the UK to help keep businesses and consumers safe online Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Oct 2018
Amazon and Apple deny claims Chinese government bugged their servers
Amazon and Apple have publicly refuted a Bloomberg report that claims their servers were tampered with and bugged during the manufacturing process Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
05 Oct 2018
GDPR case work swamps Denmark’s data protection agency
The agency investigating alleged breaches of GDPR in Denmark is recruiting additional resources to cope with the increase in work Continue Reading
By- Gerard O'Dwyer
-
Opinion
05 Oct 2018
Security Think Tank: C-suite needs to drive outcomes-based security
What is the first step towards moving from a tick-box approach to security to one that is outcomes-based and how can an organisation test whether its security defences are delivering the desired outcome? Continue Reading
-
Blog Post
04 Oct 2018
Russian cyber crime sends us crackers
The UK government has condemned Russia’s military intelligence service for a variety of cyber attacks in its routinely stern way, but at this point, we might as well be told about this kind of ... Continue Reading
By -
News
04 Oct 2018
Security Serious Unsung Heroes announced
Awards celebrate the people of the cyber security industry on the front lines of organisations battling cyber threats Continue Reading
By- Warwick Ashford, Senior analyst
-
Answer
04 Oct 2018
How does stegware malware exploit steganography techniques?
Researchers at the 2018 RSA Conference discussed the increasing availability of malware that uses steganography, dubbed stegware. Discover how this works with expert Nick Lewis. Continue Reading
By -
Tip
04 Oct 2018
How is Android Accessibility Service affected by a banking Trojan?
ThreatFabric researchers uncovered MysteryBot, Android malware that uses overlay attacks to avoid detection. Learn how this malware affects Google's Android Accessibility Service. Continue Reading
By -
Opinion
04 Oct 2018
Security Think Tank: Use Cyber Essentials to kick-start outcomes-based security
What is the first step towards moving from a tick-box approach to security to one that is outcomes-based and how can an organisation test whether its security defences are delivering the desired outcome? Continue Reading
By -
News
04 Oct 2018
Business email compromise made easy for cyber criminals
Poor security practices and access to hacking services are making it easy for cyber criminals to compromise business email, research reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Oct 2018
Apps are gateway to business data for cyber attackers
Application security is becoming increasingly important because apps are often the main way cyber attackers are getting into corporate networks, a threat researcher warns Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Oct 2018
UK and allies accuse Russia of cyber attack campaign
The UK National Cyber Security Centre has identified a campaign by the Russian military intelligence service of “indiscriminate and reckless” cyber attacks Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Oct 2018
How Starbucks is using Splunk to automate mundane security tasks
Coffee giant Starbucks is using Splunk to automate some of its more tedious security tasks to reduce the workload for its cyber staff Continue Reading
By- Clare McDonald, Business Editor