IT security
-
News
25 Oct 2024
Dutch critical infrastructure at risk despite high leadership confidence
Stark paradox in Dutch cyber security landscape has business leaders expressing high confidence in their IT infrastructure as cyber attacks rise Continue Reading
-
News
11 Jul 2024
Dutch research firm TNO pictures the SOC of the future
In only a few years, security operations centres will have a different design and layout, and far fewer will remain Continue Reading
-
News
03 Oct 2018
Companies failing to recognise the internal cyber threat
The focus at many companies is on external cyber threats, and internal threats are being overlooked as a consequence, a researcher warns Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Oct 2018
Majority of businesses believe they are open to cyber attack
More than two-thirds of businesses believe their network is open to attack, a report on the state of web application security reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Oct 2018
Rise in data-stealing Betabot malware
Researchers are warning about an increase in Betabot malware after detecting multiple infections in recent weeks, underlining the importance of software patching Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Oct 2018
AI full of possibilities with the right tools and understanding
Artificial intelligence has the potential to assist in the analysis of data in a range of topics, but businesses need to understand its limitations and have the right tools to get the most benefit, says a Swiss entrepreneur Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
03 Oct 2018
Security Think Tank: Shift to outcomes-based security by focusing on business needs
What is the first step towards moving from a tick-box approach to security to one that is outcomes-based and how can an organisation test whether its security defences are delivering the desired outcome? Continue Reading
By- Simon Persin, Turnkey Consulting
-
News
02 Oct 2018
How Bank of England is using Splunk for proactive security
Head of the Bank of England’s security operations centre talks about how Splunk is helping it to take a more proactive approach to preventing cyber attacks Continue Reading
By- Clare McDonald, Business Editor
-
Opinion
02 Oct 2018
Everyone, everywhere is responsible for IIoT cyber security
Cyber security in the industrial internet of things is not limited to a single company, industry or region – it is an international threat to public safety, and can only be addressed through collaboration that extends beyond borders and competitive interests Continue Reading
By- Andrew Kling, The Open Group
-
Opinion
02 Oct 2018
Security Think Tank: Start outcomes-based security with asset identification
What is the first step towards moving from a tick-box approach to security to one that is outcomes-based and how can an organisation test whether its security defences are delivering the desired outcome? Continue Reading
-
News
01 Oct 2018
UK firms’ password security score ‘average’
While businesses are making strides in strengthening password security, there is more work to be done, with the UK password score lagging behind the frontrunners, a survey shows Continue Reading
By- Warwick Ashford, Senior analyst
-
Answer
01 Oct 2018
SamSam ransomware: How is this version different from others?
Sophos recently discovered a SamSam extortion code that performs company-wide attacks using a range of vulnerability exploits. Discover how this version differs from past variants. Continue Reading
By -
News
01 Oct 2018
Tesco Bank gets first cyber-related FCA fine
UK’s financial watchdog issues its first cyber-related fine to Tesco Bank in connection with a multimillion-pound cyber fraud in 2016 Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
01 Oct 2018
Security Think Tank: Security governance key to outcomes-based approach
What is the first step towards moving from a tick-box approach to security to one that is outcomes based, and how can an organisation test if its security defences are delivering the desired outcome? Continue Reading
By- Maxine Holt, Omdia
-
News
01 Oct 2018
Facebook could face up to $1.6bn fine for data breach
Facebook is under increased pressure to demonstrate that users’ personal data is protected as it faces a potential fine of more than a billion dollars for a data breach affecting millions of users Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 Oct 2018
Keeping Commvault on its toes in ASEAN
Backup and data protection software supplier is going after mid-sized companies and renewing its focus on partners to make deeper inroads in Southeast Asia Continue Reading
By- Aaron Tan, TechTarget
-
News
28 Sep 2018
EU sees eIDAS regulation come into full force
A regulation aimed at cutting red tape to enable a digital single market in Europe will soon be in full force, but it could present some challenges to the UK after Brexit Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 Sep 2018
Data analytics cuts queues and flight delays at Rome’s Fiumicino Airport
Aeroporti di Roma’s CIO, Emiliano Sorrenti, describes how the city’s main airport is using data analytics technology to reduce delays and queue times, securing it an industry award for customer service Continue Reading
By- Bill Goodwin, Computer Weekly
-
Answer
28 Sep 2018
How can live chat widgets leak personal employee data?
Project Insecurity researchers found live chat software leaking personal employee data. Learn how attackers can use this leaked information and data to hurt organizations. Continue Reading
By -
News
28 Sep 2018
Cyber attackers are increasingly exploiting RDP, warns FBI
Businesses should to act to reduce the likelihood of compromise from cyber attackers exploiting the remote desktop protocol, warns the FBI Continue Reading
By- Warwick Ashford, Senior analyst
-
Blog Post
28 Sep 2018
It’s time to redefine shadow IT
Among the findings of the Committee of Inquiry (COI) that looked into the massive SingHealth data breach was the startling fact that a non-IT staff was tasked with managing the server which was ... Continue Reading
By- Aaron Tan, TechTarget
-
News
27 Sep 2018
Blockchain is no ‘magic wand’ for cyber security
The decentralised nature of blockchain networks may deter some cyber crooks, but ASEAN organisations still need to pay heed to the security of their blockchain infrastructure Continue Reading
By- Aaron Tan, TechTarget
-
News
27 Sep 2018
Network growth brings management challenges
As enterprise networks grow, so do the challenges of managing them effectively, says a report compiled by Oracle’s communications unit Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Sep 2018
Business is at inflection point for proactive cyber security
The time is ripe for proactive cyber security, but many organisations must first overcome four key obstacles to achieve effective protection, according to a research report Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Sep 2018
Explosion in fake data-stealing shopping sites
Cyber attackers are ramping up efforts to steal personal data by setting up look-alike domains that pose a phishing risk to online shoppers, researchers warn Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Sep 2018
Norwegian state discusses vulnerabilities with IT sector
Government is collaborating with the country’s IT industry to improve the availability of security expertise Continue Reading
By- Gerard O'Dwyer
-
News
27 Sep 2018
Replication won’t protect VMs against ransomware
Seamless replication is among the benefits of virtualisation, but many organisations fail to back up virtual machines properly Continue Reading
By- Cliff Saran, Managing Editor
-
Feature
27 Sep 2018
Prepare now for quantum computers, QKD and post-quantum encryption
The predicted processing power of quantum computers is likely to make existing encryption algorithms obsolete. Quantum key distribution (QKD) is a possible solution - we investigate whether QKD is viable Continue Reading
-
News
27 Sep 2018
Uber fined $148m for data breach cover-up
US court hits Uber with heavy fine which security industry commentators hope will encourage firms to take cyber security more seriously and resist the urge to cover up data breaches Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Sep 2018
Australian teen Apple hacker avoids jail time
“Fan” who broke into Apple’s mainframe from his home in Melbourne has avoided prison because the information he gathered was recovered Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Sep 2018
ICO threatens fines for outstanding fees
The UK’s privacy watchdog has issued warning letters to organisations, including some NHS trusts and government organisations, for failing to pay a new data protection fee Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Sep 2018
Financial services firms face potential security bombshell
UK financial services are facing a security crisis over outdated services and applications, a survey shows Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
26 Sep 2018
Why the government should rethink the UK’s surveillance laws
The European Court of Human Rights has made clear that the Snoopers’ Charter is an unlawful violation of people’s rights and freedoms Continue Reading
By- Megan Goulding
-
News
26 Sep 2018
Fujitsu teams up with UTCs on cyber security training
Fujitsu, University Technical Colleges across England and other private sector partners have joined forces to help address the cyber security skills gap Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Sep 2018
PCI DSS compliance falls despite security benefit
Despite the benefits of the payment card industry security standard, there is a concerning downward trend in compliance, a report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Sep 2018
MI5 admits to ‘unlawful’ spying on Privacy International
The UK's intelligence agencies acted unlawfully by intercepting communications data on NGO, Privacy International, the UK's most secret court ruled. Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
25 Sep 2018
WannaCry and NotPetya inspiring new attacks
Designs and techniques used in 2017’s global cyber attacks have inspired a new breed of malware that exploits software vulnerabilities, according to a McAfee report Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Sep 2018
Mac OS Mojave zero-day warning
The latest version of Apple’s Mac operating system contains a vulnerability that could be exploited by attackers to access protected files, a researcher warns Continue Reading
By- Warwick Ashford, Senior analyst
-
News
24 Sep 2018
NHS Digital hires chief information security officer
Robert Coles will lead the health and care sector’s response to cyber attacks and help local organisations meet the government’s cyber security standards Continue Reading
By -
News
24 Sep 2018
Business leaders expect suppliers to ensure they are cyber secure
Most UK business leaders expect suppliers to be cyber secure and nearly a third of businesses would terminate contracts because of suppliers’ security failings, a survey has revealed Continue Reading
By- Warwick Ashford, Security Editor
-
News
21 Sep 2018
Foreshadow mitigation obscures licensing impact
Performance of virtual machines could be severely affected by the workaround for Intel’s latest processor flaw. To compensate, more processors will be needed Continue Reading
By- Cliff Saran, Managing Editor
-
Blog Post
21 Sep 2018
DCMS plan aims to open up digital identity market - and might kill off Gov.uk Verify
The Department for Digital, Culture, Media and Sport (DCMS) has been conducting a review of digital identity since taking over policy responsibility from the Government Digital Service (GDS) in ... Continue Reading
By- Bryan Glick, Editor in chief
-
News
19 Sep 2018
Equifax fined by ICO for security failings
The Information Commissioners Office has fined Equifax UK in relation to a data breach at its UK parent last year Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
19 Sep 2018
Europol cyber crime report highlights emerging threats to enterprise security
Research highlights increase in sophistication of ransomware attacks, while revealing details of new and emerging threats to enterprises Continue Reading
By- Tasmin Lockwood
-
News
19 Sep 2018
IT sector advises Swedish government on elections and voting system
Swedish IT secure is helping the government make election systems more secure and reduce external influence Continue Reading
By- Gerard O'Dwyer
-
Feature
19 Sep 2018
Employers turn to wearable technology to help staff manage work-life balance
Companies are realising that there are sound business reasons for ensuring their employees get enough sleep and exercise, so they are turning to wearable technology to help their staff stay healthy, despite the pressures of work Continue Reading
-
News
18 Sep 2018
AI is crucial element of security strategy in the IoT era
Machine learning and network visibility for users and internet of things devices are essential to battle threats inside the enterprise, according to a new report Continue Reading
By- Alex Scroxton, Security Editor
-
18 Sep 2018
Disaster recovery as a service: what you need to know
Technological advances make disaster recovery as a service possible, but Computer Weekly investigates whether it is practical option for all businesses. Continue Reading
-
News
17 Sep 2018
Singapore government to start bug bounty programme
Singapore’s bug bounty programme will help the authorities identify cyber blind spots and benchmark its defences against skilled hackers Continue Reading
By- Aaron Tan, TechTarget
-
News
17 Sep 2018
Danske Bank invests in anti-money laundering systems following Estonian problems
Danske bank improves its anti money laundering software, utilising artificial intelligence and machine learning Continue Reading
By- Gerard O'Dwyer
-
News
17 Sep 2018
Lib Dems want ‘Geneva Convention’ for use of tech in modern warfare
Deputy leader of the Liberal Democrats, Jo Swinson, wants an international treaty on use of technology in modern warfare, and warns of the dangers of new technology leaving people behind Continue Reading
By -
News
17 Sep 2018
Cutting through the blockchain hype
Blockchain adoption is still in its infancy, with security challenges standing in the way of more widespread deployment, according to a blockchain expert Continue Reading
By- Aaron Tan, TechTarget
-
Podcast
14 Sep 2018
Printing, document capture and compliance risk in the GDPR era
Printers, scanners and mobile devices that capture data from documents all store data in some way or other. How can you be sure to be compliant with GDPR with regard to that data? Continue Reading
By- Antony Adshead, Storage Editor
-
Opinion
14 Sep 2018
Security Think Tank: Supplement security with an MSSP to raise the bar
What is the most practical and cost-effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
By -
News
13 Sep 2018
No Deal Brexit may hinder free flow of personal data from EU to UK
The government’s No Deal Brexit planning document on data protection warns free flow of personal data from EU isn’t guaranteed, and organisations must take action to ensure they will still be able receive data from Europe Continue Reading
By -
News
13 Sep 2018
GCHQ mass surveillance regime was in breach of human rights law, European court rules
The European Court of Human Rights in Strasbourg has ruled that the UK’s collection of bulk interception of communications data lacked adequate oversight and safeguards and was in breach of human rights law Continue Reading
By- Bill Goodwin, Computer Weekly
-
Feature
13 Sep 2018
Outcomes-based security is the way forward
Every security technology is effective for a limited time, but understanding data assets and their value to attackers is key to effective cyber defence, according to an industry veteran of 20 years’ experience Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
13 Sep 2018
Security Think Tank: Adopt a proactive approach to software vulnerabilities
What is the most practical and cost-effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
By- Richard Hunt, Turnkey Consulting
-
News
12 Sep 2018
NCSC issues core questions to help boards assess cyber risk
The National Cyber Security Centre has published its first in a series of guidance for board members which highlights what businesses should be asking security teams Continue Reading
By- Clare McDonald, Business Editor
-
News
12 Sep 2018
FCA warns it cannot manage financial crime risks without sharing data with EU
FCA admits it will be unable to manage financial crime effectively if it cannot share data with EU authorities. Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
12 Sep 2018
Two-thirds of emails not clean, says research
Two-thirds of emails don't make it to the inbox because security systems consider them unsafe, according to research Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Opinion
12 Sep 2018
Security Think Tank: Four key steps to managing software vulnerabilities
What is the most practical and cost-effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
By- Bruce Beam , (ISC)²
-
News
11 Sep 2018
Higher education sector's poor response to cyber threats laid bare in EfficientIP report
The 2018 EfficientIP Global DNS Report shines a light on how ill-prepared the higher education sector is for handling cyber threats Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
11 Sep 2018
Security Think Tank: Four steps to managing software vulnerabilities
What is the most practical and cost-effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
By -
News
11 Sep 2018
British Airways data breach: Security researchers name suspects and query attack timeline
Security researchers claim to have pinpointed the cause and perpetrators of the British Airways data breach, and also claim the attackers may have had access to its customer data for far longer than previously thought Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
11 Sep 2018
UK security vetting IT system failing, says NAO
The National Audit Office is critical of the government’s project to centralise its security vetting process, as the IT system has been plagued by failures from the start and has led to serious delays Continue Reading
By -
News
11 Sep 2018
Public cloud use surges among DDoS attackers, research shows
According to data accrued by DDoS mitigation firm, Link11, the number of attackers that rely on public cloud services soared during the 12 months to June 2018 Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
10 Sep 2018
Cyber criminals outspend businesses in cyber security battle
Cybercriminals are flexing their financial might and UK organisations are facing more attacks as a result Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Opinion
10 Sep 2018
Security Think Tank: Balancing cost and risk in software vulnerability management
What is the most practical and cost-effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
By- Alexander Drabek, 2|SEC
-
Opinion
07 Sep 2018
Security Think Tank: No shortcuts to addressing software vulnerabilities
What is the most practical and cost effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
By- Maxine Holt, Omdia
-
News
07 Sep 2018
North Korean programmer charged for WannaCry attacks
The US has charged a member of a group of North Korean hackers linked to the WannaCry, Sony Pictures and other cyber attacks around the world Continue Reading
By- Warwick Ashford, Senior analyst
-
Blog Post
07 Sep 2018
Who is The Cloud Daddy?
Had a great couple of online sessions recently with Joe Merces of the splendidly named CloudDaddy. The aim of CloudDaddy is to simplify one of the great pain points of IT (no, not repairing ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
Blog Post
07 Sep 2018
Verify on the verge – what does it mean for GDS?
The government’s flagship digital identity system Gov.uk Verify has become a car crash in motion, accelerating towards its demise. The Cabinet Office’s project watchdog has condemned Verify by ... Continue Reading
By- Bryan Glick, Editor in chief
-
News
07 Sep 2018
Ransomware down, but not out, report reveals
Cryptojacking has taken over from ransomware as the top money spinner for cyber criminals, but the threat is not over and spam is also seeing a resurgence as an attack method, a report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
07 Sep 2018
BA praised for swift GDPR-aligned action on data breach
British Airways has been praised for its swift response to a customer data breach, which could be the first test case under the EU’s GDPR and new UK GDPR-aligned data protection laws Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Sep 2018
Chrome 69 security improvements welcomed
The cyber security community has welcomed the improvements in the latest version of the Chrome browser, especially when it comes to generating strong, unique passwords Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
06 Sep 2018
Security Think Tank: How to manage software vulnerabilities
What is the most practical and cost effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
By- Emma Bickerstaffe, Information Security Forum (ISF)
-
News
05 Sep 2018
Government projects watchdog recommends terminating Gov.uk Verify identity project
Infrastructure & Projects Authority says Whitehall departments are unwilling to fund flagship GDS identity programme – cancellation would mean writing off at least £130m spent so far Continue Reading
By- Bryan Glick, Editor in chief
-
News
05 Sep 2018
Half a million UK firms hit by CEO fraud, Lloyds Bank estimates
Nearly 500,000 UK businesses are being hit by impersonation fraud, according to estimations by Lloyds Bank, with the legal sector most at risk Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Sep 2018
People top target for cyber attackers, report confirms
As security controls have improved, cyber attackers are increasingly focusing their efforts on people within organisations as a way into corporate IT systems, a report confirms Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
05 Sep 2018
Security Think Tank: How to achieve software hygiene
What is the most practical and cost-effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
-
Tip
04 Sep 2018
How insider fraud can be detected and avoided in the enterprise
IT sabotage and insider threats can put an organization at great risk. Guest expert Peter Sullivan details preventative measures to take and employee training techniques. Continue Reading
-
Opinion
04 Sep 2018
Security Think Tank: Eight controls to manage software vulnerabilities
What is the most practical and cost effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
By -
News
04 Sep 2018
Three forthcoming government services to use Gov.uk Verify
Government Digital Service is in the process of private beta testing its identity assurance platform with three new central government services Continue Reading
By -
News
04 Sep 2018
UK and allies call for backdoors in encryption products
The Five Eyes intelligence alliance is calling on tech firms to include backdoors in their encrypted products to give access to law enforcement authorities or face various measures Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
04 Sep 2018
Power play – how GE builds digital into its products
In this week’s Computer Weekly, we speak to Bill Ruh, the head of GE Digital about how the business has changed to focus on customer outcomes following a change in senior leadership. The company is exploring new industries to take its Predix platform, such as the hospitality sector. We look at the problems of implementing SAP S/4 Hana and speak to experts about how to maximise success. We also explore the challenges of networking microservices. Our CIO interview is PayPoint CIO Jon Marchant. Read the issue now. Continue Reading
-
Opinion
03 Sep 2018
Security Think Tank: Follow good practice to reduce risk of software vulnerabilities
What is the most practical and cost effective way for organisations to identify and remediate high-risk software vulnerabilities? Continue Reading
-
News
03 Sep 2018
Majority of UK firms not insured for data breaches
Many UK firms are not insured against information security breaches and data loss, and would have to spend £1m on average to recover from a breach, a report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
31 Aug 2018
Security Serious Week to feature flash mob event
“Flash mob” event will create a human collage, highlighting cyber security advice Continue Reading
By- Warwick Ashford, Senior analyst
-
News
31 Aug 2018
Fraudulent money transfers are top aim of business email compromise
Business email compromise is increasingly popular with cyber criminals to steal money and information as well as spread malware, security researchers find Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Aug 2018
Blockchain gains foothold in Australia
A number of blockchain projects are under way in Australia, but questions remain about whether the technology is wanted Continue Reading
-
News
30 Aug 2018
Cobalt cyber heist group mounts new campaign
Security researchers discover new campaign using two malicious links to double the chances of infection, which is believed to be linked to a notorious cyber crime group Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Aug 2018
Machine identity management crisis looming
Managing machine identities is looming as the next big security challenge, a study reveals, with few organisations capable of protecting them as they increasingly form the basis of online communications Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Aug 2018
Fourth man jailed for iCloud celebrity hacking
The final hacker charged with leaking nude images of female celebrities in 2014 has been jailed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Aug 2018
US and UK days away from European Parliament ultimatum to suspend data transfers to the US
Threat to Privacy Shield as the European Union and US approach a critical European Parliament deadline to suspend data transfers from the EU to the US Continue Reading
By -
News
29 Aug 2018
Improving security is top driver for ISO 27001
Organisations are implementing the ISO 27001 standard in recognition of the fact that cyber attacks are increasingly inevitable and that it is best to be well-prepared to fend off attacks and mitigate their effect Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Aug 2018
Security teams and C-suite exec views not aligned
There are key differences and potential challenges when it comes to security teams and C-suite executives communicating and aligning about cyber threats, a study shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Aug 2018
IT leaders at a crossroads as they grapple with digital technology
CIOs have the opportunity to influence their company strategy as digital technology reshapes business. A survey of CIOs across 70 countries charts a path for IT leaders through emerging technologies Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
28 Aug 2018
Cyber attackers switching to covert tactics
Cyber criminals are moving away from mass, high-profile attacks to ones that are stealthy and more subtle – as well as attacks targeting systems typically used in critical infrastructure, researchers say Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
28 Aug 2018
Information security risk – keeping it simple
Organisations should start with risk management to understand information security risks and communicate them better internally Continue Reading
-
News
28 Aug 2018
Challenge to anti-GDPR immigration exemption in DPA to go ahead
Two human rights groups are challenging a controversial clause in new UK data protection legislation that they say is in conflict with the EU’s Charter of Fundamental Rights and undermines the General Data Protection Regulation Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 Aug 2018
Sharp rise in business email compromise
Cyber attackers are expanding their attack methods to steal money and to gain access to corporate and employee data, a report reveals Continue Reading
By- Warwick Ashford, Senior analyst