IT security
-
E-Zine
07 Dec 2023
CW EMEA: Prepare for cyber war
When the war between Hamas and Israel began in October, cyber security professionals and major government and private organisations braced for an inevitable accompanying online war. In this issue of CW EMEA, we outline cyber war, patterns of threat activity, and find out what security teams can do to protect their organisations. We also look at Finland’s advances in quantum computing, how Belgian researchers have developed technology to help datacentres process data faster, and the secrets of KPN’s successful business transformation. Read the issue now. Continue Reading
-
E-Zine
09 Nov 2023
Heineken lets the data flow
In this month’s CW EMEA ezine, we find out about Heineken’s mission to make the most out of the data it holds through an enterprise-wide data ecosystem. We also look at how the UK has turned its back on the German government-funded Gaia-X data platform, why cyber experts are urging the EU to rethink vulnerability disclosure plans, and how the IT industry is responding to the software developer skills shortfall. Read the issue now. Continue Reading
-
News
26 Jun 2018
British Muslim challenges use of intelligence databases for repeated police stops
Muzaffar Abdullah is challenging police use of intelligence databases to repeatedly stop and question Muslims, after being arrested for refusing to answer questions under Schedule 7 of the Terrorism Act 2000. His lawyers say he had been stopped at least 10 times before and the police should have known he had no connection to terrorism Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
26 Jun 2018
High-Tech Bridge bets on machine learning capabilities
Machine learning has a great potential to drive the automation of some security tasks to free up information security professionals to do more strategic work, says High-Tech Bridge founder Continue Reading
By- Warwick Ashford, Senior analyst
-
Tip
26 Jun 2018
How studying the black hat community can help enterprises
White hat hackers often assimilate themselves into the black hat community to track the latest threats. Discover how this behavior actually benefits the enterprise with David Geer. Continue Reading
By- David Geer, Geer Communications
-
Opinion
26 Jun 2018
Digital transformation is just business change
Don't always start with the technology if you're driving transformation, but always start with the business Continue Reading
By- Ed Tucker, Human Firewall
-
News
26 Jun 2018
Hospitality industry under siege from botnets
The hospitality industry, including hotels, airlines and cruise lines, is the biggest target for cyber criminal botnet attacks that abuse credentials and overwhelm online systems, a report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Jun 2018
Norway’s National Security Agency warns IT industry about security obligations
IT service providers serving organisations in Norway have received a timely reminder about their security obligations. Continue Reading
By- Gerard O'Dwyer
-
News
25 Jun 2018
London cyber innovation centre opens
The government-funded London cyber innovation centre is set to open today and welcome the first cyber security businesses as a study reveals that a quarter of UK firms lack the right security technology Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Jun 2018
UK privacy groups join call on EU to halt comms data collection
UK-based privacy groups have joined calls for a halt to the collection of communications data by European Union member states Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Jun 2018
Most infosec pros would trust hacker-tested products
Information security professionals are more likely to trust a product or company tested by hackers and most would respond to security reports from this community, a survey has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Jun 2018
Apple rejects claim of iPhone brute force hack
Apple has rejected claims by a security researcher that he was able to bypass the iPhone defences against brute force passcode hacks Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Jun 2018
UK cyber skills in demand, says Dorset firm C3IA Solutions
UK cyber security skills are in demand and there is a bright future in exporting them, according to Dorset-based firm C3IA Solutions Continue Reading
By- Warwick Ashford, Senior analyst
-
Blog Post
22 Jun 2018
Public scrutiny of IT failures is fundamental to IT success
MPs on the Treasury select committee have been doing everyone in IT a favour lately. Thanks to pressure from their investigations, we’ve had near-unprecedented access to the real stories of what ... Continue Reading
By- Bryan Glick, Editor in chief
-
News
22 Jun 2018
Firms look to automation for cloud security
In the face of increasingly sophisticated and nation-state-sponsored cyber attacks, organisations are looking to managed security services and automation for security in the cloud and on-premise Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Jun 2018
IBM early findings on disastrous TSB core banking system migration released
Report released by Treasury Committee criticises lack of rigour in preparation for core banking system migration, but TSB says report’s content is out of date Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
21 Jun 2018
Infosec pros expect increase in nation state cyber attacks
Most information security professionals expect a rise in nation state cyber attacks, with more than two-thirds preparing to defend against them Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Jun 2018
CDO interview: Andrei Belevtsev, Gazprom Neft
Russian oil giant will harness the latest technologies right across its business, says chief digital officer Continue Reading
By- Vladimir Kozlov
-
News
21 Jun 2018
Government sponsors diversity cyber academy
The UK government has awarded a grant for the establishment of a cyber academy to promote neurodiversity in the industry Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Jun 2018
Younger employees 'main culprits' for security breaches
UK senior decision makers believe younger workers are the biggest risk to cyber security, but are doing little to support them and reduce that risk, a report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Jun 2018
Palo Alto Networks opens cyber range in Australia
The first of its kind in Asia-Pacific, the cyber range training facility will let Australian IT and security teams hone their skills through cyber security exercises Continue Reading
By- Aaron Tan, TechTarget
-
E-Zine
20 Jun 2018
CW ANZ: Object storage hits a sweet spot
Enterprises in Australia are only getting started on object storage, which does away with the traditional file directories, making it easier to access and move data in a heterogeneous IT environment. In this issue of CW ANZ, we look at how Australian companies are dipping their toes into object storage, the challenges they are facing and the state of the market. Read the issue now. Continue Reading
-
News
20 Jun 2018
CIO interview: Mike Young, Centrica
We speak to the CIO whose CEO recently met with the head of Microsoft to talk about strategy Continue Reading
By- Cliff Saran, Managing Editor
-
News
20 Jun 2018
More APAC consumer goods firms expected to adopt blockchain
The adoption of blockchain technology is likely to increase in the consumer goods industry as more businesses use the technology to address fraud and improve supply chain management Continue Reading
By- Kimberly Chua
-
News
20 Jun 2018
Dutch organisations must unite to fight DDoS attacks
Experts in the Netherlands call on Dutch corporations and institutions to work together to help prevent distributed denial of service attacks Continue Reading
By -
News
20 Jun 2018
Most small businesses fail to act after a cyber attack
Nearly half of small businesses have suffered at least one cyber attack in the past year, yet most fail to take action afterwards, citing lack of budget at the biggest challenge Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Jun 2018
Singapore remains hotbed for cyber threats
Singapore was a victim of advanced persistent threats, phishing and website defacements in 2017, according to the latest threat landscape report by the Cyber Security Agency Continue Reading
By- Aaron Tan, TechTarget
-
News
19 Jun 2018
Surface web used in private data sales
The surface web plays an integral role in the selling of personal information, a report on identify fraud has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
Tip
19 Jun 2018
How white hat hackers can tell you more than threat intelligence
White hat hackers can play a key role in assessing threats lurking on the dark web. Discover what traditional threat intelligence isn't telling you and how white hats can help. Continue Reading
By- David Geer, Geer Communications
-
News
19 Jun 2018
MPs see risk to critical infrastructure as top threat
A majority of MPs are concerned about the cyber threat to critical national infrastructure, a survey has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
19 Jun 2018
Australian healthcare services most hit by data breaches
Nearly a quarter of data breaches reported under Australia’s new mandatory data breach regime took place in the healthcare sector. Continue Reading
-
19 Jun 2018
Singapore firms unprepared for GDPR
An EY study reveals that only 10% of organisations in Singapore are ready to comply with the Europe’s new data protection regime. Continue Reading
-
E-Zine
19 Jun 2018
Microsoft becomes devoted to open source developers
In this week’s Computer Weekly, after Microsoft’s recent acquisition of GitHub, we examine the software giant’s tools for embracing open source developers. Secretary of state for digital, culture, media and sport Matt Hancock talks about growing the UK digital economy and supporting the tech sector. And we look at SAP’s next steps for its “intelligent enterprise” strategy. Read the issue now. Continue Reading
-
News
18 Jun 2018
Singapore faced cyber attacks during Trump-Kim summit
Russian attackers allegedly scanned IP phones in the city-state for vulnerabilities, although it was unclear what they were after or whether they were successful Continue Reading
By- Aaron Tan, TechTarget
-
Blog Post
18 Jun 2018
Your PC is rooted and jailbroken: deal with it!
One of the defining characteristics of the modern digital workplace is a Windows PC on every desk and a smartphone in every pocket. The ability to centrally discover, provision, deploy, update, and ... Continue Reading
By- Richard Edwards, Freeform Dynamics
-
Blog Post
18 Jun 2018
European Parliament heads for showdown with US over Privacy Shield
By Kevin Cahill The Justice Committee of the European Parliament has set the scene for a major showdown with the US over data transfers between the EU and the US by setting a Sept 1st deadline for ... Continue Reading
By- Bill Goodwin, Computer Weekly
-
Blog Post
15 Jun 2018
The next moves by DCMS on data and digital identity must lay foundations for UK's digital economy
Matt Hancock, the secretary of state for digital, culture, media and sport (DCMS), is not everyone’s cup of tea – especially when that cup is Matt Hancock branded. But regardless of whether you’re ... Continue Reading
By- Bryan Glick, Editor in chief
-
News
14 Jun 2018
Encryption is under attack, says Venafi CEO Jeff Hudson
Encryption is one of the fundamental principles on which the internet is built, but this vital technology is under threat from criminals and ill-advised government policies, says Venafi CEO Jeff Hudson Continue Reading
-
News
14 Jun 2018
AI is key to keeping IBM compliant with GDPR
Artificial intelligence is vital for keeping IBM compliant with the principles of the General Data Protection Regulation, which, in turn, provides opportunities for business, says the company’s data protection officer Continue Reading
By- Warwick Ashford, Senior analyst
-
News
14 Jun 2018
Cyber attack warnings highlight need to be prepared
Fresh warnings about the vulnerability of national infrastructure to cyber attacks show the need for securing and monitoring associated control systems connected to the internet Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
14 Jun 2018
CW Europe: Lufthansa’s HR IT project takes off
Lufthansa says it is confident of landing a company-wide HR IT project after having to go back to the drawing board. Also in this issue, read about the ComputerWeekly/TechTarget IT Priorities survey’s findings that many European technology leaders are expecting to increase IT spending through 2018, and how a major report has reassured Swedish society that artificial intelligence will be a positive force for change despite fears of job losses. Continue Reading
-
News
14 Jun 2018
NCSC urges action after Dixons Carphone breach
The National Cyber Security Centre (NCSC) is urging UK business to improve data protection capabilities after Dixons Carphone revealed that millions of payment card and personal data records may have been compromised in a cyber breach Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 Jun 2018
Dixons Carphone admits 'falling short' on data protection
Dixons Carphone has warned that millions of credit card and personal data records may have been compromised in a cyber breach Continue Reading
By- Warwick Ashford, Senior analyst
-
Tip
12 Jun 2018
Application security programs: Establishing reasonable requirements
Creating security program requirements can be a challenging task, especially with application security. In this tip, Kevin Beaver shares several ways to create an effective program. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
News
12 Jun 2018
Insurer Beazley meets global challenge to secure mobile workforce
Beazley has stolen a march on other London-market insurers by implementing a versatile global digital workspace with improved security Continue Reading
-
Opinion
12 Jun 2018
Security Think Tank: GDPR requires unprecedented view of data flows
Why is it important to know where data flows, with whom it's shared and where it lives at rest, and what is the best way of achieving this? Continue Reading
By- Yves Le Roux, (ISC)2
-
News
12 Jun 2018
Privacy Shield under threat by US non-compliance
The Privacy Shield framework that replaced the Safe Harbour agreement for personal data transfers between the EU and the US is under threat due to non-compliance by US firms Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Jun 2018
Investigators close Nokia extortion probe without finding a motive or making an arrest
New details of €2m blackmail of Nokia in 2007 emerge as Finland’s NBI calls a halt to its investigation Continue Reading
By- Gerard O'Dwyer
-
News
12 Jun 2018
BT announces “unhackable” quantum-secured network
In the face of the threat that quantum computers could crack many of the encryption methods used to protect highly sensitive data, BT has developed a “quantum-secured” network Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Jun 2018
Email-based cyber attacks gathering momentum
Email-based cyber attacks are gathering momentum and the cost of these attacks are rising, with several hidden costs, a survey of IT professionals in Europe, Middle East and Africa reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Jun 2018
Singapore career website hit by PageUp malware scare
A Singapore government career website was among others affected by a malware attack on an Australian recruitment technology supplier Continue Reading
By- Aaron Tan, TechTarget
-
News
11 Jun 2018
Industry must do more to open up cyber security profession
Talented and successful cyber security researcher and passionate advocate for the profession, James Lyne reveals that he fell into security more by accident than design, and says training and recruitment must change to find and develop talented individuals Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
11 Jun 2018
How Australia is keeping pace with ICS threats
Besides bridging the security gap between IT and operational technology teams, Australia is driving efforts to bolster the security of IoT devices Continue Reading
-
News
11 Jun 2018
Security Think Tank: Data flow visibility is essential to security
Why is it important to know where data flows, with whom it is shared and where it lives at rest, and what is the best way of achieving this? Continue Reading
By- Elisabetta Zaccaria, Secure Chorus
-
News
11 Jun 2018
Coinrail cyber heist highlights need for exchange security
A cyber heist at South Korea’s Coinrail has prompted fresh calls for industry regulations to drive better cyber security at cryptocurrency exchanges Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Jun 2018
APAC remains a hotbed for software piracy
The Asia-Pacific region is still seeing the highest use of unlicensed software installations globally, making enterprises more susceptible to cyber attacks from malware Continue Reading
By- Kimberly Chua
-
News
10 Jun 2018
GDS loses digital identity policy to DCMS
The move follows DCMS taking over data policy from GDS and means Cabinet Office is no longer responsible for relations with private sector ID ecosystem Continue Reading
By- Bryan Glick, Editor in chief
-
News
08 Jun 2018
Parliamentary computers at risk after staff targeted by phone phishing
Police are investigating phone phishing attacks targeted against Parliament. Staff warned not to disclose details of their computers to fraudulent callers. Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
08 Jun 2018
BYOD for mobile ‘a year away’ for Williams F1
Companies in the Williams Group – the Formula One racing operation Williams Grand Prix Engineering and its high-growth sister operation Williams Advanced Engineering – are investing with mobile security front-of-mind to enable more agile working practices within 12 months Continue Reading
-
Opinion
08 Jun 2018
Security Think Tank: Focus on data protection, but do not rely on DLP alone
Why is it important to know where data flows, with whom it's shared and where it lives at rest – and what is the best way of achieving this? Continue Reading
By- Emma Bickerstaffe, Information Security Forum (ISF)
-
Blog Post
08 Jun 2018
European Court hearing into EU-US data transfer system will not happen for at least 18 months
By Kevin Cahill The European Court of Justice may not have a hearing into crucial questions about the legality of the EU-US data transfer system for at least 18 months according to a spokesperson ... Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
08 Jun 2018
Businesses must report cyber crime, panel urges
By reporting cyber crimes, private enterprise can help improve national and international cyber defences and bring criminals to justice, according to an expert panel Continue Reading
By- Warwick Ashford, Senior analyst
-
News
07 Jun 2018
Cyber security focus too much on tech, says Domino’s CISO
Many organisations are still focusing only on technology and compliance, which means their cyber defences are not as solid as they think, according to Domino’s Pizza chief information security officer Continue Reading
By- Warwick Ashford, Senior analyst
-
News
07 Jun 2018
IT spending reaches 10-year high as CIOs struggle with digital technology strategy
IT leaders have seen their budgets and headcounts rise for the first time in 10 years, but face challenges implementing their digital strategies Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
07 Jun 2018
Nation state cyber attacks affect all, says former GCHQ boss
Cyber attacks by nation states used to be a small part of the problem for state authorities to address, but now all organisations are potential targets of nation state attacks, according to former GCHQ head Continue Reading
By- Warwick Ashford, Senior analyst
-
News
07 Jun 2018
Business not learning from past cyber security incidents
Businesses are still not getting the basics right and they are not learning from past security incidents, according to world-renowned security blogger and trainer Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
07 Jun 2018
Security Think Tank: Understand data for risk-based protection
Why is it important to know where data flows, with whom it is shared and where it lives at rest, and what is the best way of achieving this? Continue Reading
By- Simon Persin, Turnkey Consulting
-
News
06 Jun 2018
GDPR and backup: A potential minefield easily avoided
The right to be forgotten will be impossible in backups and snapshots, but systems can be built that automate for compliance, says Andy Barratt of security consultancy Coalfire Continue Reading
By- Antony Adshead, Storage Editor
-
News
06 Jun 2018
We need to design for security and privacy, says Martha Lane Fox
The digital future is bright, but only if society works through a gear change in its relationship with technology, and demands products and services that are secure and private by design, says internet service pioneer Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Jun 2018
Understanding is key to security awareness, says specialist
Only if people understand why cyber security matters will they change their behaviours as a result of awareness training, according to a human behaviour specialist and cyber security consultant Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
06 Jun 2018
Security Think Tank: Ignorance about data is tantamount to negligence
Why is it important to know where data flows, with whom it's shared and where it lives at rest, and what is the best way of achieving this? Continue Reading
By- Tim Holman, 2-sec
-
News
06 Jun 2018
Cyber attacks not sophisticated, says Just Eat CISO
The chief information security officer of Just Eat has challenged the perception that all cyber attacks are sophisticated and that it is impossible to fill cyber security jobs Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Jun 2018
Nexsan adds Assureon Cloud Transfer for hybrid cloud archiving
Nexsan archiving appliances add hybrid cloud capability to AWS and Azure cloud for unstructured data, targeting users that want to retain files on-site with cloud access Continue Reading
By- Antony Adshead, Storage Editor
-
Blog Post
05 Jun 2018
Divisive Devices And Conferencing Woes?
Like - I suspect - many people, I spend far too large a percentage of my one and only life on various 'net conferences, using a variety of platforms. Most of them are truly loathsome. So it was ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
News
05 Jun 2018
Boards not asking right security questions, says Dido Harding
Former TalkTalk CEO says boards are still not asking the right cyber security questions, do not understand that they should be making cyber risk decisions, and are not communicating with engineers Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
05 Jun 2018
Application security more important than ever
Applications have an increasingly crucial role in our lives, yet they are also a real security threat, with hackers always finding new ways to bypass security defences. Computer Weekly looks at how organisations are responding to the challenge Continue Reading
-
Opinion
05 Jun 2018
Security Think Tank: Use data flow information to protect systems
Why is it important to know where data flows, with whom it's shared and where it lives at rest, and what is the best way of achieving this? Continue Reading
-
News
04 Jun 2018
Technology key to new UK counter-terrorism strategy
Technologies such as machine learning and data analytics are key to the UK government’s updated counter-terrorism strategy Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
04 Jun 2018
GDPR – like a lot of regulation – will mostly benefit the big incumbents
The law of unintended consequences applies to the new EU data protection laws, because the big players it seeks to regulate can better afford to comply Continue Reading
By- Tim Worstall, Adam Smith Institute
-
News
04 Jun 2018
One-third of firms would pay ransoms rather than invest in security
Report says businesses are still making the same mistakes, failing to make any progress in crucial areas such as cyber security awareness and preparedness Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
04 Jun 2018
Security Think Tank: Data governance is essential to data security
Why is it important to know where data flows, with whom it's shared and where it lives at rest – and what is the best way of achieving this? Continue Reading
-
News
04 Jun 2018
Scotland to begin building identity platform prototype this autumn
Scottish government plans flexible approach to online identity providers as it aims to launch alpha phase of is online identity assurance programme in August 2018 Continue Reading
By -
News
04 Jun 2018
Offensive AI unlikely in the near future, says Mikko Hypponen
Cyber criminals are not close to being able to use AI for attack purposes, according to industry veteran Mikko Hypponen, who has been at the forefront of AI use in cyber defence for several years Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 Jun 2018
Huge rise in TSB-themed mobile phishing attacks after IT meltdown
Scammers have used bank’s IT problems as an opportunity to target its customers with mobile phishing attacks Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
01 Jun 2018
Ethical hacker, 86, rises to Santander’s challenge
Elderly hacker with little computing experience was able to hack WiFi and create phishing attack Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Feature
01 Jun 2018
Cyber resilience key to securing industrial control systems
Operators of industrial control systems can build greater cyber resilience by getting IT and operational technology teams to work more closely together and improving the visibility of their infrastructure, among other security measures Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
01 Jun 2018
Security Think Tank: Data controllers are essential in modern business environment
Why is it important to know where data flows, with whom it's shared and where it lives at rest, and what is the best way of achieving this? Continue Reading
By -
News
01 Jun 2018
Security suppliers need to interact with community, says researcher
Security suppliers need to interact with the community to get feedback on their products before launch to ensure they have not missed any vulnerabilities, a security researchers advises Continue Reading
By- Warwick Ashford, Senior analyst
-
Blog Post
31 May 2018
Fintech professional’s tech predictions: 9- Gamers monitored by businesses and authorities
People that use online gaming platforms might be being sized up for a job or even by security services Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
31 May 2018
VPN hacks can be lethal, warns security expert
Organisations should not overlook the need to secure VPN connections because failure to do so could be fatal, but 2FA alone is not enough, warns a security expert Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
31 May 2018
Security Think Tank: Data governance is good for business and security
Why is it important to know where data flows, with whom it's shared and where it lives at rest, and what is the best way of achieving this? Continue Reading
By- Maxine Holt, Omdia
-
Opinion
30 May 2018
Security Think Tank: Information management means better security
Why is it important to know where data flows, with whom it's shared and where it lives at rest – and what is the best way of achieving this? Continue Reading
-
News
30 May 2018
Security community urged to prepare for quantum computing
A top European chief information security officer is urging the security community to prepare for quantum computing to ensure their encryption processes are ready in time Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 May 2018
US issues warning about North Korean malware
US government has identified more than 85 networks compromised by two malware families believed to be North Korean in origin Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 May 2018
US jails Canadian resident who helped Russia hack Yahoo emails
A US court has jailed a hacker on charges of computer fraud for hacking Yahoo email accounts on behalf of the Russian government Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 May 2018
Identity and access management tools add AI, microservices
AI and as-a-service platforms enable IT to take a more hands-off approach. But with adoption in the early stages, most IT pros wonder what the future holds for identity management. Continue Reading
By -
News
29 May 2018
Business still not addressing insider threat
Businesses are still not addressing inside threats when it comes to cyber security, leaving themselves wide open to data breaches as a result, according to a security analyst Continue Reading
By- Warwick Ashford, Senior analyst
-
Answer
29 May 2018
How was a Cisco firewall vulnerability exploited by threat actors?
Threat actors exploited a critical Cisco firewall vulnerability that received a CVSS score of 10. Discover how this flaw works and how it was exploited with Judith Myerson. Continue Reading
-
News
29 May 2018
UK security spend low despite breaches
The UK is the most breached country in Europe, but IT security spend remains low compared with other countries in the region, a report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
29 May 2018
Tech's role in tackling humanitarian crises
In this week’s Computer Weekly, we learn about how mobile connectivity is a lifeline for Syrian refugees in Turkey, thanks to the mobile network operators in that country. Our latest buyer’s guide examines how modern network security enables digital transformation at a range of companies. And we find out about the technology strategy of logistics firm Hermes from its CIO, and about British Airways’ use of Salesforce to globalise its B2B sales. Read the issue now. Continue Reading
-
News
29 May 2018
Max Schrems’s NOYB initiates GDPR action
A privacy NGO led by Austrian lawyer Max Schrems is among the first to file complaints under the GDPR against Google, Instagram, WhatsApp and Facebook Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 May 2018
Former Macedonian PM convicted in corruption case exposed by illegal government surveillance
Information exposed by leaked recordings that were part an illegal mass surveillance campaign orchestrated under the government of former prime minster Nikola Gruevski have led to his conviction for corruption. He was found guilty of rigging a tender and receiving a luxury Mercedes as a bribe. He may still appeal the ruling Continue Reading
By