IT security
-
News
12 Nov 2024
More data stolen in 2023 MOVEit attacks comes to light
Over a year since the infamous MOVEit Transfer cyber attacks affected thousands of organisations, more new victims have come to light after an anonymous threat actor leaked their data on the dark web Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
12 Nov 2024
Strengthening cyber: Best IAM practices to combat threats
The Security Think Tank considers best practices in identity and access management and how can they be deployed to enable IT departments to combat cyber-attacks, phishing attacks and ransomware Continue Reading
-
News
14 Mar 2017
CIO interview: Simon McCalla, Nominet
Nominet, the registry for more than 10 million of the UK’s internet domains, is expanding into the internet of things and internet security services Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
13 Mar 2017
NCSC to educate UK politicians on the cyber threat
The National Cyber Security Centre is to deliver tailored seminars for politicians on how to protect their email communications and voters’ data to defend against cyber threats to the political system Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Mar 2017
Paying ransomware attackers perpetuates attacks, says researcher
Continually evolving ransomware is among the threats organisations need to factor into their cyber defences in 2017, but only once they have taken care of the basics, says Kaspersky Lab researcher Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
09 Mar 2017
CW Europe: Technology poses new risks to jobs, economies and society
Rapid advances in technology could have destabilising effects on employment and economic growth, and could exacerbate social unrest, the World Economic Forum (WEF) warned. Society’s failure to keep pace with technology change was a key risk under discussion at Davos in January. Continue Reading
-
News
08 Mar 2017
WhatsApp, Signal, ProtonMail safe from CIA hacking tools
Top secure messaging and email apps are said to be safe from CIA hacking tools, but organisations are urged to assess their own vulnerability if the tools were to fall into the hands of cyber criminals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
07 Mar 2017
Country as a service becoming reality in Estonia
Programme to help foreigners set up businesses in Estonia through virtual residency is gathering pace Continue Reading
By- Tarmo Virki
-
News
07 Mar 2017
Retail industry steps up the fight against rising cyber threats
UK retail body BRC publishes the first of its kind step-by-step guide on how to manage cyber security threats Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
07 Mar 2017
Industrial control systems pose big risk to security
In this week’s Computer Weekly, we examine the risks to critical national infrastructure from security vulnerabilities in legacy industrial control systems. DevOps is growing in popularity – we find out about the organisational, process and cultural approaches to make it succeed. And we ask CIOs how they are becoming hybrid IT and digital leaders. Read the issue now. Continue Reading
-
News
06 Mar 2017
More than a million Gmail and Yahoo account credentials on sale
Usernames, email addresses and plaintext passwords of more than a million Yahoo and Gmail accounts are reportedly on sale on the dark web, posing a threat to corporate security Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Mar 2017
AWS outage shows vulnerability of cloud disaster recovery
The recent outage at Amazon Web Services has highlighted the risks of using any public cloud for disaster recovery IT Continue Reading
By- Cliff Saran, Managing Editor
-
News
03 Mar 2017
Cyber attack on Barts NHS trust exploited zero-day vulnerability
A cyber attack that forced parts of Barts NHS trust offline in January 2017 has been blamed on previously unknown malware that was able to bypass the antivirus systems, highlighting a common weakness in cyber defences Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Mar 2017
Businesses blame rivals for DDoS attacks
Industrial sabotage is considered to be the most likely reason behind a distributed denial of service attack, a study has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
02 Mar 2017
Yahoo breaches underline executive role in cyber security
Yahoo's data breaches cost its top lawyer his job, CEO Marissa Mayer millions in bonuses, and $350m off its sale price, highlighting the importance of executive involvement Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
28 Feb 2017
The internet of things: an overview
Despite security and other concerns, there are many benefits associated with embracing the internet of things Continue Reading
By- Bruce Hughes, KuppingerCole
-
News
27 Feb 2017
Citizen Love: the story of an ordinary family's fight with the US government
Finnish documentary makers Raimo Uunila and Lauri Danska tell the behind-the-scenes story of activist Lauri Love’s battle with the US government – and the impact of the case on his family Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
27 Feb 2017
Cyber criminals net £8bn from financial services in 2016
Organised cyber fraud gangs are turning their attention to online lenders and emerging financial services, potentially netting £8bn in 2016, a report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Feb 2017
NHS ‘mislays’ 500,000 confidential patient documents
Health service accused of a ‘cover-up’ after it came to light that more than half a million documents holding patient data were never delivered to their intended recipients Continue Reading
By -
News
24 Feb 2017
Banking malware, DDoS, ransomware and CEO fraud top UK cyber threats
Businesses need to be aware of the value of their data, how that data is likely to be attacked, and how to defend against particular attacks, says leading UK cyber cop Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
23 Feb 2017
CW Nordics: Top IT priorities for Nordic CIOs in 2017
In this first issue of CW Nordics in 2017 we take a look what CIOs in the region are expecting in the year ahead. We asked a select group of CIOs and analysts in Denmark, Finland, Norway and Sweden what IT projects are at the top their priority lists. Also read about the Nordic region as a hotspot for IT startups, with Sweden punching above its weight in financial technology. And find out how board executives at healthcare company Elekta are analysing workforce data to make better strategic decisions. Continue Reading
-
News
22 Feb 2017
Beware printer helpline scam, warns NTS eCrime Team
National Trading Standards is warning consumers about a scam targeting those looking for help with printer problems Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Feb 2017
Microsoft issues critical patches but not for zero days
After missing the monthly security update for 14 February, Microsoft has issued some patches but not for zero-day vulnerabilities despite the availability of exploit code Continue Reading
By- Warwick Ashford, Senior analyst
-
Blog Post
21 Feb 2017
Gov.uk Verify ID providers eye the prize of HMRC’s digital users – but what happens without them?
In all the recent talk about whether HM Revenue & Customs (HMRC) is truly committed to the Cabinet Office’s Gov.uk Verify service, there’s been less said about the commitment of the external ... Continue Reading
By- Bryan Glick, Editor in chief
-
Opinion
20 Feb 2017
Security Think Tank: Risk of DNS attacks goes beyond websites
What are the main security risks associated with DNS and how are these best mitigated? Continue Reading
-
News
17 Feb 2017
RSAC17: Geopolitical changes driving encryption usage, survey shows
More organisations are planning to deploy encryption in response to geopolitical changes, but confidence in organisations’ ability to secure and protect encryption is low, a survey shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 Feb 2017
Too many high-risk vulnerabilities leave CISOs scrabbling to patch
Too many critical flaws are given high priority, leading to a patch overload that CISOs cannot keep up with, according to F-Secure Continue Reading
By- Cliff Saran, Managing Editor
-
Blog Post
15 Feb 2017
HMRC ID vs Gov.uk Verify – what’s the difference, and why it matters
The long-term row between HM Revenue & Customs (HMRC) and the Government Digital Service (GDS) over online identity assurance broke into the open this week. HMRC published a blog post that ... Continue Reading
By- Bryan Glick, Editor in chief
-
News
15 Feb 2017
RSAC17: Infosec pros must help create business-driven security, says RSA CTO
The inability to draw connections between security details and business metrics is one of the biggest challenges facing most companies, according to RSA CTO Zulfikar Ramzan Continue Reading
By- Warwick Ashford, Senior analyst
-
News
14 Feb 2017
AWS preps GDPR readiness by signing up to cloud Code of Conduct
AWS is now a member of the Association of Cloud Infrastructure Services Providers in Europe, which means EC2 and the like need to follow certain rules Continue Reading
By- Cliff Saran, Managing Editor
-
News
14 Feb 2017
Major DDoS attacks see huge increase, says Akamai
Akamai’s State of the Internet/Security Report for the fourth quarter of 2016 finds that distributed denial of service attacks larger than 100Gbps are rapidly increasing as more IoT devices are compromised Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
14 Feb 2017
GDS, HMRC and Verify: so much for cross-government digital collaboration
Less than a week after Cabinet Office minister Ben Gummer announced the new government transformation strategy, its central premise is already in question after HM Revenue & Customs (HMRC) ... Continue Reading
By- Bryan Glick, Editor in chief
-
E-Zine
14 Feb 2017
Under surveillance – what the Investigatory Powers Act means for business
In this week’s Computer Weekly, the UK government has passed the Investigatory Powers Act, labelled a “snoopers’ charter” that expands the scope of state surveillance – but what does it mean for businesses? We find out what digital transformation means in the fire and rescue service. And we examine the role of public cloud in supporting enterprise storage requirements. Read the issue now. Continue Reading
-
News
13 Feb 2017
MobileIron: Corporate IT policy and mobile device security are mismatched
MobileIron report identifies a gap between security policy and the actual deployment of that policy on mobile devices Continue Reading
By- Cliff Saran, Managing Editor
-
Feature
13 Feb 2017
Breaking the cyber kill chain
Traditional antivirus is no longer good enough for fileless malware attacks that don’t leave a trace Continue Reading
By- Aaron Tan, TechTarget
-
E-Zine
09 Feb 2017
CW Benelux: Is there a Dutch digital delusion?
On government and business levels, the Netherlands aspires to be a digital leader in Europe, but it may be losing ground because of a lack of research and development investment. Also in this issue, IT decision makers based in the Benelux region are less confident than their European neighbours that IT budgets will increase in 2017, and Dutch bank ING, which used digital technology to reinvent itself after the financial crash, is about to reinvent itself again. Continue Reading
-
News
08 Feb 2017
How a Dublin court case could derail EU-US data privacy agreements
The Irish Commercial Court will consider whether privacy protection offered by standard contractual clauses for data transfers to the US from Europe is legally valid Continue Reading
By- Kevin Cahill and Dai Davis
-
News
08 Feb 2017
NHS websites defaced by Tunisian Islamist hacktivists
Another series of pro-Islamic State hacktivist attacks on NHS websites has underlined the need to harden websites and keep software up to date as attackers exploit a vulnerability in WordPress Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Feb 2017
APAC businesses turn to DevOps to improve app quality, security
Security validation and metrics are some of the key trends in DevOps this year, according to CA Technologies Continue Reading
By- Aaron Tan, TechTarget
-
News
06 Feb 2017
Google to appeal against order to hand over foreign emails
UK firms urged to consider the risks of non-UK cloud service providers and to encrypt data in the light of another US warrant to access emails held by a US cloud services firm on non-US servers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 Feb 2017
TalkTalk CEO Harding steps aside for public service role
TalkTalk CEO Dido Harding has stepped down, leaving the ISP in rude health Continue Reading
By- Alex Scroxton, Security Editor
-
News
31 Jan 2017
Data breach costs exceed 20% of revenue
The cost of data breaches topped 20% of revenue in the past year as cyber attacks became more sophisticated and defenders struggled to keep pace, the latest Cisco security report shows Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
31 Jan 2017
Visionary technology transforming healthcare
In this week’s Computer Weekly, find out how a visionary approach to technology is transforming healthcare at London’s world-leading Moorfields Eye Hospital. The UK tech sector has set out its priorities for the forthcoming Brexit negotiations – we take a look at the key issues. And our new buyer’s guide examines the latest trends in datacentre management. Read the issue now. Continue Reading
-
News
26 Jan 2017
Facebook ups security with Fido U2F two-factor authentication
Social media giant is enabling users to increase the security of their logins with Fido U2F USB security keys Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Jan 2017
Security spending leaving data vulnerable, study finds
Cyber breaches are increasing despite increased security spending, a study shows, highlighting that security investment decisions are not aligned with actual cyber threats Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Jan 2017
Microsoft’s cloud privacy battle may go to US Supreme Court
The US Department of Justice is considering going to the Supreme Court after an appeals court refused to revisit its July 2016 landmark ruling blocking government access to Microsoft servers in Ireland Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
25 Jan 2017
Challenges of complying with the Investigatory Powers Act
Despite opposition by civil liberties groups and technology companies, the UK government has passed the controversial Investigatory Powers Act, adding a host of security and contingency requirements that UK businesses need to consider Continue Reading
-
E-Zine
24 Jan 2017
World leaders discuss risks of social unrest from advances in technology
In this week’s Computer Weekly, we examine the fears raised at the World Economic Forum in Davos over the potential for social unrest as new technology such as AI transforms working practices and eliminates jobs. We hear from the CIO at the World Health Organization about how IT helped tackle the Ebola crisis. And we look at progress in companies adopting big data analytics. Read the issue now. Continue Reading
-
News
23 Jan 2017
Lloyds Bank hit by massive DDoS attack
It has emerged that UK banks have been targeted by a DDoS campaign that affected services intermittently only at the Lloyds Banking Group Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Jan 2017
Lords ‘deeply concerned’ about Digital Economy Bill data-sharing clauses
Digital Economy Bill comes under fire again for its data-sharing principles, this time from the House of Lords Delegated Powers Committee Continue Reading
By -
E-Zine
19 Jan 2017
CW ANZ: The role of cognitive computing in data analytics
In this month’s CW ANZ, read why enterprises need to worry just as much – if not more – about the business implications, rather than the technical challenges, when implementing cognitive software. Read about the experiences of Dutch banking and financial services company Rabobank which has been using predictive analytics for years to predict which customers might default on their mortgage or abandon an account application midway through the process. We also take a look at why the future of Apple Pay Australia is still unresolved, how the Red Cross data breach has highlighted security shortcomings, and what Virgin Atlantic has gained from its use of Salesforce CRM software. Continue Reading
-
Feature
17 Jan 2017
How information security professionals can help business understand cyber risk
Information security is continually moving up business and board agendas, but information security professionals find it challenging to help business leaders to understand fully the cyber risks across increasingly digital businesses. Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
17 Jan 2017
RAC digitises driver assistance
In this week’s Computer Weekly, we speak to the RAC about its modernisation initiative, where it is using Microsoft Azure to digitise older cars and gather real-time data to alert members of faults before they result in roadside breakdowns. We also look at how a lack of diversity in organisations is costing the UK economy money, and how attacks against IoT devices are highlighting the vulnerabilities of specific devices but failing to provide a complete picture of the security challenges. Continue Reading
-
News
13 Jan 2017
Davos: Technology poses new risks to jobs, economies and society
Politicians and business leaders will discuss the risks posed by technology to jobs, political stability and cyber security at the World Economic Forum in Davos Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
12 Jan 2017
TechUK launches framework to build public trust in the IoT
Tech sector association techUK wants to help overcome public distrust in the internet of things Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Jan 2017
Flawed GoDaddy security certificates show need for control
Vulnerabilities in digital security certificates highlight the need for organisations to be able to exercise more control over those certificates Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
12 Jan 2017
CW Middle East: UAE takes lead in autonomous car trials
Self-driving cars are one of the most exciting developments in technology. Companies like Google and Tesla are pioneering the technology. But it might be countries in the Middle East, with the poorest road safety records in the world that could benefit most. Despite significant regional spending on safety campaigns, the UAE still clocks up 12.7 road deaths per 100,000 people, with 30.4 in Oman, 24.8 in Saudi Arabia, 16.5 in Kuwait, 14 in Egypt and 13.2 in Qatar. In September Dubai’s Road and Transport Authority (RTA) trialled a public driverless vehicle in the city’s Downtown area, running along a 700-metre trial route. Continue Reading
-
Opinion
10 Jan 2017
Security Think Tank: Top three DNS-related security risks
What are the main security risks associated with the domain name system and how are these best mitigated? Continue Reading
By- Richard Hollis
-
E-Zine
10 Jan 2017
IT Priorities 2017: focus on flexibility
In this week’s Computer Weekly, we survey CIOs to find out how they will be spending their 2017 budget. It is going to be a big year for cloud computing, but our research highlights the challenges IT decision makers face in balancing business pressures with the need to lower operating costs. Read the issue now. Continue Reading
-
News
10 Jan 2017
Cyber security scare stories could sharpen focus at banks
There are continual cyber attacks on banks, and although most are repelled, there is significant room for improvement Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Feature
09 Jan 2017
Secure IoT before it kills us
Experts say more must be done to mitigate the potentially catastrophic threats presented by connected devices Continue Reading
-
News
05 Jan 2017
UK youngsters unwittingly exposing private data
The UK children's commissioner has called for better support for child privacy after study shows most are unknowingly agreeing to share private data Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Jan 2017
Flight booking systems easy to hack, researchers warn
Malicious actors could infiltrate systems to alter passenger information and even cancel bookings, Chaos Communications Congress told Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Jan 2017
Three-quarters of enterprises collecting IoT data, says 451 Research
A study of IoT buying plans by analysts at 451 Research shows robust growth ahead during 2017 Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Dec 2016
Top 10 networking stories of 2016
A look back at Computer Weekly’s most-read networking stories of 2016 Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Dec 2016
European court delivers blow to Snoopers’ Charter
Parts of the controversial Investigatory Powers Act relating to the bulk collection of communications data have been ruled unlawful by the European Court of Justice Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Dec 2016
Top 10 IT security stories of 2016
Here are Computer Weekly’s top 10 IT security stories of 2016: Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
20 Dec 2016
Data danger: Cyber threats lurk inside every company
In this week’s issue, we investigate the hidden threats lurking in every company and discuss what options CIOs and heads of security have to limit damage. We also look at how CIOs can fund digital initiatives when costs are under pressure, and how Boots has built an SAP centre of expertise to take back control of the strategic direction of its IT organisation from its previously outsourced structure. Read the issue now. Continue Reading
-
News
20 Dec 2016
Top 10 cyber crime stories of 2016
Here are Computer Weekly’s top 10 cyber crime stories of 2016: Continue Reading
-
News
15 Dec 2016
Typo allowed Russian hackers to access US Democratic Party emails
Typographical mistake in an email warning of a phishing attack on the US Democrats led to thousands of private emails being accessed and published by Russian-backed hackers Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
E-Zine
15 Dec 2016
European law enforcement seeking smart ways to fight cyber crime
Cyber criminals are always likely to be better resourced than law enforcement. Now, national and regional police forces in Europe are switching tactics to even the odds. Under-resourced law enforcement needs a smarter approach as cyber crime becomes increasingly prevalent and sophisticated, backed by the money and expertise of organised crime groups set up and run as well-resourced and efficient professional business organisations. Cyber crime operations typically have teams dedicated to looking at open source intelligence, targets’ physical environments, weaknesses in supply chains, and potential collaborators inside target organisations to enable sophisticated, blended attacks that involve a combination of actions against a range of vulnerabilities, making them difficult to detect and defend against. Continue Reading
-
News
08 Dec 2016
PowerShell security threats greater than ever, researchers warn
Administrators should upgrade to the latest version of Microsoft PowerShell and enable extended logging and monitoring capabilities in the light of a surge in related security threats, warn researchers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
08 Dec 2016
More than 2,000 TalkTalk routers hijacked by Mirai botnet variant
Security researchers are urging ISPs to issue emergency patches for Marai botnet infections after 2,374 TalkTalk routers were linked in a regional botnet Continue Reading
By- Warwick Ashford, Senior analyst
-
News
07 Dec 2016
UKtech50 interview: ARM Holdings CEO Simon Segars
The UKtech50 most influential person in UK IT 2016, ARM Holdings CEO Simon Segars, shares his thoughts on the consequences of Brexit, access to skills and the importance of security in a world full of connected devices Continue Reading
By -
Opinion
07 Dec 2016
Security Think Tank: Communication is key to cyber security in digital era
How can information security professionals help organisations to understand the cyber risks across increasingly digital businesses? Continue Reading
By- Ramses Gallego
-
News
07 Dec 2016
40 firms to trial IBM Watson cognitive computing for cyber security
Forty companies sign up to apply IBM’s Watson cognitive computing systems to cyber security, but threat intelligence experts caution against total reliance on such systems Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Dec 2016
UK falls below global cyber security confidence
Global confidence in ability to accurately assess cyber risk has fallen in the past year, but the UK has fallen below the global average Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Dec 2016
Top 10 ANZ enterprise IT stories of 2016
Here is a rundown of Computer Weekly’s most popular ANZ enterprise IT articles for 2016 Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
02 Dec 2016
Academics link payment card vulnerability to Tesco Bank cyber heist
UK academics uncover a vulnerability in online payment systems, which they say could have been used in the Tesco Bank cyber heist Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 Dec 2016
US and UK government expand surveillance powers
The US has introduced wide new hacking powers for federal agents a day after the UK's Investigatory Powers Act firmed up bulk surveillance powers for intelligence and polices services Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 Dec 2016
Mozilla and Tor issue patches for Firefox flaw exposing Tor users
Users of Tor anonymous browsing urged to update to the latest versions of relevant software to block an exploit that collects IP and MAC addresses to identify users Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Nov 2016
Mastercard uses artificial intelligence for transaction approval
Mastercard is using artificial intelligence to reduce the number of transactions that are wrongly declined, while maintaining security Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Feature
30 Nov 2016
Disaster recovery testing: A vital part of the DR plan
Disaster recovery provision is worthless unless you test out your plans. In this two-part series, Computer Weekly looks at disaster recovery testing in virtualised datacentres Continue Reading
By -
News
28 Nov 2016
IBM blamed for Australian census website crash
Computer giant reportedly pays $30m to Australian government as reports are released from two inquiries into DDoS attacks on census website Continue Reading
-
News
25 Nov 2016
One in four Wi-Fi hotspots vulnerable to attack, study finds
At least one in four Wi-Fi hotspots are open to attack, a study by Kaspersky Lab reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Nov 2016
Consumer identity key to digital transformation
Customer identity and access management has benefits for consumers and service providers alike, but is key to digital transformation, says KuppingerCole Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Nov 2016
Alleged hacker Lauri Love’s ‘life will be destroyed’ under Trump regime
Supporters fear for activist Lauri Love if his extradition to face hacking charges to the US goes ahead Continue Reading
By- Fiona O'Cleirigh and Bill Goodwin
-
News
18 Nov 2016
Three breach highlights several security issues, says (ISC)2
Customer data breaches continue to demonstrate that companies are still not treating cyber risk like every other business risk, says Adrian Davis of (ISC)2 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Nov 2016
Hackers arrested in Three mobile upgrade scam
Three men arrested in connection with mobile handset upgrade fraud enabled by unauthorised access to customer data Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 Nov 2016
Digital transformation not a finite process, says Martin Kuppinger
Security, privacy and identity are key to digital transformation, which is an evolutionary process, according to Martin Kuppinger Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 Nov 2016
Government data security confusing, finds PAC
A Public Accounts Committee hearing shows the government’s data and cyber security landscape is chaotic and confusing Continue Reading
By -
News
15 Nov 2016
Online identity needs to be fixed, says Microsoft’s Kim Cameron
Software giant’s identity architect calls on enterprises to professionalise the way they relate to customers to help replace online identity infrastructure that is not fit for purpose Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
15 Nov 2016
Counting the cost of financial cyber crime
In this week’s Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer’s guide, on server operating systems, looks at the new features in Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping motivate staff. Read the issue now. Continue Reading
-
News
15 Nov 2016
Amber Rudd orders Lauri Love extradition to US to face hacking charges
Engineering student Lauri Love faces trials in three US states and a possible 99-year jail sentence for allegedly hacking into US government computer systems as part of a political protest, despite concerns over his health Continue Reading
-
News
14 Nov 2016
412 million user accounts exposed in FriendFinder Networks hack
Another huge data breach has exposed poor security of user details and continued poor user password practices Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Nov 2016
GDS aiming for 25 million users of Gov.uk Verify by 2020
Early draft of new GDS strategy reveals an ambitious target for its identity assurance service Continue Reading
By- Bryan Glick, Editor in chief
-
News
11 Nov 2016
Russian banks hit by IoT-enabled DDoS attacks
DDoS attacks on Russian banks have been linked to IoT botnets, further confirming this worrying trend and highlighting the need for IoT suppliers to improve security capabilties Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Nov 2016
24 cyber criminals arrested in Europol operation
Romanian police arrest 24 members of a card skimming and cloning operation and identify 47 other suspects Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
08 Nov 2016
The march of the robot workers
In this week’s Computer Weekly, we look at how artificial intelligence is being used to automate existing jobs, including roles as varied as IT administrators and customer service agents. Capital One’s European CIO talks about how to create an agile business. And we offer tips on how to deal with an Oracle software audit. Read the issue now. Continue Reading
-
E-Zine
03 Nov 2016
CW ASEAN: SMEs present security weakness
In this month's CW ASEAN, we look at how the cyber security defences at small and medium-sized enterprises in Southeast Asia may have some vulnerabilities, resulting in cyber security attacks on the large corporations they work with. We also consider the need to educate users of smartphones and tablets across the region as card fraud rates rise, with high use of mobile devices considered a contributing factor. Read the issue now. Continue Reading
-
E-Zine
03 Nov 2016
CW ANZ: Using gamification to build cyber security skills
In this month's CW ANZ, we look at how PwC is using an online game to give its customers first-hand experience of what it means to face a cyber attack. We also look at how identity is gaining greater prominence in the security debate in Australia as the DTO takes the wraps off plans for a national identity system. Read the issue now. Continue Reading
-
News
02 Nov 2016
Pure-play cyber security has real value, says incoming McAfee head
Intel Security has outlined its strategy to protect the new digital economy as it gears up for innovation as a new independent pure-play security firm under the McAfee banner Continue Reading
By- Warwick Ashford, Senior analyst