IT security
-
News
25 Oct 2024
Dutch critical infrastructure at risk despite high leadership confidence
Stark paradox in Dutch cyber security landscape has business leaders expressing high confidence in their IT infrastructure as cyber attacks rise Continue Reading
-
News
11 Jul 2024
Dutch research firm TNO pictures the SOC of the future
In only a few years, security operations centres will have a different design and layout, and far fewer will remain Continue Reading
-
News
04 Oct 2016
DDoS attacks consistent, relentless and costly, report shows
The latest global DDoS report from Neustar underlines the importance of investing in appropriate defences as the high volume of attacks looks set to increase Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Sep 2016
NGOs challenge UK and US mass surveillance in human rights court
Privacy International, Liberty and the American Civil Liberties Union are among 10 human rights groups backing a landmark challenge to mass surveillance in the European Court of Human Rights Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
29 Sep 2016
Trust issues stifling digital economy growth, study shows
Businesses that have products and services based on trust have a significant opportunity to future-proof their business, but those who do not risk being side-lined, a study shows Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
27 Sep 2016
Digital knowledge at the British Library
In this week’s Computer Weekly, we find out about the technology plans at the British Library as it aims to store the UK’s printed and digital history. Graph database technology is being used to help improve food safety throughout the supply chain – we examine how it works. And tech leaders tell us how to architect IT infrastructure for moving to the cloud. Read the issue now. Continue Reading
-
News
22 Sep 2016
Cyber attack aimed at destruction, says TV5Monde
TV5Monde counting the cost of not being adequately prepared for a cyber attacked that downed the network in 2015 Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
22 Sep 2016
Computer Weekly 50th anniversary special
It’s been 50 years since Computer Weekly's launch on 22 September 1966. To mark this achievement, we have compiled a special edition of the magazine to reflect on how much the British technology industry has contributed over that time – and, of course, to celebrate our role in keeping IT professionals in touch with those developments – week-in, week-out, for half a century. Read this 100-page anniversary special now. Continue Reading
-
News
20 Sep 2016
Business warned not to be complacent about cyber security
Lloyds of London survey reveals just how badly some European firms are failing in terms of cyber security and low levels of awareness about the role of cyber insurance Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
20 Sep 2016
Digital giving – transforming Save the Children with technology
In this week’s Computer Weekly, we talk to global charity Save the Children to find out how digital technology is helping to transform its work in improving children’s lives. We go behind the scenes at the UK’s most secretive court as it discusses bulk data surveillance of citizens by the UK intelligence services. And we analyse the often contradictory experiences of firms implementing SAP’s Hana in-memory database platform. Read the issue now. Continue Reading
-
News
19 Sep 2016
Consumers trust banks more than government for biometric security
UK citizens think banks are the best organisations to provide biometric authentication for payments Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
16 Sep 2016
Alleged hacker Lauri Love can be extradited to the US, court rules
Westminster Magistrates’ Court has ruled that alleged hacker, Lauri Love, can be extradited to the US, where he could face a 99-year prison sentence Continue Reading
-
Feature
16 Sep 2016
Lauri Love: the student accused of hacking the US
How did a brilliant but fragile computer science student from a rural English town end up facing life imprisonment in the US? Computer Weekly speaks to Lauri Love Continue Reading
By- Bill Goodwin and Niels Ladefoged
-
Video
16 Sep 2016
Lauri Love - my battle with extradition
A court ruled today that Lauri Love, a 31-year old electrical engineering student, from Suffolk, can be extradited to the US to face hacking charges. Continue Reading
By- Bill Goodwin, Computer Weekly
-
E-Zine
13 Sep 2016
Dell Technologies aims for an intelligent, connected future
In this week’s Computer Weekly, as Dell and EMC complete the largest IT supplier merger in history, we look at the new $74bn company’s strategy and what it means for IT leaders. Our latest buyer’s guide examines a key aspect of cloud – cloud bursting, used for dynamic capacity management. And we assess the latest views on the UK government’s plans for internet surveillance legislation. Read the issue now. Continue Reading
-
News
12 Sep 2016
MaidSafe secure internet concept enters testing phase
Scottish internet startup MaidSafe brings its vision for a more private and secure approach to the web a step closer to reality Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Sep 2016
NSA used Iraq war to develop surveillance capability, documents show
As the controversial Investigatory Powers Bill inches closer to becoming law, NSA documents reveal that the agency used the Iraq war to develop and expand its surveillance infrastructure Continue Reading
By- Warwick Ashford, Senior analyst
-
News
07 Sep 2016
Basic security could have prevented OPM breach, says report
Basic security controls and malware-detection tools could have prevented the breach of more than 21 million records at the US Office of Personnel Management in 2015, claims a congressional report Continue Reading
By- Warwick Ashford, Senior analyst
-
News
07 Sep 2016
MoD becomes first tenant in Microsoft's UK Azure datacentre
Microsoft’s UK Azure cloud is now fully operational, offering Azure cloud services and Office 365 Continue Reading
By- Cliff Saran, Managing Editor
-
News
06 Sep 2016
Use ransomware to get security buy-in, says Trend Micro CTO
Ransomware is one of the top cyber threats to business, but organisations should use that to engage stakeholders and review processes and defences, says Trend Micro CTO Raimund Genes Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Sep 2016
Mobile device use feeds card fraud in Asean region
Card fraud is rising in Asean countries, with the high use of mobile devices a contributing factor. Continue Reading
By -
News
01 Sep 2016
Lessons from the Dropbox breach
Dropbox is the latest major company to confirm a data breach, albeit four years old, but – as with all recent data breaches by cloud-based services – it highlights some key security lessons Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
31 Aug 2016
Blockchain and the promise of cooperative cloud storage
Blockchain technology allows distributed retention of encrypted data and is at the heart of cooperative cloud storage Continue Reading
By- Bryan Betts, Freeform Dynamics
-
News
31 Aug 2016
Evidence of DNS tunnelling in two-fifths of business networks
Cyber criminals are capitalising on the failure of many businesses to examine their DNS traffic for malware insertion and data exfiltration, according to Infoblox Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Aug 2016
Westpac bank launches Databank data protection service
Australia's Westpac bank is offering organisations that share customer data a service that it says securely locks down personal information Continue Reading
By- Stuart Kennedy
-
News
30 Aug 2016
Encryption hiding malware in half of cyber attacks
Cyber attackers are using encryption to hide malicious activity, making it increasingly difficult to find as more organisations turn to encryption to protect data, a study has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
30 Aug 2016
Get protected: The importance of security
It is not uncommon for computer systems to be compromised by a company’s own employees. In this week’s issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls. Our CIO interview is TalkTalk’s CTO, Gary Steen, and we have a report from the Intel Developer Forum on the chipmaker’s future plans. Continue Reading
-
News
26 Aug 2016
Law firms planning litigation market for GDPR
Businesses should be preparing for the storm of litigation that is likely to be unleashed when the GDPR goes into force, warns Stewart Room of PwC Legal Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Aug 2016
French submarine maker data breach highlights challenges of IP security
French naval contractor data breach proves that protecting intellectual property is challenging, say security experts Continue Reading
By- Warwick Ashford, Senior analyst
-
News
24 Aug 2016
UK second only to US in DDoS attacks
Distributed denial of service attacks on UK organisations have eased from a peak in the fourth quarter of 2015, but the UK remains the world’s second most targeted country Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Aug 2016
Expect ransomware arrests soon, says bitcoin tracking firm Chainalysis
Law enforcement organisations are set to ramp up arrests of cyber criminals behind ransomware attacks, according to financial technology startup Chainalysis Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Aug 2016
Police arrest woman in connection with Sage data breach
A woman has been arrested on suspicion of fraud in connection with a data breach at accounting software firm Sage Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
18 Aug 2016
CW Benelux: Painting by numbers
In this issue of CW Benelux, we describe how data scientists in the Netherlands have applied technology to art. The Dutch are renowned for being creative with technology and the country has a deep history in art, boasting some of the most celebrated painters. It is therefore apt that the combined tech brains of ING, Microsoft, the Technical University of Delft and other contributors have created The Next Rembrandt, which serves as a visual showcase for big data. The new portrait in the style of Rembrandt van Rijn was put together by a combination of big data technology and 3D printing. All of Rembrandt’s 346 paintings were analysed using data analytics, making it possible to create a seemingly genuine Rembrandt image, while a 3D printer made accurate emulation of his paint patterns and textures a reality. Also in the Netherlands, we feature a case study about how The Hague is solving a bike parking headache with a mobile app. Continue Reading
-
News
16 Aug 2016
Cerber ransomware service reaps $195,000 profit in a month
Franchises such as Cerber are making highly profitable ransomware available to a broader range of cyber criminals, according to a report by security firm Check Point Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 Aug 2016
Financial sector faces era of cyber mega heists
Banks and other financial institutions are threatened by a new breed of elite cyber criminals running professional operations that will use any means to achieve their goals, says Barclays security chief Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 Aug 2016
Sage data breach underlines insider threat
Organisations need to take insider threats more seriously say security experts, as Sage warns that a data breach using an internal log-in may have compromised employee data at nearly 300 UK firms Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
10 Aug 2016
CW Nordics: Dealing with digital disruption
The Nordic countries are renowned for being home to thriving tech startup scenes, so it is hardly surprising that IT is a disruptive force in the region. In this quarter’s CW Nordics ezine we look more closely at how the Nordic region is being affected by technology disruption across industry sectors and how organisations are reacting to it. Continue Reading
-
News
10 Aug 2016
MI5 staff repeatedly overrode data surveillance rules
Security service MI5 is responsible for 210 “clear contraventions” over five years for the way it accessed private internet and telephone data Continue Reading
By -
News
09 Aug 2016
PwC Australia uses gamification to teach cyber security lessons
With the number of cyber incidents identified by Australian organisations more than doubling in the past year, PwC is using an online game to give enterprises first-hand experience of what it means to face a cyber attack Continue Reading
-
News
08 Aug 2016
IT failure grounds Delta flights worldwide
US airline Delta has temporarily grounded flights worldwide after a power failure took key IT systems offline in its home base of Atlanta, Georgia Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Aug 2016
Strider cyber attack group deploying malware for espionage
Symantec security researchers have uncovered a spying campaign by a previously unknown group using modular malware as stealthware Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Aug 2016
Banner Health cyber breach underlines need for faster intrusion detection
A data breach at Banner Health has highlighted the importance of intrusion detection and prompted calls for greater cyber security investment in the increasingly targeted healthcare industry Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Aug 2016
Artificial intelligence takes centre stage in cyber security
Artificial intelligence-led cyber security technology has been in the spotlight at two major industry conferences in Las Vegas, signalling a firm trend in cyber defence research Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Aug 2016
Italian-based Android RAT spies on mobiles in Japan and China, say researchers
Researchers discover an Italian-based Android RAT designed for spying that is targeting mobile devices using their unique identification codes Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Aug 2016
One in five businesses hit by ransomware are forced to close, study shows
More than half of UK companies have been hit by ransomware in the past year, a study on the impacts of this popular attack method has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
02 Aug 2016
Giving fashion a digital makeover
In this week’s Computer Weekly, we find out how one of the UK’s biggest mail order retailers – N Brown, owner of JD Williams and Simply Be – is moving to digital. We examine the growing importance of network function virtualisation and what it means for CIOs. And a year after Microsoft turned Lync into Skype for Business, we assess how the unified communications product is faring. Read the issue now. Continue Reading
-
News
01 Aug 2016
Barclays to use voice recognition for phone banking
Retail bank says technology will provide secure verification by recognising the unique characteristics of each person’s voice Continue Reading
By- Clare McDonald, Business Editor
-
Opinion
28 Jul 2016
Consumer identity management is the core of real CRM
IAM + CRM is much more than simply IAM for external users, says Ivan Niccolai Continue Reading
By- Ivan Niccolai
-
Opinion
28 Jul 2016
Six essential processes for keeping data secure
Data security is increasingly vital for organisations as the countdown begins for compliance with new rules imposed by the EU’s general data protection regulation Continue Reading
By- Christine Andrews
-
News
28 Jul 2016
UK’s top security judges struggle to assess privacy threats
Technological advancements make it difficult for the Investigatory Powers Tribunal to assess privacy threats, say the tribunal’s own judges Continue Reading
-
News
27 Jul 2016
UK education system failing to support cyber security profession
Countries and companies must act quickly to address the cyber security skills shortage through improvements in education, workforce diversity, training opportunities, security technology and data collection, a report says Continue Reading
-
News
26 Jul 2016
Date set for landmark hearing into EU-US data transfers
Irish court hearing triggered by Austrian law student Max Schrems could have huge implications for EU-US trade and the data privacy rights of millions of EU citizens Continue Reading
By- Computer Weekly Reporters
-
News
26 Jul 2016
Government tests use of social media accounts for verifying online user identity
Online public service users may be asked to allow access to their Facebook, LinkedIn or Twitter accounts to help prove they are who they say they are Continue Reading
By- Bryan Glick, Editor in chief
-
News
21 Jul 2016
Security industry welcomes cyber crime’s inclusion in official stats
The security industry welcomes the inclusion of cyber crime statistic in official crime reports to highlight the size and nature of the threat Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Jul 2016
Mobile payments get Isaca’s security approval
Mobile contactless payments enable three key security controls that make them more secure than physical and e-commerce payments, according to a report by Isaca Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Jul 2016
Carbon Black bets on next-generation antivirus
Carbon Black is betting on next-generation antivirus technology by acquiring Confer to extend the capability and appeal of its endpoint protection offerings Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Jul 2016
Case study: Rémy Cointreau boosts security and productivity
Drinks firm Rémy Cointreau uses Centrify’s identity and mobile management to simplify security, improve business agility and reduce IT costs Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Jul 2016
French public sector’s never-ending struggle with the cloud
The French government has more hurdles to overcome than many of its European neighbours when it comes to adopting cloud computing services Continue Reading
By- Pat Brans, Pat Brans Associates/Grenoble Ecole de Management
-
News
14 Jul 2016
Cyber attacks cost UK business more than £34bn a year, study shows
Nearly half of UK firms lack advanced cyber defences, despite the high level of concern about cyber attacks and associated costs Continue Reading
By- Warwick Ashford, Senior analyst
-
News
14 Jul 2016
CIO Interview: Elly Resende, CIO, Rio 2016 Olympics
As Rio de Janeiro gets ready to host the Olympics, Computer Weekly speaks to the man in charge of its IT Continue Reading
-
Feature
13 Jul 2016
Cost-effective managed IPS for small businesses
Small businesses typically struggle to afford cyber intrusion prevention systems, but the introduction of a service tailored for this market could change that Continue Reading
-
News
12 Jul 2016
IBM sets up security centre in Canberra
IBM leads the charge as large private businesses invest heavily in security resources across Australia in an attempt to close the security gap Continue Reading
-
News
11 Jul 2016
Datadog calls for password reset after cyber breach
Monitoring and analytics firm detected unauthorised activity associated with production servers and database of user credentials Continue Reading
By- Warwick Ashford, Senior analyst
-
News
08 Jul 2016
Cisco UK and Ireland CEO Phil Smith steps down after 22 years
Phil Smith announces he is stepping down from the day-to-day running of Cisco’s UK and Ireland business to take up the role of chairman Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
07 Jul 2016
CW ASEAN: July 2016
Lessons from the Philippine government hack: In this issue we ask why a hack on the Philippine Commission on the Elections (Comelec) was allowed to happen and what organisations in Southeast Asia can learn from this breach of security. Retailers in the region are concerned – read how the theft of customer data is their biggest worry. Continue Reading
-
E-Zine
07 Jul 2016
CW ANZ: July 2016
Australia knows it has a cyber security problem, but not the scale. In this month’s CW ANZ we describe how Australia's $230m security strategy serves as a wake-up call to enterprises. We also reveal the techniques and technologies being used to protect one Australian school, as well as a more general look at the main cyber threats to orgainsations in Australia. Read the issue now. Continue Reading
-
Feature
07 Jul 2016
The problem of passwords and how to deal with it
Security experts have long recognised passwords as inadequate, but finally technology is offering some viable alternative authentication methods that businesses can explore to keep their data safe Continue Reading
-
News
06 Jul 2016
Business has critical role in fighting cyber crime, says report
The National Crime Agency is calling for a stronger collaboration between business and law enforcement to fight cyber crime in the light of a report produced with private sector partners Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Jul 2016
UK's Darktrace aims to lead the way to automatic cyber security
Darktrace hopes to be a leader in the move to automated cyber security to free up security professionals to focus on business risk and innovation Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
05 Jul 2016
How will UK IT adapt after Brexit?
In this week’s Computer Weekly, as the aftershocks continue from the UK’s decision to leave the European Union, we look at the implications and challenges for the UK technology community. Our latest buyer’s guide examines expense management software. And IT leaders discuss ethics in IT and debate the question – can you trust your technology? Read the issue now. Continue Reading
-
News
30 Jun 2016
LizardStresser IoT botnet launches 400Gbps DDoS attack
Attack groups using the LizardStresser botnet are exploiting IoT devices to mount massive DDoS attacks without using amplification techniques, say researchers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Jun 2016
Lauri Love using illness as a shield against extradition, claims prosecution
Prosecution lawyer questions whether activist Lauri Love is not fit enough to stand trial in the US over hacking charges,as expert witnesses warn that US prisons are ill-equipped for people with mental health problems. Continue Reading
By- Bill Goodwin and Fiona O'Cleirigh
-
News
29 Jun 2016
Most cyber security strategies ignore the way attackers really work
Cyber attackers use more legitimate software than malware, which means most organisations are incapable of detecting much of the malicious activity in their networks, a report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Jun 2016
Lauri Love may be faking mental illness claims lawyer for US
Prosecution lawyer Peter Caldwell questions whether activist Lauri Love is exaggerating mental health problems to avoid extradition to face hacking charges in the US Continue Reading
By- Fiona O’Cleirigh and Bill Goodwin
-
News
28 Jun 2016
Lauri Love suicide risk if extradited to US over hacking allegations
Westminster Magistrates’ Court hears evidence from medical experts that alleged hacker Lauri Love is at risk of suicide if extradited to the US Continue Reading
By- Bill Goodwin and Fiona O'Cleirigh
-
News
21 Jun 2016
Enterprises urged not to view security as a barrier to internet of things adoption
The Lower Colorado River Authority’s chief administrative officer urges enterprises to balance the risks of using the internet of things with the benefits connected devices can bring Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
21 Jun 2016
Cyber security industry mostly welcomes report on TalkTalk breach
Most of the recommendations of a government committee inquiry into the TalkTalk breach have been welcomed, but pundits have expressed reservations about some, particularly proposed new fines Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Jun 2016
Lower average cost of Australian data breaches is not a sign of comfort
The average cost of a data breach to Australian organisations dropped in 2015, according to research Continue Reading
-
News
17 Jun 2016
How MI5 and MI6 gather your personal data for surveillance
Publicly released documents shed light on the many databases and sources used by the intelligence services to gather bulk personal data about UK citizens Continue Reading
By -
News
14 Jun 2016
Shadow data and the risks posed by cloud storage and apps
Cloud storage and apps can open up an organisation to risks of data leakage. Computer Weekly looks at key areas of vulnerability and what you can do to prevent your data going viral Continue Reading
By- Bryan Betts, Freeform Dynamics
-
E-Zine
14 Jun 2016
The password’s the problem – lessons from the LinkedIn breach
In this week’s Computer Weekly, after millions of LinkedIn users had their data compromised, we look at the lessons to be learned from this latest data breach incident. Our buyer’s guide looks at NoSQL technologies and compares the offerings from database leaders Microsoft and Oracle. And we examine the benefits of cloud-based data analytics and how to make it work for your organisation. Read the issue now. Continue Reading
-
News
13 Jun 2016
Singapore banks adopt voice biometrics for user authentication
Banks in Singapore are rolling out biometric technology to improve customer services by speeding up the authentication process Continue Reading
By -
News
13 Jun 2016
EU firms slow in detecting cyber attacks, study shows
European firms take an average of 469 days to discover a compromise, compared with an average of 146 days globally, according to Mandiant Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Jun 2016
Philippines government data breach is a warning to Asean region
Security is a rising concern in the Asean region, with fears fuelled by incidents such as the recent hacking incident in Manila Continue Reading
By -
News
10 Jun 2016
IoT security: Lack of expertise will hurt, says Bruce Schneier
Government action at national and international levels is essential for addressing IoT security issues, but the relevant expertise is lacking, according to security expert Bruce Schneier Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Jun 2016
Small businesses bearing the brunt of cyber crime, says FSB
The Federation of Small Businesses is calling for more government support for its members in defending against cyber threats Continue Reading
By- Warwick Ashford, Senior analyst
-
News
07 Jun 2016
Internet traffic to triple by 2020, says Cisco
The latest edition of Cisco’s Visual Networking Index predicts a near tripling of internet traffic during the coming years as more than a billion people come online Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Jun 2016
Millions of sensitive IT services exposed to the internet, study finds
Encryption should become the default as study reveals millions of sensitive services are exposed to the internet, says Rapid7 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Jun 2016
How emails sent to and from Parliament are monitored
Government officials deny that emails sent by MPs are open to surveillance by GCHQ and NSA - we examine the evidence Continue Reading
By- Duncan Campbell and Bill Goodwin
-
News
01 Jun 2016
Human error causes more data loss than malicious attacks
Stupid humans, you are the weakest link, at least according to the ICO Continue Reading
By- Cliff Saran, Managing Editor
-
News
01 Jun 2016
MPs’ private emails are routinely accessed by GCHQ
Computer Weekly investigation reveals the extent of interception of MPs’ and peers’ email communications and data Continue Reading
By- Duncan Campbell and Bill Goodwin
-
Feature
01 Jun 2016
My first IoT project: A guide for businesses
We’ve all had a good giggle about having our fridges hacked – but now it’s time to get real. What are the first steps enterprises should take when implementing their first internet of things project? Continue Reading
By -
News
26 May 2016
BSA warns of malware risk from unlicensed software
While piracy rates are declining, unauthorised software poses a big security risk, says the Business Software Alliance Continue Reading
By- Cliff Saran, Managing Editor
-
News
26 May 2016
UK government details plans for National Cyber Security Centre
The objectives of the UK’s National Cyber Security Centre are to address systemic vulnerabilities, reduce risks, respond to serious incidents and nurture national cyber security capability Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 May 2016
A new wave of cyber attacks targets the Middle East’s banks
Hot on the heels of the Qatar National Bank breach comes a campaign employing advanced social engineering techniques Continue Reading
By- Tom Paye
-
News
24 May 2016
Network Collapse: Why the internet is flirting with disaster
It’s surprising the internet works at all, given the age of its core software. The question is, can we catch it before it falls over? Continue Reading
By- Cliff Saran, Managing Editor
-
News
24 May 2016
UK government announces CyberFirst bursary scheme
GCHQ will partner with other government departments and private industry to offer students a comprehensive package of financial assistance and cyber skills Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 May 2016
NHS data security standards to be designed around technology, people and processes
The Care Quality Commission’s delayed review of NHS data security standards will encourage NHS organisations to have senior information risk owners and Caldicott Guardians at board level Continue Reading
By -
E-Zine
20 May 2016
CW Benelux: May-July 2016
Welcome to the Computer Weekly ezine focused on the Benelux region. This quarterly publication will look at the issues facing CIOs in Belgium, the Netherlands and Luxemburg. Continue Reading
-
News
19 May 2016
Lawmaker Vaizey hails UK role in resolving datacentre sovereignty issues
Digital economy minister talks up government’s work in supporting the growth of the UK’s technology sector Continue Reading
By- Cliff Saran, Managing Editor
-
News
19 May 2016
Gov.uk Verify to go live 24 May 2016
On 24 May 2016, the government’s identity assurance platform will move from beta to “fully live”, after missing its original April go-live target Continue Reading
By -
News
19 May 2016
Lessons from LinkedIn data breach revelations
There are several important lessons to be learned from revelations about LinkedIn's 2012 data breach, say security experts Continue Reading
By- Warwick Ashford, Senior analyst