IT security
-
News
25 Oct 2024
Dutch critical infrastructure at risk despite high leadership confidence
Stark paradox in Dutch cyber security landscape has business leaders expressing high confidence in their IT infrastructure as cyber attacks rise Continue Reading
-
News
11 Jul 2024
Dutch research firm TNO pictures the SOC of the future
In only a few years, security operations centres will have a different design and layout, and far fewer will remain Continue Reading
-
News
02 Oct 2015
David Jones online customers hit by data breach
Hackers have accessed the personal details of an unknown number of David Jones online customers, but the retailer says payment details and passwords are not affected Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
01 Oct 2015
How technology is helping deliver aid to Syrian refugees in the Middle East
The Syrian refugee crisis has engulfed the Middle East, but technology is proving to be an essential tool to help aid organisations support displaced people Continue Reading
By -
News
30 Sep 2015
Medical devices must be secure by design, say industry experts
The information security industry is calling for medical device manufacturers to design and build cyber security into all internet-enabled devices after thousands are found to be hackable Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Sep 2015
120-day patching gap puts many firms at risk of cyber attack, study shows
The probability of a vulnerability being exploited hits 90% between 40-60 days after discovery, but many firms are taking up to 60 days beyond that to patch, while others are failing to patch at all, a study shows Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
28 Sep 2015
Keeping app pirates at bay
In this week's Computer Weekly, we look at how digital piracy is affecting app developers – and what they can do about it. The man behind the controversial NHS Care.data project has quit – what will it mean for the troubled programme? And we find out how digital disruption is affecting the insurance market. Read the issue now. Continue Reading
-
Feature
25 Sep 2015
How to fully test IT networks for vulnerabilities
Making sure a company network is secure is a very important task, and one that should be scheduled regularly Continue Reading
By -
News
22 Sep 2015
Is Microsoft Office 2016 reliable enough for business?
A day after a major Skype outage, Microsoft unveils Office 2016, which, ironically, offers tight integration with Skype Continue Reading
By- Cliff Saran, Managing Editor
-
E-Zine
21 Sep 2015
How cloud technology helps kittens
In this week's Computer Weekly, we talk to the CIO at the UK's leading animal charity, the RSPCA, about how her cloud-first strategy is helping animal welfare. Microsoft is ending support for older version of Internet Explorer – we assess the implications. And we ask the experts about the best practice in mobile security. Read the issue now. Continue Reading
-
News
21 Sep 2015
Department for Culture, Media and Sport takes over responsibility for data protection policy
Government transfers responsibility for data protection policy and ICO oversight from Ministry of Justice (MOJ) to Department for Culture, Media and Sport (DCMS) Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Sep 2015
Health chief 'should be held to account' for whistleblow errors
Former nurse and clincial commissioner Bernie Rochford claims unfair dismissal after blowing the whistle on IT problems which put patient care at risk Continue Reading
By- Julia Gregory and Bill Goodwin
-
News
18 Sep 2015
Public-private co-operation in the Nordics tackles growing cyber crime threat
Nordic governments and businesses are putting cyber security at the centre of their planning as threats increase Continue Reading
By -
News
16 Sep 2015
BT launches ethical hacking service for bankers
BT introduces a certified Crest Star ethical hacking test service for financial services customers Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Sep 2015
Most DDoS attacks hiding something more sinister, Neustar warns
Smaller DDoS attacks can be more dangerous than a powerful attack that knocks a company offline but does not install malware or steal data, warns Neustar Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 Sep 2015
NHS trust denies bullying and intimidation of IT whistleblower
Managers were already aware of whistleblower's concerns about the accuracy of NHS Southwark's data, tribunal hears Continue Reading
By- Bill Goodwin and Julia Gregory
-
News
14 Sep 2015
RSA Group flags ID theft risk to Lloyds Bank customers following datacentre storage theft
International insurance group has seen 500 customers take up offer of identity theft protection in wake of datacentre theft Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
11 Sep 2015
Security industry welcomes GCHQ password guidelines
GCHQ's guidance on password policy covers some of the most pressing issues facing UK businesses and employees today, according to Skyhigh Networks Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Sep 2015
DD4BC cyber extortion gang adds social media to arsenal
Cyber extortion gang DD4BC is using social media campaigns to garner more attention for its ability to create service disruptions by publicly embarrassing large organisations Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
11 Sep 2015
CW Europe – September 2015 edition
Find out the winners of the Computer Weekly European User Awards 2015. The awards aim to shine a light on businesses across Europe that have excelled in their approach to using technology. You can find a full list of winners in this issue and we have highlighted a few through in-depth case studies. Continue Reading
-
News
10 Sep 2015
Researchers discover Android PIN locker ransomware
Researchers say LockerPIN is a self-defending, aggressive piece of ransomware currently targeting Android devices, mainly in the US Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Sep 2015
US health insurer Excellus BlueCross BlueShield hit by data breach
Forensic investigation reveals a data breach at US health insurer Excellus BlueCross BlueShield exposing up to 11 million records 21 months after the first intrusion Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Sep 2015
Cloudian boosts object storage HyperStore compliance features
Distributed object storage software maker Cloudian upgrades HyperStore with added granularity of data protection features that can help meet compliance requirements Continue Reading
By- Antony Adshead, Storage Editor
-
News
09 Sep 2015
Security pros failing to address digital certificate risks, survey shows
Even though 90% of security professionals believe a leading CA will be compromised in next two years, only 13% have existing automation to deal with that happening Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Sep 2015
Conventional security measures hit productivity, study shows
Most IT professionals say context-aware security would improve productivity without compromising security, a survey from Dell reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Sep 2015
Security vulnerability management more than patching, warns Secunia
Keeping track of what makes an IT environment vulnerable is an ongoing and complex task, according to Secunia Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Sep 2015
US State Department plans cyber security playbook
The US State Department issues a request for information to determine the capabilities of commercial industry to provide and maintain a cyber security playbook Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 Sep 2015
DDoS attack on NCA highlights need to be prepared, says Barracuda Networks
A Lizard Squad DDoS attack the NCA says is a fact of life highlights the need for organisations to be prepared, according to Barracuda Networks Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 Sep 2015
Use 2FA to mitigate KeyRaider iOS malware, says Rapid7
KeyRaider iOS malware targeting iPhone users in China and 17 other countries including the UK has raised enterprise security concerns Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 Aug 2015
Police arrest six UK teenagers for using DDoS cyber attack tool
Police arrest six UK teenagers on suspicion of using a DDoS attack tool targeting a national newspaper, a school and online gaming companies and retailers Continue Reading
-
News
27 Aug 2015
Rapid7 calls on router makers to eliminate backdoors
Until manufacturers stop using default passwords, we will continue to see opportunistic attacks on home and small business routers, says Rapid7's Tod Beardsley Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Aug 2015
Many firms not getting to grips with third-party data security risk
Supply chain data security risk is pervasive, but being unable to deal with it is down to basic failings, says a cyber risk expert Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Aug 2015
Sans Institute identifies top UK cyber talent
The cream of UK cyber security talent selected from 24,000 candidates are set to begin eight weeks of intensive training in the first-ever intake at the Sans UK Cyber Academy Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
25 Aug 2015
Life’s a breach: How to handle the press after a hacking attack
Emily Dent, specialist in crisis PR, offers some advice to organisations that unexpectedly find themselves in the headlines Continue Reading
By- Emily Dent
-
E-Zine
25 Aug 2015
Computer Weekly – 25 August 2015: Coping with a crisis
In this week’s Computer Weekly, IT leaders discuss their experiences of dealing with disaster and the importance of planning to ensure business continuity. Jaeger’s CIO talks about bring the iconic fashion brand into the digital age. And we look at the issues around writing supplier contracts for agile software development. Read the issue now. Continue Reading
-
News
24 Aug 2015
Spotify to update privacy policy after user protest
Some Spotify users are unhappy about new privacy policies that allow access to users’ photos, video, mobile device location, voice controls and contacts Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Aug 2015
ICO orders Google to remove links to right to be forgotten takedowns
The Information Commissioner's Office (ICO) says Google must remove newer links that reveal the same details as previously removed links Continue Reading
-
News
20 Aug 2015
Broadband Stakeholder Group to review UK net neutrality policy
The Broadband Stakeholder Group commissions an independent review into the UK’s industry-led approach to net neutrality and the open internet Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Aug 2015
Mumsnet suffers multi-vector cyber attack
Mumsnet has been hit by a DDoS attack, its admin hacked and data stolen, and then a hoax call sent armed police to the home of the organisation's co-founder, Justine Roberts Continue Reading
-
News
20 Aug 2015
Premiership Rugby scores security and efficiency with Intralinks
By setting access controls, Premiership Rugby can ensure that its partners get quick access only to role-appropriate content Continue Reading
By- Warwick Ashford, Senior analyst
-
News
17 Aug 2015
AT&T a key NSA partner in internet spying Snowden docs show
The NSA considered its relationship with AT&T to be unique and especially productive, leaked documents show Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 Aug 2015
Mobile phone users at risk as hackers bug and track victims
An investigation by Australian TV show 60 Minutes demonstrates how hackers based thousands of miles away in Germany were able to record the calls of an Australian senator and track his movements Continue Reading
By- Ross Coulthart, 60 Minutes Australia
-
News
11 Aug 2015
FBI uncovers cyber insider trading gang
Nine suspects are expected to be charged in the US with insider trading based on corporate press releases stolen by hackers before they had been made public Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Aug 2015
BlackHat 2015: Industrial hacking - the untold story
Hackers have been penetrating industrial control systems for at least a decade for extortion, yet little is known about how they gain access Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Aug 2015
Carphone Warehouse data breach hits 2.4 million UK customers
Carphone Warehouse confirms the authorities have been notified about the breach, and urges customers to take steps to protect themselves Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
E-Zine
05 Aug 2015
CW Europe – August 2015
Data is a valuable thing nowadays, and more businesses are collecting it for exactly that reason. However, with the collection of data also comes concern for consumers and governments over where the data is stored and what companies will do with it. This issue of CW Europe investigates the different cultural attitudes towards data management ethics. Continue Reading
-
E-Zine
04 Aug 2015
Cyber risks hit the road
In this week's Computer Weekly, after hackers took remote control of a Jeep Cherokee, we assess the security concerns for internet-connected cars. With the growth of digital banking, is there a need for high-street branches anymore? And we examine whether email overload is hindering the UK's economic productivity. Read the issue now. Continue Reading
-
News
03 Aug 2015
Why the time is ripe for security behaviour analytics
Recent months have seen an uptick in announcements by security suppliers around behavioural analytics, but what is driving this trend? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
31 Jul 2015
Commercial software more secure than open source, finds report
A study has found that commercial code is more compliant than open source code with security compliance standards, such as the Owasp top 10 and the CWE top 25 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Jul 2015
A third of employees will sell company data if the price is right, study reveals
For £5,000, a quarter of employees polled said they would sell confidential company data, and risk both their job and criminal convictions Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Jul 2015
Technology experts warn of dangers of artificial intelligence arms race
An open letter signed by more than 12,000 technology experts calls for a ban on artificial intelligence (AI) to manage weapons “beyond meaningful human control” Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
27 Jul 2015
SaaS criteria to track for business outcomes
Organisations should evolve their SaaS selection criteria to focus on newer metrics that are better indicators of supplier performance Continue Reading
By- Liz Herbert
-
News
24 Jul 2015
Contactless card fraud highlights need for 2FA
A Which? report on contactless card fraud highlights the need for multi-factor authentication for payments, say security experts Continue Reading
By- Warwick Ashford, Senior analyst
-
News
24 Jul 2015
GDS targets three million new users of Gov.uk Verify service in next 12 months
Roll-out of the system for logging in to digital public services is taking longer than expected, but user numbers are expected to grow significantly in 2015 Continue Reading
By- Bryan Glick, Editor in chief
-
News
22 Jul 2015
Jeep hack raises questions about responsibility for security
The hack of a Jeep raises the question whether users or car manufacturers should be responsible for protecting against cyber attackers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Jul 2015
Information security governance maturing, says Gartner
Increasing awareness of the impact of digital business risks, coupled with high levels of publicity regarding cyber security incidents, is making IT risk a board-level issue, says Gartner Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Jul 2015
UK considers 10-year jail sentences for online piracy
The UK government is considering new measures to increase the sanctions for criminals who infringe the rights of copyright holders for large-scale financial gain Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Jul 2015
Hackers threaten to expose ALM’s dating and cheating site users
A hacking group, calling itself The Impact Team, claims to have compromised Avid Life Media’s user databases, source code repositories, financial records and email system Continue Reading
By- Warwick Ashford, Senior analyst
-
News
17 Jul 2015
United Airlines begins bug bounty payouts
United Airlines has paid out the maximum award to two hackers, which means the flaws are likely to be remote code execution vulnerabilities Continue Reading
By- Warwick Ashford, Senior analyst
-
News
17 Jul 2015
UK man arrested for hacking into US government computers
Briton Lauri Love is accused of hacking into various US agencies, including the US army, Nasa, the federal reserve and the environmental protection agency Continue Reading
By- Warwick Ashford, Senior analyst
-
News
14 Jul 2015
Anyone still running Windows Server 2003 is now at risk
Businesses still running Windows server 2003 are vulnerable to attack from hackers looking to exploit security holes Continue Reading
By- Cliff Saran, Managing Editor
-
News
14 Jul 2015
Vodafone scheme to help SMEs get online
Vodafone is to trial a series of digital workshops for SMEs aimed at equipping them with a stronger online presence Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Jul 2015
Land Rover praised for recall over software security bug
BT Security head Mark Hughes says Land Rover's recall of vehicles to fix a software security flaw is a sensible step to address evolving criminal threats Continue Reading
By- Warwick Ashford, Senior analyst
-
News
14 Jul 2015
Symantec bets on simplicity, cloud and mobile
Symantec is not trying to be all things to all people, but is instead focusing on threats and protecting information in the mobile and cloud environments Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Jul 2015
UK sales teams are the most exposed to cyber attacks, study reveals
UK sales staff, callcentre agents and customer services teams are among the most highly targeted by cyber attacks, yet few firms give these groups IT security training, a study shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
08 Jul 2015
Symantec uncovers Morpho cyber espionage operation
A cyber espionage group has targeted high-profile technology, internet, commodities and pharmaceutical companies in the US, Europe and Canada, reports Symantec Continue Reading
By- Warwick Ashford, Senior analyst
-
News
08 Jul 2015
MtGox chief Mark Karpeles arrested for fraud
Former chief Mark Karpeles is under arrest on suspicion of $1m fraud and involvement in the disappearance of 650,000 bitcoins Continue Reading
By- Warwick Ashford, Senior analyst
-
News
07 Jul 2015
Dashlane bullish about the future despite LastPass hack
Password management firm Dashlane is confident its business model will evolve and continue to be relevant even if passwords eventually disappear Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
07 Jul 2015
CW Europe – July 2015 Edition
The economy in central and eastern Europe (CEE) is starting to recover, which means investment in IT across the region is also starting to return. This issue of CW Europe investigates how the boost in IT is changing the role of the CIO, from supporting the business to driving its growth. Continue Reading
-
E-Zine
07 Jul 2015
The IT behind Angry Birds
In this week's Computer Weekly, we talk to the CIO of Rovio Entertainment, the company behind the gaming phenomenon Angry Birds, about how he supports a global business with a five-person IT team. We assess your options for moving off Windows Server 2003 now support is ending. And our buyer's guide looks at log management. Read the issue now. Continue Reading
-
News
06 Jul 2015
The internet of things could save the honeybee from extinction
Gemalto’s M2M unit is developing an ambitious project with agricultural science firm Eltopia and the University of Minnesota. The objective: to save the honeybee from extinction Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Jul 2015
Italy’s Hacking Team gets hacked
Unknown hackers have posted a torrent file-sharing link to more than 400GB of Hacking Team data, including source code, internal documents and emails that could reveal the identity of customers Continue Reading
-
News
03 Jul 2015
Wi-Fi enhances guest experience and profitability for Belgian theme park
Bobbejaanland, one of the largest theme parks in Belgium, is using a Fortinet Wi-Fi network to offer visitors access on the go, and improve its management capabilities Continue Reading
By- Xavier Mertens
-
News
02 Jul 2015
How Deutsche Telekom plans to challenge AWS and Google in the cloud
German telco Deutsche Telekom wants to evolve into the public cloud and plans to beat sector giants such as Amazon and Google at their own game Continue Reading
By -
News
02 Jul 2015
Facebook wins first round in European privacy battle
Facebook has welcomed a Vienna court’s rejection of a 25,000-strong class action lawsuit against the social networking firm for allegedly breaching European privacy laws Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 Jul 2015
UK universities revise computer course guidelines to boost ranks of cyber warriors
UK universities revise course guidelines to transform computing degree courses and ensure that undergraduates learn cyber security skills Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Jun 2015
Cisco launches IoT System for enterprise and smart cities
Cisco unveils 15 products to address the growing complexity of internet of things deployments Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
29 Jun 2015
The legacy IT challenge for CIOs
In this week’s Computer Weekly, CIOs in financial services hoping to fight off challenger banks face a huge hindrance from their legacy IT – we assess the difficulties and reveal a diagram that shows the scale of the problem. We look at how to prepare for information security audits and why they are so vital. And we ask if HM Revenue & Customs’ plan for online tax accounts will make tax more taxing for the digitally excluded taxpayer. Read the issue now. Continue Reading
-
News
26 Jun 2015
Computer Weekly European User Awards 2015 winners revealed
The winners have been announced for the Computer Weekly European User Awards 2015. See who made the top spots Continue Reading
By- Kayleigh Bateman, Computer Weekly
-
News
26 Jun 2015
Dutch court orders Facebook to identify revenge porn poster
Facebook has a legal obligation to provide information about a user who posted a revenge porn video on the site, a Dutch court has ruled Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
26 Jun 2015
Three things you may not know that DNS data can tell you
Big data tools can help network administrators gather new insights into security and performance from DNS data Continue Reading
By- Simon McCalla, Nominet
-
Feature
24 Jun 2015
App development companies fight back against digital piracy
How can digital companies protect their IP against a tidal wave of smartphone boosted piracy? Is digital rights management software effective enough, or is it better to adapt your business model? Continue Reading
-
News
24 Jun 2015
IT professionals give Windows 10 Start button the thumbs up
A survey of European and North American IT professionals has found that the return of the Start button is the most enticing feature in Microsoft's latest operating system Continue Reading
By- Cliff Saran, Managing Editor
-
News
23 Jun 2015
Pharmaceutical companies use BPM to cut cost of clinical trial drugs
Pharmaceutical companies have developed an IT system to secure the supply of medicines they need for clinical studies, saving hundreds of thousands on their drugs bill in the process Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
22 Jun 2015
Government Digital Service insists Verify safe despite claims of vulnerabilities
An academic paper suggests the Gov.uk Verify system could be used as a spy network, but the Government Digital Service (GDS) insists this is not the case Continue Reading
By- Clare McDonald, Business Editor
-
News
17 Jun 2015
FBI investigates US baseball team over rival's hacking allegations
FBI investigations, into claims a US baseball team stole data from a rival, highlights cyber crime perpetrated by competitors – not just anonymous criminals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
17 Jun 2015
DD4B cyber extortion gang ramps up operations
Cyber criminals using DDoS attacks to extort funds from victims are carrying out more attacks despite a $26,000 bounty Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Jun 2015
Government preparing to let private sector companies use its Verify identity scheme
The Cabinet Office is talking to banks, insurers and retailers to establish Gov.uk Verify identity assurance as a national scheme Continue Reading
By -
News
11 Jun 2015
Kaspersky Lab praised for handling of Duqu 2.0 cyber attack
Kaspersky Lab determined the best approach to cyber attack was to not only admit that it had been hacked, but also to provide extensive information on the malware Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Jun 2015
International police operation arrests cyber fraud gang
Police in six countries have arrested 49 people suspected of committing financial fraud involving email account intrusions Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
09 Jun 2015
How to cull old, potentially risky data
Unused data is a potential security risk, with old spreadsheets, reports and email containing industry secrets and laced with company gossip. If it's no longer useful, it's time to delete it Continue Reading
By- Christian Cawley
-
E-Zine
08 Jun 2015
The file-sharing face-off: Box or Dropbox
In this week's Computer Weekly, we look at the two most popular tools for cloud-based enterprise file sharing and assess the relative merits of Box and Dropbox. We talk to some of the early pioneers in developing smartwatch apps. And we find out why IT security spending is shifting from prevention to detection and response. Read the issue now. Continue Reading
-
News
03 Jun 2015
VMware puts network virtualisation to work in McAfee environments
VMware announces an integrated system to automate distribution and enforcement of McAfee’s network security platform using its NSX network virtualisation system Continue Reading
By- Alex Scroxton, Security Editor
-
News
02 Jun 2015
The drivers and inhibitors of cyber security evolution
A study shows a shift in IT security spending to detection and response – but why are most organisations falling way behind the more enlightened front runners? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 Jun 2015
Most of more than 733,000 police communications data requests approved
Big Brother Watch is calling for a curb on the scale of police access to communications data and greater transparency in the use of this data Continue Reading
By- Warwick Ashford, Senior analyst
- Guide 30 May 2015
-
News
29 May 2015
Data classification key to IP protection, says Titus
Data classification can help organisations get more value out of encryption and data loss prevention systems Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 May 2015
Computer Weekly European User Awards 2015 shortlist
Find out who made the Computer Weekly European User Awards 2015 shortlist Continue Reading
By- Kayleigh Bateman, Computer Weekly
-
News
29 May 2015
Google announces security features for Android
Google announces better app permission controls and other Android security changes at its Google I/O developer conference Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 May 2015
CIF cloud certification scheme wins European Commission's backing
Cloud Industry Forum's Code of Practice has been added to European list of trusted certification schemes Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
27 May 2015
Social engineering attacks more complex than ever, says expert
Expert warns attackers are starting to use increasingly sophisticated ways to get people in organisations to help them circumvent security controls Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 May 2015
NATS failure down to bug from the 90s and redundant code
A bug present in Nats since 1990s has been identified as the root cause of the five-hour outage of UK air traffic control on 12 December 2014 Continue Reading
By- Cliff Saran, Managing Editor