IT security
-
News
25 Oct 2024
Dutch critical infrastructure at risk despite high leadership confidence
Stark paradox in Dutch cyber security landscape has business leaders expressing high confidence in their IT infrastructure as cyber attacks rise Continue Reading
-
News
11 Jul 2024
Dutch research firm TNO pictures the SOC of the future
In only a few years, security operations centres will have a different design and layout, and far fewer will remain Continue Reading
-
Feature
26 May 2015
How to reduce the risk of social engineering attacks
Implement simple checks to reduce the risk of the main types of social engineering attacks Continue Reading
By- Peter Wood, First Base Technologies LLP
-
News
22 May 2015
Researchers raise privacy concerns about Bluetooth Low Energy devices
Researchers have raised privacy concerns about a growing number of devices using Bluetooth Low Energy technology Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 May 2015
CIO interview: Austerity drives joined-up council IT with Force.com
Peterborough has become a big user of software-as-a-service for council services. We speak to its IT head Continue Reading
By- Cliff Saran, Managing Editor
-
News
20 May 2015
BT Openreach turns to Crimestoppers to catch cable thieves
Openreach extends its partnership with crime-fighting charity Crimestoppers to tackle cable theft Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 May 2015
Google slashes public cloud prices to undercut rivals
Google cuts cost of its public cloud services to pass on hardware savings in line with Moore's Law Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
19 May 2015
St Louis Federal Reserve Bank not target of DNS hack, say experts
The hacking of a domain name server (DNS) for the Federal Reserve Bank of St Louis is more likely to be aimed at customers than the bank itself, say security experts Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 May 2015
Wi-Fi Global Congress: Hotspot 2.0 standard addresses wireless security holes
At Wi-Fi Global Congress, Ruckus Wireless announces it will be first to market with the second release of Hotspot 2.0 Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 May 2015
Whitehall technology chiefs vetoed new Windows XP support deal
Government technology chiefs vetoed a new deal with Microsoft to continue Windows XP support to force laggards to move off the OS Continue Reading
By- Bryan Glick, Editor in chief
-
News
14 May 2015
Digital age a turning point for policing, says commissioner Leppard
Policing in the digital age will face a turning point in the next two years, according to City of London Police commissioner Adrian Leppard Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 May 2015
Former nurse’s career blighted after blowing whistle on IT problems
Southwark's continuing care database included names of patients who had been dead for several years, a tribunal is told Continue Reading
By- Julia Gregory and Bill Goodwin
-
News
11 May 2015
PSNGB rebrands to drive information sharing across PSN
PSNGB, the trade association set up to promote the Public Services Network, rebrands itself as Innopsis and says its work is far from over Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 May 2015
The IoT industry needs to do more to secure data, says Beecham Research
There are key areas where the industry supporting the internet of things (IoT) needs to provide better security, according to Beecham Research Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
08 May 2015
CW Europe – May 2015 Edition
In this issue, CW Europe's security editor investigates whether the legislation could strangle Europe's productivity and whether businesses see the regulations as a burden. Continue Reading
-
News
07 May 2015
Businesses should prepare for black swans, says resiliency consultant
While black swan events are random and unexpected, businesses can still prepare for them, according to a resiliency consultant Continue Reading
By- Warwick Ashford, Senior analyst
-
News
07 May 2015
Future IAM will need to be broader, says Martin Kuppinger
Identity and access management systems need to look at all forms of identity, not just employees or users, says KuppingerCole analyst Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
05 May 2015
UK election special – who wins the digital vote?
In this week’s Computer Weekly, as the UK goes to the polls in the general election, we take an in-depth look at the political parties’ manifestos for technology, and examine what the IT sector wants from the next government. Our latest buyer’s guide covers collaboration software. And we analyse host identity protocol (HIP), an emerging standard for endpoint security. Read the issue now. Continue Reading
-
News
30 Apr 2015
IoT benefits and privacy not mutually exclusive, says industry expert
It is possible to mitigate the privacy and security risks of the internet of things (IoT) without losing its benefits, according to an industry expert Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Apr 2015
Ryanair remains tight-lipped over £3.3m hacker theft
Ryanair provided no details of how hackers took £3.3m from one of its bank accounts, as industry pundits call for greater collaboration Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Apr 2015
Time to embrace a new level of IAM, says Martin Kuppinger
A new level of identity and access management is at hand, yet many businesses still rely on usernames and passwords Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Apr 2015
Vodafone sends network in a backpack to Nepal earthquake zone
Vodafone’s charitable arm, the Vodafone Foundation, deploys instant mini networks to help restore communications in quake-hit Nepal Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
27 Apr 2015
Top tips for remote and mobile workers to improve their cyber security
Steps remote and mobile workers can take to improve cyber security on mobile devices, using public Wi-Fi and computers, and handling USB devices Continue Reading
By- Peter Wood, First Base Technologies LLP
-
News
27 Apr 2015
EU data protection regulation will drive privacy by design, says KuppingerCole
The EU data protection regulation will drive privacy by design in companies with European clients, says KuppingerCole analyst Karsten Kinast Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
25 Apr 2015
Bill Binney, the ‘original’ NSA whistleblower, on Snowden, 9/11 and illegal surveillance
Always a patriot: Computer Weekly talks to Bill Binney, the senior NSA official who blew the whistle before Edward Snowden Continue Reading
-
News
23 Apr 2015
Mobile malware overhyped, says security company Damballa
Mobile internet users are 1.3 times more likely to get struck by lightning than infected by mobile malware, research by security firm Damballa finds Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Apr 2015
Destructive cyber attacks making security a business concern, says Microsoft
Destructive cyber attacks are driving a fundamental shift in the information security market, according to Microsoft Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Apr 2015
HSBC website mistake guides customers to porn
HSBC’s Hong Kong website accidentally featured an out-of-date link that directed people to a porn site Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
22 Apr 2015
Collaboration key to cyber security, says US homeland security chief
Collaboration between governments and with the private sector key to improving global cyber security Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
20 Apr 2015
The future of Moore's Law at 50
In this week's Computer Weekly, Moore's Law – the seminal forecast by Intel founder Gordon Moore that oversees technology development – is 50 years old. We look at its modern relevance and future implications. IT chiefs discuss whether Windows is still core to their strategy. And we look back at five years of government IT. Read the issue now. Continue Reading
-
News
17 Apr 2015
Cyber security boot camp launched to boost skills
Sans Cyber Academy unveils eight-week security boot camp after businesses demand more cyber security specialists Continue Reading
By- Kayleigh Bateman, Computer Weekly
-
News
15 Apr 2015
Liberal Democrats promise to double innovation spend and 99.9% broadband roll-out
The Liberal Democrats’ general election manifesto promises to double innovation spending and roll out high-speed broadband to 99.9% of homes Continue Reading
By- Bryan Glick, Editor in chief
-
News
15 Apr 2015
Banks hide cyber crime losses, says City of London Police
Banks obscure the amount of money lost to cyber fraudsters – preferring to write off cyber theft as operating losses – says the City of London Police Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
14 Apr 2015
Security risk potential linked to young, mobile users
A study conducted by wireless supplier Aruba Networks has identified a distinct cohort of high-risk, security-agnostic workers Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
14 Apr 2015
Can legislation stop cyber crime?
Rising cyber crime suggests criminal law does not deter criminals and that a better legal solution is required to prevent further rises Continue Reading
By- Stewart James
-
E-Zine
13 Apr 2015
Taking stock of e-commerce systems
In this week's Computer Weekly, the first of our three-part buyer's guide to next generation e-commerce looks at managing inventory in multi-channel retailers. We highlight the six technology companies that are threats to the dominance of high-street banks. And we examine the top five issues in virtual machine backup. Read the issue now. Continue Reading
-
Feature
10 Apr 2015
NHS data security: Lessons to be learned
The NHS does not always provide a trusted repository for patient data, but some trusts are examples of good practice in action Continue Reading
By -
News
10 Apr 2015
French TV5Monde network cyber attack the latest in destructive trend in system intrusions
The cyber attack on French television network TV5Monde is the latest in a growing list of incursions intended to destroy data and IT systems Continue Reading
By- Warwick Ashford, Senior analyst
-
News
08 Apr 2015
Exit checks system for UK borders finally goes live
The Home Office launches a system for making exit checks of travellers at UK borders, following the scrapped e-Borders programme Continue Reading
By- Bryan Glick, Editor in chief
-
News
08 Apr 2015
Alleged White House hack highlights typical security failings, say experts
The alleged penetration of sensitive White House computer networks highlights typical security failings, say information security experts Continue Reading
By- Warwick Ashford, Senior analyst
-
News
08 Apr 2015
CIO interview: Bruna Pellicci, global head of IT, Ashurst
Global law firm Ashurst is rolling out a new IT strategy based on single platforms worldwide for its core business areas Continue Reading
By -
Feature
01 Apr 2015
Mobile device management (MDM) vs backup
MDM tackles the challenge of mobile devices flooding the enterprise, but it doesn’t mean you can stop worrying about mobile data protection Continue Reading
By -
News
31 Mar 2015
AWS gets EU approval for data replication outside of Europe
The European Union Data Protection Authorities has approved Amazon Web Services’ Data Processing Agreement Continue Reading
By- Cliff Saran, Managing Editor
-
News
31 Mar 2015
DDoS losses potentially £100k an hour, survey shows
DDoS attacks could expose 40% of businesses to losses of £100,000 or more an hour at peak times, a survey shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Mar 2015
British Airways rewards scheme hack highlights password problem
The hacking of British Airways’ executive club frequent flyer accounts shows the importance of using strong, unique passwords for all online accounts Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Mar 2015
Samsung targets business with Microsoft tools integration
Samsung has pre-installed Microsoft OneNote, OneDrive, and Skype on the new Galaxy S6 and Galaxy S6 edge, as it expands into business Continue Reading
By- Cliff Saran, Managing Editor
-
News
26 Mar 2015
UK attacks on crypto keys and digital certificates endemic
All UK security professionals polled in a global survey have responded to attacks on keys and certificates in past two years Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Mar 2015
UK government adds five authentication providers to Gov.uk Verify identity management system
The Government Digital Service (GDS) adds five authentication providers to the Gov.uk Verify identity and access management scheme Continue Reading
By- Clare McDonald, Business Editor
-
News
25 Mar 2015
Identity fraud still top UK fraud threat
Identity fraud continues to be the single biggest fraud threat, according to the latest report by UK fraud prevention service Cifas Continue Reading
By- Warwick Ashford, Senior analyst
-
News
24 Mar 2015
Google warns of fake digital certificates
Google has warned of unauthorised digital certificates issued for several of its domains that could be used to intercept data traffic Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Mar 2015
Home devices threaten enterprise data security, warn researchers
Poor or lacking security on ADSL routers and other devices used by teleworkers a threat to global enterprise information security Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Mar 2015
Target agrees to $10m breach compensation
US retailer Target has agreed to a $10m compensation package for victims of its 2013 data breach Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Mar 2015
Ford drives connected car journey with Microsoft Azure
The Microsoft Azure cloud will be used to power Ford's new software delivery and vehicle monitoring service Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
18 Mar 2015
Premera hack exposes 11 million financial and medical records
US health insurance firm Premera Blue Cross reveals an IT systems breach, exposing financial and medical records of 11 million customers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
17 Mar 2015
Microsoft warns of fake SSL certificate for Windows Live
Microsoft has warned that a fake security certificate has been issued for the Windows Live domain that could be abused by attackers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 Mar 2015
Lookout bets on big data analytics to secure enterprise mobiles
Mobile security SaaS provider Lookout is betting on its cloud-based big data analytics capability to attract enterprise customers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 Mar 2015
Japan recruits hackers for cyber security force
The Japanese government plans to recruit hackers to identify and protect against cyber security threats Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Mar 2015
Why IAM is topping security investments in 2015
It is not surprising identity and access management (IAM) is set to move to the fore in 2015 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Mar 2015
US cyber crime indictment prompts calls for zero tolerance
A newly-revealed US indictment of three suspected cyber criminals has prompted a call for zero tolerance for cyber intrusions Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Mar 2015
Group claiming links to Isis hacks small business websites
The FBI is investigating the hacking of a number of SME websites in the US and Europe by people claiming affiliation with Islamic State Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Mar 2015
2015 IT priorities: SDN yet to prove itself, fear of network hacks growing
In Computer Weekly’s 2015 IT priorities study, software-defined networking is still behind management and monitoring as a networking priority Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Mar 2015
How to ensure your hot-desking colleagues keep their data secure
Once hot-desking is implemented, data security suddenly demands greater attention Continue Reading
By- Christian Cawley
-
Feature
06 Mar 2015
How to secure the SDN infrastructure
As more enterprises look to deploy software-defined networking, the need for security from the ground up should not be underestimated Continue Reading
By -
News
05 Mar 2015
China and US cross swords over software backdoors
Barack Obama criticises Chinese plans to force tech firms trading in China to share encryption keys and put backdoors in software Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
02 Mar 2015
Cyber crime: What every business needs to know
Computer Weekly gets the low-down on cyber crime from law enforcement officers and investigators Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Feb 2015
Case study: Norwegian insurer invests in Darktrace machine-learning cyber defence
Shipping insurance company DNK hopes to inspire the rest of the shipping industry to adopt Darktrace’s cyber defence system Continue Reading
-
News
26 Feb 2015
Cloud security still needs a lot more work, say European experts
Security and privacy remain a stumbling block for cloud computing, according to information experts at the Trust in the Digital World conference Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Feb 2015
RASP helps apps protect themselves, but is it ready for the enterprise?
A new technology called runtime application self-protection is being touted as a next big thing in application security. But not everyone is singing its praises. Continue Reading
By- Nicole Laskowski, Senior News Director
-
News
24 Feb 2015
UK consumers lack confidence in data protection, study finds
UK consumers do not believe businesses or governments do enough to protect their data, according to to Symantec’s State of Privacy report Continue Reading
By- Warwick Ashford, Senior analyst
-
News
24 Feb 2015
PrivDog SSL compromise potentially worse than Superfish
Some versions of PrivDog software designed to block online ads compromise internet security in a similar way to Superfish Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Feb 2015
BlackBerry 10.3.1 review: Access Android apps and Blend
BlackBerry has finally released version 10.3.1 of its mobile operating system, which gives access to the Amazon Android app store Continue Reading
By- Cliff Saran, Managing Editor
-
News
19 Feb 2015
Intel Security warns of six social engineering techniques targeting businesses
An Intel Security report encourages businesses to address and educate employees on “six levers of influence” used by hackers Continue Reading
By- Warwick Ashford, Senior analyst
-
Tip
19 Feb 2015
Five ways to prepare a company board for a cyber breach
Five key things that boards need to do to stop their businesses leaking like sieves and potentially going to the wall Continue Reading
By- Neil Hare-Brown
-
News
17 Feb 2015
International spyware operation linked to NSA
The US National Security Agency has reportedly hidden surveillance software in the hard drives of several top computer makers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 Feb 2015
MasterCard to pilot facial, voice and fingerprint authentication
MasterCard will pilot a biometric authentication and verification tool this year as part of cyber security technology investment Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
16 Feb 2015
$1bn cyber heist underlines need for detection, say security experts
The theft of up to $1bn from financial institutions in a daring cyber crime operation underlines the need for monitoring, say security experts Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Feb 2015
Damballa report highlights the limitations of prevention-centric security
Anti-virus (AV) suppliers can take more than six months to create signatures for malware, according to a report from security firm Damballa Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Feb 2015
General election 2015: Major parties focus on tech agenda
With advancements around data protection and state surveillance of internet traffic, the UK is heading into its first tech-aware general election Continue Reading
By- Cliff Saran, Managing Editor
-
E-Zine
09 Feb 2015
Tackling security with quantum physics
In this week's Computer Weekly, we examine research that promises to deliver new levels of encrypted communications using quantum teleportation. IBM has announced its latest mainframe – but will the company's problems hinder its future? And we find out how one company has used the low-cost Raspberry Pi in its enterprise IT. Read the issue now. Continue Reading
-
News
06 Feb 2015
Symantec continues cloud investment in spite of poor Q3 results
Symantec has reported third quarter 2015 revenue of $1.64bn, a drop of 4% compared with $1.70bn over the same period in 2014 Continue Reading
By- Cliff Saran, Managing Editor
-
News
06 Feb 2015
National Police ICT Company finally set to start operations
A national Police ICT Company is set to begin operations after finally being approved by the UK’s police and crime commissioners Continue Reading
By- Bryan Glick, Editor in chief
-
News
06 Feb 2015
Sony data breach claims first scalp as co-chair steps down
Amy Pascal, co-chair of Sony Pictures Entertainment, steps down in wake of data breach that exposed "inappropriate" comments in emails Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Feb 2015
FCC’s Tom Wheeler offers up net neutrality plan
The Federal Communications Commission (FCC) may rule in favour of a strong regulatory environment to preserve the open internet Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Feb 2015
Ross Ulbricht faces life for Silk Road dark market conviction
Ross Ulbricht faces life in jail after being convicted of seven charges related to the Silk Road online illegal drugs dark market Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Feb 2015
IoT could be key to farming, says Beecham Research
The internet of things could be key to the farming industry meeting the challenge of increasing food production by 70% by 2050, says report Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Feb 2015
Sony says cyber attack will cost $15m
Sony expects the investigation and remediation costs of the November 2014 cyber attack on its movie subsidiary will amount to $15m Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Feb 2015
EC3 announces industry partnership in fight against cyber crime
Europol's European Cybercrime Centre has partnered with security firm AnubisNetworks to help fight the global threat of cyber crime Continue Reading
By- Warwick Ashford, Senior analyst
-
Tip
03 Feb 2015
How to implement risk-based security
Implement a simple process to identify, analyse and prioritise risk without significant investment in time or money Continue Reading
By- Peter Wood, First Base Technologies LLP
-
Opinion
03 Feb 2015
Five questions every board should ask after Sony Pictures breach
What can the board do to avoid having to answer embarrassing questions at the next shareholder meeting? Continue Reading
By -
News
02 Feb 2015
Cyber crime is a threat to global economy, says researcher
Halting cyber crime could have a positive impact on the global economy, says Intel Security Europe security researcher and CTO Continue Reading
By- Warwick Ashford, Senior analyst
-
News
02 Feb 2015
Darknet technologies have legitimate security uses, says researcher
Darket technologies have legitimate security applications for business, says security investigator Continue Reading
By- Warwick Ashford, Senior analyst
-
News
02 Feb 2015
Former Capital One data analysts charged with mining customer data
US financial services regulator SEC charges two former employees of financial services firm Capital One with insider trading Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
28 Jan 2015
Data Protection Day: Five steps to securing data
Data management firm Iron Mountain has compiled five steps to securing data to mark Data Protection Day Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Jan 2015
QinetiQ hosts latest Cyber Security Challenge competition
UK defence firm QinetiQ challenged amateur cyber defenders in a realistic global online terrorist attack simulation Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
26 Jan 2015
Why we need cyber war games
In this week’s Computer Weekly, the UK and US are starting a cyber war on each other – all in the name of testing each other’s defences. We look at why the cyber war games are needed. We examine what IT managers can learn from the car industry to improve supplier relationship management. And we find out why innovation should be top of the IT agenda in 2015. Read the issue now. Continue Reading
-
News
20 Jan 2015
Younger users prefer biometrics to passwords
Younger bank customers would rather use biometrics than PINs and passwords for security, according to Visa Europe Continue Reading
By- Clare McDonald, Business Editor
-
News
16 Jan 2015
Security Think Tank: How to deal with wiper malware
How much should businesses worry about destructive, computer-killing malware, and what steps should they take to mitigate attacks? Continue Reading
By- Tim Holman, 2-sec
-
News
16 Jan 2015
FTSE 350 firms still have long way to go on cyber risk
Many FTSE 350 firms still have a long way to go to manage the risks of a cyber attack, a government-backed cyber governance health check has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
15 Jan 2015
Quantum key distribution is the future for secure comms
Quantum teleportation is a technology that will ultimately replace encryption as the foundation of communication security Continue Reading
-
News
13 Jan 2015
Obama calls for single US data breach notification law
The US president is calling for a single US data breach notification law as part of proposed legislation to improve data security Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Jan 2015
Attackers bypass conventional security, says FireEye study
Hackers breach most conventional, signature-based security technologies, with 27% involving advanced threats Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Jan 2015
IT fails to get a grip on shadow applications
IT managers are unaware how much shadow IT is used by their business, the Cloud Security Alliance has warned Continue Reading
By- Cliff Saran, Managing Editor