IT security
-
News
25 Oct 2024
Dutch critical infrastructure at risk despite high leadership confidence
Stark paradox in Dutch cyber security landscape has business leaders expressing high confidence in their IT infrastructure as cyber attacks rise Continue Reading
-
News
11 Jul 2024
Dutch research firm TNO pictures the SOC of the future
In only a few years, security operations centres will have a different design and layout, and far fewer will remain Continue Reading
-
News
27 Apr 2015
EU data protection regulation will drive privacy by design, says KuppingerCole
The EU data protection regulation will drive privacy by design in companies with European clients, says KuppingerCole analyst Karsten Kinast Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
25 Apr 2015
Bill Binney, the ‘original’ NSA whistleblower, on Snowden, 9/11 and illegal surveillance
Always a patriot: Computer Weekly talks to Bill Binney, the senior NSA official who blew the whistle before Edward Snowden Continue Reading
-
News
23 Apr 2015
Mobile malware overhyped, says security company Damballa
Mobile internet users are 1.3 times more likely to get struck by lightning than infected by mobile malware, research by security firm Damballa finds Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Apr 2015
Destructive cyber attacks making security a business concern, says Microsoft
Destructive cyber attacks are driving a fundamental shift in the information security market, according to Microsoft Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Apr 2015
HSBC website mistake guides customers to porn
HSBC’s Hong Kong website accidentally featured an out-of-date link that directed people to a porn site Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
22 Apr 2015
Collaboration key to cyber security, says US homeland security chief
Collaboration between governments and with the private sector key to improving global cyber security Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
20 Apr 2015
The future of Moore's Law at 50
In this week's Computer Weekly, Moore's Law – the seminal forecast by Intel founder Gordon Moore that oversees technology development – is 50 years old. We look at its modern relevance and future implications. IT chiefs discuss whether Windows is still core to their strategy. And we look back at five years of government IT. Read the issue now. Continue Reading
-
News
17 Apr 2015
Cyber security boot camp launched to boost skills
Sans Cyber Academy unveils eight-week security boot camp after businesses demand more cyber security specialists Continue Reading
By- Kayleigh Bateman, Computer Weekly
-
News
15 Apr 2015
Liberal Democrats promise to double innovation spend and 99.9% broadband roll-out
The Liberal Democrats’ general election manifesto promises to double innovation spending and roll out high-speed broadband to 99.9% of homes Continue Reading
By- Bryan Glick, Editor in chief
-
News
15 Apr 2015
Banks hide cyber crime losses, says City of London Police
Banks obscure the amount of money lost to cyber fraudsters – preferring to write off cyber theft as operating losses – says the City of London Police Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
14 Apr 2015
Security risk potential linked to young, mobile users
A study conducted by wireless supplier Aruba Networks has identified a distinct cohort of high-risk, security-agnostic workers Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
14 Apr 2015
Can legislation stop cyber crime?
Rising cyber crime suggests criminal law does not deter criminals and that a better legal solution is required to prevent further rises Continue Reading
By- Stewart James
-
E-Zine
13 Apr 2015
Taking stock of e-commerce systems
In this week's Computer Weekly, the first of our three-part buyer's guide to next generation e-commerce looks at managing inventory in multi-channel retailers. We highlight the six technology companies that are threats to the dominance of high-street banks. And we examine the top five issues in virtual machine backup. Read the issue now. Continue Reading
-
Feature
10 Apr 2015
NHS data security: Lessons to be learned
The NHS does not always provide a trusted repository for patient data, but some trusts are examples of good practice in action Continue Reading
By -
News
10 Apr 2015
French TV5Monde network cyber attack the latest in destructive trend in system intrusions
The cyber attack on French television network TV5Monde is the latest in a growing list of incursions intended to destroy data and IT systems Continue Reading
By- Warwick Ashford, Senior analyst
-
News
08 Apr 2015
Exit checks system for UK borders finally goes live
The Home Office launches a system for making exit checks of travellers at UK borders, following the scrapped e-Borders programme Continue Reading
By- Bryan Glick, Editor in chief
-
News
08 Apr 2015
Alleged White House hack highlights typical security failings, say experts
The alleged penetration of sensitive White House computer networks highlights typical security failings, say information security experts Continue Reading
By- Warwick Ashford, Senior analyst
-
News
08 Apr 2015
CIO interview: Bruna Pellicci, global head of IT, Ashurst
Global law firm Ashurst is rolling out a new IT strategy based on single platforms worldwide for its core business areas Continue Reading
By -
Feature
01 Apr 2015
Mobile device management (MDM) vs backup
MDM tackles the challenge of mobile devices flooding the enterprise, but it doesn’t mean you can stop worrying about mobile data protection Continue Reading
By -
News
31 Mar 2015
AWS gets EU approval for data replication outside of Europe
The European Union Data Protection Authorities has approved Amazon Web Services’ Data Processing Agreement Continue Reading
By- Cliff Saran, Managing Editor
-
News
31 Mar 2015
DDoS losses potentially £100k an hour, survey shows
DDoS attacks could expose 40% of businesses to losses of £100,000 or more an hour at peak times, a survey shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Mar 2015
British Airways rewards scheme hack highlights password problem
The hacking of British Airways’ executive club frequent flyer accounts shows the importance of using strong, unique passwords for all online accounts Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Mar 2015
Samsung targets business with Microsoft tools integration
Samsung has pre-installed Microsoft OneNote, OneDrive, and Skype on the new Galaxy S6 and Galaxy S6 edge, as it expands into business Continue Reading
By- Cliff Saran, Managing Editor
-
News
26 Mar 2015
UK attacks on crypto keys and digital certificates endemic
All UK security professionals polled in a global survey have responded to attacks on keys and certificates in past two years Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Mar 2015
UK government adds five authentication providers to Gov.uk Verify identity management system
The Government Digital Service (GDS) adds five authentication providers to the Gov.uk Verify identity and access management scheme Continue Reading
By- Clare McDonald, Business Editor
-
News
25 Mar 2015
Identity fraud still top UK fraud threat
Identity fraud continues to be the single biggest fraud threat, according to the latest report by UK fraud prevention service Cifas Continue Reading
By- Warwick Ashford, Senior analyst
-
News
24 Mar 2015
Google warns of fake digital certificates
Google has warned of unauthorised digital certificates issued for several of its domains that could be used to intercept data traffic Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Mar 2015
Home devices threaten enterprise data security, warn researchers
Poor or lacking security on ADSL routers and other devices used by teleworkers a threat to global enterprise information security Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Mar 2015
Target agrees to $10m breach compensation
US retailer Target has agreed to a $10m compensation package for victims of its 2013 data breach Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Mar 2015
Ford drives connected car journey with Microsoft Azure
The Microsoft Azure cloud will be used to power Ford's new software delivery and vehicle monitoring service Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
18 Mar 2015
Premera hack exposes 11 million financial and medical records
US health insurance firm Premera Blue Cross reveals an IT systems breach, exposing financial and medical records of 11 million customers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
17 Mar 2015
Microsoft warns of fake SSL certificate for Windows Live
Microsoft has warned that a fake security certificate has been issued for the Windows Live domain that could be abused by attackers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 Mar 2015
Lookout bets on big data analytics to secure enterprise mobiles
Mobile security SaaS provider Lookout is betting on its cloud-based big data analytics capability to attract enterprise customers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 Mar 2015
Japan recruits hackers for cyber security force
The Japanese government plans to recruit hackers to identify and protect against cyber security threats Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Mar 2015
Why IAM is topping security investments in 2015
It is not surprising identity and access management (IAM) is set to move to the fore in 2015 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Mar 2015
US cyber crime indictment prompts calls for zero tolerance
A newly-revealed US indictment of three suspected cyber criminals has prompted a call for zero tolerance for cyber intrusions Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Mar 2015
Group claiming links to Isis hacks small business websites
The FBI is investigating the hacking of a number of SME websites in the US and Europe by people claiming affiliation with Islamic State Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Mar 2015
2015 IT priorities: SDN yet to prove itself, fear of network hacks growing
In Computer Weekly’s 2015 IT priorities study, software-defined networking is still behind management and monitoring as a networking priority Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Mar 2015
How to ensure your hot-desking colleagues keep their data secure
Once hot-desking is implemented, data security suddenly demands greater attention Continue Reading
By- Christian Cawley
-
Feature
06 Mar 2015
How to secure the SDN infrastructure
As more enterprises look to deploy software-defined networking, the need for security from the ground up should not be underestimated Continue Reading
By -
News
05 Mar 2015
China and US cross swords over software backdoors
Barack Obama criticises Chinese plans to force tech firms trading in China to share encryption keys and put backdoors in software Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
02 Mar 2015
Cyber crime: What every business needs to know
Computer Weekly gets the low-down on cyber crime from law enforcement officers and investigators Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Feb 2015
Case study: Norwegian insurer invests in Darktrace machine-learning cyber defence
Shipping insurance company DNK hopes to inspire the rest of the shipping industry to adopt Darktrace’s cyber defence system Continue Reading
-
News
26 Feb 2015
Cloud security still needs a lot more work, say European experts
Security and privacy remain a stumbling block for cloud computing, according to information experts at the Trust in the Digital World conference Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Feb 2015
RASP helps apps protect themselves, but is it ready for the enterprise?
A new technology called runtime application self-protection is being touted as a next big thing in application security. But not everyone is singing its praises. Continue Reading
By- Nicole Laskowski, Senior News Director
-
News
24 Feb 2015
UK consumers lack confidence in data protection, study finds
UK consumers do not believe businesses or governments do enough to protect their data, according to to Symantec’s State of Privacy report Continue Reading
By- Warwick Ashford, Senior analyst
-
News
24 Feb 2015
PrivDog SSL compromise potentially worse than Superfish
Some versions of PrivDog software designed to block online ads compromise internet security in a similar way to Superfish Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Feb 2015
BlackBerry 10.3.1 review: Access Android apps and Blend
BlackBerry has finally released version 10.3.1 of its mobile operating system, which gives access to the Amazon Android app store Continue Reading
By- Cliff Saran, Managing Editor
-
News
19 Feb 2015
Intel Security warns of six social engineering techniques targeting businesses
An Intel Security report encourages businesses to address and educate employees on “six levers of influence” used by hackers Continue Reading
By- Warwick Ashford, Senior analyst
-
Tip
19 Feb 2015
Five ways to prepare a company board for a cyber breach
Five key things that boards need to do to stop their businesses leaking like sieves and potentially going to the wall Continue Reading
By- Neil Hare-Brown
-
News
17 Feb 2015
International spyware operation linked to NSA
The US National Security Agency has reportedly hidden surveillance software in the hard drives of several top computer makers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 Feb 2015
MasterCard to pilot facial, voice and fingerprint authentication
MasterCard will pilot a biometric authentication and verification tool this year as part of cyber security technology investment Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
16 Feb 2015
$1bn cyber heist underlines need for detection, say security experts
The theft of up to $1bn from financial institutions in a daring cyber crime operation underlines the need for monitoring, say security experts Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Feb 2015
Damballa report highlights the limitations of prevention-centric security
Anti-virus (AV) suppliers can take more than six months to create signatures for malware, according to a report from security firm Damballa Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Feb 2015
General election 2015: Major parties focus on tech agenda
With advancements around data protection and state surveillance of internet traffic, the UK is heading into its first tech-aware general election Continue Reading
By- Cliff Saran, Managing Editor
-
E-Zine
09 Feb 2015
Tackling security with quantum physics
In this week's Computer Weekly, we examine research that promises to deliver new levels of encrypted communications using quantum teleportation. IBM has announced its latest mainframe – but will the company's problems hinder its future? And we find out how one company has used the low-cost Raspberry Pi in its enterprise IT. Read the issue now. Continue Reading
-
News
06 Feb 2015
Symantec continues cloud investment in spite of poor Q3 results
Symantec has reported third quarter 2015 revenue of $1.64bn, a drop of 4% compared with $1.70bn over the same period in 2014 Continue Reading
By- Cliff Saran, Managing Editor
-
News
06 Feb 2015
National Police ICT Company finally set to start operations
A national Police ICT Company is set to begin operations after finally being approved by the UK’s police and crime commissioners Continue Reading
By- Bryan Glick, Editor in chief
-
News
06 Feb 2015
Sony data breach claims first scalp as co-chair steps down
Amy Pascal, co-chair of Sony Pictures Entertainment, steps down in wake of data breach that exposed "inappropriate" comments in emails Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Feb 2015
FCC’s Tom Wheeler offers up net neutrality plan
The Federal Communications Commission (FCC) may rule in favour of a strong regulatory environment to preserve the open internet Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Feb 2015
Ross Ulbricht faces life for Silk Road dark market conviction
Ross Ulbricht faces life in jail after being convicted of seven charges related to the Silk Road online illegal drugs dark market Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Feb 2015
IoT could be key to farming, says Beecham Research
The internet of things could be key to the farming industry meeting the challenge of increasing food production by 70% by 2050, says report Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Feb 2015
Sony says cyber attack will cost $15m
Sony expects the investigation and remediation costs of the November 2014 cyber attack on its movie subsidiary will amount to $15m Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Feb 2015
EC3 announces industry partnership in fight against cyber crime
Europol's European Cybercrime Centre has partnered with security firm AnubisNetworks to help fight the global threat of cyber crime Continue Reading
By- Warwick Ashford, Senior analyst
-
Tip
03 Feb 2015
How to implement risk-based security
Implement a simple process to identify, analyse and prioritise risk without significant investment in time or money Continue Reading
By- Peter Wood, First Base Technologies LLP
-
Opinion
03 Feb 2015
Five questions every board should ask after Sony Pictures breach
What can the board do to avoid having to answer embarrassing questions at the next shareholder meeting? Continue Reading
By -
News
02 Feb 2015
Cyber crime is a threat to global economy, says researcher
Halting cyber crime could have a positive impact on the global economy, says Intel Security Europe security researcher and CTO Continue Reading
By- Warwick Ashford, Senior analyst
-
News
02 Feb 2015
Darknet technologies have legitimate security uses, says researcher
Darket technologies have legitimate security applications for business, says security investigator Continue Reading
By- Warwick Ashford, Senior analyst
-
News
02 Feb 2015
Former Capital One data analysts charged with mining customer data
US financial services regulator SEC charges two former employees of financial services firm Capital One with insider trading Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
28 Jan 2015
Data Protection Day: Five steps to securing data
Data management firm Iron Mountain has compiled five steps to securing data to mark Data Protection Day Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Jan 2015
QinetiQ hosts latest Cyber Security Challenge competition
UK defence firm QinetiQ challenged amateur cyber defenders in a realistic global online terrorist attack simulation Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
26 Jan 2015
Why we need cyber war games
In this week’s Computer Weekly, the UK and US are starting a cyber war on each other – all in the name of testing each other’s defences. We look at why the cyber war games are needed. We examine what IT managers can learn from the car industry to improve supplier relationship management. And we find out why innovation should be top of the IT agenda in 2015. Read the issue now. Continue Reading
-
News
20 Jan 2015
Younger users prefer biometrics to passwords
Younger bank customers would rather use biometrics than PINs and passwords for security, according to Visa Europe Continue Reading
By- Clare McDonald, Business Editor
-
News
16 Jan 2015
Security Think Tank: How to deal with wiper malware
How much should businesses worry about destructive, computer-killing malware, and what steps should they take to mitigate attacks? Continue Reading
By- Tim Holman, 2-sec
-
News
16 Jan 2015
FTSE 350 firms still have long way to go on cyber risk
Many FTSE 350 firms still have a long way to go to manage the risks of a cyber attack, a government-backed cyber governance health check has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
15 Jan 2015
Quantum key distribution is the future for secure comms
Quantum teleportation is a technology that will ultimately replace encryption as the foundation of communication security Continue Reading
-
News
13 Jan 2015
Obama calls for single US data breach notification law
The US president is calling for a single US data breach notification law as part of proposed legislation to improve data security Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Jan 2015
Attackers bypass conventional security, says FireEye study
Hackers breach most conventional, signature-based security technologies, with 27% involving advanced threats Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Jan 2015
IT fails to get a grip on shadow applications
IT managers are unaware how much shadow IT is used by their business, the Cloud Security Alliance has warned Continue Reading
By- Cliff Saran, Managing Editor
-
News
12 Jan 2015
Sony Pictures admits it was unprepared for November’s cyber attack
Sony Pictures admits it was not prepared for the nature and extent of the cyber attack that hit the company last November Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
09 Jan 2015
How to make applications resilient on AWS
Cloud services are susceptible to network and other outages. There is no silver bullet to boost the resilience of an AWS-hosted application Continue Reading
By- Guido Soeldner
-
News
09 Jan 2015
Traditional security putting UK businesses at risk, study shows
Traditional approaches to security are exposing UK businesses to heightened risk of attack, a study shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
08 Jan 2015
Cyber attack now primary weapon for countries, says ViaSat UK
Cyber attacks are becoming the first weapon of choice for countries in conflict, says ViaSat UK Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Jan 2015
Online money transfer provider Xoom suffers multimillion-dollar fraud
Digital money transfer provider Xoom has admitted to suffering a $30.8m loss at the hands of fraudsters Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
06 Jan 2015
Google under fire over Windows zero-day disclosure
Google has come under fire for publishing a proof-of-concept attack exploiting a flaw in Windows 8.1 before Microsoft had released a security update Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
05 Jan 2015
CW Europe – January 2015 Edition
As we start another new year we look back at what technology has been playing a vital role in keeping Europe safe. Headlines are regularly filled with threats about cyber wars and attacks which, although are important to bring to light, can sometimes overshadow the role technology plays in keeping us safe. Continue Reading
-
News
05 Jan 2015
Hackers can exploit free mobile apps to steal data, study shows
Hackers can access private data by exploiting vulnerabilities mainly in free mobile apps, according to security researchers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
31 Dec 2014
Top 10 cyber crime stories of 2014
Computer Weekly looks back at the most significant stories on cyber crime in the past 12 months Continue Reading
By- Warwick Ashford, Senior analyst
-
News
23 Dec 2014
What might North Korea v US cyberwarfare over Sony mean for other corporates?
North Korea behind Sony attack and US counter-penetration -- what now, asks SearchCIO's Francesca Sales. Continue Reading
-
News
18 Dec 2014
CIO interview: Mercedes AMG Petronas IT director on the need for speed in IT
When Matt Harris became IT director for F1 team Mercedes AMG Petronas in 2009, IT costs needed to be slashed Continue Reading
By- Cliff Saran, Managing Editor
-
News
17 Dec 2014
Fears over the IT security of new banks are overblown
Challenger banks such as PayPal are perceived to be less secure than traditional banks when protecting personal data. But is this the case? Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
17 Dec 2014
Cabinet Office begins procurement for next stage of Gov.uk Verify
The Cabinet Office has submitted a tender notice for a £150m three-year framework for the provision of identity assurance services Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
17 Dec 2014
US interception in the EU faces new legal challenges
US government orders against Microsoft to hand over email data 'infringes privacy legislation' in other countries Continue Reading
By- Fiona O’Cleirigh
-
News
15 Dec 2014
Lloyd’s Register Foundation grants £10m to Alan Turing Institute
The Lloyd’s Register Foundation has announced £10m in funding over five years to support research by the Alan Turing Institute Continue Reading
By- Brian McKenna, Senior Analyst, Business Applications
-
News
12 Dec 2014
Care.data faces more delays over concerns about patients
The NHS’s Care.data scheme may face more delays due to concerns over lack of publicity and clarity of the proposed programme Continue Reading
By- Clare McDonald, Business Editor
-
Feature
11 Dec 2014
The state of mobile back end as a service
Common mobile application services are increasingly being hosted on central back-end servers – but what does that mean for the enterprise? Continue Reading
By- Janakiram MSV
-
News
10 Dec 2014
Social media threats to business on the rise, says report
Social media threats to business are increasing, according to the first in-depth analysis covering Fortune 100 companies Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
08 Dec 2014
The most influential people in UK IT 2014
In this week's Computer Weekly, we unveil the 50 most influential people in UK IT for 2014, and interview the winner of our UKtech50 list, Unilever's global CIO, Jane Moran. We examine how Cisco is responding to software-defined networking. And we hear from IT chiefs successfully implementing identity and access management. Read the issue now. Continue Reading
-
News
08 Dec 2014
Hacker group Lizard Squad downs Sony PlayStation Network
Sony remains in the firing line of hackers – who have now brought down its PlayStation Network and PlayStation Store Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Dec 2014
Cyber criminals are targeting smartphone supply chains, warn researchers
A new mobile trojan dubbed “DeathRing” is being pre-loaded onto smartphones somewhere in the supply chain, warn researchers Continue Reading
By- Warwick Ashford, Senior analyst