IT security
-
News
12 Nov 2024
More data stolen in 2023 MOVEit attacks comes to light
Over a year since the infamous MOVEit Transfer cyber attacks affected thousands of organisations, more new victims have come to light after an anonymous threat actor leaked their data on the dark web Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
12 Nov 2024
Strengthening cyber: Best IAM practices to combat threats
The Security Think Tank considers best practices in identity and access management and how can they be deployed to enable IT departments to combat cyber-attacks, phishing attacks and ransomware Continue Reading
-
News
06 Jan 2015
Online money transfer provider Xoom suffers multimillion-dollar fraud
Digital money transfer provider Xoom has admitted to suffering a $30.8m loss at the hands of fraudsters Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
06 Jan 2015
Google under fire over Windows zero-day disclosure
Google has come under fire for publishing a proof-of-concept attack exploiting a flaw in Windows 8.1 before Microsoft had released a security update Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
05 Jan 2015
CW Europe – January 2015 Edition
As we start another new year we look back at what technology has been playing a vital role in keeping Europe safe. Headlines are regularly filled with threats about cyber wars and attacks which, although are important to bring to light, can sometimes overshadow the role technology plays in keeping us safe. Continue Reading
-
News
05 Jan 2015
Hackers can exploit free mobile apps to steal data, study shows
Hackers can access private data by exploiting vulnerabilities mainly in free mobile apps, according to security researchers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
31 Dec 2014
Top 10 cyber crime stories of 2014
Computer Weekly looks back at the most significant stories on cyber crime in the past 12 months Continue Reading
By- Warwick Ashford, Senior analyst
-
News
23 Dec 2014
What might North Korea v US cyberwarfare over Sony mean for other corporates?
North Korea behind Sony attack and US counter-penetration -- what now, asks SearchCIO's Francesca Sales. Continue Reading
-
News
18 Dec 2014
CIO interview: Mercedes AMG Petronas IT director on the need for speed in IT
When Matt Harris became IT director for F1 team Mercedes AMG Petronas in 2009, IT costs needed to be slashed Continue Reading
By- Cliff Saran, Managing Editor
-
News
17 Dec 2014
Fears over the IT security of new banks are overblown
Challenger banks such as PayPal are perceived to be less secure than traditional banks when protecting personal data. But is this the case? Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
17 Dec 2014
Cabinet Office begins procurement for next stage of Gov.uk Verify
The Cabinet Office has submitted a tender notice for a £150m three-year framework for the provision of identity assurance services Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
17 Dec 2014
US interception in the EU faces new legal challenges
US government orders against Microsoft to hand over email data 'infringes privacy legislation' in other countries Continue Reading
By- Fiona O’Cleirigh
-
News
15 Dec 2014
Lloyd’s Register Foundation grants £10m to Alan Turing Institute
The Lloyd’s Register Foundation has announced £10m in funding over five years to support research by the Alan Turing Institute Continue Reading
By- Brian McKenna, Senior Analyst, Business Applications
-
News
12 Dec 2014
Care.data faces more delays over concerns about patients
The NHS’s Care.data scheme may face more delays due to concerns over lack of publicity and clarity of the proposed programme Continue Reading
By- Clare McDonald, Business Editor
-
Feature
11 Dec 2014
The state of mobile back end as a service
Common mobile application services are increasingly being hosted on central back-end servers – but what does that mean for the enterprise? Continue Reading
By- Janakiram MSV
-
News
10 Dec 2014
Social media threats to business on the rise, says report
Social media threats to business are increasing, according to the first in-depth analysis covering Fortune 100 companies Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
08 Dec 2014
The most influential people in UK IT 2014
In this week's Computer Weekly, we unveil the 50 most influential people in UK IT for 2014, and interview the winner of our UKtech50 list, Unilever's global CIO, Jane Moran. We examine how Cisco is responding to software-defined networking. And we hear from IT chiefs successfully implementing identity and access management. Read the issue now. Continue Reading
-
News
08 Dec 2014
Hacker group Lizard Squad downs Sony PlayStation Network
Sony remains in the firing line of hackers – who have now brought down its PlayStation Network and PlayStation Store Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Dec 2014
Cyber criminals are targeting smartphone supply chains, warn researchers
A new mobile trojan dubbed “DeathRing” is being pre-loaded onto smartphones somewhere in the supply chain, warn researchers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Dec 2014
Sony hack exposes poor security practices
Sony Pictures Entertainment remains tight-lipped about its recent cyber attack, but security lessons can be drawn from what is known Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
02 Dec 2014
CW Europe - December 2014 Edition
The Computer Weekly European User Awards crowned 19 winners and three honourable mentions for 2014. This issue of CW Europe showcases all of our awards winners, revealing why they won and what the judges' said when they made their selections. Continue Reading
-
News
01 Dec 2014
Films leaked online after Sony Pictures hack
High-quality copies of still-to-be-released films have been leaked online a week after Sony Pictures Entertainment was reportedly hacked Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 Nov 2014
CGI secures communications between pilots and air traffic control
Satellite communications firm Inmarsat has outsourced the provision of security IT and services to CGI Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
27 Nov 2014
BSI urges UK businesses to bolster cyber security
UK businesses are at risk of reputational damage due to lack of awareness on how to protect their data assets, BSI research shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Nov 2014
How resilient is the public cloud?
The recent downtime that affected some Azure services following an update illustrates the precarious balance CIOs face in the cloud era Continue Reading
By- Cliff Saran, Managing Editor
-
Feature
25 Nov 2014
How the development of standards will affect the internet of things
As the internet of things (IoT) grows, so will the number of applications developed to control internet-connected devices and objects Continue Reading
By- Clare McDonald, Business Editor
-
News
25 Nov 2014
National Trust for Scotland overcomes legacy network challenge
The National Trust for Scotland has replaced a historical network infrastructure with a core service from Brocade Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Nov 2014
Cert-UK calls for better cyber threat data-sharing
Cert-UK has called for more UK firms to join the government’s Cyber Security Information Sharing Partnership Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Nov 2014
Russian webcam-spying site highlights common security failing
A Russian website collecting images from internet-connected cameras highlights a common security failing, say security professionals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Nov 2014
UK police make four arrests in international cyber crime crackdown
UK police make four arrests during an international crackdown on cyber criminals using malware tools to steal data Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Nov 2014
Microsoft releases emergency security patch for Windows and Windows Server
Microsoft emergency patch fixes a Windows and Windows Server vulnerability hackers are exploiting to compromise networks Continue Reading
By- Warwick Ashford, Senior analyst
-
News
17 Nov 2014
US State Department bolsters email security after suspected breach
The US State Department took its unclassified email system offline to bolster security after a suspected breach in October 2014 Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
14 Nov 2014
The business challenges and benefits of identity and access management
IT leaders gathered at a CW500 Club meeting to hear from peers about the challenges of identity and access management Continue Reading
By- Bryan Glick, Editor in chief
-
News
12 Nov 2014
NHS more trusted with personal data than private sector
Private sector could learn from the NHS when it comes to inspiring trust over personal data, Deloitte survey finds Continue Reading
By- Brian McKenna, Senior Analyst, Business Applications
-
News
11 Nov 2014
Network firewalls as relevant to data security as ever, says industry pioneer Gil Shwed
Network firewalls are as relevant to data security today as they were 20 years ago, says industry pioneer Gil Shwed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Nov 2014
US Postal Service latest government target for cyber attack
Hackers breach the networks of the US Postal Service in the latest of a series of attacks on US government agencies Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
07 Nov 2014
CW Europe - November 2014 Edition
In this issue of CW Europe find out the winners of our Best of VMworld Europe 2014 user awards, which were recently unveiled at an awards ceremony in Barcelona. Find out why all of our five winners were crowned champions at VMworld Europe 2014, along with two honorable mentions due to a high number of quality projects. Continue Reading
-
News
07 Nov 2014
Home Depot traces credit card data hack to supplier compromise
US retailer Home Depot reveals its recent data breach was linked to a compromised supplier’s credentials Continue Reading
By- Warwick Ashford, Senior analyst
-
News
07 Nov 2014
Police forces use private cloud to access Holmes database
Police forces across the UK will access the Holmes major investigation system via a private cloud service Continue Reading
By- Cliff Saran, Managing Editor
-
Photo Story
31 Oct 2014
The real story behind The Imitation Game film
The life of Alan Turing is being celebrated on the big screen this month. The Imitation Game from Studio Canal opens on November 14th 2014 and tells the story of the war hero who’s achievements until recently were largely unknown. Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
30 Oct 2014
Business needs to take cyber crime seriously, says top EU cyber cop Troels Oerting
Troels Oerting, head of Europol’s European Cybercrime Centre, says businesses must heed the risk of cyber crime Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Oct 2014
Half a million citizens to be using Gov.uk Verify by April 2015
Government now expects to have nearly half a million people using its Gov.uk Verify service for online identity assurance by April 2015 Continue Reading
By- Bryan Glick, Editor in chief
-
News
30 Oct 2014
Many firms still unprepared for cyber attack, EY survey shows
More than a third of organisastions have no real-time insight on cyber risks necessary to combat rising threats, a survey has shown Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Oct 2014
Firms at serious risk of data loss through file sharing, study shows
Businesses are at serious risk of data loss and compliance violations due to risky file-sharing practices, a study has shown Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 Oct 2014
Most businesses do not understand risks of data breaches, study finds
More than 70% of businesses do not understand fully the risks associated with data breaches, a study shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Oct 2014
Incident response: a common failing
Organisations hit by cyber attacks often lack an effective incident response plan. Why are so many unprepared? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Oct 2014
Cloud providers rush to build European datacentres over data sovereignty
Cloud providers IBM and Google build datacentres in the EU as enterprises insist on keeping their data in Europe Continue Reading
By- Archana Venkatraman, Datacentre Editor
-
E-Zine
27 Oct 2014
Securing critical industrial systems
In this week’s Computer Weekly, we examine the security threats to the industrial control systems that power the UK’s critical national infrastructure, and ask what can be done to better protect them. We look at the key considerations when choosing an infrastructure as a service supplier. And we compare six of the top hybrid flash array products from the leading storage hardware providers. Read the issue now. Continue Reading
-
Feature
22 Oct 2014
Interview: Ed Vaizey MP talks digital economy and digital skills
Minister for the digital economy Ed Vaizey discusses his new role and the future of digital policy Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Oct 2014
Drones a threat to privacy, says former GCHQ chief David Omand
The use of drones in the UK raises significant safety, security and privacy concerns, according to a report from ex-head of GCHQ, David Omand Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Oct 2014
GCHQ embodies British values, says Iain Lobban
Outgoing GCHQ director Iain Lobban has defended the intelligence agency in his final speech before retiring Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Oct 2014
US retailer Staples investigates possible data breach
US retailer Staples confirms it is investigating a possible credit and debit card breach Continue Reading
By- Warwick Ashford, Senior analyst
-
News
17 Oct 2014
FBI director James Comey joins call for online surveillance tools
FBI director James Comey has reiterated the need for online surveillance and joined calls for more tools to do so Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 Oct 2014
UK is prime target for cyber attacks, says FireEye
The UK has been greatest target of advanced cyber attacks in Europe, the Middle East or Africa in the first half of 2014, report shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 Oct 2014
Security key to Bank of Maharashtra payments platform
The Bank of Maharashtra (BOM) is using software from FIS for a card management and card fraud and risk monitoring system as it modernizes its payments platform Continue Reading
By- Ayush Gupta
-
News
15 Oct 2014
Industrial control systems: What are the security challenges?
Targeted attacks on industrial control systems are the biggest threat to critical national infrastructure, says Kaspersky Lab Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 Oct 2014
Cyber security failing in execution, says ex-US cyber czar
Cyber security suffers from a lack of execution, former White House cyber security co-ordinator Howard Schmidt has said. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 Oct 2014
Gov.uk Verify identity assurance service ready to go live
Government expected to launch first service using digital identity assurance in "next couple of weeks" Continue Reading
By- Bryan Glick, Editor in chief
-
News
15 Oct 2014
CIOs fear poor cloud investment is making businesses uncompetitive
CIOs and CFOs fear their enterprises are missing revenue opportunities due to poor cloud strategies Continue Reading
By- Archana Venkatraman, Datacentre Editor
-
News
13 Oct 2014
Embedded SIMs key to unlocking internet of things
GSMA’s eUICC Embedded SIM Specification will help M2M communications and the IoT become mainstream, say analysts Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Oct 2014
UK ranks third in right to be forgotten requests to Google
The UK has made the third-highest number of requests for links to be removed from Google's search results Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
13 Oct 2014
Why has HP split?
In this week’s Computer Weekly, HP has announced plans to split the company in two – we look at the reasons and assess the future prospects for the IT giant. We examine the best practice in security policy to support a bring your own device (BYOD) scheme for staff mobile technology. And we find out how one company moved its entire datacentre from Berlin to London. Read the issue now. Continue Reading
-
News
13 Oct 2014
Cybercrime fighters to target kingpins, says top EU cyber cop
International cybercrime fighters are to focus on the relatively small number of top malware producers, says Europe's top cyber cop Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Oct 2014
Azure CTO Mark Russinovich's top ten public cloud security risks
Microsoft Azure cloud CTO Mark Russinovich identified ten key security risks of public cloud services Continue Reading
By- Archana Venkatraman, Datacentre Editor
-
News
10 Oct 2014
Symantec splits storage and security
Symantec is splitting its storage and security business, following just days after HP announced its split Continue Reading
By- Cliff Saran, Managing Editor
-
News
10 Oct 2014
Fear and loathing could hold back UK internet of things, says KPMG report
More than two-thirds of UK consumers fear growing number of interconnected devices make it too easy for things to go wrong Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
09 Oct 2014
WordPress most attacked application
Websites that run the WordPress content management system are attacked 24% more often than those using other systems Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
08 Oct 2014
Tim Berners-Lee: Data sharing needs accountability
The question of how much data an individual should share was a key theme of Tim Berners-Lee's keynote at IP Expo Continue Reading
By- Cliff Saran, Managing Editor
-
News
08 Oct 2014
Malware being used to steal cash from ATMs
Criminals are using malware to steal cash from ATMs without debit and credit cards Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
07 Oct 2014
Engineering company rolls out talent management software across 17 countries
Meggitt is deploying cloud-based HR technology as it seeks to integrate 60 diverse business units into a multinational operation Continue Reading
By- Bill Goodwin, Computer Weekly
-
E-Zine
06 Oct 2014
The future of digital government in the UK
In this week’s Computer Weekly, as the last political party conferences before the election come to an end, we examine the future of digital government in the UK, featuring interviews with Whitehall’s digital chief Mike Bracken and Labour’s policy leader Chi Onwurah. Also, we look at the growth of the open-source cloud computing platform Openstack, and find out what it’s like to be on the receiving end of a data breach. Read the issue now. Continue Reading
-
News
03 Oct 2014
Google could face $100m lawsuit over nude celebrity pictures
Lawyers of celebrities whose private pictures were published by hackers are threatening to sue Google Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
03 Oct 2014
CW Europe - October 2014 Edition
BYOD policies: What’s allowed and what’s banned? As IT departments still try to come to terms with the notion of BYOD, CW Europe takes a look at what policies are being implemented to keep security under control. Continue Reading
-
News
01 Oct 2014
European firms far from ready for new data rules, study shows
As European authorities aim to ratify revised data protection rules by 2015, many firms have a lot to do to comply Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 Oct 2014
Vtesse bought by Interoute in major fibre expansion
Acquisition adds 7,000km of fibre infrastructure to Interoute’s European network Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Sep 2014
Cyber Essentials for public sector IT suppliers: pros and cons
What are the pros and cons of the Cyber Essentials Scheme certification mandated for public sector IT suppliers? Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
29 Sep 2014
Hacking IT from the inside
In this week’s Computer Weekly, car giant Daimler talks about its IT security strategy and the benefits of having its own in-house hacking team. App developers are under fire for collecting too much personal data – we examine the latest best practice. Our new buyer’s guide looks at virtualisation backup. And our review of Microsoft’s Surface Pro 3 tablet asks whether it can replace the laptop. Read the issue now. Continue Reading
-
News
29 Sep 2014
Case study: Deutsche Post DHL develops software contract templates to reduce costs
Deutsche Post DHL has created contract templates to manage software costs. Computer Weekly speaks to the people leading the initiative Continue Reading
By- Cliff Saran, Managing Editor
-
News
25 Sep 2014
Bash bug could be bigger threat than Heartbleed
A bug in the Bash command prompt software used by many Unix computers could be a greater threat than Heartbleed. Continue Reading
-
News
24 Sep 2014
BlackBerry Passport delivers a real keyboard and high-res screen to business
BlackBerry has introduced its Passport smartphone featuring a 4.5in hi-res screen, a qwerty keyboard and 13MP camera Continue Reading
By- Cliff Saran, Managing Editor
-
News
23 Sep 2014
Google to build giant '40-football pitch' datacentre in the Netherlands
Google will invest €600m to build a giant, 120-megawatt datacentre in the Netherlands Continue Reading
By- Archana Venkatraman, Datacentre Editor
-
E-Zine
22 Sep 2014
Nato and business join forces to tackle cyber security threats
In this week’s Computer Weekly, we look at how Nato wants to work with businesses to tackle their common cyber security threat. Is Amazon Web Services becoming the new Microsoft? We examine the historic similarities between two very different suppliers. And low-cost airline easyJet talks about how it has implemented a hybrid cloud for greater IT and business flexibility. Read the issue now. Continue Reading
-
News
22 Sep 2014
Conficker infections an indictment of IT security, says CWG
Conficker worm infections reflect the “sad state of affairs of IT security”, says the Conficker Working Group Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Sep 2014
Home Depot under fire for data breach notification
US retailer Home Depot criticised for delays in telling customers their payment card details may have been compromised Continue Reading
By- Warwick Ashford, Senior analyst
-
News
17 Sep 2014
KPMG: IoT, 3D printing and healthcare IT to have most impact
Internet of things (IoT), 3D printing and biotech or healthcare IT are among the IT trends that will change the way people work and live Continue Reading
By- Archana Venkatraman, Datacentre Editor
-
News
17 Sep 2014
Risk management key to cyber strategy, says BP
Cyber attacks constitute a group-level risk that is managed as part of BP’s standard set of risk management processes, says group chief Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 Sep 2014
GDS unveils 'Gov.UK Verify' public services identity assurance scheme
The Government Digital Service (GDS) debuts a system to prove users’ identities when using public services online, branded as 'Gov.UK Verify' Continue Reading
By- Bryan Glick, Editor in chief
-
News
15 Sep 2014
Salesforce issues advice on avoiding Dyreza attack
Salesforce has issued a set of guidelines on tightening security after a number of its customers were targeted by the Dyreza email virus Continue Reading
By- Cliff Saran, Managing Editor
-
News
15 Sep 2014
WikiLeaks reveals Australian police are using surveillance software
Australia's New South Wales police are using spyware that has been linked to repressive states, according to leaked documents Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Sep 2014
Google denies breach after hackers leak millions of user logins
Google denies claims cyber criminals stole users' data and downplays the threat after a hacker purportedly leaked 4.9 million Gmail logins Continue Reading
-
News
09 Sep 2014
EY seeks tech startups to address challenges of right to be forgotten
Professional services firm Ernst & Young is looking for startups to find technology solutions to the ‘right to be forgotten’ regulation Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
08 Sep 2014
BP spends £2m developing apps to train business leaders
BP is scrapping online courses in favour of apps and portals that can deliver bite-sized information and training when it's needed Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
08 Sep 2014
Ransomware on the rise, warns cyber threat report
The first half of 2014 saw an increase in online attacks that lock up user data and hold it for ransom, reports F-Secure Labs Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Sep 2014
Nude celebrity hack forces changes at Apple and 4Chan
Apple and image-sharing site 4Chan take security measures after celebrity iCloud accounts were compromised and photos leaked Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Sep 2014
Barclays bank launches biometric authentication
Barclays bank plans to launch biometric readers that read users' finger veins to authenticate customers Continue Reading
By- Clare McDonald, Business Editor
-
News
02 Sep 2014
Apple and FBI launch iCloud hack investigation
Apple and FBI investigate the breach of Apple’s iCloud causing fresh business concerns over cloud security Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 Sep 2014
Nato set to clarify stance on cyber attack
Leaders will discuss changing the mission of collective defence with respect to cyber attack at this week’s Nato summit Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 Sep 2014
Nude celebrity pictures posted online after alleged iCloud hack
Hundreds of nude images of female celebrities have been leaked, allegedly after Apple’s iCloud service was hacked Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 Aug 2014
Microsoft re-releases security bulletin MS14-045
Microsoft has re-released a software security update that was withdrawn because it put some computers in endless reboot loops Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Aug 2014
Security experts identify top 10 software design flaws
The IEEE Center for Secure Design has published a report on how to avoid the top 10 software security design flaws Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Aug 2014
South Korea arrests 16 suspects in massive cyber fraud
South Korea has arrested 16 suspects in connection with a multi-million-dollar fraud enabled by the theft of 27 million online gaming credentials Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Aug 2014
Local authorities can improve data protection, says ICO audit
There is room for improvement in how local authorities protect personal data, says an audit report by the ICO Continue Reading
By- Warwick Ashford, Senior analyst