IT security
-
News
25 Oct 2024
Dutch critical infrastructure at risk despite high leadership confidence
Stark paradox in Dutch cyber security landscape has business leaders expressing high confidence in their IT infrastructure as cyber attacks rise Continue Reading
-
News
11 Jul 2024
Dutch research firm TNO pictures the SOC of the future
In only a few years, security operations centres will have a different design and layout, and far fewer will remain Continue Reading
-
News
21 Jun 2013
Government launches cyber awareness campaign
UK government debuts the first stage of a £4m cyber awareness campaign as part of the National Cyber Security Programme Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
18 Jun 2013
The challenges of information governance in our increasingly litigious age
Formulating the right enterprise-wide information governance policies is essential in heading off potential legal and compliance costs Continue Reading
By- Doug Miles
-
News
11 Jun 2013
UK links to US internet surveillance remain unclear
The government insists that UK spy agencies operate within the law, but questions remain Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Jun 2013
Telefonica Digital forms security group Eleven Paths
The business division of mobile operator Telefonica launches Eleven Paths, an independent company working on security issues in the workplace Continue Reading
By- Jennifer Scott, TechTarget
-
Feature
10 Jun 2013
Manage identity and access to improve business processes
Streamlining identity and access management is essential to exploiting your organisation’s assets and employees’ productivity. Continue Reading
By- Andras Cser
-
News
10 Jun 2013
2013 Cost of Data Breach Study: UK
The cost of data breaches has risen for UK organisations over the past year, but companies that appoint chief information security officers with enterprise-wide responsibilities can reduce their costs, this report from the Ponemon Institute reveals Continue Reading
-
News
07 Jun 2013
PM urged to criminalise internet rape porn
Campaigners are calling for the criminalisation of possessing internet pornography depicting rape Continue Reading
By- Warwick Ashford, Senior analyst
-
News
07 Jun 2013
ICO fines Glasgow City Council for loss of unencrypted laptops
Glasgow City Council has been fined £150,000 for losing two laptops which held personal details of more than 20,000 people Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
05 Jun 2013
Human error causes most data breaches, Ponemon study finds
Human errors and system problems caused two-thirds of data breaches in 2012, according to a study from Symantec and the Ponemon Institute Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Jun 2013
Information Governance
This research from AIIM looks at the risk profile around electronic records, the keep-all versus delete-all options, e-discovery, and the implications of social, mobile and cloud on risk management policies. Continue Reading
-
News
29 May 2013
Stratfor hacker pleads guilty
US hacktivist Jeremy Hammond pleads guilty to accessing computers of law enforcement agencies and government contractors illegally Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 May 2013
Syrian hackers deface Sky Android apps
Syrian hackers have defaced several of Sky’s Android apps, forcing the broadcaster to remove them temporarily from the Google Play store Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 May 2013
UK ISPs block access to pirate sites
UK internet service providers have begun blocking access to two sites accused of breaking copyright laws Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 May 2013
Privileged accounts key to most APT attacks, says Cyber-Ark
The theft, misuse and exploitation of privileged accounts is becoming an increasingly key tactic in advanced persistent threat attacks Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 May 2013
Most IT environments immature, Microsoft reveals
Most business IT environments are immature, analysis of data from Microsoft’s Cloud Security Readiness Tool has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 May 2013
Microsoft declares conformance with ISO 27034-1
Microsoft has declared conformance with ISO 27034-1, the first part of an international standard for secure software development Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 May 2013
Cyber criminals hack Washington court system
Hackers gain access to the personal data of 160,000 US citizens after compromising Washington State court service servers Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
07 May 2013
Symantec helps NHS trust cut security costs by a quarter
The Royal Liverpool and Broadgreen University Hospitals NHS Trust cut security costs by 25% in its partnership with security supplier Symantec Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 May 2013
Netherlands considers hacking powers for police
The Netherlands government considers legislation to give police powers to hack into computers, install spyware and read emails Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 May 2013
Computer Weekly European User Awards for Security: Winners
The winners are in for the Computer Weekly European User Awards for Security. See who made the top spots. Continue Reading
By- Kayleigh Bateman, Computer Weekly
-
News
01 May 2013
What’s to be done about data breach discovery?
The time from first contact by cyber attackers to the victim learning of it is still measured in months and years, not hours and days Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 May 2013
CW buyer's guide: context-aware security
This 11-page Computer Weekly buyer's guide looks at how organisations should approach context-aware security technologies and what business benefits they can deliver. Continue Reading
-
News
01 May 2013
Information Security Breaches Survey 2013
Security breaches cost large businesses an average of £850,000, the 2013 Information Security Breaches Survey reveals. Continue Reading
-
News
01 May 2013
CW Special Report on CSC
This 16-page report from Computer Weekly analyses the challenges facing CSC, its financial performance, the services it offers, its place in the IT market and its future strategy. Continue Reading
-
News
30 Apr 2013
Big data security: getting a grip on multiple data sources
Big data analyses multiple data points, but how do you ensure that ecosystem is secure? In this podcast, Mathieu Gorge, CEO of Vigitrust, outlines the key steps in achieving big data security Continue Reading
By- Antony Adshead, Storage Editor
-
News
29 Apr 2013
Another online firm hit by data breach
Online deals service LivingSocial is the latest company to report a breach of its computer systems that may mean attackers accessed customer details Continue Reading
-
News
25 Apr 2013
Infosec 2013: Cyber crime challenges law enforcement
Cyber crime is forcing police and law enforcement agencies to re-think basic skills needed, according to experts at Infosecurity Europe 2013 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Apr 2013
Lib Dems will block Snoopers’ Charter, says Nick Clegg
The draft Communications Data Bill will not go ahead while the Lib Dems are in government, says deputy prime minister Nick Clegg Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Apr 2013
Spam SMS messages drop following ICO penalty
The number of spam SMS messages has significantly reduced since government regulator ICO issued £440,000 fines last year Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
24 Apr 2013
Protecting against modern password cracking
This article in our Royal Holloway Security Thesis series explains just how insecure passwords are and offers advice on alternative methods of security. Continue Reading
-
News
22 Apr 2013
Infosec 2013: University research challenges reliability of IPS
Research shows intrusion prevention systems (IPS) are not as effective at detecting malicious activity as some might think Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Apr 2013
Security spend misaligned with threats, says security veteran
Security budget allocations have remained the same for the past 15 years, but threats have changed, says Shlomo Kramer, chief executive at security firm Imperva Continue Reading
-
Feature
22 Apr 2013
The internet of things is set to change security priorities
IT leaders must protect against the security risks introduced by the growing interaction between technology and the physical world. Continue Reading
By- Andrew Rose
-
News
22 Apr 2013
US jails LulzSec hacker Cody Kretsinger
The US has jailed a member of hacktivist group LulzSec for a year for his role in breaching computer systems at Sony Pictures Entertainment in 2011 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Apr 2013
Conficker makes way for web-based attacks, says Microsoft
Web attacks emerge as top threat as businesses finally begin to win the battle against Conficker and other worms, says Microsoft Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
16 Apr 2013
How to create a good information security policy
Information security policies provide vital support to security professionals, yet few organisations take the time to create decent policies Continue Reading
By- Andi Scott
-
Photo Story
15 Apr 2013
One man’s mission to uncover a WWII decryption machine
How Brian Randell unlocked the secrets of Colossus, the world’s first programmable computer. Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
15 Apr 2013
Anonymous hacks North Korean websites for a second time
Members of the Anonymous hacktivist collective claim to have again hacked several prominent North Korean websites Continue Reading
-
News
15 Apr 2013
Google reaches deal with EU competition authorities
Google has reportedly reached a deal with European Union (EU) competition authorities over concerns about its business practices Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Apr 2013
Google has another go at allaying EU competition concerns
Google has submitted a fresh set of proposals to address European concerns about its business practices and avoid punitive action Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Apr 2013
Bots and web apps among top threats to data security, says Check Point
Bots, viruses, breaches and attacks are a constant and real threat to the information security of organisations Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
11 Apr 2013
Windows XP end of support: What to do next
CIOs may not wish to carry on running a 12-year-old desktop OS, but thousands of incompatible applications leave many with no choice Continue Reading
By- Cliff Saran, Managing Editor
-
News
11 Apr 2013
Porn websites pose malware risk, says researcher
Browsing popular pornography internet sites pose a growing risk of malware infection, according to a security researcher Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Apr 2013
South Korea accuses North Korea of launching cyber attacks
South Korea blames North Korea for the cyber attacks that shut down thousands of computers at broadcasters and banks two weeks ago Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Apr 2013
Effective print security for SMBs
Analysts Louella Fernandes and Clive Longbottom discuss how integrated print management provides SMBs with a simple and scalable approach for print security. Continue Reading
-
News
03 Apr 2013
Case Study: 192business switches to tokenisation to speed up business processes
Online payment card verification firm 192business uses tokenisation to speed up its processes and protect credit card details from fraud Continue Reading
-
News
03 Apr 2013
US Army practises poor data security on mobile devices
Pentagon inspector general finds smartphones and tablets the US Army buys are not configured to protect sensitive data and allow remote wipe Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Apr 2013
Anonymous threatens to declare cyber war on North Korea
Anonymous hacktivist collective has threatened North Korea with cyber war if leader Kim Jong-un does not resign and install free democracy Continue Reading
-
News
02 Apr 2013
Google closer to action from European privacy regulators
Google is another step closer to action by privacy regulators across Europe for failing to change the way it manages user data Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Mar 2013
UK government sets up cyber security fusion cell
A cyber security “fusion cell” for cross-sector threat data sharing aims to put government, industry and information security analysts side-by-side Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Mar 2013
Employees ignore security rules, say infosec pros
Most information security professionals believe corporate employees wilfully ignore security rules, survey at RSA Conference 2013 reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
25 Mar 2013
Securing the hypervisor: expert tips
There are many potential security issues with the various components of a virtualised infrastructure, and nowhere is this more of a concern than with the hypervisor platforms that host virtual systems and application instances Continue Reading
By- Dave Shackleford, Voodoo Security
-
News
25 Mar 2013
Malware in counterfeit software to cost business $114bn in 2013
Dealing with malware in counterfeit software will cost global enterprises an estimated $114bn in 2013, says research firm IDC Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Mar 2013
How to configure Mac OS X Server
This step by step guide shows you how to configure Max OS X Server. Continue Reading
-
News
22 Mar 2013
Six security issues to tackle before encrypting cloud data
Concern about security and privacy is likely to drive adoption of cloud encryption, but there are six security issues businesses should tackle Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Mar 2013
Case study: Hamilton Fraser embraces BYOD with MobileIron
How insurance firm Hamilton Fraser is using MobileIron to enable employees to bring their own devices while following company policy Continue Reading
By- Jennifer Scott, TechTarget
-
News
14 Mar 2013
CIO Interview: Matthew Oakeley, global IT head of Schroders
Matthew Oakeley talks to Karl Flinders about his role as global IT head at investment management company Schroders Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
13 Mar 2013
US authorities investigate hack of Michelle Obama and other high-profile people
US authorities are investigating hackers who allegedly stole financial information belonging to US first lady Michelle Obama Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Mar 2013
The Deloitte Consumer Review: A more secure customer
This report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond. Continue Reading
-
News
12 Mar 2013
Information security trends
This report from CompTIA, based on original research, assesses the current trends in information security. Continue Reading
-
News
11 Mar 2013
Phishing emails sent in pairs to lend authenticity, says training company
Phishing emails are now being deployed in pairs to create the illusion of authenticity, says security awareness training company PhishMe Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Mar 2013
Microsoft releases four critical security updates
Microsoft is to release four “critical” patches in its monthly Patch Tuesday security update, according to the advance notice. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Mar 2013
Territorial Army on the hunt for information assurance professionals
TA to recruit IT security professionals into the Royal Signals to strengthen cyber operations Continue Reading
By- Kayleigh Bateman, Computer Weekly
-
News
06 Mar 2013
What is RSA's build, buy, partner strategy?
Computer Weekly takes a closer look at RSA's build, buy, partner strategy Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
05 Mar 2013
The security risk sweeping Europe
Never have we been so open about the information we share online, without so little concern for our privacy. Social media can be a threat to a company, not just to what information an employee chooses to disclose, but because social media sites are prime targets for cybercrime. In this issue of CW Europe read how the increase in social media usage has created new privacy concerns for businesses. Continue Reading
-
News
05 Mar 2013
Enterprise Security Architecture – an outsourcer's view
Alan Jenkins, chief security officer of outsourcing specialist, T Systems, explains the company's approach to enterprise security architecture. Continue Reading
-
News
05 Mar 2013
Enterprise Security Architecture
Mark Brown, Director for Advisory Risk & Information Security at Ernst & Young offers advice to security leaders on developing a robust Enterprise Security Architecture. Continue Reading
-
News
05 Mar 2013
Security the future: Keeping up with the business
Gareth Lindahl-Wise, group information security manager at British American Tobacco, explains the company's approach to enterprise security architecture. Continue Reading
-
Feature
04 Mar 2013
How to tackle big data from a security point of view
Before leaping into big data, companies must be clear what they are trying to achieve, otherwise their investment will be wasted Continue Reading
By- Peter Wood, First Base Technologies LLP
-
Photo Story
04 Mar 2013
How to configure Mac OS X Server
How to secure Mac OS X Server using global password policies and data loss prevention Continue Reading
By- Rob Buckley
-
News
28 Feb 2013
RSA 2013: Suppliers need to prepare for new security vulnerability handling standards
Software makers and online service providers need to prepare for two ISO standards on vulnerability handling processes due by the end of 2013 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Feb 2013
350,000 different types of spam SMS messages were targeted at mobile users in 2012
350,000 different variants of unsolicited spam SMS messages were accounted for in 2012, with 53,000 variants logged for December alone Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
27 Feb 2013
Health records should be protected like bank details, says BCS
The BCS and NHS say people should protect their online medical records in the same way they look after their bank details Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
26 Feb 2013
RSA 2013: Obama cyber order will have significant effect, says DoHS
President Barack Obama’s executive order on cybersecurity is a “very big deal” says Mark Weatherford, deputy under-secretary for cybersecurity at the US Department of Homeland Security (DoHS). Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Feb 2013
Virtualization Security: Protecting Virtualized Environments
This extract from the book Virtualization Security, includes a 30% discount for Computer Weekly readers. Continue Reading
-
News
22 Feb 2013
Music companies critical of Google’s anti-piracy efforts
Music companies have accused Google of failing to fulfil a pledge not to give prominent rankings in search results to websites offering illegal music downloads. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Feb 2013
The Demise in Effectiveness of Signature and Heuristic Based Antivirus
Anti-virus technology is failing to protect organisations from malicious attacks. Security professionals should look at alternative strategies, the NNC group argues in this report. Continue Reading
-
News
15 Feb 2013
Bad outsourcing decisions cause 63% of data breaches
Bad outsourcing decisions nearly two-thirds of data breaches investigated by security firm Trustwave in the past year Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
11 Feb 2013
How to find the most vulnerable systems on your internal network
Most corporate networks share common vulnerabilities, but many could be mitigated with education in “hacker thinking” for technical staff Continue Reading
By- Peter Wood, First Base Technologies LLP
-
News
11 Feb 2013
IT expert in Microsoft monopoly case faces £2.5m legal fight
A computer expert who advised the European Commission in its investigation into anti-competitive behaviour by Microsoft faces £2.5bn legal battle Continue Reading
By- Bill Goodwin, Computer Weekly
-
Feature
07 Feb 2013
Social media: A security challenge and opportunity
Generation Y workers are posing increasing security challenges to their employers as they share data unreservedly Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Feb 2013
EU cyber strategy aimed at boosting preparedness and cooperation
The European cyber security strategy addresses insufficient national preparedness and boosting co-operation in the region, says the EC Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Feb 2013
Business avoids cloud over fear of government snooping
Almost half of IT professionals are deterred from keeping sensitive data in the cloud because of fear of government intervention and possible legal action, a survey has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
06 Feb 2013
Technology in the dock
In this issue of CW Europe we take a look at tablet security, through a range of case studies, highlighting the benefits and downfalls of mobile computing. You will also find information about the European Parliament’s decision to provide a new single patent law regulation and one court to cover intentions across the continent. Continue Reading
-
News
06 Feb 2013
Twitter strengthens login security after hacker attack
Days after a hacking attack, it has emerged that Twitter plans to strengthen its login security with two-factor authentication Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Feb 2013
Twitter resets a quarter of a million accounts after hacker attack
Twitter has reset the passwords of 250,000 accounts after detecting and shutting down a hacker attack last week. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 Jan 2013
Why has NAC, like DLP, failed to take off?
Why are organisations not investing in systems that are designed to keep malicious actors out of their networks? Continue Reading
By- Warwick Ashford, Senior analyst
-
Photo Story
28 Jan 2013
IT Security Purchasing Intentions 2013 - Europe
TechTarget surveyed 250+ IT pros about security media purchasing in Europe. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Jan 2013
Encryption is safe bet, says SafeNet
Encryption is the only thing that can give peace of mind to CIOs and CISOs, says Dave Hansen, president and CEO of security firm SafeNet Continue Reading
By- Warwick Ashford, Senior analyst
-
News
24 Jan 2013
ICO hits Sony with £250,000 data breach penalty
The Information Commissioner’s office (ICO) has fined Sony Computer Entertainment Europe £250,000 for breaching the Data Protection Act Continue Reading
-
News
22 Jan 2013
BYOD: People pay for devices to use for work
Over half of employees buy their own devices for work use, according to new report from mobile device management specialist Good Technology Continue Reading
By- Cliff Saran, Managing Editor
-
News
22 Jan 2013
Why has DLP never taken off?
Why is data loss prevention (DLP) technology not being adopted if it provides the very protection most businesses need? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Jan 2013
Security visualisation
This article is guideline of how to generate a visual representation of a given dataset and use in the evaluation of known security vulnerabilities Continue Reading
-
News
14 Jan 2013
Oracle rushes out patches for Java zero days
Oracle has released two out-of-band security updates for the latest zero day vulnerabilities in Java Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Jan 2013
Disable Java to protect from latest zero-day
Security researchers are warning of a zero-day vulnerability in all versions of Java, including the latest Java 7 update 10 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Jan 2013
Software piracy international in scope, says Fast
The scale of software piracy is both international in scope and military in its execution, says the Federation Against Software Theft (Fast) Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Jan 2013
UK Border Agency tenders for security systems
The UK Border Agency (UKBA) and Border Force is tendering for an integrated border security system Continue Reading
By- Kathleen Hall, TechTarget
-
News
08 Jan 2013
Misuse of social media could wreak havoc, warns World Economic Forum
The rapid spread of false information through social media poses a growing threat to business and society, the World Economic Forum has warned Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
07 Jan 2013
Parliamentary commission calls for electrified banking ring fence
A parliamentary report on plans to separate retail and investment banking calls for legislation to prevent breaches of the ring fence Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
07 Jan 2013
Ernst & Young email keyword analysis identifies fraudsters
Fraud investigators have revealed the most common words used in email conversations by employees engaged in rogue trading and fraud Continue Reading
By- Warwick Ashford, Senior analyst