Identity and access management products
-
News
14 Nov 2024
Ping CEO on ForgeRock integration and future of identity
Ping Identity CEO Andre Durand discusses the company’s unified roadmap, commitment to customer stability and growth plans in the evolving identity landscape following the merger with ForgeRock Continue Reading
By- Aaron Tan, TechTarget
-
News
21 Oct 2024
Can AI be secure? Experts discuss emerging threats and AI safety
International cyber security experts call for global cooperation and proactive strategies to address the security challenges posed by artificial intelligence Continue Reading
By- Aaron Tan, TechTarget
-
Feature
14 Mar 2014
Hacktivism: good or evil?
IT lawyer Dai Davis looks at the rise of hacktivism and its impact on business and international politics Continue Reading
By- Dai Davis, Percy Crow Davis & Co
-
News
12 Mar 2014
Government finally ends e-Borders programme
The government has formally ended the troubled e-Borders programme, with its intended functions merged into a new project Continue Reading
By- Bryan Glick, Editor in chief
-
News
27 Feb 2014
Microsoft takes aim at passwords
Microsoft says it is determined to solve the problem of ineffective authentication that relies on usernames and passwords Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Feb 2014
Bank of England publishes Waking Shark II cyber security exercise results
Bank of England publishes the results of its Waking Shark II security exercise, which tested financial institutions' contingency plans for cyber attack Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
15 Jan 2014
The IT risks facing Universal Credit
Despite Iain Duncan Smith's robust defence of his flagship welfare reform policy, Universal Credit, evidence to the contrary continues to mount Continue Reading
By- Bryan Glick, Editor in chief
-
News
10 Jan 2014
Security considerations for UK enterprises
This Research Snapshot from Vanson Bourne looks at IT security spending trends, awareness of cyber-threats, and the factors perceived as the biggest security risks for organisations. Continue Reading
-
News
12 Nov 2013
Global profiles of the fraudster
Computers, rather than conmen, are set to be the future face of fraud, as criminals turn to robotics in an effort to avoid detection, this report from KPMG reveals. Continue Reading
-
News
30 Oct 2013
Identity assurance system moves into beta test phase
The Government Digital Service has started testing of a key system to support plans for citizens to securely prove their identity when accessing online public services Continue Reading
By- Bryan Glick, Editor in chief
-
News
17 Oct 2013
Government overhauls security classification to fit digital age
In its first overhaul since World War II the government is consolidating six security bands to three with a system deemed more appropriate in the digital age. Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
26 Sep 2013
Small businesses must encrypt customer data, says ICO
The Information Commissioner’s Office (ICO) urges small businesses to encrypt customer data after a sole trader was fined for failing to do so Continue Reading
-
News
05 Sep 2013
Windows 2012 Server Network Security
This book chapter offers an introduction to Windows 8 and Windows Server 2012 network security and IPv6. It includes a 30% discount code for Computer Weekly readers. Continue Reading
-
News
05 Sep 2013
Windows Server 2012 Security from End to Edge and Beyond
This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask. Continue Reading
-
News
05 Sep 2013
Printing: a false sense of security?
Louella Fernandes and Bob Tarzey show how secure printing technology can provide authentication, authorisation and accounting capabilities, helping businesses improve document security and meet compliance regulations. Continue Reading
-
News
20 Aug 2013
Targeted attacks and how to defend against them
Analysts Bob Tarzey and Louella Fernandes assess the scale and real impact of targeted attacks the measures being taken to defend against them. Continue Reading
-
E-Zine
30 Jul 2013
The threat within – balancing security and employee privacy
In this week’s Computer Weekly, as more data breaches come from inside an organisation, we examine how to get the right balance between information security and employees’ rights to privacy. Tech City CEO Joanna Shields talks about the opportunity for CIOs from working with startups. Our buyer’s guide to data management explains how one major utility firm improved information sharing. And we look at how mobile technology and wireless networking is helping improve patient care in the NHS. Read the issue now. Continue Reading
-
News
22 Jul 2013
Insider threat: Balancing security with privacy
How can organisations increase security without affecting productivity or encroaching on employees’ right to privacy? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Jul 2013
IT security case studies
Four critical IT security case-studies selected from the winners of Computer Weekly's European User Awards for security Continue Reading
-
News
18 Jul 2013
Needle in a Datastack: The rise of big security data
This research from McAfee investigates how well organisations are positioned to address the challenges of managing security in a world of ever increasing amounts and types of data. Continue Reading
-
News
17 Jul 2013
2013 Cost of Data Breach Study: UK
The cost of data breaches has risen for UK organisations over the past year, the Ponemon Institute reveals. Continue Reading
-
News
17 Jul 2013
Security Think Tank Download: Bring your own device
Downloadable guide. How to make your company secure when you introduce BYOD. Continue Reading
-
News
17 Jul 2013
IT Security Case Studies
Warwick Ashford presents 4 essential IT security case-studies selected from the winners of Computer Weekly's European User Awards. Continue Reading
-
News
11 Jul 2013
Protecting against modern password cracking
This article in our Royal Holloway Security Thesis series explains just how insecure passwords are and offers advice on alternative methods of security. Continue Reading
-
News
24 Jun 2013
Identity management key to browser-based IT strategy
A cloud-based identity management system is key to enabling a browser-based IT strategy at online recruitment firm Reed.co.uk Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
10 Jun 2013
Manage identity and access to improve business processes
Streamlining identity and access management is essential to exploiting your organisation’s assets and employees’ productivity. Continue Reading
By- Andras Cser
-
News
10 Jun 2013
2013 Cost of Data Breach Study: UK
The cost of data breaches has risen for UK organisations over the past year, but companies that appoint chief information security officers with enterprise-wide responsibilities can reduce their costs, this report from the Ponemon Institute reveals Continue Reading
-
News
01 May 2013
CW buyer's guide: context-aware security
This 11-page Computer Weekly buyer's guide looks at how organisations should approach context-aware security technologies and what business benefits they can deliver. Continue Reading
-
News
01 May 2013
CW Special Report on CSC
This 16-page report from Computer Weekly analyses the challenges facing CSC, its financial performance, the services it offers, its place in the IT market and its future strategy. Continue Reading
-
News
29 Apr 2013
Another online firm hit by data breach
Online deals service LivingSocial is the latest company to report a breach of its computer systems that may mean attackers accessed customer details Continue Reading
-
News
25 Apr 2013
Spam SMS messages drop following ICO penalty
The number of spam SMS messages has significantly reduced since government regulator ICO issued £440,000 fines last year Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
19 Apr 2013
Conficker makes way for web-based attacks, says Microsoft
Web attacks emerge as top threat as businesses finally begin to win the battle against Conficker and other worms, says Microsoft Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Mar 2013
What is RSA's build, buy, partner strategy?
Computer Weekly takes a closer look at RSA's build, buy, partner strategy Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Feb 2013
Twitter strengthens login security after hacker attack
Days after a hacking attack, it has emerged that Twitter plans to strengthen its login security with two-factor authentication Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 Jan 2013
Why has NAC, like DLP, failed to take off?
Why are organisations not investing in systems that are designed to keep malicious actors out of their networks? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Jan 2013
BYOD: People pay for devices to use for work
Over half of employees buy their own devices for work use, according to new report from mobile device management specialist Good Technology Continue Reading
By- Cliff Saran, Managing Editor
-
News
14 Dec 2012
Mazars outsources access management
Global accountancy firm Mazars has outsourced the management of access to Oracle and Sharepoint applications for 6000 global staff Continue Reading
-
News
03 Dec 2012
IT Security Purchasing Intentions 2013
This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe. Continue Reading
-
News
13 Nov 2012
The Global State of Information Security Survey 2013: Key Findings
This global study examines the state of cyber-security and the impact of cyber crime and offers advice to businesses on reducing the risks. Continue Reading
-
Tip
31 Oct 2012
Identity and access management (IAM) in the cloud: Challenges galore
Identity and access management (IAM) in the cloud poses never before seen challenges to Indian organizations. Here are some points to keep an eye out for. Continue Reading
By- Narendra Sahoo, Vista Infosec
-
News
25 Oct 2012
Government expected to unveil eight IDA suppliers for online services
The government is to announce suppliers – including PayPal, BT and the Post Office – to provide identity assurance (IDA) for online public services Continue Reading
By- Kathleen Hall, TechTarget
-
Opinion
18 Oct 2012
Security Think Tank: You can’t protect what you don’t know you’ve got
IP theft: who should be tackling it and how? Continue Reading
By- Adrian Wright
-
Tip
18 Oct 2012
Leading Indian banking portals contain glaring security lapses
Even as Internet banking portals transform the way Indians bank, vulnerabilities exist in banking websites like SBI, Citibank India, HDFC Bank and ICICI Bank. Continue Reading
By- Ajit Hatti, Contributor
-
News
16 Oct 2012
Organisations need alternative data protection as security models fail
Organisations' security models are failing - so could it be time to adopt an intelligence-led approach to data protection and fighting cyber crime? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Oct 2012
RSA Europe: Thousands of unprotected virtual servers exposed to the web
Organisations are failing to protect data in virtual environments, says Jason Hart, vice-president cloud solutions, SafeNet Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Oct 2012
RSA Europe: Security concerns whole supply chain, says Misha Glenny
Targeted attacks affect the whole supply chain, not just big corporations, author Misha Glenny tells RSA Conference Europe 2012 attendees Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Oct 2012
DWP to announce identity assurance suppliers
The Department for Work and Pensions (DWP) is to announce the first providers in the government’s identity assurance (IDA) scheme at the end of October Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
10 Oct 2012
CW500: Managing the mobile workforce (part 1)
Mobile working has transformed Colt Telecommunications beyond recognition over the past three years Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
05 Oct 2012
Security firm warns against Samsung Galaxy Tab for enterprise use
Security specialist Context Information Security says vulnerabilities in the Samsung Galaxy Tab make it unsuitable for use in the enterprise Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
02 Oct 2012
HMRC deploys Becrypt off-the-shelf encryption
HMRC will use Becrypt Disk protect, which has recently been certified under the government’s Commercial Product Assurance (CPA) Scheme. Continue Reading
By- Cliff Saran, Managing Editor
-
Tip
25 Sep 2012
Limitations of two factor authentication (2FA) technology
The common two factor authentication (2FA) techniques used In India have several shortfalls. We take a look at security risks associated with 2FA solutions. Continue Reading
By- Rakesh Thatha, Contributor
-
News
20 Sep 2012
Dell SecureWorks uncovers cyber espionage targeting energy firms
Dell SecureWorks researchers have discovered a cyber espionage campaign targeting several companies, including two in the energy sector Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 Sep 2012
Government launches £3.8m cyber security institute
The government has ramped up moves to tackle growing cyber security threats by launching a £3.8m research institute. Continue Reading
By- Kathleen Hall, TechTarget
-
News
05 Sep 2012
FBI denies link to leaked Apple device codes
The FBI says there is no evidence that Anonymous gained access to 12 million identity codes for Apple devices by hacking an FBI agent's laptop Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Sep 2012
Anonymous claims a million Apple IDs in FBI breach
Hacking group Anonymous claims to have released over a million Apple Unique Device Identifiers (UDIDs) obtained from breaching FBI networks Continue Reading
-
News
03 Sep 2012
Powerful cyber attack tools widely available, say researchers
More low-level cyber criminals are getting access to sophisticated attack tools, say cyber intelligence specialists Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Sep 2012
Advanced cyber-security intelligence
Analysts Bob Tarzey and Clive Longbottom look at the business case for rolling out next security information and event management tools. Continue Reading
-
News
03 Sep 2012
Cyber Vulnerability Index
What does your online corporate profile reveal? With so many cyber attacks in the news recently, executives are becoming increasingly concerned about their organisation’s exposure to hackers. Continue Reading
-
News
31 Aug 2012
Businesses worldwide fail to prepare for cyber threats, says Kaspersky Lab
Companies around the world have failed to address cyber threats, according to a survey from security organisation Kaspersky Lab Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Aug 2012
At least 9 out of 10 top mobile apps hacked, study shows
An average of 96% of the top 100 paid mobile apps have been hacked, a study has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Aug 2012
More than 1,000 school application details leaked on the internet
Personal information about more than 1,000 children has been published on the UK Independent Schools Guide website after an alleged cyber attack Continue Reading
-
News
08 Aug 2012
Good data protection can be cheap and easy, says ICO
The ICO says charities and third sector organisations stand to benefit most from a data protection check-up. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Aug 2012
LinkedIn data breach costs more than $1m
LinkedIn says the forensic investigation and other recovery costs of the data breach in June could have topped $1m. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
31 Jul 2012
Cyber threats affect banks worldwide
Nearly a quarter of the world's banks were hit by security breaches in the past year, a study shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Jul 2012
Twitter users targeted by Blackhole malware
Twitter users are being targeted by tweets containing malicious links that claim recipients are pictured in an online photo Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Jul 2012
Australian telco AAPT confirms Anonymous data breach
Australian telecoms firm AAPT confirms business customer data was breached by hacktivist group Anonymous at an external service provider Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Jul 2012
Many global firms unaware of online risk, finds KPMG
Many global organisations could do a lot more to protect their private data and reduce exposure to attacks by hackers, according to KPMG Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 Jul 2012
Sophos combines endpoint security and UTM
Security firm Sophos combines endpoint protection and unified threat management (UTM) products into a single physical or virtual appliance Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Jul 2012
Google Android OS Trojan virus hits 100K devices in China
Trojan malware has hit 100,000 devices using the Google Android operating system (OS) in China, say security researchers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Jul 2012
BT extends cyber security agreement with MoD
BT is to extend its cyber security agreement with the Ministry of Defence (MoD) in a deal to expand its cyber defence service Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Jun 2012
White House cyber security coordinator Howard Schmidt joins Qualys
Former White House cyber security coordinator Howard Schmidt is to join the board of security and compliance company Qualys Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Jun 2012
Network security: Is new technology bypassing traditional controls?
Network security practices are among the most mature, but can businesses be sure network traffic is not sneaking past traditional controls? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Jun 2012
FTC sues Wyndham Worldwide hotel group over data breaches
The US Federal Trade Commission (FTC) is suing hotel group Wyndham Worldwide over claims it failed to secure customer data Continue Reading
By- Warwick Ashford, Senior analyst
-
Answer
26 Jun 2012
Techniques for preventing a brute force login attack
A brute force login attack can enable an attacker to log in to an application and steal data. Rob Shapland explains how to prevent brute force attacks. Continue Reading
By -
News
18 Jun 2012
Ethiopian government blocks Tor Network online anonymity
The Ethiopian government is blocking access to the Tor Network that enables online anonymity, according to Reporters Without Borders Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Jun 2012
2012: Will this be the year TPM finally comes of age?
Will 2012 be the year that TPM finally delivers on its potential to provide a hardware-based "root of trust" for enterprise information security? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Jun 2012
Flame malware gets kill command
The controllers of Flame, the most powerful cyber weapon discovered to date, have recently sent a kill command that removes the malware from some infected computers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
08 Jun 2012
eHarmony, Last.fm join LinkedIn with password leaks
Online dating site eHarmony and Last.fm have joined LinkedIn with password leaks, as hackers focus on social networks Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Jun 2012
Top 10 tips for IPv6 security
Many organisations are being misled about the complexities surrounding IPv6 security, according to security firm Stonesoft Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 May 2012
Security researchers discover powerful cyber espionage weapon 'Flame'
Security researchers have discovered a cyber espionage weapon, dubbed 'Flame', with a functionality greater than any other known threat Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 May 2012
UK regulator PhonepayPlus shuts down Angry Birds smartphone scam
UK users of Android smartphones have been targeted by premium-rate phone scams masquerading as popular apps such as Angry Birds Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 May 2012
Mobile threats demand focus on data protection, says Websense
Business needs to focus on data protection as cyber criminals turn to mobile malware, says Websense. Continue Reading
-
News
17 May 2012
The Pirate Bay is latest site to be hit by DDoS attack
The Pirate Bay has become the latest high-profile website to be hit by a distributed denial-of-service (DDoS) attack Continue Reading
By- Warwick Ashford, Senior analyst
-
Photo Story
30 Apr 2012
InfoSecurity Europe: Odd Bugs
A selection of photos showing how far exhibitors will go to get people to their stands at InfoSecurity Europe 2012... Continue Reading
By- Cliff Saran, Managing Editor
-
News
30 Apr 2012
Half of UK networks vulnerable to APTs
Many UK corporate networks are vulnerable to advanced persistent threats (APTs), a survey has revealed. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Apr 2012
SOCA shuts down network of CVV sellers' carder sites
The Serious Organised Crime Agency shut down 36 CVV sellers who were selling stolen credit card and banking credentials to buyers around the world. Continue Reading
By -
News
26 Apr 2012
Infosec 2012: Unscrubbed hard drives a threat to business, says ICO
Unscrubbed hard drives on computers that are decommissioned and sold on represent a significant risk to business Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Apr 2012
Infosec 2012: Patching alone can deliver 80% protection
Keeping software up to date with security patches can deliver 80% protection from cyber threats, says security firm Secunia. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Apr 2012
Infosec 2012: Cloud enables security expertise for SME
Small and medium enterprises (SMEs) typically face the same threats as bigger organisations, but lack the same level of expertise and other security resources. Continue Reading
By- Warwick Ashford, Senior analyst
-
Photo Story
24 Apr 2012
Infosecurity Europe
With 300 exhibitors and hundreds of delegates, security is still hot on the IT agenda. Cliff Saran presents the highlights of infosecurity Europe Continue Reading
By- Cliff Saran, Managing Editor
-
News
24 Apr 2012
2012 Information Security Breaches Survey
Security breaches cost the UK billions over the last 12 months as cyber attacks reached record levels. Continue Reading
-
News
23 Apr 2012
UK firms see competitors as greater cyber attack risk than criminals
More than half of UK firms expect a cyber attack in the next six months, but see competitors as a greater risk than criminals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
02 Apr 2012
UK business fears impact of new EU data protection framework
More than half of senior UK IT managers in large enterprises believe the proposed new EU data protection framework will cost their business more money, a survey has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Mar 2012
Warwickshire-based company to revamp data protection following breach
A Warwickshire-based company has committed to taking action to protect personal data, following a breach of the Data Protection Act Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Mar 2012
Barclays Bank card data vulnerable to mobile phone scanning fraud
Channel 4 News has revealed fraudsters can access the data on Barclays Bank cards by scanning them with mobile phones Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Feature
20 Mar 2012
Bank of India’s 2FA with mutual authentication goes beyond OTPs
Indian BFSI major Bank of India chose mutual authentication when it required a two factor authentication (2FA) solution. There’s been no looking back. Continue Reading
By- Varun Haran, Reporter
-
News
19 Mar 2012
UK hacktivist cases should spur business to action, says lawyer
The last of four alleged UK members of hacktivist group LulzSec has appeared in Westminster magistrates court in London Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 Mar 2012
BBC cyber attacks highlight difficulty of attribution
The BBC has said it is was targeted by cyber attacks following a campaign by Iran against its Persian service, but stopped short of accusing Tehran of ordering the cyber attacks Continue Reading
By- Warwick Ashford, Senior analyst
-
News
02 Mar 2012
2012 security outlook
This report, based on extensive research from chief information security officers, identifies the top 10 security imperatives for 2012. Continue Reading
-
News
01 Mar 2012
RSA 2012: IT security experts urge enterprises to ban smartphone BYOD schemes
Enterprises should ban employees from using their own smartphones for work, a panel of IT security practitioners told the RSA Conference 2012 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 Mar 2012
DWP tenders for £25m IDA services
The Department for Work and Pensions (DWP) has tendered for a £25m identity assurance (IDA) framework to create a marketplace of providers across the public sector. Continue Reading
By- Kathleen Hall, TechTarget
-
News
29 Feb 2012
IT departments risk losing responsibility for IT security
IT security professionals can no longer take it for granted that IT security will continue as part of the IT function Continue Reading
By- Bill Goodwin, Computer Weekly