Network security management
-
News
15 Jan 2025
Cyber security dovetails with AI to lead 2025 corporate IT investment
Cyber security and GenAI top enterprise IT investment plans for 2025, whether singly or together, according to research from Enterprise Strategy Group Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
15 Jan 2025
Biggest Patch Tuesday in years sees Microsoft address 159 vulnerabilities
The largest Patch Tuesday of the 2020s so far brings fixes for more than 150 CVEs ranging widely in their scope and severity – including eight zero-day flaws Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Jan 2025
CNI operators should ask these 12 questions of their OT suppliers
The NCSC, CISA and others have set out 12 cyber security considerations CNI organisations and other users of operational technology should incorporate into their buying processes to force their suppliers to do better Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Jan 2025
US bank FNBO uses Pindrop to tackle voice fraud, deepfakes
Learn how First National Bank of Omaha in the US is enhancing customer authentication and verification in its contact centres, eliminating friction points and making life easier for its customer service teams, with Pindrop voice security technology Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Jan 2025
Mandiant: Latest Ivanti vulns exploited by Chinese cyber spooks
Threat actors are once again lining up to exploit vulnerabilities in the widely used Ivanti product suite, with an apparent link to Chinese espionage activity Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Jan 2025
German court finds hacked EncroChat phone evidence inadmissible
The Berlin Regional Court has found that evidence obtained by a joint French and Dutch operation to hack the EncroChat encrypted mobile phone network is legally inadmissible, raising questions about its use in other European countries Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
03 Jan 2025
US Treasury incident a clear warning on supply chain security in 2025
A cyber incident at the US Department of the Treasury – blamed on a Chinese state actor – raises fresh warnings about supply chain risk after it was found to have originated via vulnerabilities in a remote tech support product Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
23 Dec 2024
What is a proxy firewall?
A proxy firewall is a network security system that protects network resources by filtering messages at the application layer. Continue Reading
By -
Opinion
19 Dec 2024
Innovation, insight and influence: the CISO playbook for 2025 and beyond
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Mandy Andress, Elastic
-
News
18 Dec 2024
The Security Interviews: Martin Lee, Cisco Talos
Threat intel expert and author Martin Lee, EMEA technical lead for security research at Cisco Talos, joins Computer Weekly to mark the 35th anniversary of the first ever ransomware attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Dec 2024
Top 10 cyber security stories of 2024
Data breaches, data privacy and protection, and the thorny issue of open source security were all hot topics this year. Meanwhile, security companies frequently found themselves hitting the headlines, and not always for good reasons. Here are Computer Weekly's top 10 cyber security stories of 2024 Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
18 Dec 2024
Look to the future: How the threat landscape may evolve next
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Elliott Wilkes, ACDS
-
News
18 Dec 2024
Top 10 cyber crime stories of 2024
From ransomware targeting the NHS to nation-state-backed intrusions, 2024 was another big year for cyber criminals and cyber spooks alike, but they didn't have it all their own way as the good guys fought back Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Dec 2024
How AWS is protecting customers from cyber threats
Amazon Web Services reveals how its threat intelligence capabilities work under the hood to thwart cyber attacks and keep its customers’ data safe Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
12 Dec 2024
CISOs: Don’t rely solely on technical defences in 2025
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Deepti Gopal, Gartner
-
News
10 Dec 2024
Dangerous CLFS and LDAP flaws stand out on Patch Tuesday
Microsoft has fixed over 70 CVEs in its final Patch Tuesday update of the year, and defenders should prioritise a zero-day in the Common Log File System Driver, and another impactful flaw in the Lightweight Directory Access Protocol Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
10 Dec 2024
Defending against cyber grinches: AI for enhanced security
On the Seventh Day of AI, Defending against cyber grinches: AI for enhanced security, we explore the double-edged sword of AI in cybersecurity and how businesses can protect themselves against the cyber grinches. Continue Reading
By- Justin Young, ANS
-
News
10 Dec 2024
Top IT predictions in APAC in 2025
Enterprises across the Asia-Pacific region are expected to focus on securing their AI workloads, invest in energy efficient infrastructure and rethink their platform strategy, among other tech trends in the new year Continue Reading
By- Aaron Tan, TechTarget
-
E-Zine
10 Dec 2024
On the road to change at Aston Martin
In this week’s Computer Weekly, we talk to the CIO at luxury car maker Aston Martin to find out how technology is helping tackle the huge challenges facing the automotive sector. The new National Cyber Security boss explains why organisations need to be extra vigilant against the growing online threats. And we examine the future of secure remote connectivity in the cloud era. Read the issue now. Continue Reading
-
Opinion
06 Dec 2024
Six trends that will define cyber through to 2030
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Pierre-Martin Tardif, ISACA
-
News
06 Dec 2024
TfL cyber attack cost over £30m to date
TfL provides more detail on the financial impact of the September 2024 cyber attack that crippled several of its online systems Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Dec 2024
Shared digital gateway was source of three NHS ransomware attacks
Alder Hey children’s hospital confirms ransomware operators accessed its systems through a shared digital gateway, but is standing firm in the face of the gang’s demands Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
04 Dec 2024
The most pressing challenges for CISOs and cyber security teams
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Elliot Rose, PA Consulting
-
News
04 Dec 2024
Nordics move to deepen cyber security cooperation
Nordic countries are increasing collaboration on cyber security amid more sophisticated and aggressive attacks Continue Reading
By- Gerard O'Dwyer
-
News
03 Dec 2024
US updates telco security guidance after mass Chinese hack
Following the widespread Salt Typhoon hacks of US telecoms operators including AT&T and Verizon, CISA and partner agencies have launched refreshed security guidance for network engineers and defenders alike Continue Reading
By- Alex Scroxton, Security Editor
-
News
02 Dec 2024
APAC businesses face cyber onslaught
The Asia-Pacific region is a cyber security hotspot, enduring significantly more cyber attacks than the global average, with AI-powered threats and skills shortages exacerbating the problem Continue Reading
-
News
02 Dec 2024
NCSC boss calls for ‘sustained vigilance’ in an aggressive world
NCSC CEO Richard Horne is to echo wider warnings about the growing number and severity of cyber threats facing the UK as he launches the security body’s eighth annual report Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
02 Dec 2024
CISOs will face growing challenges in 2025 and beyond
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Mike Gillespie and Ellie Hurst, Advent IM
-
News
26 Nov 2024
Sellafield operator opens dedicated cyber centre
The UK’s Nuclear Decommissioning Authority has opened a cyber security centre spanning its activities across the nuclear sector Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Nov 2024
BT unveils managed SASE service
Telecoms provider expands managed software-defined wide area network solution with new security service edge capabilities to help businesses transition to a secure access service edge model Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Definition
25 Nov 2024
What is IPsec (Internet Protocol Security)?
IPsec (Internet Protocol Security) is a suite of protocols and algorithms for securing data transmitted over the internet or any public network. Continue Reading
By- Katie Terrell Hanna
- Peter Loshin, Former Senior Technology Editor
-
Definition
25 Nov 2024
What is Extensible Authentication Protocol (EAP)?
Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by Point-to-Point Protocol (PPP), a protocol often used when connecting a computer to the internet. Continue Reading
-
News
25 Nov 2024
Geopolitical strife drives increased ransomware activity
The lines between financially motivated cyber criminals and nation state APTs are rapidly blurring, as geopolitical influences weigh heavily on the threat landscape, according to data from NCC Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
22 Nov 2024
What is endpoint detection and response (EDR)?
Endpoint detection and response (EDR) is a system that gathers and analyzes security threat-related information from computer workstations and other endpoints. Continue Reading
By- Nick Barney, Technology Writer
- Gavin Wright
- Alexander S. Gillis, Technical Writer and Editor
-
News
21 Nov 2024
BianLian cyber gang drops encryption-based ransomware
The Australian and American cyber authorities have published updated intelligence on the BianLian ransomware gang, which has undergone a rapid evolution in tactics Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Nov 2024
AI readiness stalls in APAC
Despite significant investment in AI, only 15% of organisations in Asia-Pacific are ready to deploy the technology today, according to Cisco’s latest regional AI readiness survey Continue Reading
-
Feature
19 Nov 2024
Storage technology explained: Ransomware and storage and backup
We look at ransomware attacks, and the importance of good backup practice as well as immutable snapshots, air-gapping, network segmentation, AI anomaly detection and supplier warranties Continue Reading
By- Antony Adshead, Storage Editor
-
Definition
18 Nov 2024
What is a spam trap?
A spam trap is an email address that's used to identify and monitor spam email. It's also a type of honeypot because it uses a fake email address to bait spammers. Continue Reading
By- Scott Robinson, New Era Technology
- Ben Lutkevich, Site Editor
-
News
13 Nov 2024
China’s Volt Typhoon rebuilds botnet in wake of takedown
Nine months after its malicious botnet comprising legacy routers was disrupted by the Americans, Chinese APT Volt Typhoon is rebuilding and presents as persistent a threat as ever Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
08 Nov 2024
Beyond VPNs: The future of secure remote connectivity
As more companies adopt cloud services and remote work, the limitations of VPNs are becoming obvious. We explore what’s next for secure remote connectivity Continue Reading
By -
News
01 Nov 2024
CISA looks to global collaboration as fraught US election begins
The US' CISA cyber agency has unveiled a two-year International Strategic Plan to advance collaboration and improve resilience against shared risks and threats Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Oct 2024
Dutch critical infrastructure at risk despite high leadership confidence
Stark paradox in Dutch cyber security landscape has business leaders expressing high confidence in their IT infrastructure as cyber attacks rise Continue Reading
By- Kim Loohuis
-
News
25 Oct 2024
How Infoblox is tackling multicloud complexity and boosting security
Infoblox CEO Scott Harrell discusses the company’s new Universal DDI service designed to address the growing challenges of managing network security in hybrid IT environments Continue Reading
By- Aaron Tan, TechTarget
-
News
22 Oct 2024
Danish government reboots cyber security council amid AI expansion
Denmark’s government relaunches digital security initiative to protect business sectors and society at large Continue Reading
By- Gerard O'Dwyer
-
News
16 Oct 2024
Cato further expands SASE platform for ‘complete’ UK delivery
Secure access service edge platform gains digital experience monitoring capability so enterprises can monitor user experiences and fix them online or in private datacentres Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Feature
15 Oct 2024
Reinventing security operations for the modern threat landscape
The growing pace of digital transformation has opened new avenues for attackers, making traditional security measures obsolete. Organisations must modernise their security operations to fortify their defences and navigate the evolving threat landscape Continue Reading
By- Aaron Tan, TechTarget
-
News
15 Oct 2024
Telefónica and Halotech integrate post-quantum encryption into IoT devices
Leading global telco implements state-of-the-art cyber security through internet of things managed connectivity platform allowing devices to be controlled and monitored in real time and remotely Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
11 Oct 2024
NFL and Cisco gain yardage with network and security partnership
Cisco scores contract extension with US sports body NFL to connect and protect 2024 roster of International Games in the UK, Germany, Brazil and Spain in 2025 Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
10 Oct 2024
NCSC issues fresh alert over wave of Cozy Bear activity
The NCSC, FBI and NSA publish updated warning about Cozy Bear’s activities, highlighting a range of vulnerabilities the threat actor is using to set up its cyber attacks Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Oct 2024
Government launches cyber standard for local authorities
Local government bodies are being invited to take advantage of a new NCSC-derived Cyber Assessment Framework to help enhance their resilience and ward off cyber attacks Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Oct 2024
How Recorded Future finds ransomware victims before they get hit
Threat intel specialists at Recorded Future have shared details of newly developed techniques they are using to disrupt Rhysida ransomware attacks before the gang even has a chance to execute them Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Oct 2024
Secureworks: Ransomware takedowns didn’t put off cyber criminals
The number of active cyber criminal ransomware gangs has surged by almost a third in the space of 12 months, according to the latest intelligence from Secureworks Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Oct 2024
UK’s cyber incident reporting law to move forward in 2025
The UK government says that enforced cyber incident and ransomware reporting for critical sectors of the economy will help to build a better picture of the threat landscape and enable more proactive and preventative responses Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Oct 2024
UK telcos including BT at risk from DrayTek router vulnerabilities
A series of vulnerabilities in DrayTek's Vigor router product lines affects multiple comms service providers in the UK, according to new analysis Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Oct 2024
NCSC celebrates eight years as Horne blows in
Outgoing NCSC interim leader Felicity Oswald shares her thoughts on the body’s work over the past eight years as she hands over the reins to incoming CEO Richard Horne Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Oct 2024
Cups Linux printing bugs open door to DDoS attacks, says Akamai
The Cups Linux printing vulnerabilities disclosed at the end of September would seem to have a nasty sting in their tail, according to researchers at Akamai Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Oct 2024
Microsoft files lawsuit to seize domains used by Russian spooks
Microsoft has been given permission to seize multiple domains used by the Russian state threat actor Star Blizzard as part of a coordinated disruption effort undertaken ahead of the US elections Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Oct 2024
Nutanix courts VMware customers in APAC amid Broadcom concerns
Nutanix is driving double-digit growth across the region by capitalising on the evolving cloud landscape with its hybrid cloud and artificial intelligence offerings, as well as anxieties about the future direction of VMware under Broadcom’s ownership Continue Reading
By- Aaron Tan, TechTarget
-
Definition
30 Sep 2024
What is WPA3 (Wi-Fi Protected Access 3)?
WPA3, also known as Wi-Fi Protected Access 3, is the third iteration of a security certification standard developed by the Wi-Fi Alliance. WPA3 is the latest updated implementation of WPA2, which has been in use since 2004. Continue Reading
By- Gavin Wright
- Alexander S. Gillis, Technical Writer and Editor
-
News
26 Sep 2024
Racist Network Rail Wi-Fi hack was work of malicious insider
Police have revealed that this week’s racist cyber attack on public Wi-Fi networks at stations across the UK appears to have been the work of a malicious insider, after arresting an employee of one of the service providers Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Sep 2024
Islamophobic cyber attack downs Wi-Fi at UK transport hubs
An apparent hacktivist attack disrupted public-facing Wi-Fi networks at UK rail stations to display Islamophobic content Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Sep 2024
Microsoft shares progress on Secure Future Initiative
Microsoft has published a progress report on its Secure Future Initiative, launched last year in the wake of multiple security incidents, and made a series of commitments to improve its internal cyber culture Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
16 Sep 2024
Automation driving SD-WAN optimisation
AIOps is being deployed to help manage highly distributed enterprise networking configurations Continue Reading
By- Cliff Saran, Managing Editor
-
News
13 Sep 2024
Cyber workforce must almost double to meet global talent need
Research from ISC2 finds global cyber workforce needs additional 4.8 million people to fully secure businesses Continue Reading
By- Clare McDonald, Business Editor
-
News
12 Sep 2024
European enterprise networking lacks hybrid maturity
Deploying a complex hybrid and multicloud IT architecture has an impact on enterprise network management Continue Reading
By- Cliff Saran, Managing Editor
-
News
06 Sep 2024
Longstanding Darktrace CEO Poppy Gustafsson to step down
Darktrace CEO Poppy Gustafsson is to leave the AI cyber company she helped build with Mike Lynch after more than a decade, following its acquisition by a private equity firm Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Aug 2024
Siegwerk strengthens global manufacturing operations with managed SD-WAN
Global manufacturer enhances operational security and digitisation with managed SD-WAN, managed security and professional services Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
30 Aug 2024
MEF association claims SASE milestone
Leading technology provider achieves first milestone in secure access service edge programme, with SASE certification now generally available to trade association’s technology and service provider members Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
30 Aug 2024
Norwegian Refugee Council leverages Okta for Good cyber scheme
Pietro Galli, CIO of the Norwegian Refugee Council, reveals how the globally distributed NGO has been taking advantage of the Okta for Good CSR programme to improve its own cyber security and data protection practice, and elevate good practice in the third sector Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Aug 2024
Iranian APT caught acting as access broker for ransomware crews
Members of Iran-backed Pioneer Kitten APT appear to be trying to supplement their pay packets by helping Russian-speaking ransomware gangs to access their victims in exchange for a cut of the profits Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Aug 2024
Iranian APT Peach Sandstorm teases new Tickler malware
Peach Sandstorm, an Iranian state threat actor, has developed a dangerous new malware strain that forms a key element of a rapidly evolving attack sequence Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Aug 2024
Global cyber spend to rise 15% in 2025, pushed along by AI
Security spending will increase at pace in 2025, with artificial intelligence, cloud and consultancy services all pushing outlay to new highs, according to Gartner Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Aug 2024
How Kaspersky is driving growth in APAC
Kaspersky is leveraging its threat intelligence capabilities and local market knowledge to navigate geopolitical tensions and expand its footprint across the Asia-Pacific region Continue Reading
By- Aaron Tan, TechTarget
-
News
27 Aug 2024
Palo Alto Networks bets on ‘precision AI’
Palo Alto Networks’ regional leader, Steven Scheurmann, explains how machine learning, neural networks and generative AI can help to prevent breaches in what it calls ‘precision AI’ Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
15 Aug 2024
Google's cookie conundrum: What comes next?
Google's revised approach to third-party cookies shouldn't come as a surprise, and may also be welcome Continue Reading
By- Christian Ward
-
News
13 Aug 2024
NIST debuts three quantum-safe encryption algorithms
NIST has launched the first three quantum-resistant encryption algorithms, and as the threat of quantum-enabled cyber attacks grows greater, organisations are encouraged to adopt them as soon as they can Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
13 Aug 2024
Labour's first cyber priority must be the NHS
With Labour returning to 10 Downing Street after 14 years, the Computer Weekly Security Think Tank panellists share advice and wish lists for the new government Continue Reading
By- Adam Button
-
News
24 Jul 2024
WhatsApp and Signal messages at risk of surveillance following EncroChat ruling, court hears
Defence lawyers seek leave to appeal a decision by the Investigatory Powers Tribunal that the National Crime Agency lawfully obtained warrants to intercept messages sent over an encrypted phone network Continue Reading
By- Bill Goodwin, Computer Weekly
-
Feature
23 Jul 2024
Enhancing mobile app security with behaviour-based biometrics
Behavioural-based biometrics offer tantalising advantages over more traditional biometric solutions. Learn about some of the benefits and potential challenges for safe and secure implementation Continue Reading
By -
News
22 Jul 2024
NCA cracks digitalstress DDoS-for-hire operation
The UK authorities have taken down a major component of the multinational DDoS cyber attack-for-hire ecosystem, hacking into the digitalstress.su service and exfiltrating data on its users, who now face arrest Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
22 Jul 2024
The sky’s the limit with the two sides of AI and networking
Generative AI is a hyped topic in virtually all industries. But within the realms of infrastructure management, there are two aspects to consider: AI for networking, and networking for AI Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
18 Jul 2024
Netscout expands network observability for the digital edge
Network performance management firm announces business edge observability for networks, applications and user experience to mitigate risk and reduce mean time to respond Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
16 Jul 2024
Incubator Plexal heads to Singapore for CyberBoost
Cyber startup hub Plexal expands its presence to Singapore through a new initiative, and sets its sights on helping new UK businesses break into the booming Asia-Pacific market Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Jul 2024
How Snowflake is tackling AI challenges
Snowflake’s regional leader Sanjay Deshmukh outlines how the company is helping customers to tackle the security, skills and cost challenges of AI implementations Continue Reading
By- Aaron Tan, TechTarget
-
News
11 Jul 2024
Dutch research firm TNO pictures the SOC of the future
In only a few years, security operations centres will have a different design and layout, and far fewer will remain Continue Reading
By- Kim Loohius
-
News
09 Jul 2024
Lessons from war: How Israel is fighting Iranian state-backed hacking
The general director of the Israel National Cyber Directorate talks about the rise in cyber attacks and what lessons the country has gleaned to defend against hacking from foreign parties Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
28 Jun 2024
How Recorded Future is operationalising threat intelligence
Recorded Future is investing in APIs to enable automated security workflows, among other measures, to help organisations overcome the hurdles of operationalising threat intelligence Continue Reading
By- Aaron Tan, TechTarget
-
News
26 Jun 2024
Scottish Courts and Tribunal Service replaces legacy SD-WAN
Contract awarded for the deployment of cross-Scotland software-defined wide area network designed to ensure efficient, secure and reliable administrative services to the judiciaries of Scotland Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
24 Jun 2024
Sellafield pleads guilty to criminal charges over cyber security
Nuclear Decommissioning Authority-backed organisation Sellafield Ltd pleads guilty to criminal charges brought over significant cyber security failings that could have compromised sensitive nuclear information Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
24 Jun 2024
Hybrid work prompts spike in network security threats
Survey shows more than two-thirds of organisations have seen an increase in network security threats over the past 18 months, with remote and hybrid working the biggest contributor to heightened threat levels Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
24 Jun 2024
Tata Communications hosted SASE claims to redefine networking, security
Tata Communications claims world-first implementation of unified SASE solution to deliver unified visibility and control of network traffic with context-led insights and enhanced user experience Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
21 Jun 2024
Qilin ransomware gang publishes stolen NHS data online
The ransomware gang behind a major cyber attack on NHS supplier Synnovis has published a 400GB trove of private healthcare data online Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
21 Jun 2024
ICO police cloud guidance released under FOI
Long-awaited guidance from the UK data regulator on police cloud deployments highlights some potential data transfer mechanisms it thinks can clear up ongoing legal issues, but tells forces it’s up to them to decide if the measures would work Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Definition
18 Jun 2024
DNS attack
A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system. Continue Reading
By -
16 Jun 2024
Securing the edge: A new battleground in mobile network security
Edge computing is changing approaches to mobile network infrastructure, but failure to secure it can expose networks and data to cyber threats. We look at the dangers and potential solutions. Continue Reading
-
Opinion
13 Jun 2024
Data leakage in the cloud – can data truly be safe in the cloud?
This month, the Computer Weekly Security Think Tank considers how CISOs and security practitioners should ensure that the business can make use of public cloud services safely and securely and avoid accidental or deliberate data leakage. Continue Reading
By- Scott Swalling
-
Definition
13 Jun 2024
secure access service edge (SASE)
Secure access service edge (SASE), pronounced sassy, is a cloud architecture model that bundles together network and cloud-native security technologies and delivers them as a single cloud service. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Kinza Yasar, Technical Writer
-
News
07 Jun 2024
Juniper Networks claims first with AIOps to WAN routing
Juniper Networks announces industry leadership with enhancements to cloud-native Mist AI engine for all network domains, claiming to deliver insight for exceptional experiences Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
07 Jun 2024
Sophos uncovers Chinese state-sponsored campaign in Southeast Asia
Sophos found three distinct clusters of activity targeted at a high-level government organisation that appeared to be tied to Chinese interests in the South China Sea Continue Reading
By- Aaron Tan, TechTarget
-
News
04 Jun 2024
Haier Europe taps Orange Business to build responsive SD-WAN
Looking to offer a scalable, secure networking infrastructure to support its growth, Fortune 500 home appliances company works with business arm of telco to deploy cloud-first platform enhancing security, visibility and agility Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
03 Jun 2024
McLaren Formula 1 Team revs up network security with Cisco
Legendary motor racing team expands global partnership with networking giant to accelerate network security for on-premise hardware and cloud-based software, including secure firewall and XDR Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
24 May 2024
Networks emerge as catalyst for digital business success
Global networking trends report for 2024 reveals continued measurable impact of the network in advancing business goals, with 72% planning on deploying integrated network management platforms over the next two years Continue Reading
By- Joe O’Halloran, Computer Weekly