Network security management
-
Feature
08 Nov 2024
Beyond VPNs: The future of secure remote connectivity
As more companies adopt cloud services and remote work, the limitations of VPNs are becoming obvious. We explore what’s next for secure remote connectivity Continue Reading
By -
News
01 Nov 2024
CISA looks to global collaboration as fraught US election begins
The US' CISA cyber agency has unveiled a two-year International Strategic Plan to advance collaboration and improve resilience against shared risks and threats Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Mar 2019
BT switches on quantum network link at Adastral Park
BT has opened its quantum network link between its Adastral Park research base and the UK Quantum Network node at the University of Cambridge Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Mar 2019
UK government at odds over Huawei threat
The chair of the Science and Technology Committee has criticised the government’s vague response to concerns about Huawei’s activities in the UK Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
19 Mar 2019
Growing board focus on cyber risk challenges current thinking
As digital transformation continues to drive change in the business and risk landscape, business and cyber security leaders need to improve discussions around this topic Continue Reading
-
E-Zine
13 Mar 2019
CW APAC: Buyer's guide to cloud security
When putting data in the cloud, companies must understand how it is protected – and not assume that security is all taken care of. In this buyer's guide, Computer Weekly offers advice on making cloud security choices, looks at how to guard against DDoS attacks, and finds out Amazon's approach to building secure cloud products. Continue Reading
-
13 Mar 2019
How traffic scrubbing can guard against DDoS attacks
Although most scrubbing services can help fend off distributed denial of service attacks, a more comprehensive mitigation strategy is required to remain unscathed. Continue Reading
-
Opinion
11 Mar 2019
Security Think Tank: Is it true you can't manage what you don't measure?
What should be the key cyber security risk indicator for any business? Continue Reading
By- Vladimir Jirasek, Foresight Cyber
-
News
07 Mar 2019
Vodafone defends its use of Huawei as 5G trials go live
As Vodafone begins trials of a live 5G service in Bristol, Cardiff and Liverpool, the operator’s CTO and general counsel have defended their use of Huawei equipment in Vodafone’s network and challenged its detractors to produce evidence of spying Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Mar 2019
How aid workers are using encrypted communications to stay safe in conflict zones
Often operating in volatile conflict zones, aid workers are frequently turning to encrypted communication services to protect each other Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
07 Mar 2019
US government ban unconstitutional, says Huawei
Huawei’s lawsuit accuses Washington of violating the US Constitution by banning it from government contracts Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Mar 2019
Singapore can now certify security products based on Common Criteria
The city-state is has attained the status of a Certificate Authorising Nation, enabling it to evaluate and certify security products under the Common Criteria standard Continue Reading
By- Aaron Tan, TechTarget
-
Feature
01 Mar 2019
What are the CDN options for enterprises?
We look at how content delivery networks can give your organisation’s web presence a literal edge Continue Reading
By -
News
28 Feb 2019
Supplier consolidation tops infosec goals for 2019
Supplier consolidation, collaboration between networking and security teams, and security awareness are the top priorities for information security professionals trying to prepare for the unknown, annual benchmark study shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Feb 2019
Cyber power needs wider discussion, says GCHQ director
The topic of cyber power needs wider discussion, says GCHQ head in a speech about the opportunities of digital innovation such as 5G, as well as the accompanying complexity and risk, with particular mention of China and Huawei Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Feb 2019
US may cut off countries that use Huawei in 5G networks
US secretary of state Mike Pompeo has said America may scale back or cut military and diplomatic ties with countries that use Huawei equipment in national 5G networks Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Feb 2019
Thales to sell nCipher to Entrust Datacard
Thales eSecurity has announced that it is to sell HSM specialist nCipher, the UK-based encryption firm it acquired in 2008, after spinning it out as a separate business Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Feb 2019
IT Priorities 2019: Security concerns top agenda for network buyers again
The ability to gain visibility into what is happening on enterprise networks has once again topped the agenda for network managers and buyers, according to the latest Computer Weekly/TechTarget IT Priorities survey Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Feb 2019
MWC 2019: Huawei claims massive lead on 5G readiness
At a pre-Mobile World Congress event in London, Huawei’s Ryan Ding shared details of the firm’s rapidly expanding 5G mobile portfolio, and laid into his competitors Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Feb 2019
UK naïve to think China won’t try to exploit Huawei
A think-tank report has branded the UK government naïve at best, irresponsible at worst, over its use of Chinese networking equipment in critical national infrastructure Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
19 Feb 2019
Cybersecurity needs both psychologists and field marshals
Many cybersecurity professionals like military analogies. Indeed, some security pros are ex-military. But after a recent security exercise involving IBM’s new lorry-mounted SOC (security operations ... Continue Reading
By- Bryan Betts, Freeform Dynamics
-
News
19 Feb 2019
Huawei’s Ren Zhengfei: US won’t crush us
Huawei CEO Ren Zhengfei has taken a more combative stance in the ongoing row over the firm’s alleged links to the Chinese intelligence services Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Feb 2019
NCSC signals UK may take softer line on Huawei
The UK’s National Cyber Security Centre suggests Huawei will be allowed to form core elements of the country’s 5G mobile network infrastructure after all Continue Reading
By- Alex Scroxton, Security Editor
-
Answer
11 Feb 2019
What are the pros and cons of machine learning in network security?
The predictive nature of machine learning can benefit network security strategies. But it can also benefit those looking to break through secure network barriers. Continue Reading
By- David Jacobs, The Jacobs Group
-
Feature
08 Feb 2019
A guide to choosing cloud-based security services
Cloud-based security services can help organisations with a growing cloud footprint to reduce cost and address the manpower crunch in cyber security Continue Reading
By- Aaron Tan, TechTarget
-
News
07 Feb 2019
Data breaches in Australia show no sign of abating
Australia’s privacy watchdog recorded over 800 cases of data breaches, nearly one year into the country’s mandatory data breach notification regime Continue Reading
-
News
06 Feb 2019
Huawei: We are not spying on the UK
Huawei’s Ryan Ding tells the British government that the company has never, and will never, use its technology to assist the Chinese intelligence services Continue Reading
By- Alex Scroxton, Security Editor
-
News
31 Jan 2019
Cisco Live Europe: Intent-based networking meets the IoT head-on
Networking and communications technology supplier Cisco plans to bring intent-based networking techniques to bear on the internet of things Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Jan 2019
How traffic scrubbing can guard against DDoS attacks
Although most scrubbing services can help fend off distributed denial of service attacks, a more comprehensive mitigation strategy is required to remain unscathed Continue Reading
By -
Tip
29 Jan 2019
How a Windows antimalware tool helps endpoint security
The Windows Defender Antivirus program was updated to include sandbox network security. Learn why this is so important and why security professionals have been asking for it. Continue Reading
By -
News
28 Jan 2019
UK cyber security agency investigates DNS hijacking
NCSC is probing the large-scale DNS hijacking campaign that has reportedly affected government and commercial organisations worldwide, and has issued defence advice Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Jan 2019
Vodafone suspends use of Huawei hardware
Vodafone’s UK CEO has said the operator will ‘pause’ its use of Huawei hardware for the foreseeable future Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Jan 2019
Chinese government grants BT new powers
Enhanced operating licences improve telco’s ability to work with customers in China Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Jan 2019
Thales eSecurity spins out nCipher
After just over a decade, Thales eSecurity has announced that it has spun out HSM specialist nCipher, the UK-based encryption firm it acquired for $100m in 2008 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
23 Jan 2019
MPs challenge Huawei over spying allegations
The chair of the cross-bench Science and Technology Committee has written to Huawei seeking answers over its activities in the UK Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Jan 2019
US issues emergency directive to halt DNS hijacking
US government agencies have been given 10 days to complete a four-step action plan to stop DNS hijacking attacks Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
22 Jan 2019
Moving beyond network boundaries
In this week’s Computer Weekly, we look at how businesses are adapting to the challenges of perimeterless network security. We examine how digital transformation is bringing increased complications for identity and access management (IAM). And we ask if public cloud providers are becoming a threat to the funding model for open source software. Read the issue now. Continue Reading
-
News
21 Jan 2019
Public procurement key to cyber security
Using public procurement as a means of boosting cyber security is the top recommendation for 2019, according to a report based on expert views Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
21 Jan 2019
Break free from traditional network security
Highly connected businesses put pressure on traditional network security. We look at how corporate networks are breaking out of their boundaries Continue Reading
By- Cliff Saran, Managing Editor
-
Opinion
17 Jan 2019
Security Think Tank: Cloud tech helps to protect advanced networks
How can organisations combine software-defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
By -
News
17 Jan 2019
CenturyLink opens Singapore SOC amid security services boom
US telco’s second Asia-Pacific security operations centre in Singapore is one of eight globally as it bids to carve a slice of the security services market Continue Reading
By- Aaron Tan, TechTarget
-
News
15 Jan 2019
Millions of industrial remote controllers open to attack
Millions of industrial remote controllers are open to cyber attack because of vulnerabilities in the radio frequency technology used, a study has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
15 Jan 2019
Security Think Tank: Apply different techniques to safeguard against rogue code
How can organisations combine software-defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
By- Ramsés Gallego, Isaca
-
Opinion
14 Jan 2019
Security Think Tank: Combine SDN, containerisation and encryption to halt rogue code
How can organisations combine software-defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
By- Mary-Jo de Leeuw, (ISC)2
-
Feature
14 Jan 2019
Security without borders
Perimeterless security offers a way to secure each point of connectivity and every device, rather than relying on perimeter protection Continue Reading
By -
Opinion
11 Jan 2019
Security Think Tank: How to use SDN, containers and encryption – and some warnings
How can organisations combine software-defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
By -
Opinion
09 Jan 2019
Security Think Tank: The security role of SDN, containers, encryption and SDP
How can organisations combine software-defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
-
Opinion
31 Dec 2018
Can we live without passwords?
Can you imagine a future in which we can be secure online without having to remember an unwieldly list of passwords? Solutions are emerging that could make passwords redundant, but there will be other security problems to resolve Continue Reading
By- Bruno Halopeau & Adrien Ogee
-
News
31 Dec 2018
Top 10 network stories of 2018
2018 was the year when software-defined networking, and more specifically software-defined WANs, took centre stage. We look back at a transformative year for the world of the network manager Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Dec 2018
Malwarebytes: Fileless ransomware an emerging threat for U.S.
A new Malwarebytes report examines Sorebrect, a fileless ransomware threat that's been detected in the U.S. this year, as well as with three other fileless attacks. Continue Reading
By- Casey Clark, TechTarget
-
News
24 Dec 2018
Top 10 IT security stories of 2018
Here are Computer Weekly’s top 10 IT security stories of 2018 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Dec 2018
APAC cyber security landscape to be more tumultuous in 2019
Amid growing cyber threats, the Asia-Pacific cyber security landscape will not get any rosier in 2019 unless organisations start shoring up their cyber hygiene Continue Reading
By- Aaron Tan, TechTarget
-
News
18 Dec 2018
Mobile security needs a rethink for the 5G era
A report released through the government’s 5G Testbeds and Trials programme has recommended the UK rethink its mobile security strategy Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Dec 2018
Broadband coverage improved through 2018, says Ofcom
Ofcom’s annual Connected Nations report reveals that the number of people who cannot receive a 10Mbps broadband connection has halved Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
14 Dec 2018
Security Think Tank: Smart botnets resist attempts to cut comms
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including "sleepers" designed to be activated at a future date Continue Reading
-
Opinion
14 Dec 2018
Security Think Tank: Strategies for blocking malware comms
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including “sleepers” designed to be activated at a future date? Continue Reading
By -
Opinion
12 Dec 2018
Security Think Tank: Prevention and detection key to disrupting malware comms
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including “sleepers” designed to be activated at a future date? Continue Reading
By- Simon Persin, Turnkey Consulting
-
Opinion
11 Dec 2018
Security Think Tank: Severing C&C comms is key, but complex
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including “sleepers” designed to be activated at a future date? Continue Reading
By- Emma Bickerstaffe, Information Security Forum (ISF)
-
News
10 Dec 2018
O2 expected to pursue Ericsson for compensation over 24-hour stoppage
Mobile network operator could seek up to £100m in damages from its supplier, which failed to update expired software certificates, causing a day-long outage Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
07 Dec 2018
What does the 802.11ax wireless standard mean for your network?
The publication of the 802.11ax standard will pave the way for the next generation of wireless technology, but what does it mean for enterprise networks? Continue Reading
-
News
07 Dec 2018
O2 outage highlights importance of software certificate audits
A major outage on the O2 4G mobile network was caused by an expired certificate and could easily have been avoided, it has emerged Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
06 Dec 2018
Security Think Tank: How to tool up to catch evasive malware comms
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including “sleepers” designed to be activated at a future date? Continue Reading
-
News
06 Dec 2018
Fileless malware surge, warns Malwarebytes report
Data from millions of consumers reveals an uptick in fileless malware and other new-generation malware that calls for a new cyber security approach, report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Dec 2018
China demands release of arrested Huawei CFO
The Chinese government has called for the release of Huawei chief financial officer Meng Wanzhou, who was detained in Canada at the weekend Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Dec 2018
Software failure paralyses O2’s 4G network
O2 is racing to fix a major outage on its 4G network that has left millions of mobile subscribers without access to data services Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Dec 2018
BT moves to strip Huawei kit from EE’s network
Telco will remove Huawei’s networking equipment from the core of EE’s 4G mobile network Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Dec 2018
Symantec unveils AI-based protection for critical infrastructure
Cyber security firm has unveiled what it claims to be the industry’s first neural network to protect critical infrastructure from USB-borne malware attacks Continue Reading
By- Warwick Ashford, Senior analyst
-
Answer
04 Dec 2018
What are the differences between network security vs. cybersecurity?
IT groups need to consider varying layers of security. For instance, the similarities and differences between cybersecurity and network security are closely entwined. Continue Reading
By- Mike Jude, Stratecast/Frost & Sullivan
-
Feature
04 Dec 2018
The future of network-connected device security
The proliferation of poorly secured network-connected devices has prompted the UK government to publish new best practice guidelines. Do these go far enough? Continue Reading
-
Answer
16 Nov 2018
What are today's top 3 network security challenges?
A significant shortage of cybersecurity staff, poorly configured firewalls and unmanaged end-user mobile devices are some of the top network security threats. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
-
Answer
16 Nov 2018
How does Thanatos ransomware decryptor tool restore data?
Cisco Talos' Thanatos ransomware decryptor can recover files affected by new ransomware that won't decrypt ransomed files even when a ransom has been paid. Continue Reading
By -
Feature
16 Nov 2018
Securing the SD-WAN: The next network challenge
Every time an enterprise weighs up whether or not to try SD-WAN, security is an essential part of the picture Continue Reading
-
News
16 Nov 2018
Why is hiring a government chief security officer such a tricky business?
Security bosses and CIOs weigh in on why they think the government is struggling to recruit a chief security officer Continue Reading
By -
E-Zine
15 Nov 2018
CW ASEAN: Blockchain is no ‘magic wand’ for security
Blockchain is all the rage, although the technology is so much more than just about bitcoin and cryptocurrencies. In this issue of CW ASEAN, we examine how blockchain is being applied in cyber security, and whether the technology is really as secure as claimed by its proponents. Read the issue now. Continue Reading
-
Feature
14 Nov 2018
It’s complicated: How enterprises are approaching IAM challenges
Identity and access management challenges are evolving with digital transformation. Computer Weekly explores some of the ways organisations are ensuring the right people gain the right access to the right resources Continue Reading
-
News
12 Nov 2018
Norway’s IT industry must tackle security vulnerabilities
Report reveals growing threat posed by “hostile foreign actors” against Norway’s IT systems and critical national infrastructure Continue Reading
By- Gerard O'Dwyer
-
News
06 Nov 2018
APAC firms warm up to SD-WAN to solve networking woes
A third of enterprises in the APAC region have already deployed SD-WAN at most of their sites, while 55% are in the process of doing so, a study shows Continue Reading
By- Aaron Tan, TechTarget
-
News
26 Oct 2018
British Airways data breach worse than thought
British Airways has admitted that up to 185,000 more people than first thought may have had personal details compromised in August’s data breach Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Oct 2018
DNS attacks cost finance firms millions of pounds a year
Average cost of recovering from a single DNS attack is $924,390 for a large financial services company, survey shows Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
24 Oct 2018
Sibos 2018: ‘Black swan’ cyber event is inevitable
With security experts and bankers expecting a 9/11-style cyber event, deeper collaboration between companies and governments is necessary to identify emerging threats before they occur Continue Reading
-
News
22 Oct 2018
McAfee CTO raises concerns about election cyber security
The security industry needs to look at the security of election processes around the world as well as the security of voting and counting machines, says McAfee CTO Continue Reading
By- Warwick Ashford, Senior analyst
-
Answer
17 Oct 2018
How did the IcedID and TrickBot banking Trojans join forces?
The TrickBot banking Trojan joined forces with IcedID to form a dual threat that targets victims for money. Discover how this union occurred and how it has changed their behaviors. Continue Reading
By -
News
16 Oct 2018
APAC security spending tipped to reach new highs
Security services will be the largest and fastest-growing slice of the overall security pie in the Asia-Pacific region Continue Reading
By- Aaron Tan, TechTarget
-
News
15 Oct 2018
Cost of WannaCry attack to NHS set at £92m
Department for Health and Social Care estimates the immediate cost of the May 2017 WannaCry attack on the NHS was £92m, and says it will have spent about £275m on improvements to its cyber security infrastructure by the end of 2021 Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Oct 2018
AI is no silver bullet for cyber security
A security expert has called for businesses to manage the risks of adopting new technologies and improve their cyber hygiene, rather than see artificial intelligence as a panacea for their security woes Continue Reading
By- Aaron Tan, TechTarget
-
News
11 Oct 2018
Optus to acquire Hivint in cyber security deal
The deal is expected to bolster the telco’s security pedigree in a market that is grappling with more data breaches and cyber incidents Continue Reading
By- Aaron Tan, TechTarget
-
News
08 Oct 2018
Airbus secures European institutions against cyber threat
Airbus CyberSecurity has partnered with Atos to help protect 17 European government institutes from cyber attacks Continue Reading
By- Cliff Saran, Managing Editor
-
Opinion
04 Oct 2018
Security Think Tank: Use Cyber Essentials to kick-start outcomes-based security
What is the first step towards moving from a tick-box approach to security to one that is outcomes-based and how can an organisation test whether its security defences are delivering the desired outcome? Continue Reading
By -
News
03 Oct 2018
Companies failing to recognise the internal cyber threat
The focus at many companies is on external cyber threats, and internal threats are being overlooked as a consequence, a researcher warns Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Oct 2018
Rise in data-stealing Betabot malware
Researchers are warning about an increase in Betabot malware after detecting multiple infections in recent weeks, underlining the importance of software patching Continue Reading
By- Warwick Ashford, Senior analyst
-
Answer
01 Oct 2018
SamSam ransomware: How is this version different from others?
Sophos recently discovered a SamSam extortion code that performs company-wide attacks using a range of vulnerability exploits. Discover how this version differs from past variants. Continue Reading
By -
News
28 Sep 2018
Cyber attackers are increasingly exploiting RDP, warns FBI
Businesses should to act to reduce the likelihood of compromise from cyber attackers exploiting the remote desktop protocol, warns the FBI Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Sep 2018
Network growth brings management challenges
As enterprise networks grow, so do the challenges of managing them effectively, says a report compiled by Oracle’s communications unit Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Sep 2018
Business is at inflection point for proactive cyber security
The time is ripe for proactive cyber security, but many organisations must first overcome four key obstacles to achieve effective protection, according to a research report Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Sep 2018
Norwegian state discusses vulnerabilities with IT sector
Government is collaborating with the country’s IT industry to improve the availability of security expertise Continue Reading
By- Gerard O'Dwyer
-
News
25 Sep 2018
MI5 admits to ‘unlawful’ spying on Privacy International
The UK's intelligence agencies acted unlawfully by intercepting communications data on NGO, Privacy International, the UK's most secret court ruled. Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
18 Sep 2018
AI is crucial element of security strategy in the IoT era
Machine learning and network visibility for users and internet of things devices are essential to battle threats inside the enterprise, according to a new report Continue Reading
By- Alex Scroxton, Security Editor
-
News
17 Sep 2018
Singapore government to start bug bounty programme
Singapore’s bug bounty programme will help the authorities identify cyber blind spots and benchmark its defences against skilled hackers Continue Reading
By- Aaron Tan, TechTarget
-
News
13 Sep 2018
GCHQ mass surveillance regime was in breach of human rights law, European court rules
The European Court of Human Rights in Strasbourg has ruled that the UK’s collection of bulk interception of communications data lacked adequate oversight and safeguards and was in breach of human rights law Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
11 Sep 2018
Higher education sector's poor response to cyber threats laid bare in EfficientIP report
The 2018 EfficientIP Global DNS Report shines a light on how ill-prepared the higher education sector is for handling cyber threats Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
11 Sep 2018
British Airways data breach: Security researchers name suspects and query attack timeline
Security researchers claim to have pinpointed the cause and perpetrators of the British Airways data breach, and also claim the attackers may have had access to its customer data for far longer than previously thought Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
10 Sep 2018
Cyber criminals outspend businesses in cyber security battle
Cybercriminals are flexing their financial might and UK organisations are facing more attacks as a result Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA