Network security management
-
Opinion
19 Dec 2024
Innovation, insight and influence: the CISO playbook for 2025 and beyond
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Mandy Andress, Elastic
-
News
18 Dec 2024
The Security Interviews: Martin Lee, Cisco Talos
Threat intel expert and author Martin Lee, EMEA technical lead for security research at Cisco Talos, joins Computer Weekly to mark the 35th anniversary of the first ever ransomware attack Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
13 May 2019
Security Think Tank: Benefits and challenges of security segmentation
What are the security benefits and challenges of segregating IT environments, and how best are these challenges overcome? Continue Reading
By- Maxine Holt, Omdia
-
News
07 May 2019
Privileged access management moving to cloud
Survey shows nearly half of information security professionals are either planning to move privileged access management to the cloud or are exploring the possibility Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 May 2019
Zero trust: A 21st century security model
Traditional corporate security models date back to a time when there were fewer, lower-level threats, but a zero trust model is better suited to the 21st century, according to the originator of the idea Continue Reading
By- Warwick Ashford, Senior analyst
-
Blog Post
02 May 2019
Huawei furore leads inevitably to a global polarisation of the tech sector
The sacking of defence minister Gavin Williamson is another indication of how technology is influencing politics, and vice versa. While his crime was to leak details from a national security ... Continue Reading
By- Bryan Glick, Editor in chief
-
News
02 May 2019
Defence secretary sacked over Huawei leak
Defence secretary Gavin Williamson has been sacked after leaking confidential discussions over the use of Huawei networking equipment Continue Reading
By- Alex Scroxton, Security Editor
-
News
01 May 2019
Get more proactive on cyber security, says ex Europol chief
Business needs to get more proactive, collaborative, resilient and analytical to manage cyber risks posed by cyber criminals down to acceptable levels, says former Europol chief Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Apr 2019
Huawei leak inquiry launched
Cabinet secretary Mark Sedwill has instituted an inquiry aimed at discovering who leaked confidential discussions about UK mobile operators’ use of Huawei in their future 5G networks to the press Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Apr 2019
GDPR cases drive bigger budgets for Nordic regulators
High-profile General Data Protection Regulation cases in Finland and Sweden have increased the workload for regulators, which are to receive an increase in funding Continue Reading
By- Gerard O'Dwyer
-
News
25 Apr 2019
No final decision taken on Huawei 5G ban, government claims
Culture secretary tells MPs that a final decision on use of Huawei in UK 5G networks has not been taken, and says government is taking the leak of confidential discussions at the National Security Council very seriously Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Apr 2019
NCSC looks to industry to scale Active Cyber Defence
The national cyber security agency is calling on wider government organisations as well as industry to help scale automated cyber attack blocking systems country-wide Continue Reading
By- Warwick Ashford, Senior analyst
-
News
24 Apr 2019
PM May approves Huawei for use in 5G networks despite opposition
The UK’s National Security Council has approved the use of Huawei’s networking equipment in parts of the country’s 5G mobile networks in spite of widespread opposition Continue Reading
By- Alex Scroxton, Security Editor
-
News
17 Apr 2019
TfL suspends Wi-Fi service as Extinction Rebellion spreads
Transport for London has cut off its public Virgin Media Wi-Fi service to disrupt climate change protests Continue Reading
By- Alex Scroxton, Security Editor
-
News
17 Apr 2019
Wipro admits to potential breach to employee accounts by phishing attack
Indian IT services company Wipro is investigating a phishing attack, which hit some staff email accounts and launched attacks on customer environments Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
16 Apr 2019
Huawei cyber security chief John Suffolk: It’s not our culture to be aggressive
John Suffolk, global cyber security and privacy officer at China-based telecoms equipment supplier Huawei, tells Huawei Analyst Summit growth is the best answer to US criticism Continue Reading
By- Brian McKenna, Senior Analyst, Business Applications
-
News
15 Apr 2019
How Palo Alto Networks fends off its cyber adversaries
Palo Alto Networks CIO Naveen Zutshi talks up the company’s approach in keeping threat actors at bay Continue Reading
By- Aaron Tan, TechTarget
-
News
15 Apr 2019
Zero trust is about more than products
The zero trust security model is more than just products and network segmentation, it’s an architectural design principle with identity at its core that needs to be applied enterprise-wide, says KuppingerCole Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
09 Apr 2019
Using data science at Sainsbury’s
In this week’s Computer Weekly, we talk to one of the UK’s leading retailers, Sainsbury’s, about its data science strategy and how it helps the firm to better understand customers. We take a detailed look at the evolution of the business intelligence market and the impact of big data. And we find out how simulated disaster management can tackle the security skills gap. Read the issue now. Continue Reading
-
News
05 Apr 2019
Huawei ban will cost UK plc £6.8bn, delay 5G
If the UK government decides to impose tighter restrictions, or an outright ban on the use of Huawei in national 5G networks, the country faces severe consequences, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Apr 2019
Enhanced Wi-Fi cuts costs to maximise efficiency at Dorset school
The need for cost-effective, manageable wireless infrastructure without additional annual licence fees drove Lytchett Minster School’s decision to upgrade its on-site network with TP-Link Continue Reading
By- Alex Scroxton, Security Editor
-
News
02 Apr 2019
Akamai to open second traffic scrubbing centre in Australia
New centre in Melbourne will meet growing demand for scrubbing services to mitigate the impact of distributed denial of service attacks in Australia Continue Reading
-
News
02 Apr 2019
Huawei reports record numbers despite tumultuous year
Huawei has become one of the world’s largest technology companies by revenue, suggesting the accusations over its ties to the Chinese government are failing to have much impact Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
02 Apr 2019
The nightmare driving test – making driverless cars safe
In this week’s Computer Weekly, we talk to AI experts about the challenges of teaching autonomous vehicles how to drive safely in often extreme environments, and how deep learning simulations can help. Our latest buyer’s guide looks at business intelligence and analytics technologies. And we examine the implications of the EU’s controversial new copyright laws. Read the issue now. Continue Reading
-
News
01 Apr 2019
Singapore government to review data security in public sector
A high-level committee comprising ministers and private sector security experts will review data security practices and recommend measures to better protect citizens’ data Continue Reading
By- Aaron Tan, TechTarget
-
News
28 Mar 2019
Huawei making no progress on addressing security concerns
Huawei has made no material progress on addressing the issues identified last year by the NCSC, according to the latest highly critical report from its HSCEC Oversight Board Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Mar 2019
Encryption adoption driven by new tech and compliance
The adoption of encryption is at its highest level yet, driven by the need to protect data generated by new digital initiatives, but still less than half of organisations are applying it consistently across the enterprise Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Mar 2019
BT switches on quantum network link at Adastral Park
BT has opened its quantum network link between its Adastral Park research base and the UK Quantum Network node at the University of Cambridge Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Mar 2019
UK government at odds over Huawei threat
The chair of the Science and Technology Committee has criticised the government’s vague response to concerns about Huawei’s activities in the UK Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
19 Mar 2019
Growing board focus on cyber risk challenges current thinking
As digital transformation continues to drive change in the business and risk landscape, business and cyber security leaders need to improve discussions around this topic Continue Reading
-
E-Zine
13 Mar 2019
CW APAC: Buyer's guide to cloud security
When putting data in the cloud, companies must understand how it is protected – and not assume that security is all taken care of. In this buyer's guide, Computer Weekly offers advice on making cloud security choices, looks at how to guard against DDoS attacks, and finds out Amazon's approach to building secure cloud products. Continue Reading
-
13 Mar 2019
How traffic scrubbing can guard against DDoS attacks
Although most scrubbing services can help fend off distributed denial of service attacks, a more comprehensive mitigation strategy is required to remain unscathed. Continue Reading
-
Opinion
11 Mar 2019
Security Think Tank: Is it true you can't manage what you don't measure?
What should be the key cyber security risk indicator for any business? Continue Reading
By- Vladimir Jirasek, Foresight Cyber
-
News
07 Mar 2019
Vodafone defends its use of Huawei as 5G trials go live
As Vodafone begins trials of a live 5G service in Bristol, Cardiff and Liverpool, the operator’s CTO and general counsel have defended their use of Huawei equipment in Vodafone’s network and challenged its detractors to produce evidence of spying Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Mar 2019
How aid workers are using encrypted communications to stay safe in conflict zones
Often operating in volatile conflict zones, aid workers are frequently turning to encrypted communication services to protect each other Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
07 Mar 2019
US government ban unconstitutional, says Huawei
Huawei’s lawsuit accuses Washington of violating the US Constitution by banning it from government contracts Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Mar 2019
Singapore can now certify security products based on Common Criteria
The city-state is has attained the status of a Certificate Authorising Nation, enabling it to evaluate and certify security products under the Common Criteria standard Continue Reading
By- Aaron Tan, TechTarget
-
Feature
01 Mar 2019
What are the CDN options for enterprises?
We look at how content delivery networks can give your organisation’s web presence a literal edge Continue Reading
By -
News
28 Feb 2019
Supplier consolidation tops infosec goals for 2019
Supplier consolidation, collaboration between networking and security teams, and security awareness are the top priorities for information security professionals trying to prepare for the unknown, annual benchmark study shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Feb 2019
Cyber power needs wider discussion, says GCHQ director
The topic of cyber power needs wider discussion, says GCHQ head in a speech about the opportunities of digital innovation such as 5G, as well as the accompanying complexity and risk, with particular mention of China and Huawei Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Feb 2019
US may cut off countries that use Huawei in 5G networks
US secretary of state Mike Pompeo has said America may scale back or cut military and diplomatic ties with countries that use Huawei equipment in national 5G networks Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Feb 2019
Thales to sell nCipher to Entrust Datacard
Thales eSecurity has announced that it is to sell HSM specialist nCipher, the UK-based encryption firm it acquired in 2008, after spinning it out as a separate business Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Feb 2019
IT Priorities 2019: Security concerns top agenda for network buyers again
The ability to gain visibility into what is happening on enterprise networks has once again topped the agenda for network managers and buyers, according to the latest Computer Weekly/TechTarget IT Priorities survey Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Feb 2019
MWC 2019: Huawei claims massive lead on 5G readiness
At a pre-Mobile World Congress event in London, Huawei’s Ryan Ding shared details of the firm’s rapidly expanding 5G mobile portfolio, and laid into his competitors Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Feb 2019
UK naïve to think China won’t try to exploit Huawei
A think-tank report has branded the UK government naïve at best, irresponsible at worst, over its use of Chinese networking equipment in critical national infrastructure Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
19 Feb 2019
Cybersecurity needs both psychologists and field marshals
Many cybersecurity professionals like military analogies. Indeed, some security pros are ex-military. But after a recent security exercise involving IBM’s new lorry-mounted SOC (security operations ... Continue Reading
By- Bryan Betts, Freeform Dynamics
-
News
19 Feb 2019
Huawei’s Ren Zhengfei: US won’t crush us
Huawei CEO Ren Zhengfei has taken a more combative stance in the ongoing row over the firm’s alleged links to the Chinese intelligence services Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Feb 2019
NCSC signals UK may take softer line on Huawei
The UK’s National Cyber Security Centre suggests Huawei will be allowed to form core elements of the country’s 5G mobile network infrastructure after all Continue Reading
By- Alex Scroxton, Security Editor
-
Answer
11 Feb 2019
What are the pros and cons of machine learning in network security?
The predictive nature of machine learning can benefit network security strategies. But it can also benefit those looking to break through secure network barriers. Continue Reading
By- David Jacobs, The Jacobs Group
-
Feature
08 Feb 2019
A guide to choosing cloud-based security services
Cloud-based security services can help organisations with a growing cloud footprint to reduce cost and address the manpower crunch in cyber security Continue Reading
By- Aaron Tan, TechTarget
-
News
07 Feb 2019
Data breaches in Australia show no sign of abating
Australia’s privacy watchdog recorded over 800 cases of data breaches, nearly one year into the country’s mandatory data breach notification regime Continue Reading
-
News
06 Feb 2019
Huawei: We are not spying on the UK
Huawei’s Ryan Ding tells the British government that the company has never, and will never, use its technology to assist the Chinese intelligence services Continue Reading
By- Alex Scroxton, Security Editor
-
News
31 Jan 2019
Cisco Live Europe: Intent-based networking meets the IoT head-on
Networking and communications technology supplier Cisco plans to bring intent-based networking techniques to bear on the internet of things Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Jan 2019
How traffic scrubbing can guard against DDoS attacks
Although most scrubbing services can help fend off distributed denial of service attacks, a more comprehensive mitigation strategy is required to remain unscathed Continue Reading
By -
Tip
29 Jan 2019
How a Windows antimalware tool helps endpoint security
The Windows Defender Antivirus program was updated to include sandbox network security. Learn why this is so important and why security professionals have been asking for it. Continue Reading
By -
News
28 Jan 2019
UK cyber security agency investigates DNS hijacking
NCSC is probing the large-scale DNS hijacking campaign that has reportedly affected government and commercial organisations worldwide, and has issued defence advice Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Jan 2019
Vodafone suspends use of Huawei hardware
Vodafone’s UK CEO has said the operator will ‘pause’ its use of Huawei hardware for the foreseeable future Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Jan 2019
Chinese government grants BT new powers
Enhanced operating licences improve telco’s ability to work with customers in China Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Jan 2019
Thales eSecurity spins out nCipher
After just over a decade, Thales eSecurity has announced that it has spun out HSM specialist nCipher, the UK-based encryption firm it acquired for $100m in 2008 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
23 Jan 2019
MPs challenge Huawei over spying allegations
The chair of the cross-bench Science and Technology Committee has written to Huawei seeking answers over its activities in the UK Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Jan 2019
US issues emergency directive to halt DNS hijacking
US government agencies have been given 10 days to complete a four-step action plan to stop DNS hijacking attacks Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
22 Jan 2019
Moving beyond network boundaries
In this week’s Computer Weekly, we look at how businesses are adapting to the challenges of perimeterless network security. We examine how digital transformation is bringing increased complications for identity and access management (IAM). And we ask if public cloud providers are becoming a threat to the funding model for open source software. Read the issue now. Continue Reading
-
News
21 Jan 2019
Public procurement key to cyber security
Using public procurement as a means of boosting cyber security is the top recommendation for 2019, according to a report based on expert views Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
21 Jan 2019
Break free from traditional network security
Highly connected businesses put pressure on traditional network security. We look at how corporate networks are breaking out of their boundaries Continue Reading
By- Cliff Saran, Managing Editor
-
Opinion
17 Jan 2019
Security Think Tank: Cloud tech helps to protect advanced networks
How can organisations combine software-defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
By -
News
17 Jan 2019
CenturyLink opens Singapore SOC amid security services boom
US telco’s second Asia-Pacific security operations centre in Singapore is one of eight globally as it bids to carve a slice of the security services market Continue Reading
By- Aaron Tan, TechTarget
-
News
15 Jan 2019
Millions of industrial remote controllers open to attack
Millions of industrial remote controllers are open to cyber attack because of vulnerabilities in the radio frequency technology used, a study has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
15 Jan 2019
Security Think Tank: Apply different techniques to safeguard against rogue code
How can organisations combine software-defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
By- Ramsés Gallego, Isaca
-
Opinion
14 Jan 2019
Security Think Tank: Combine SDN, containerisation and encryption to halt rogue code
How can organisations combine software-defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
By- Mary-Jo de Leeuw, (ISC)2
-
Feature
14 Jan 2019
Security without borders
Perimeterless security offers a way to secure each point of connectivity and every device, rather than relying on perimeter protection Continue Reading
By -
Opinion
11 Jan 2019
Security Think Tank: How to use SDN, containers and encryption – and some warnings
How can organisations combine software-defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
By -
Opinion
09 Jan 2019
Security Think Tank: The security role of SDN, containers, encryption and SDP
How can organisations combine software-defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Continue Reading
-
Opinion
31 Dec 2018
Can we live without passwords?
Can you imagine a future in which we can be secure online without having to remember an unwieldly list of passwords? Solutions are emerging that could make passwords redundant, but there will be other security problems to resolve Continue Reading
By- Bruno Halopeau & Adrien Ogee
-
News
31 Dec 2018
Top 10 network stories of 2018
2018 was the year when software-defined networking, and more specifically software-defined WANs, took centre stage. We look back at a transformative year for the world of the network manager Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Dec 2018
Malwarebytes: Fileless ransomware an emerging threat for U.S.
A new Malwarebytes report examines Sorebrect, a fileless ransomware threat that's been detected in the U.S. this year, as well as with three other fileless attacks. Continue Reading
By- Casey Clark, TechTarget
-
News
24 Dec 2018
Top 10 IT security stories of 2018
Here are Computer Weekly’s top 10 IT security stories of 2018 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Dec 2018
APAC cyber security landscape to be more tumultuous in 2019
Amid growing cyber threats, the Asia-Pacific cyber security landscape will not get any rosier in 2019 unless organisations start shoring up their cyber hygiene Continue Reading
By- Aaron Tan, TechTarget
-
News
18 Dec 2018
Mobile security needs a rethink for the 5G era
A report released through the government’s 5G Testbeds and Trials programme has recommended the UK rethink its mobile security strategy Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Dec 2018
Broadband coverage improved through 2018, says Ofcom
Ofcom’s annual Connected Nations report reveals that the number of people who cannot receive a 10Mbps broadband connection has halved Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
14 Dec 2018
Security Think Tank: Smart botnets resist attempts to cut comms
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including "sleepers" designed to be activated at a future date Continue Reading
-
Opinion
14 Dec 2018
Security Think Tank: Strategies for blocking malware comms
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including “sleepers” designed to be activated at a future date? Continue Reading
By -
Opinion
12 Dec 2018
Security Think Tank: Prevention and detection key to disrupting malware comms
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including “sleepers” designed to be activated at a future date? Continue Reading
By- Simon Persin, Turnkey Consulting
-
Opinion
11 Dec 2018
Security Think Tank: Severing C&C comms is key, but complex
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including “sleepers” designed to be activated at a future date? Continue Reading
By- Emma Bickerstaffe, Information Security Forum (ISF)
-
News
10 Dec 2018
O2 expected to pursue Ericsson for compensation over 24-hour stoppage
Mobile network operator could seek up to £100m in damages from its supplier, which failed to update expired software certificates, causing a day-long outage Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
07 Dec 2018
What does the 802.11ax wireless standard mean for your network?
The publication of the 802.11ax standard will pave the way for the next generation of wireless technology, but what does it mean for enterprise networks? Continue Reading
-
News
07 Dec 2018
O2 outage highlights importance of software certificate audits
A major outage on the O2 4G mobile network was caused by an expired certificate and could easily have been avoided, it has emerged Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
06 Dec 2018
Security Think Tank: How to tool up to catch evasive malware comms
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including “sleepers” designed to be activated at a future date? Continue Reading
-
News
06 Dec 2018
Fileless malware surge, warns Malwarebytes report
Data from millions of consumers reveals an uptick in fileless malware and other new-generation malware that calls for a new cyber security approach, report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Dec 2018
China demands release of arrested Huawei CFO
The Chinese government has called for the release of Huawei chief financial officer Meng Wanzhou, who was detained in Canada at the weekend Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Dec 2018
Software failure paralyses O2’s 4G network
O2 is racing to fix a major outage on its 4G network that has left millions of mobile subscribers without access to data services Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Dec 2018
BT moves to strip Huawei kit from EE’s network
Telco will remove Huawei’s networking equipment from the core of EE’s 4G mobile network Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Dec 2018
Symantec unveils AI-based protection for critical infrastructure
Cyber security firm has unveiled what it claims to be the industry’s first neural network to protect critical infrastructure from USB-borne malware attacks Continue Reading
By- Warwick Ashford, Senior analyst
-
Answer
04 Dec 2018
What are the differences between network security vs. cybersecurity?
IT groups need to consider varying layers of security. For instance, the similarities and differences between cybersecurity and network security are closely entwined. Continue Reading
By- Mike Jude, Stratecast/Frost & Sullivan
-
Feature
04 Dec 2018
The future of network-connected device security
The proliferation of poorly secured network-connected devices has prompted the UK government to publish new best practice guidelines. Do these go far enough? Continue Reading
-
Answer
16 Nov 2018
What are today's top 3 network security challenges?
A significant shortage of cybersecurity staff, poorly configured firewalls and unmanaged end-user mobile devices are some of the top network security threats. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
-
Answer
16 Nov 2018
How does Thanatos ransomware decryptor tool restore data?
Cisco Talos' Thanatos ransomware decryptor can recover files affected by new ransomware that won't decrypt ransomed files even when a ransom has been paid. Continue Reading
By -
Feature
16 Nov 2018
Securing the SD-WAN: The next network challenge
Every time an enterprise weighs up whether or not to try SD-WAN, security is an essential part of the picture Continue Reading
-
News
16 Nov 2018
Why is hiring a government chief security officer such a tricky business?
Security bosses and CIOs weigh in on why they think the government is struggling to recruit a chief security officer Continue Reading
By -
E-Zine
15 Nov 2018
CW ASEAN: Blockchain is no ‘magic wand’ for security
Blockchain is all the rage, although the technology is so much more than just about bitcoin and cryptocurrencies. In this issue of CW ASEAN, we examine how blockchain is being applied in cyber security, and whether the technology is really as secure as claimed by its proponents. Read the issue now. Continue Reading
-
Feature
14 Nov 2018
It’s complicated: How enterprises are approaching IAM challenges
Identity and access management challenges are evolving with digital transformation. Computer Weekly explores some of the ways organisations are ensuring the right people gain the right access to the right resources Continue Reading
-
News
12 Nov 2018
Norway’s IT industry must tackle security vulnerabilities
Report reveals growing threat posed by “hostile foreign actors” against Norway’s IT systems and critical national infrastructure Continue Reading
By- Gerard O'Dwyer
-
News
06 Nov 2018
APAC firms warm up to SD-WAN to solve networking woes
A third of enterprises in the APAC region have already deployed SD-WAN at most of their sites, while 55% are in the process of doing so, a study shows Continue Reading
By- Aaron Tan, TechTarget