Network security management
-
Opinion
19 Dec 2024
Innovation, insight and influence: the CISO playbook for 2025 and beyond
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Mandy Andress, Elastic
-
News
18 Dec 2024
The Security Interviews: Martin Lee, Cisco Talos
Threat intel expert and author Martin Lee, EMEA technical lead for security research at Cisco Talos, joins Computer Weekly to mark the 35th anniversary of the first ever ransomware attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Oct 2018
British Airways data breach worse than thought
British Airways has admitted that up to 185,000 more people than first thought may have had personal details compromised in August’s data breach Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Oct 2018
DNS attacks cost finance firms millions of pounds a year
Average cost of recovering from a single DNS attack is $924,390 for a large financial services company, survey shows Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
24 Oct 2018
Sibos 2018: ‘Black swan’ cyber event is inevitable
With security experts and bankers expecting a 9/11-style cyber event, deeper collaboration between companies and governments is necessary to identify emerging threats before they occur Continue Reading
-
News
22 Oct 2018
McAfee CTO raises concerns about election cyber security
The security industry needs to look at the security of election processes around the world as well as the security of voting and counting machines, says McAfee CTO Continue Reading
By- Warwick Ashford, Senior analyst
-
Answer
17 Oct 2018
How did the IcedID and TrickBot banking Trojans join forces?
The TrickBot banking Trojan joined forces with IcedID to form a dual threat that targets victims for money. Discover how this union occurred and how it has changed their behaviors. Continue Reading
By -
News
16 Oct 2018
APAC security spending tipped to reach new highs
Security services will be the largest and fastest-growing slice of the overall security pie in the Asia-Pacific region Continue Reading
By- Aaron Tan, TechTarget
-
News
15 Oct 2018
Cost of WannaCry attack to NHS set at £92m
Department for Health and Social Care estimates the immediate cost of the May 2017 WannaCry attack on the NHS was £92m, and says it will have spent about £275m on improvements to its cyber security infrastructure by the end of 2021 Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Oct 2018
AI is no silver bullet for cyber security
A security expert has called for businesses to manage the risks of adopting new technologies and improve their cyber hygiene, rather than see artificial intelligence as a panacea for their security woes Continue Reading
By- Aaron Tan, TechTarget
-
News
11 Oct 2018
Optus to acquire Hivint in cyber security deal
The deal is expected to bolster the telco’s security pedigree in a market that is grappling with more data breaches and cyber incidents Continue Reading
By- Aaron Tan, TechTarget
-
News
08 Oct 2018
Airbus secures European institutions against cyber threat
Airbus CyberSecurity has partnered with Atos to help protect 17 European government institutes from cyber attacks Continue Reading
By- Cliff Saran, Managing Editor
-
Opinion
04 Oct 2018
Security Think Tank: Use Cyber Essentials to kick-start outcomes-based security
What is the first step towards moving from a tick-box approach to security to one that is outcomes-based and how can an organisation test whether its security defences are delivering the desired outcome? Continue Reading
By -
News
03 Oct 2018
Companies failing to recognise the internal cyber threat
The focus at many companies is on external cyber threats, and internal threats are being overlooked as a consequence, a researcher warns Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Oct 2018
Rise in data-stealing Betabot malware
Researchers are warning about an increase in Betabot malware after detecting multiple infections in recent weeks, underlining the importance of software patching Continue Reading
By- Warwick Ashford, Senior analyst
-
Answer
01 Oct 2018
SamSam ransomware: How is this version different from others?
Sophos recently discovered a SamSam extortion code that performs company-wide attacks using a range of vulnerability exploits. Discover how this version differs from past variants. Continue Reading
By -
News
28 Sep 2018
Cyber attackers are increasingly exploiting RDP, warns FBI
Businesses should to act to reduce the likelihood of compromise from cyber attackers exploiting the remote desktop protocol, warns the FBI Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Sep 2018
Network growth brings management challenges
As enterprise networks grow, so do the challenges of managing them effectively, says a report compiled by Oracle’s communications unit Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Sep 2018
Business is at inflection point for proactive cyber security
The time is ripe for proactive cyber security, but many organisations must first overcome four key obstacles to achieve effective protection, according to a research report Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Sep 2018
Norwegian state discusses vulnerabilities with IT sector
Government is collaborating with the country’s IT industry to improve the availability of security expertise Continue Reading
By- Gerard O'Dwyer
-
News
25 Sep 2018
MI5 admits to ‘unlawful’ spying on Privacy International
The UK's intelligence agencies acted unlawfully by intercepting communications data on NGO, Privacy International, the UK's most secret court ruled. Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
18 Sep 2018
AI is crucial element of security strategy in the IoT era
Machine learning and network visibility for users and internet of things devices are essential to battle threats inside the enterprise, according to a new report Continue Reading
By- Alex Scroxton, Security Editor
-
News
17 Sep 2018
Singapore government to start bug bounty programme
Singapore’s bug bounty programme will help the authorities identify cyber blind spots and benchmark its defences against skilled hackers Continue Reading
By- Aaron Tan, TechTarget
-
News
13 Sep 2018
GCHQ mass surveillance regime was in breach of human rights law, European court rules
The European Court of Human Rights in Strasbourg has ruled that the UK’s collection of bulk interception of communications data lacked adequate oversight and safeguards and was in breach of human rights law Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
11 Sep 2018
Higher education sector's poor response to cyber threats laid bare in EfficientIP report
The 2018 EfficientIP Global DNS Report shines a light on how ill-prepared the higher education sector is for handling cyber threats Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
11 Sep 2018
British Airways data breach: Security researchers name suspects and query attack timeline
Security researchers claim to have pinpointed the cause and perpetrators of the British Airways data breach, and also claim the attackers may have had access to its customer data for far longer than previously thought Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
10 Sep 2018
Cyber criminals outspend businesses in cyber security battle
Cybercriminals are flexing their financial might and UK organisations are facing more attacks as a result Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
21 Aug 2018
New Zealand to run national cyber security exercise
The island-nation will test the resilience of its critical infrastructure in November 2018, bringing together multiple agencies to protect assets of national significance Continue Reading
-
News
16 Aug 2018
Global infosec spending to top $114bn in 2018, says Gartner
The need for improved detection, response and privacy is driving the demand for security products and services in response to security risks, business needs and industry changes, Gartner reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
14 Aug 2018
Cyber attackers target infrastructure
In this week’s Computer Weekly, we find out about the growing sophistication of cyber attackers who specialise in industrial control systems. They are fast, efficient and able to move between IT and OT environments. We also discover how few businesses in general are reporting cyber crime, as they should. The issue also tracks Google’s playing court to the C-suite, with respect to cloud computing. Read the issue now. Continue Reading
-
News
14 Aug 2018
FBI warns of global ATM cyber crime spree
The FBI has issued a warning to banks that cyber criminals are planning to steal millions in a coordinated worldwide attack on cash machines Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 Aug 2018
Millions of businesses vulnerable to fax-based cyber attack
Hackers could exploit security vulnerabilities in fax machines to launch cyber attacks in millions of organisations around the world, researchers warn, underlining the need for cyber resilience Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Aug 2018
Brace for more Triton-like attacks, researchers warn
The world has not seen the last of industrial control system (ICS) attacks like Triton, researchers have warned Continue Reading
By- Warwick Ashford, Senior analyst
-
News
07 Aug 2018
Industrial control systems a specialised cyber target
Cyber attackers specialising in industrial control systems are fast, efficient and able to move between IT and OT environments, a study has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Aug 2018
Virus outbreak at iPhone chip plant could delay shipments
A computer virus at an iPhone chip manufacturing plant could delay shipments of Apple’s latest smartphones, but the impact will be limited, say analysts Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Aug 2018
UK security centre to launch IoT security standard
The London-based Centre for Strategic Cyber Space and Security Science is working on an internet of things security standard and has roped in participants from eight markets Continue Reading
By- Aaron Tan, TechTarget
-
News
31 Jul 2018
Briton ran pro-Kremlin disinformation campaign that helped Trump deny Russian links
A British IT manager and former hacker from Darlington ran a disinformation campaign that duped former US intelligence agents and provided Donald Trump with manufactured “evidence” to deny that Russia interfered with the US election Continue Reading
By- Duncan Campbell , 2QQ Ltd, Sussex University
-
News
26 Jul 2018
Brace for PowerGhost cryptominer, warns Kaspersky Lab
Corporate networks are the target of a new illicit cryptocurrency mining malware that is difficult to detect and eradicate, security researchers warn Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Jul 2018
Cyber security vulnerability concerns skyrocket
Security professionals are more worried about data breaches and cyber attacks than they were a year ago, with most fearing that Meltdown-Spectre attacks are becoming the norm Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
25 Jul 2018
Smart cities face challenges and opportunities
IHS Markit analysts Noman Akhtar and Kevin Hasley assess the way forward for smart city technology projects around the world Continue Reading
By- Norman Akhtar and Kevin Hasley
-
Opinion
25 Jul 2018
Beyond GDPR: ePrivacy could have an even greater impact on mobile
From how we monitor air pollution and manage our public transport systems, to how we enable connected cars and the next generation of 5G mobile services, the forthcoming ePR could have a lasting impact on European society Continue Reading
By- Jade Nester, GSMA
-
News
24 Jul 2018
MPs call for inquiry into smart meter roll-out
Government urged to conduct a review of the roll-out of smart meters for electricity and gas, and to intervene to tackle a number of failures Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Jul 2018
Singapore public healthcare sector limits internet use
Healthcare workers who require internet access will have to use separate internet workstations following an unprecedented attack on Singapore’s public healthcare system Continue Reading
By- Aaron Tan, TechTarget
-
News
23 Jul 2018
Zero trust security model boosts business confidence
Organisations that combine the zero trust security model with next-gen access are more confident about meeting access control challenges, a study shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Jul 2018
How Splunk is ‘splunking’ data for APAC enterprises
Splunk’s regional vice-president talks up the company’s business strategy and how its customers are using big data analytics in security and IT operations Continue Reading
By- Aaron Tan, TechTarget
-
E-Zine
17 Jul 2018
CW ANZ: Fix the weak links
Recent reports have suggested that cyber threats are increasingly aimed at critical information infrastructure such as power grids, water treatment plants and transportation networks. While the scale of the problem that Australian industry faces is hard to quantify, no one disputes the threat is real. In this edition of CW ANZ, we look at how Australia is securing its industrial control systems and how it is bridging the security gap between IT and OT teams. Read the issue now. Continue Reading
-
Feature
17 Jul 2018
An insider’s look into the dark web
A principal research scientist at Sophos offers a glimpse into the abysses of the dark web in a bid to uncover what cyber crooks are up to Continue Reading
By- Aaron Tan, TechTarget
-
News
17 Jul 2018
A third of organisations do not have a security expert, survey shows
Around a third of organisations are vulnerable to cyber attacks due to a lack of dedicated in-house cyber security experts, finds Gartner survey Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
13 Jul 2018
Hackers increasingly targeting cloud infrastructure
Cloud infrastructure is a growing target for cyber attackers because of available computing resources, as well as the repositories of valuable data, a report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Jul 2018
Cyber attackers cashing in on ‘hidden’ attack surface
Cyber attackers are cashing in on organisations’ lack of visibility into all online interactions that can involve multiple third parties, a report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Jul 2018
Corporate networks vulnerable to insider attacks, report finds
Researchers found that 100% of corporate networks tested in 2017 were vulnerable to insider attacks, with Wi-Fi networks and employees among the top areas of weakness Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Jul 2018
Inside one of the world’s largest bug bounty programmes
Trend Micro’s Zero Day Initiative may be the top external supplier of software bug reporting for Microsoft and Adobe, but that does not mean it purchases every type of bug Continue Reading
By- Aaron Tan, TechTarget
-
News
29 Jun 2018
UK government cyber security standard welcomed
The information security community has welcomed the publication of the government’s minimum cyber security standard, which could be used by any organisation to improve its cyber defences Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 Jun 2018
University of Melbourne claims quantum computing breakthrough
Australian scientists have simulated the power of quantum computing on classical computers to solve a mathematical problem, paving the way for future breakthroughs in the nascent field Continue Reading
By- Aaron Tan, TechTarget
-
News
27 Jun 2018
Brexit a greater risk to UK financial system than cyber attack
While Brexit is seen as the biggest risk to the stability of the UK financial system, cyber attack is the most difficult risk to manage for over half of firms Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
27 Jun 2018
Government must challenge popular smart city misconceptions
A report by the All Party Parliamentary Group on Smart Cities says many people feel alienated by the concept, and calls on the government to challenge some popular misconceptions Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Jun 2018
Global IoT security standard remains elusive
Despite the lack of a global internet of things security standard, existing security frameworks are on the same page in areas such as device upgradability and data stewardship Continue Reading
By- Aaron Tan, TechTarget
-
News
26 Jun 2018
Norway’s National Security Agency warns IT industry about security obligations
IT service providers serving organisations in Norway have received a timely reminder about their security obligations. Continue Reading
By- Gerard O'Dwyer
-
News
21 Jun 2018
Younger employees 'main culprits' for security breaches
UK senior decision makers believe younger workers are the biggest risk to cyber security, but are doing little to support them and reduce that risk, a report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Jun 2018
Palo Alto Networks opens cyber range in Australia
The first of its kind in Asia-Pacific, the cyber range training facility will let Australian IT and security teams hone their skills through cyber security exercises Continue Reading
By- Aaron Tan, TechTarget
-
News
18 Jun 2018
Singapore faced cyber attacks during Trump-Kim summit
Russian attackers allegedly scanned IP phones in the city-state for vulnerabilities, although it was unclear what they were after or whether they were successful Continue Reading
By- Aaron Tan, TechTarget
-
Feature
11 Jun 2018
How Australia is keeping pace with ICS threats
Besides bridging the security gap between IT and operational technology teams, Australia is driving efforts to bolster the security of IoT devices Continue Reading
-
Feature
01 Jun 2018
Cyber resilience key to securing industrial control systems
Operators of industrial control systems can build greater cyber resilience by getting IT and operational technology teams to work more closely together and improving the visibility of their infrastructure, among other security measures Continue Reading
By- Aaron Tan, TechTarget
-
E-Zine
29 May 2018
Tech's role in tackling humanitarian crises
In this week’s Computer Weekly, we learn about how mobile connectivity is a lifeline for Syrian refugees in Turkey, thanks to the mobile network operators in that country. Our latest buyer’s guide examines how modern network security enables digital transformation at a range of companies. And we find out about the technology strategy of logistics firm Hermes from its CIO, and about British Airways’ use of Salesforce to globalise its B2B sales. Read the issue now. Continue Reading
-
News
25 May 2018
Former Macedonian PM convicted in corruption case exposed by illegal government surveillance
Information exposed by leaked recordings that were part an illegal mass surveillance campaign orchestrated under the government of former prime minster Nikola Gruevski have led to his conviction for corruption. He was found guilty of rigging a tender and receiving a luxury Mercedes as a bribe. He may still appeal the ruling Continue Reading
By -
News
24 May 2018
Grab outlines its approach to cyber security
Singapore-based ride-hailing company prefers detective controls rather than preventive ones to deter cyber threats – an approach it claims is less intrusive and costly to implement Continue Reading
By- Aaron Tan, TechTarget
-
News
18 May 2018
GDS seeks advice on migration from Public Services Network
The Government Digital Service has started the process of moving public sector organisations away from the Public Services Network Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 May 2018
BSI launches kitemark for internet of things devices
The British Standards Institution has launched a new kitemark for IoT devices, designed to improve consumer trust in the technology Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 May 2018
IoT and personal devices pose huge security risk to enterprises
After years of speculation about the risk IoT and personal devices pose to enterprise security, research has revealed the threat is “immense” and probably greater than most firms realise Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 May 2018
CNI providers face hefty fines for cyber security failings
UK providers of critical national infrastructure face hefty fines for cyber security failings from 10 May 2018 Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
08 May 2018
Security Think Tank: Five tips for killing the campers on your network
Why is reducing cyber attacker dwell time important and how should this be tackled? Continue Reading
By- Adrian Davis, (ISC)²
-
News
08 May 2018
Virtual tripwire to keep elephant poachers out of Zambian national park
Cisco and Dimension Data are working to protect Zambia’s at-risk elephant population after a successful pilot project in South Africa Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
04 May 2018
Security Think Tank: More time equals more opportunity for cyber attackers
Why is reducing cyber attacker dwell time important and how should this be tackled? Continue Reading
By -
News
03 May 2018
Fibre network breakthrough has implications for data security
Researchers have devised a new protocol that they claim vastly extends the range of quantum key distribution over fibre networks Continue Reading
By- Alex Scroxton, Security Editor
- 03 May 2018
-
News
03 May 2018
City Police use Lego simulation to teach businesses cyber security
City of London Police are offering to train business leaders and IT security in cyber security using a Lego simulation that is surprisingly close to real life Continue Reading
By- Bill Goodwin, Computer Weekly
-
Opinion
03 May 2018
Security Think Tank: Prevention and detection are key to limit dwell time
Why is reducing cyber attacker dwell time important and how should this be tackled? Continue Reading
By- Emma Bickerstaffe, Information Security Forum (ISF)
-
Opinion
02 May 2018
Security Think Tank: Containment should be top priority in cyber breaches
Why is reducing cyber attacker dwell time important, and how should this be tackled? Continue Reading
-
News
02 May 2018
Ransomware still a threat to business, F-Secure warns
Ransomware attacks tapered off towards the end of 2017 after an explosion in such attacks earlier in the year, but ransomware remains a threat to big business, a report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 May 2018
Google Chrome helps clean up certificate authority industry
The security industry has welcomed the introduction of measures by the Google Chrome browser aimed at achieving certificate transparency Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Apr 2018
Finnish R&D and utilities in line of cyber espionage fire, say security police
Finnish research and development, as well as critical infrastructure, are being targeted by state-backed cyber espionage attacks, says report Continue Reading
By- Tarmo Virki
-
News
23 Apr 2018
Next generation of SCADA industrial controls will protect against cyber attack
Oil, energy and chemical companies are rethinking how to control big manufacturing plants, replacing expensive control technology with cheaper, more secure systems, taking their cue from biology Continue Reading
By- Bill Goodwin, Computer Weekly
-
Opinion
19 Apr 2018
Security Think Tank: Use good practice to address cryptojacking risk
How can organisations best defend against cryptojacking? Continue Reading
By- Simon Persin, Turnkey Consulting
-
News
17 Apr 2018
Business at risk from unidentified network traffic, report warns
A lack of network traffic visibility poses significant security challenges to businesses, a report on network firewalls warns Continue Reading
By- Warwick Ashford, Senior analyst
-
News
17 Apr 2018
China’s ZTE a national security risk, UK telcos warned
UK national cyber security authority has warned telecommunications companies against using equipment and services from Chinese network equipment supplier ZTE, citing national security risks Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 Apr 2018
Flashpoint researchers warn of new VBS Loader
Researchers have issued warnings about a new VBScript downloader that behaves like a remote access Trojan, is designed to run undetected and can update and delete itself Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 Apr 2018
UK and US accuse Russia of targeting network infrastructure
The UK and US have accused the Russian government of targeting network infrastructure, calling on network operators to take the necessary protective measures Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Apr 2018
Government to set up £13.5m cyber security centre
Located at the 2012 Olympic Park, the London Cyber Innovation Centre could create up to 2,000 jobs in cyber security Continue Reading
By- Alex Scroxton, Security Editor
-
Podcast
10 Apr 2018
Podcast: Storage compliance for GDPR data subject requests
The General Data Protection Regulation is upon us. Mathieu Gorge, CEO of Vigitrust, talks you through the key areas needed for compliance in storage of data subjects’ data and how to find it quickly on request Continue Reading
By- Antony Adshead, Storage Editor
-
News
28 Mar 2018
Facebook announces more privacy control updates
Social media giant updates privacy settings and tools in response to the unfolding controversy over Cambridge Analytica’s use of Facebook data for political campaigns Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Mar 2018
Dutch SMEs’ cyber security is insufficient
Nowhere in the Netherlands is digitisation as big as it is in small and medium-sized enterprises, but the sector still has a lot to do in terms of cyber security Continue Reading
By- Kim Loohuis
-
News
22 Mar 2018
Application layer DDoS attacks increasing, Imperva data shows
Distributed denial of service attacks targeting applications almost doubled in the last three months of 2017, according to Imperva Incapsula data Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Mar 2018
SD-WAN still too complex, survey shows
Despite SD-WAN adoption, WAN complexity remains a major challenge, a survey has revealed, driving firms to managed services, mainly because of security concerns Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
19 Mar 2018
Network security in the digital transformation era
Network security has always been a core focus for CISOs and IT security managers, but in an era of digital transformation, we examine if network security strategies are keeping up with new and emerging cyber threats Continue Reading
-
News
19 Mar 2018
Russia compromised core router in US energy attacks
Russian cyber attackers used a compromised core router in a series of attacks on the US energy sector, security researchers have revealed as the UK energy sector is placed on alert Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
16 Mar 2018
Network security in the age of the internet of things
Wireless devices and smart technologies are increasingly being brought into the workplace, and pose a growing risk to company data Continue Reading
-
News
16 Mar 2018
IT contractors not a risk despite Snowden leaks, GCHQ tells court
The government argues in the Investigatory Powers Tribunal that contractors with systems administration rights to computers holding GCHQ’s most sensitive intelligence pose no more of a security risk than the agency’s employees Continue Reading
By- Bill Goodwin, Computer Weekly
-
Opinion
16 Mar 2018
SD-WAN needs software-defined security
Digital transformation is driving organisations to move to the cloud, which requires a new architecture that embraces cloud technology, but that in turn requires a new way of thinking about network security to ensure data is protected Continue Reading
By- Klaus Gheri, Barracuda
-
Opinion
15 Mar 2018
Security Think Tank: Fileless malware not totally undetectable
What should organisations do at the very least to ensure business computers are protected from fileless malware? Continue Reading
By -
News
13 Mar 2018
Government ‘unlawfully delegated’ bulk data powers to GCHQ, court hears
Privacy International urges Britain’s most secret court, the Investigatory Powers Tribunal, to rule that the government illegally collected surveillance data from internet and phone companies until at least September 2017 Continue Reading
By- Bill Goodwin, Computer Weekly
-
Feature
13 Mar 2018
Businesses need to take cryptojacking seriously
Organisations must pay attention to cyber criminals hijacking computing resources to mine cryptocurrencies, because nearly half are affected and the impact is greater than many realise Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
12 Mar 2018
Security Think Tank: Human, procedural and technical response to fileless malware
What should organisations do at the very least to ensure business computers are protected from fileless malware? Continue Reading