Network security management
-
Opinion
19 Dec 2024
Innovation, insight and influence: the CISO playbook for 2025 and beyond
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Mandy Andress, Elastic
-
News
18 Dec 2024
The Security Interviews: Martin Lee, Cisco Talos
Threat intel expert and author Martin Lee, EMEA technical lead for security research at Cisco Talos, joins Computer Weekly to mark the 35th anniversary of the first ever ransomware attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Oct 2016
Snowden: the IT analyst turned whistleblower who exposed mass surveillance
Oliver Stone's biopic on Edward Snowden reaches the heart of the ethical crisis posed by mass surveillance for the state and ordinary citizens Continue Reading
-
News
18 Oct 2016
Saving Lauri Love: activists plan their next move
An eclectic bunch of activists, charity workers and reformed hackers spent a rainy Sunday afternoon plotting their next move in a campaign to save Lauri Love from extradition to the US on hacking charges Continue Reading
By- Julia Gregory
-
News
29 Sep 2016
NGOs challenge UK and US mass surveillance in human rights court
Privacy International, Liberty and the American Civil Liberties Union are among 10 human rights groups backing a landmark challenge to mass surveillance in the European Court of Human Rights Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
16 Sep 2016
Alleged hacker Lauri Love can be extradited to the US, court rules
Westminster Magistrates’ Court has ruled that alleged hacker, Lauri Love, can be extradited to the US, where he could face a 99-year prison sentence Continue Reading
-
Feature
16 Sep 2016
Lauri Love: the student accused of hacking the US
How did a brilliant but fragile computer science student from a rural English town end up facing life imprisonment in the US? Computer Weekly speaks to Lauri Love Continue Reading
By- Bill Goodwin and Niels Ladefoged
-
News
12 Sep 2016
MaidSafe secure internet concept enters testing phase
Scottish internet startup MaidSafe brings its vision for a more private and secure approach to the web a step closer to reality Continue Reading
By- Alex Scroxton, Security Editor
-
News
31 Aug 2016
Evidence of DNS tunnelling in two-fifths of business networks
Cyber criminals are capitalising on the failure of many businesses to examine their DNS traffic for malware insertion and data exfiltration, according to Infoblox Continue Reading
By- Warwick Ashford, Senior analyst
-
News
14 Jul 2016
CIO Interview: Elly Resende, CIO, Rio 2016 Olympics
As Rio de Janeiro gets ready to host the Olympics, Computer Weekly speaks to the man in charge of its IT Continue Reading
-
News
12 Jul 2016
IBM sets up security centre in Canberra
IBM leads the charge as large private businesses invest heavily in security resources across Australia in an attempt to close the security gap Continue Reading
-
News
08 Jul 2016
Cisco UK and Ireland CEO Phil Smith steps down after 22 years
Phil Smith announces he is stepping down from the day-to-day running of Cisco’s UK and Ireland business to take up the role of chairman Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
07 Jul 2016
CW ASEAN: July 2016
Lessons from the Philippine government hack: In this issue we ask why a hack on the Philippine Commission on the Elections (Comelec) was allowed to happen and what organisations in Southeast Asia can learn from this breach of security. Retailers in the region are concerned – read how the theft of customer data is their biggest worry. Continue Reading
-
E-Zine
07 Jul 2016
CW ANZ: July 2016
Australia knows it has a cyber security problem, but not the scale. In this month’s CW ANZ we describe how Australia's $230m security strategy serves as a wake-up call to enterprises. We also reveal the techniques and technologies being used to protect one Australian school, as well as a more general look at the main cyber threats to orgainsations in Australia. Read the issue now. Continue Reading
-
News
29 Jun 2016
Lauri Love may be faking mental illness claims lawyer for US
Prosecution lawyer Peter Caldwell questions whether activist Lauri Love is exaggerating mental health problems to avoid extradition to face hacking charges in the US Continue Reading
By- Fiona O’Cleirigh and Bill Goodwin
-
News
07 Jun 2016
Internet traffic to triple by 2020, says Cisco
The latest edition of Cisco’s Visual Networking Index predicts a near tripling of internet traffic during the coming years as more than a billion people come online Continue Reading
By- Alex Scroxton, Security Editor
-
News
01 Jun 2016
MPs’ private emails are routinely accessed by GCHQ
Computer Weekly investigation reveals the extent of interception of MPs’ and peers’ email communications and data Continue Reading
By- Duncan Campbell and Bill Goodwin
-
Feature
01 Jun 2016
My first IoT project: A guide for businesses
We’ve all had a good giggle about having our fridges hacked – but now it’s time to get real. What are the first steps enterprises should take when implementing their first internet of things project? Continue Reading
By -
E-Zine
19 Apr 2016
The hunters who prey on cyber criminals
In this week’s Computer Weekly, we talk to the hunters – a new breed of security expert that proactively hunts down cyber attackers before they can strike. We visit Silicon Valley to meet some of the up-and-coming startups in data analytics and business intelligence. And we hear from IT leaders about the people, process and cultural aspects of managing digital transformation. Read the issue now. Continue Reading
-
News
15 Apr 2016
Israeli volunteers ready their cyber defences as Anonymous affiliates attack
Every April, Israel braces itself for an onslaught from pro-Palestinian hackers, but the occupants of a small conference room in Tel Aviv stand in their way Continue Reading
By- Niv Lilien
-
News
11 Apr 2016
Activist Lauri Love faces order to disclose encryption keys
The UK’s National Crime Agency takes an unusual legal step to force a former university student accused of hacking to disclose encryption keys Continue Reading
By- Bill Goodwin, Computer Weekly
-
Opinion
07 Mar 2016
The problem with passwords: how to make it easier for employees to stay secure
An organisation’s IT security can be compromised if staff do not follow a strict policy of using strong passwords to access internal systems Continue Reading
By- Jeremy Bergsman, CEB
-
E-Zine
23 Feb 2016
Surviving broadband failure
In this week’s Computer Weekly, after the recent BT broadband outage, we examine the options to keep your communications in place in the event of a failure, to ensure business continuity. We look at the prospects for the OpenStack open source cloud platform in the enterprise. And we see how Ireland is making progress on delivering a digital health service. Read the issue now. Continue Reading
-
News
29 Jan 2016
HSBC online services hit by DDoS attack
HSBC was hit by a distributed denial of service (DDoS) attack, which targeted its online personal banking services. Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
27 Jan 2016
Average DDoS attacks fatal to most businesses, report reveals
Criminal activity is top motivation for DDoS attacks as average attacks become strong enough to down most businesses, Arbor Networks report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
05 Jan 2016
Interview: James Bamford on surveillance, Snowden and technology companies
Investigative journalist and documentary maker James Bamford was among the first to uncover the secrets of the US National Security Agency and its global surveillance Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
24 Dec 2015
Top 10 IT security stories of 2015
Computer Weekly looks back at the most significant stories on IT security in the past 12 months Continue Reading
By- Warwick Ashford, Senior analyst
-
Guide
07 Dec 2015
Essential guide to data breaches, the dark web and the hidden data economy
In this guide, we look at the aftermath of a data breach - what do cyber criminals use that stolen data for, and what can companies do to avoid becoming a victim? Continue Reading
-
News
02 Nov 2015
Hewlett Packard Enterprise: think of us as a startup
As Hewlett Packard Enterprise and HP Inc finally part ways, UK managing director Andy Isherwood shares some insight on what the future holds for the newly minted enterprise business Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
15 Oct 2015
The true cost of a cyber security breach in Australia
The costs of cyber security breaches can quickly add up with fines, reputational damage and overhauls to network security all hitting the coffers. The case of one Australian firm shows why paying a ransom to a hacker might be tempting. Continue Reading
-
News
12 Oct 2015
Encryption is a double-edged sword, says Blue Coat
Seven more security suppliers join Blue Coat encrypted traffic management programme amid fresh warnings of attackers using encryption to hide malicious activity Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
09 Oct 2015
The security dangers of home networks
Most companies take reasonable steps to protect their networks from virus attacks, but one area of vulnerability that is often overlooked is infection from employees’ home networks Continue Reading
-
Feature
09 Oct 2015
How to ensure strong passwords and better authentication
Five steps to ensure stronger passwords and better authentication to reduce the threat of business data theft Continue Reading
By- Peter Wood, First Base Technologies LLP
-
Feature
25 Sep 2015
How to fully test IT networks for vulnerabilities
Making sure a company network is secure is a very important task, and one that should be scheduled regularly Continue Reading
By -
News
16 Sep 2015
BT launches ethical hacking service for bankers
BT introduces a certified Crest Star ethical hacking test service for financial services customers Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Sep 2015
Security pros failing to address digital certificate risks, survey shows
Even though 90% of security professionals believe a leading CA will be compromised in next two years, only 13% have existing automation to deal with that happening Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 Aug 2015
Mobile phone users at risk as hackers bug and track victims
An investigation by Australian TV show 60 Minutes demonstrates how hackers based thousands of miles away in Germany were able to record the calls of an Australian senator and track his movements Continue Reading
By- Ross Coulthart, 60 Minutes Australia
-
News
06 Jul 2015
The internet of things could save the honeybee from extinction
Gemalto’s M2M unit is developing an ambitious project with agricultural science firm Eltopia and the University of Minnesota. The objective: to save the honeybee from extinction Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Jul 2015
Wi-Fi enhances guest experience and profitability for Belgian theme park
Bobbejaanland, one of the largest theme parks in Belgium, is using a Fortinet Wi-Fi network to offer visitors access on the go, and improve its management capabilities Continue Reading
By- Xavier Mertens
-
News
29 Jun 2015
Cisco launches IoT System for enterprise and smart cities
Cisco unveils 15 products to address the growing complexity of internet of things deployments Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Jun 2015
Computer Weekly European User Awards 2015 winners revealed
The winners have been announced for the Computer Weekly European User Awards 2015. See who made the top spots Continue Reading
By- Kayleigh Bateman, Computer Weekly
-
Opinion
26 Jun 2015
Three things you may not know that DNS data can tell you
Big data tools can help network administrators gather new insights into security and performance from DNS data Continue Reading
By- Simon McCalla, Nominet
-
News
23 Jun 2015
Pharmaceutical companies use BPM to cut cost of clinical trial drugs
Pharmaceutical companies have developed an IT system to secure the supply of medicines they need for clinical studies, saving hundreds of thousands on their drugs bill in the process Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
03 Jun 2015
VMware puts network virtualisation to work in McAfee environments
VMware announces an integrated system to automate distribution and enforcement of McAfee’s network security platform using its NSX network virtualisation system Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 May 2015
Computer Weekly European User Awards 2015 shortlist
Find out who made the Computer Weekly European User Awards 2015 shortlist Continue Reading
By- Kayleigh Bateman, Computer Weekly
-
News
20 May 2015
BT Openreach turns to Crimestoppers to catch cable thieves
Openreach extends its partnership with crime-fighting charity Crimestoppers to tackle cable theft Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 May 2015
Wi-Fi Global Congress: Hotspot 2.0 standard addresses wireless security holes
At Wi-Fi Global Congress, Ruckus Wireless announces it will be first to market with the second release of Hotspot 2.0 Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 May 2015
PSNGB rebrands to drive information sharing across PSN
PSNGB, the trade association set up to promote the Public Services Network, rebrands itself as Innopsis and says its work is far from over Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
25 Apr 2015
Bill Binney, the ‘original’ NSA whistleblower, on Snowden, 9/11 and illegal surveillance
Always a patriot: Computer Weekly talks to Bill Binney, the senior NSA official who blew the whistle before Edward Snowden Continue Reading
-
E-Zine
20 Apr 2015
The future of Moore's Law at 50
In this week's Computer Weekly, Moore's Law – the seminal forecast by Intel founder Gordon Moore that oversees technology development – is 50 years old. We look at its modern relevance and future implications. IT chiefs discuss whether Windows is still core to their strategy. And we look back at five years of government IT. Read the issue now. Continue Reading
-
News
14 Apr 2015
Security risk potential linked to young, mobile users
A study conducted by wireless supplier Aruba Networks has identified a distinct cohort of high-risk, security-agnostic workers Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Mar 2015
Why IAM is topping security investments in 2015
It is not surprising identity and access management (IAM) is set to move to the fore in 2015 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Mar 2015
2015 IT priorities: SDN yet to prove itself, fear of network hacks growing
In Computer Weekly’s 2015 IT priorities study, software-defined networking is still behind management and monitoring as a networking priority Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
06 Mar 2015
How to secure the SDN infrastructure
As more enterprises look to deploy software-defined networking, the need for security from the ground up should not be underestimated Continue Reading
By -
News
27 Feb 2015
Case study: Norwegian insurer invests in Darktrace machine-learning cyber defence
Shipping insurance company DNK hopes to inspire the rest of the shipping industry to adopt Darktrace’s cyber defence system Continue Reading
-
News
06 Feb 2015
Symantec continues cloud investment in spite of poor Q3 results
Symantec has reported third quarter 2015 revenue of $1.64bn, a drop of 4% compared with $1.70bn over the same period in 2014 Continue Reading
By- Cliff Saran, Managing Editor
-
E-Zine
05 Jan 2015
CW Europe – January 2015 Edition
As we start another new year we look back at what technology has been playing a vital role in keeping Europe safe. Headlines are regularly filled with threats about cyber wars and attacks which, although are important to bring to light, can sometimes overshadow the role technology plays in keeping us safe. Continue Reading
-
News
23 Dec 2014
What might North Korea v US cyberwarfare over Sony mean for other corporates?
North Korea behind Sony attack and US counter-penetration -- what now, asks SearchCIO's Francesca Sales. Continue Reading
-
News
18 Dec 2014
CIO interview: Mercedes AMG Petronas IT director on the need for speed in IT
When Matt Harris became IT director for F1 team Mercedes AMG Petronas in 2009, IT costs needed to be slashed Continue Reading
By- Cliff Saran, Managing Editor
-
News
17 Dec 2014
Cabinet Office begins procurement for next stage of Gov.uk Verify
The Cabinet Office has submitted a tender notice for a £150m three-year framework for the provision of identity assurance services Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
28 Nov 2014
CGI secures communications between pilots and air traffic control
Satellite communications firm Inmarsat has outsourced the provision of security IT and services to CGI Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
25 Nov 2014
National Trust for Scotland overcomes legacy network challenge
The National Trust for Scotland has replaced a historical network infrastructure with a core service from Brocade Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Nov 2014
Network firewalls as relevant to data security as ever, says industry pioneer Gil Shwed
Network firewalls are as relevant to data security today as they were 20 years ago, says industry pioneer Gil Shwed Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
27 Oct 2014
Securing critical industrial systems
In this week’s Computer Weekly, we examine the security threats to the industrial control systems that power the UK’s critical national infrastructure, and ask what can be done to better protect them. We look at the key considerations when choosing an infrastructure as a service supplier. And we compare six of the top hybrid flash array products from the leading storage hardware providers. Read the issue now. Continue Reading
-
News
08 Oct 2014
Malware being used to steal cash from ATMs
Criminals are using malware to steal cash from ATMs without debit and credit cards Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
E-Zine
03 Oct 2014
CW Europe - October 2014 Edition
BYOD policies: What’s allowed and what’s banned? As IT departments still try to come to terms with the notion of BYOD, CW Europe takes a look at what policies are being implemented to keep security under control. Continue Reading
-
News
15 Sep 2014
Salesforce issues advice on avoiding Dyreza attack
Salesforce has issued a set of guidelines on tightening security after a number of its customers were targeted by the Dyreza email virus Continue Reading
By- Cliff Saran, Managing Editor
-
News
21 Aug 2014
Load balancing supports Kent County Council's VDI project
Kent County Council picks Kemp Technologies load balancers to support a deployment of VMware Horizon View and Workspace across its estate Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Aug 2014
USB-connected devices present cyber vulnerabilities
Connecting devices to computers using a USB port could lead to security breaches, say Berlin-based researchers Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
18 Jul 2014
BT’s secure link to Microsoft Azure goes live in Europe
BT’s new, secure, high-performance connectivity to Azure public cloud has gone live in Europe three months after BT teamed up with Microsoft Continue Reading
By- Archana Venkatraman, Datacentre Editor
-
Opinion
16 Jul 2014
The legal considerations of the internet of things
As with many new technologies, there are a number of tricky legal challenges to consider as part of widespread IoT adoption Continue Reading
By- Kim Walker
-
News
07 Jul 2014
Smart light bulbs get security update
Smart light bulb maker LIFX has issued a firmware update after security researchers exposed a security weakness Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Jul 2014
Barclays passes government’s ‘internet-born threat’ test
Barclays Bank has been awarded the government’s cyber security certificate for digital banking services after independent tests of services such as Pingit Continue Reading
-
News
03 Jul 2014
Netflix releases its AWS monitoring tool Security Monkey into the wild
Netflix has made Security Monkey, the AWS tracker tool it built for itself, freely available to other Amazon cloud users Continue Reading
By- Archana Venkatraman, Datacentre Editor
-
News
16 Jun 2014
Microsoft admits running out of IP addresses for Azure
Microsoft has assured US Azure customers data remains in the US, despite running out of US-registered IP addresses at times Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
09 Jun 2014
The case for a European cloud market
In this week’s Computer Weekly, the European Commission wants to create a digital single market in Europe based on industry standard clouds – but is the plan realistic? Network encryption promises to solve many IT security threats – we examine the benefits. And our latest buyer’s guide looks at business process management. Read the issue now. Continue Reading
-
News
06 Jun 2014
Vodafone blows lid on government spy networks
Vodafone reveals secret mobile phone-tapping network and joins Microsoft and Cisco in calling for debate on electronic surveillance Continue Reading
By- Alex Scroxton, Security Editor
-
News
02 Jun 2014
Cyber threats hiding in plain sight, says Palo Alto Networks
Cyber attackers exploit commonly used business applications to bypass security controls, research shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Apr 2014
Cyber threat detection paramount, says SANS fellow
Cyber threat prevention is ideal, but detection is a must, says Eric Cole, SANS Institute fellow Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Apr 2014
Why have organisations failed to make PSN compliance deadline?
A number of organisations have failed to meet the PSN security compliance deadline despite the threat of being cut off from critical services Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
Feature
14 Mar 2014
Hacktivism: good or evil?
IT lawyer Dai Davis looks at the rise of hacktivism and its impact on business and international politics Continue Reading
By- Dai Davis, Percy Crow Davis & Co
-
News
12 Mar 2014
More than 162,000 WordPress sites used in DDoS attack
Security researchers have uncovered a DDoS attack that used more than 162,000 legitimate and unwitting WordPress websites Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Mar 2014
IT Security Salary Index (UK)
Are you being paid the right rate for the job? Check out this IT Security salary index from Acumin. Continue Reading
-
News
21 Feb 2014
PSN gets encryption for higher security levels
An encryption service has been announced by the Cabinet Office which will enable public sector staff to share information at the IL3 security level over the Public Services Network (PSN) Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
06 Feb 2014
UK critical infrastructure at risk of cyber attack, says IET report
UK critical national infrastructure is at risk of cyber attack, says a report by consultancy Atkins for the Institution of Engineering and Technology (IET) Continue Reading
-
News
05 Feb 2014
Bank of England publishes Waking Shark II cyber security exercise results
Bank of England publishes the results of its Waking Shark II security exercise, which tested financial institutions' contingency plans for cyber attack Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
17 Jan 2014
Internet at risk of 'cybergeddon' says WEF
Internet is at risk of fragmenting amid concerns over spying and cyber crime, says World Economic Forum Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
10 Jan 2014
Security considerations for UK enterprises
This Research Snapshot from Vanson Bourne looks at IT security spending trends, awareness of cyber-threats, and the factors perceived as the biggest security risks for organisations. Continue Reading
-
News
20 Dec 2013
UK citizen wins legal round against Facebook over Prism leaks
A British citizen has applied for a judgement against Facebook in a case that will test the right of tech firms to give UK personal data to the NSA. Continue Reading
By- Fiona O’Cleirigh
-
E-Zine
16 Dec 2013
Can BlackBerry restore its business appeal?
In this week’s issue of Computer Weekly, we examine whether former Sybase chief, John Chen, will be able to stem the decline of BlackBerry and reinvent the the smartphone maker as a software business for the “bring your own device” (BYOD) era. Our buyer’s guide to the internet of things concludes with a look at how universal connectivity will yield insights in fields as diverse as aviation and hospitality. And we analyse Google’s attempts to compete with Amazon Web Services in public cloud. Continue Reading
-
News
05 Dec 2013
UK citizen sues Microsoft over Prism private data leak to NSA
A court action brought in the UK will test Microsoft's legal right to disclose private data on UK citizens to US intelligence services Continue Reading
By- Fiona O’Cleirigh
-
News
04 Dec 2013
Councils threatened with disconnection from PSN in escalating security row
A London council was hours away from being disconnected from the public sector network, in an row between central and local government over security compliance Continue Reading
By- Bryan Glick, Editor in chief
-
News
27 Nov 2013
European Parliament closes Wi-Fi after man-in-the-middle attack
A number of mailboxes have been compromised and users’ smartphones could be at risk following a man-in-the-middle attack on the European Parliament’s public Wi-Fi Continue Reading
By- Jennifer Scott, TechTarget
-
News
26 Nov 2013
NCA changed UK cyber crime fighting, says NCCU head
The NCA has changed the UK law enforcement landscape, says Andy Archibald, head of the NCA’s National Cyber Crime Unit Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Nov 2013
White hat Wi-Fi hacking shows vulnerability of business data
Whitehat hackers have shown that senstitive data can be sniffed easily from public Wi-Fi hotspots Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Nov 2013
Facebook authentication - Like?
As Cisco teams up with Facebook to offer authentication for public Wi-Fi, is this option safe for businesses? Continue Reading
By -
News
15 Nov 2013
Cyber collateral damage a concern for all, says Lancope
All organisations could be affected by cyber attack collateral damage, says network security firm Lancope Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Nov 2013
Mass surveillance a bad idea, says Information Commissioner Christopher Graham
Information Commissioner Christopher Graham says issues of national security must not overshadow concerns of legitimate public interest Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Nov 2013
Global profiles of the fraudster
Computers, rather than conmen, are set to be the future face of fraud, as criminals turn to robotics in an effort to avoid detection, this report from KPMG reveals. Continue Reading
-
News
29 Oct 2013
Analysis: RSA says security needs to change, but what does that mean?
RSA executive chairman Art Coviello has issued a call to action to the security industry to improve technology and collaboration Continue Reading
-
News
29 Oct 2013
Most businesses need to transform IT security, says RSA
No modern network or IT system can withstand the onslaught of a skilled adversary, given focus and time, says Amit Yoran, general manager of RSA Continue Reading
By- Warwick Ashford, Senior analyst
-
News
23 Oct 2013
US publishes draft cyber security framework
The US has published a draft framework of voluntary cyber security standards aimed at reducing risks to critical national infrastructure Continue Reading
By- Warwick Ashford, Senior analyst