Network security management
-
Opinion
19 Dec 2024
Innovation, insight and influence: the CISO playbook for 2025 and beyond
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Mandy Andress, Elastic
-
News
18 Dec 2024
The Security Interviews: Martin Lee, Cisco Talos
Threat intel expert and author Martin Lee, EMEA technical lead for security research at Cisco Talos, joins Computer Weekly to mark the 35th anniversary of the first ever ransomware attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 May 2024
Microsoft beefs up cyber initiative after hard-hitting US report
Microsoft is expanding its recently launched Secure Future Initiative in the wake of a hard-hitting US government report on recent nation state intrusions into its systems Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 May 2024
Optimising application connections, improving security posture top SD-WAN priorities
Research looking into key drivers behind global SD-WAN investments find deployments are mainly driven by need to optimise network connections to cloud-based applications and improve overall security posture Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
02 May 2024
Palo Alto Networks claims to raise bar on SASE
Palo Alto Networks releases version 3.0 of SASE tech designed to extend zero trust to unmanaged devices, secure data with artificial intelligence and boosts application performance for partners and customers Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Definition
02 May 2024
What is a SSL (secure sockets layer)?
Secure sockets layer (SSL) is a networking protocol designed for securing connections between web clients and web servers over an insecure network, such as the internet. Continue Reading
By- TechTarget Contributor
- Michael Cobb
- Peter Loshin, Former Senior Technology Editor
-
News
02 May 2024
How Okta is fending off identity-based attacks
Okta has been bolstering the security of its own infrastructure and building new tools to scan customer environments for vulnerable identities, among other efforts to fend off identity-based attacks Continue Reading
By- Aaron Tan, TechTarget
-
Definition
01 May 2024
remote access
Remote access is the ability for an authorized person to access a computer or network from a geographical distance through a network connection. Continue Reading
-
News
30 Apr 2024
Bad bot traffic in Australia grew 23% in 2023
Traffic from bad bots that perform malicious tasks accounted for 30.2% of Australia’s internet traffic in 2023 Continue Reading
By- Aaron Tan, TechTarget
-
News
29 Apr 2024
Cradlepoint unveils 5G-optimised SASE to deliver agile enterprises
Ericsson division unveils SASE solution said to enable lean IT teams to establish zero-trust networks in as little as six minutes securing environments such as roaming vehicles, IoT devices and pop-up locations Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
25 Apr 2024
Zero trust is a strategy, not a technology
Zero-trust security should be seen as a strategy to protect high-value assets and is not tied to a specific technology or product, says the model’s creator John Kindervag Continue Reading
By- Aaron Tan, TechTarget
-
Feature
22 Apr 2024
Securing the edge: A new battleground in mobile network security
Edge computing is transforming approaches to mobile network infrastructure, but failure to secure it can expose networks and data to cyber threats. Learn more about the dangers and potential solutions Continue Reading
By -
News
18 Apr 2024
CSA warns of emerging security risks with cloud and AI
Few users appreciate the security risks of cloud and have the expertise to implement the complex security controls, says CSA chief executive David Koh Continue Reading
By- Aaron Tan, TechTarget
-
News
17 Apr 2024
Mandiant formally pins Sandworm cyber attacks on APT44 group
Mandiant has formally attributed a long-running campaign of cyber attacks by a Russian state actor known as Sandworm to a newly designated advanced persistent threat group to be called APT44 Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 Apr 2024
CW Innovation Awards: Balancing security and user experience
The National University of Singapore’s Safe initiative has strengthened the security of IT systems and end-user devices while prioritising user experience through passwordless access Continue Reading
By -
Feature
12 Apr 2024
5G networks and biometric breakthroughs: Navigating opportunities and risks
Businesses are quickly adopting 5G to introduce advanced security features such as facial recognition, but while these technologies improve safety and ease of use, they also raise concerns about how sensitive biometric information is gathered and may be misused Continue Reading
By -
News
10 Apr 2024
Breakthrough may herald secure home quantum computing
An emerging approach to quantum security dubbed blind quantum computing may one day help spur mass adoption of quantum computing safely and securely, using technology that is already available today Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Apr 2024
What Cisco’s Splunk acquisition means for APAC customers
APAC organisations can expect better visibility and insights into their networks and applications along with automation and response capabilities to improve their digital resilience Continue Reading
By- Aaron Tan, TechTarget
-
News
05 Apr 2024
How Oracle Red Bull Racing guards against cyber threats
The F1 team is tapping managed security services, conducting penetration tests and improving security awareness among employees to fend off cyber threats such as phishing and ransomware Continue Reading
-
News
03 Apr 2024
RDP abused in over 90% of cyber attacks, Sophos finds
Threat actors continue to see great success using simple, tried and tested methods, and many defenders are failing to do the basics Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Apr 2024
Cato claims SASE speed record
Fast cars meet even faster networks as leading SASE provider doubles throughput to double-digit gigabits per second without any hardware upgrades, attributing the landmark as underscoring value of fully cloud-native platform Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
28 Mar 2024
Hybrid work drives demand for SASE, zero-trust networking
Aryaka report finds five key trends with 70% of CISOs seeking secure access service edge and software-defined WAN convergence for simplified infrastructure management Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
28 Mar 2024
UK plc going backwards on cyber maturity, Cisco report claims
Fewer UK organisations believe their cyber security postures have reached a mature level than did so 12 months ago, as they struggle to keep up with new challenges and a fast-evolving threat landscape Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Mar 2024
Sellafield to be prosecuted over alleged cyber compliance failure
Sellafield Ltd, the organisation responsible for cleaning up and decommissioning the UK's largest nuclear waste site, is to be prosecuted over alleged cyber security failings dating back to 2019 Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Mar 2024
Cyber spies, not cyber criminals, behind most zero-day exploitation
Analysis from Google has found that zero-day vulnerabilities are much more heavily exploited for espionage purposes than for financially motivated cyber crime Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Mar 2024
NCSC reaffirms guidance for those at risk of Chinese state hacking
As the UK and US governments announce sanctions and indictments of a Chinese state threat actor, the NCSC has reiterated its security advice for individuals at risk of being targeted for espionage purposes Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Mar 2024
US authorities charge seven over Chinese hacking
The US Department of Justice has charged seven Chinese nationals linked to the APT31 threat actor that targeted politicians in the UK and US Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Mar 2024
Court finds EncroChat hacked messages admissible as former footballer is jailed
A judge in ‘lead’ EncroChat case found that messages obtained by police from the encrypted phone network can be lawfully used in evidence Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
20 Mar 2024
UK’s cyber resilience stagnates as more fall victim to attacks
The government is calling on businesses to ramp up their cyber protections as study shows improvements to resilience are stagnating amid an ever-growing volume of attacks Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Mar 2024
EMEA security spend will have another boom year in 2024
Cyber security services and technology will once again be the focus of major investment across EMEA during 2024, according to the latest Technology Spending Intentions study from TechTarget and ESG Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Mar 2024
Cato claims first for AI-driven networking, security incident detection and response
Artificial intelligence option from Cato enhanced to detect and identify the root cause of networking incidents and to reduce outages from hours to minutes Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
19 Mar 2024
Australia’s cyber security spending to grow 11.5% this year
Highly publicised cyber attacks and growing regulatory obligations are keeping security and risk top of mind for Australian organisations this year, says Gartner Continue Reading
By- Aaron Tan, TechTarget
-
Definition
15 Mar 2024
virus (computer virus)
A computer virus is a type of malware that attaches itself to a program or file. A virus can replicate and spread across an infected system and it often propagates to other systems, much like a biological virus spreads from host to host. Continue Reading
By- Robert Sheldon
- Mike Chapple, University of Notre Dame
- Crystal Bedell
-
Definition
14 Mar 2024
virus signature (virus definition)
A virus signature, also known as a 'virus definition,' is a piece of code with a unique binary pattern that identifies a computer virus or family of viruses. Continue Reading
-
News
13 Mar 2024
Microsoft AI-powered cyber service to go live in April
After a year being previewed by beta customers, Microsoft’s much vaunted Copilot for Security service is about to go on general release, promising time savings and improved accuracy for hard-pressed security pros Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Mar 2024
More DDoS attacks launched against APAC financial firms
The financial sector in Asia-Pacific saw more DDoS attacks in 2023, but no notable impact was reported, according to a report by Akamai and FS-ISAC Continue Reading
By- Aaron Tan, TechTarget
-
News
11 Mar 2024
Aryaka advances network, security convergence with SASE as a service
Cloud-based software-defined networking and security services provider claims to transform global secure networking with unified secure access service edge solution Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
07 Mar 2024
Western Sydney Metro deploys mission-critical communications for driverless transport
Nokiar teams with industrial partner to provide IP/MPLS backbone communications network and security solution for new Metro line connecting Australia’s largest city to airport Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Feature
01 Mar 2024
Ivanti vulnerabilities explained: Everything you need to know
A series of vulnerabilities in Ivanti products have caused concern worldwide. Delve into some of the key issues arising from the Ivanti disclosures, looking at the vulnerabilities and their impact, what affected users should do, and learn about new developments Continue Reading
By- Alex Scroxton, Security Editor
-
News
01 Mar 2024
Fancy Bear sniffs out Ubiquiti router users
The authorities have warned users of Ubiquiti EdgeRouter products to take remedial action after a number of devices were hijacked into a malicious botnet by a Russian cyber espionage unit Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
27 Feb 2024
OpenSSL
OpenSSL is an open source cryptographic toolkit that facilitates secure communications between endpoints on a network. Continue Reading
-
News
23 Feb 2024
ConnectWise users see cyber attacks surge, including ransomware
ConnectWise ScreenConnect users who have yet to patch against a critical vulnerability are now being targeted by a barrage of cyber attacks, including ransomware Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Feb 2024
Toshiba and Orange test quantum encryption on traditional network
Researchers used QKD on a fibre-optic network spanning 184km to show how the technology could be used to secure networks cost-effectively Continue Reading
By- Cliff Saran, Managing Editor
-
News
21 Feb 2024
SITA enhances aviation SASE with automated multi-cloud networking service
Leading IT provider in the air transport industry announces strategic collaboration with multi-cloud networking firm to gain enhanced access to secure cloud-based offerings Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
14 Feb 2024
Microsoft: Nation-state hackers are exploiting ChatGPT
Threat actors from China, Iran, North Korea and Russia have all been probing use cases for generative AI service ChatGPT, but have yet to use such tools in a full-blown cyber attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Feb 2024
Hunter-killer malware volumes seen surging
Latest Picus Security report on malware tactics, techniques and procedures reveals an increasing focus on disabling security defences Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
12 Feb 2024
Executives must face down state-sponsored hacking groups targeting firmware
State-backed groups have ratcheted up the pressure for cyber security professionals and executives. But that’s not an excuse to cede them the territory. Continue Reading
By- Michael Marcotte
-
News
09 Feb 2024
MoD ethical hacking programme expands after initial success
The Ministry of Defence has expanded the scope of its defensive security partnership with HackerOne Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Feb 2024
NCSC warns CNI operators over ‘living-off-the-land’ attacks
Malicious, state-backed actors may well be lurking in the UK’s most critical networks right now, and their operators may not even know until it is too late, warn the NCSC and its partners Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Feb 2024
AI ID specialist Onfido in talks to be bought by Entrust
UK-based cyber unicorn Onfido agrees to enter talks to be acquired by Entrust Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
29 Jan 2024
indicators of compromise (IOC)
Indicators of compromise are unusual activities on a system or network that imply the presence of a malicious actor. Continue Reading
By- Robert Sheldon
- Madelyn Bacon, TechTarget
-
News
24 Jan 2024
Southern Water confirms cyber attack after Black Basta claims
Southern Water, which supplies millions of customers in southeast England, has confirmed it has fallen victim to a cyber attack, although its services appear to be running normally Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Jan 2024
Inside Cisco’s security platform strategy
Raj Chopra, senior vice-president of Cisco’s security business, outlines the company’s security platform strategy and how it brought different products together into a single platform Continue Reading
By- Aaron Tan, TechTarget
-
News
24 Jan 2024
Cato claims world’s first SASE-based XDR
Generative AI, detection and response, endpoint protection and new incident response tools headline expansion of core secure access service edge platform beyond networking, threat prevention and data protection Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
19 Jan 2024
ICO prompts confusion over police cloud legality
The UK data regulator has suggested that, despite major data protection concerns, it is likely to greenlight police cloud deployments because of an information-sharing agreement with the US government Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
19 Jan 2024
Neighbouring Kent councils hit by simultaneous cyber attacks
Canterbury, Dover and Thanet Councils in Kent have all been struck by simultaneous cyber attacks knocking systems offline, with indications of a link between all three Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
18 Jan 2024
Powering up cyber security defences with AI
AI holds great promise when it comes to securing valuable, and vulnerable, data, but security teams face some challenges if they are to get the best out of it, writes IBM’s Christopher Meenan Continue Reading
By- Christopher Meenan
-
Opinion
09 Jan 2024
Inadequate cloud logs are proving a headache for CISOs
The mass adoption of cloud environments is pushing strained CISOs to the brink and a lack of attention to logging isn't helping. Vectra's Mark Wojtasiak calls for organisations to do more to improve visibility in their clouds in 2024 Continue Reading
By- Mark Wojtasiak
-
News
08 Jan 2024
Inside the Met Police’s investigation into EncroChat crime gangs
The Met’s senior investigating officer responsible for investigating criminals using the EncroChat encrypted phone network tells the inside story of the UK’s biggest organised crime bust in a BBC podcast series released this week Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
04 Jan 2024
Celona and Palo Alto partner to enhance private 5G network security
Wireless services specialist Celona and security firm Palo Alto Networks are coming together to enhance device protection for organisations operating private mobile networks Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Jan 2024
Dutch working to promote cooperation in Europe to keep internet safe
A Dutch cooperative approach offers national and international cooperation opportunities for ISPs to guard against DDoS attacks, lawful interception and detect abuse in networks Continue Reading
By- Kim Loohuis
-
News
02 Jan 2024
China’s UNC4841 pivots to new Barracuda ESG zero-day
The Chinese state threat actor behind a series of cyber attacks on Barracuda Networks customers embarked on a campaign targeting the supplier’s email security products in the run-up to Christmas Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Dec 2023
Top 10 cyber crime stories of 2023
Ransomware gangs dominated the cyber criminal underworld in 2023, a year that will prove notable for significant evolutionary trends in their tactics Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
20 Dec 2023
Beyond the office walls: Safeguarding remote workers from attack
Remote working has enabled people to work from almost anywhere but has piled pressure on cyber pros. Three years after Covid, how are best practices evolving and what can we expect going forward? Continue Reading
By- Paul Lewis, Nominet
-
Opinion
20 Dec 2023
Zero-trust principles: Your gateway to securing remote workers
Remote working has enabled people to work from almost anywhere but has piled pressure on cyber pros. Three years after Covid, how are best practices evolving and what can we expect going forward? Continue Reading
By- Michael Healey, Turnkey Consulting
-
Opinion
20 Dec 2023
What we learned in cyber in 2023, and what to look out for
PA Consulting's Rasika Somasiri looks back at a busy 12 months in the cyber security world, and highlights some key learnings from 2023 Continue Reading
By- Rasika Somasiri
-
Opinion
20 Dec 2023
Evolving best practice: What next for securing remote work?
Remote working has enabled people to work from almost anywhere but has piled pressure on cyber pros. Three years after Covid, how are best practices evolving and what can we expect going forward? Continue Reading
By- Scott Burman
-
News
19 Dec 2023
Nokia and HellasQCI complete quantum-safe networks proof of concept
Trial showcase by leading networking tech firm and communication infrastructure consortium shows hybrid approach with both classic and quantum physics key to reach goal of quantum-safe networks Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Opinion
19 Dec 2023
Security Think Tank: Testing to improve remote worker security
Remote working has enabled people to work from almost anywhere but has piled pressure on cyber pros. Three years after Covid, how are best practices evolving and what can we expect going forward? Continue Reading
By- Rowland Johnson
-
E-Zine
19 Dec 2023
The ransomware threat to UK critical infrastructure
In this week’s Computer Weekly, a parliamentary report warns that a lack of ransomware preparedness at the highest levels of government is leaving UK critical national infrastructure dangerously exposed – we analyse the risks. We examine how AI tools are helping to enhance cloud security. And the CTO at jewellery retailer Pandora discusses organisational change in IT. Read the issue now. Continue Reading
-
News
18 Dec 2023
Cathay takes off with global SASE deployment
Unified secure access service edge services provider replaces legacy MPLS network for improved performance and observability, and unified end user security, access and application performance across global sites Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
18 Dec 2023
How threat intelligence is applied in DNS security
Infoblox’s director of security architecture explains how the company leverages its threat intelligence capabilities to help organisations stay ahead of DNS security threats Continue Reading
By- Aaron Tan, TechTarget
-
News
14 Dec 2023
Cisco eyes opportunities in AI, sustainability in Australia
Cisco is looking to tap opportunities in sustainability, AI and cyber security as it navigates Australia’s economic headwinds Continue Reading
-
News
08 Dec 2023
Fancy Bear targets Nato entities via critical Outlook flaw
A vulnerability patched in March has likely been exploited by the Russian state actor Fancy Bear, for over two years, according to the latest intelligence Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
07 Dec 2023
CW EMEA: Prepare for cyber war
When the war between Hamas and Israel began in October, cyber security professionals and major government and private organisations braced for an inevitable accompanying online war. In this issue of CW EMEA, we outline cyber war, patterns of threat activity, and find out what security teams can do to protect their organisations. We also look at Finland’s advances in quantum computing, how Belgian researchers have developed technology to help datacentres process data faster, and the secrets of KPN’s successful business transformation. Read the issue now. Continue Reading
-
News
01 Dec 2023
Human augmentation tech requires dual use oversight
Researchers investigating human augmentation technologies must acknowledge the potential military applications of their work, and military bodies cannot be allowed to dismiss ethical concerns in their pursuit of national security interests, says NGO Drone Wars UK Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
01 Dec 2023
Security Think Tank: Four steps to secure remote workers
Remote working has enabled people to work from almost anywhere but has piled pressure on cyber pros. Three years after Covid, how are best practices evolving and what can we expect going forward? Continue Reading
By- Olivia Rofe
-
News
27 Nov 2023
The Security Interviews: Zeki Turedi, field CTO Europe, CrowdStrike
Organisations are racing to keep their security up to date against the latest threats. CrowdStrike’s Zeki Turedi explains how to protect against novel and innovative cyber attacks Continue Reading
-
News
24 Nov 2023
APAC organisations warm to microsegmentation
Nearly two-thirds of organisations in the APAC region see microsegmentation as a way to protect their IT assets, but lack the skills to deploy the technology Continue Reading
By- Aaron Tan, TechTarget
-
News
23 Nov 2023
Expereo on tap for Carlsberg to deliver connectivity in 40 countries
SD-WAN/SASE and internet provider brings brewing giant ‘unrivalled’ connectivity in global network Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
23 Nov 2023
North Korean APTs go all in on supply chain attacks, warns NCSC
Threat actors linked to the North Korean regime are becoming more adept at targeting software supply chains in the service of their cyber attacks Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Nov 2023
Australia ups ante on cyber security
Australia’s new cyber security strategy will focus on building threat-blocking capabilities, protecting critical infrastructure and improving the cyber workforce, among other priorities Continue Reading
-
News
22 Nov 2023
CISA reveals how LockBit hacked Boeing via Citrix Bleed
As alarm grows around the world about the impact of the so-called Citrix Bleed vulnerability, Boeing has shared details of its experience at the hands of the LockBit ransomware crew Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Nov 2023
Over half of SME cyber incidents now ‘malware-free’
The age of malware-driven cyber attacks may have peaked, at least when it comes to incidents affecting small and medium sized enterprises Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Nov 2023
Defence lawyers seek appeal of tribunal ruling on police EncroChat cryptophone hack
Defence lawyers are seeking leave to appeal against a tribunal ruling that found the National Crime Agency had lawfully obtained warrants to access messages from 9,000 cryptophones used in the UK Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
15 Nov 2023
BlackCat affiliate seen using malvertising to spread ransomware
Researchers at eSentire identified a wave activity from an ALPHV/BlackCat ransomware affiliate which has adopted a somewhat unusual approach to delivering its locker Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Nov 2023
Russian cyber criminal pleads guilty to running IPStorm botnet
Sergey Manikin faces years in jail after his illicit proxy botnet service was taken down by US law enforcement Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Nov 2023
November Patch Tuesday heralds five new MS zero-days
Microsoft pushes fixes for five new zero-days in its latest monthly update Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Nov 2023
US government reinforces ICBC hack link to Citrix Bleed
US Treasury adds weight to reports that a ransomware gang gained access to the systems of Chinese bank ICBC by exploiting a critical Citrix flaw Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Nov 2023
How Gigamon is making its mark in deep observability
Gigamon CEO Shane Buckley talks up the company’s ability to inspect encrypted network traffic for malicious activity, how it stands out with its deep observability capabilities and the tailwinds that are fuelling its growth Continue Reading
By- Aaron Tan, TechTarget
-
News
14 Nov 2023
Fast-acting cyber gangs increasingly disabling telemetry logs
Sophos guidance for security practitioners and defenders highlights a growing trend for threat actors to disable or wipe telemetry logs to cover their tracks Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Nov 2023
Researchers ‘break’ rule designed to guard against Barracuda vulnerability
Vectra AI researchers found that a Suricata rule designed to detect exploitation of a dangerous Barracuda Email Security Gateway flaw was not entirely effective Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Nov 2023
How Trellix’s CISO keeps threat actors at bay
Trellix’s chief information security officer, Harold Rivas, outlines how the company mitigates security threats through containment and by helping security analysts to respond faster to cyber incidents Continue Reading
By- Aaron Tan, TechTarget
-
News
02 Nov 2023
Admins told to take action over F5 Big-IP platform flaws
Two vulnerabilities in the widely used F5 Networks Big-IP platform are now being exploited in the wild Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
02 Nov 2023
Use existing structures to build your incident response plan
What goes into a good incident response plan, and what steps should security professionals take to ensure they are appropriately prepared for the almost inevitable attack, and secure buy-in from organisational leadership? Continue Reading
By- Sam Lascelles
-
News
31 Oct 2023
British Library falls victim to cyber attack
The British Library is experiencing a major IT outage following a cyber incident of an undisclosed nature Continue Reading
By- Alex Scroxton, Security Editor
-
News
31 Oct 2023
SEC sues SolarWinds, alleging serious security failures
SolarWinds and its CISO have been charged with fraud and internal control failures by the US authorities amid allegations of a series of cyber security failings leading up to the 2020 Sunburst attacks Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Oct 2023
Microsoft warns over growing threat from Octo Tempest gang
The English-speaking Octo Tempest extortion gang – which became an ALPHV/BlackCat affiliate recently – presents one of the most significant and rapidly growing threats to large organisations at this time, says Microsoft Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Oct 2023
How Elastic manages cyber security threats
Mandy Andress, CISO at Elastic, highlights the company’s approach to tackling evolving cyber threats through the use of AI tools and enhanced security measures while strengthening the capabilities of its security offerings Continue Reading
By- Aaron Tan, TechTarget
-
News
26 Oct 2023
Exploitation of Citrix NetScaler vulns reaching dangerous levels
Observed activity exploiting two new Citrix NetScaler vulnerabilities disclosed earlier this month is ramping up, and users may be running out of time to patch lest they be attacked Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Oct 2023
Demystifying the top five OT security myths
Goh Eng Choon, president of ST Engineering’s cyber business, outlines the common myths around OT security in a bid to raise awareness of the security challenges confronting OT systems Continue Reading
By- Aaron Tan, TechTarget
-
News
24 Oct 2023
Customers speak out over Okta’s response to latest breach
Customers of identity specialist Okta have been attacked via a compromise of its systems, and are claiming Okta’s response leaves something to be desired Continue Reading
By- Alex Scroxton, Security Editor