Network security management
-
Opinion
19 Dec 2024
Innovation, insight and influence: the CISO playbook for 2025 and beyond
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Mandy Andress, Elastic
-
News
18 Dec 2024
The Security Interviews: Martin Lee, Cisco Talos
Threat intel expert and author Martin Lee, EMEA technical lead for security research at Cisco Talos, joins Computer Weekly to mark the 35th anniversary of the first ever ransomware attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Dec 2021
Investigation mounted into Spar supermarket cyber attack
Possible supply chain cyber attack left more than 300 Spar supermarkets unable to process credit card payments Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Dec 2021
Surge in Nobelium-linked supply chain attacks
Mandiant’s researchers share new intel on two distinct clusters of Russian APT activity, linked to the Nobelium SolarWinds attackers Continue Reading
By- Alex Scroxton, Security Editor
-
News
02 Dec 2021
GTT teams with Palo Alto to power SASE platform
Secure access service edge platform will offer advanced security techniques, fortifying network access from any location Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Opinion
01 Dec 2021
A ‘whole of society’ approach to cyber may be on the horizon
Nominet Cyber managing director David Carroll reflects on the NCSC’s latest annual review amid 2021’s fast-evolving threat landscape Continue Reading
By- David Carroll, Nominet Cyber
-
Opinion
01 Dec 2021
The way we talk and think about tech is crucial to helping solve the skills shortage crisis
Companies are looking to short-term fixes to find IT specialists, but there is still a need for long-term solutions Continue Reading
By- Andy Heyes, Harvey Nash
-
News
30 Nov 2021
HP patches bugs in over 150 printer models
More than 150 HP multifunction printers are at risk of compromise through a series of newly disclosed vulnerabilities, one of them wormable Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Nov 2021
Recovering from ransomware: One organisation’s inside story
In February 2021, French office equipment supplier Manutan fell victim to a DoppelPaymer ransomware hit. IT ops director Jérôme Marchandiau tells the inside story of the incident Continue Reading
By- Yann Serra, LeMagIT
-
Opinion
29 Nov 2021
Security Think Tank: Dissecting the true value of SASE is a challenge
As a relatively nascent technology that is getting a lot of publicity, dissecting the true value of SASE is still a difficult proposition, for now Continue Reading
By- Maximilian Brook
-
Opinion
26 Nov 2021
Computing at the edge: Let’s get on board
With the increasing complexity of networks today, whether it’s hybrid cloud infrastructure or time-sliced 5G, somehow we’ve got to manage it Continue Reading
By- Graham Williamson
-
Opinion
26 Nov 2021
Security Think Tank: SASE will become operational reality
While still considered very much a buzzword, the pace of change in corporate networks and operational technology means secure access service edge (SASE) is becoming reality for many Continue Reading
By- Tom Venables, Turnkey Consulting
-
News
24 Nov 2021
Apple sues under-fire malware firm NSO
Lawsuit alleges spyware firm NSO Group targeted Apple’s users, adding to the pressure on the under-fire company Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Nov 2021
Upcoming holidays prompt ransomware warning from authorities
Ransomware gangs know how calendars work, and may target their attacks around major holidays to take advantage of more people being off work, according to a new alert Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Nov 2021
Black Friday cyber warning for 4,000 card-skimming victims
NCSC warns thousands of small retailers that their websites are being exploited to steal customer data Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Nov 2021
Why is Emotet back, and should we be worried about it?
The sudden reappearance of Emotet this week has security teams on high alert, but do we need to be worried about its return, and what should we be doing about it? Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Nov 2021
Memento ransomware gang quick to retool for ‘optimum’ outcome
The operators of a new ransomware called Memento are quick to retool for ‘success’ if they run up against a competent defender, says Sophos Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Nov 2021
Alert over spate of Iran-linked BitLocker attacks
A joint advisory from western cyber agencies warns of a campaign of ‘ongoing malicious activity’ by an Iran-linked APT group exploiting BitLocker to extort its targets Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Nov 2021
Sky ECC provided free cryptophones to a Canadian police force
Internal emails disclosed in a US court show how Sky Global supplied sample encrypted phones to a Canadian police force before its phone users became subject to an international police investigation Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
17 Nov 2021
Security startups line up on Cyber Runway
Some 108 cyber security startups representing the UK’s most cutting-edge innovators are to join Plexal’s Cyber Runway accelerator Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 Nov 2021
One-fifth of NCSC-supported cyber incidents linked to Covid-19
National Cyber Security Centre has helped to thwart multiple cyber incidents that could have seriously disrupted the UK’s response to the pandemic Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
16 Nov 2021
Security Think Tank: SASE – more than the sum of its parts?
Airbus Cybersecurity’s Paddy Francis asks what makes an integration of the various components of SASE more the sum of their parts, and what are the benefits and pitfalls? Continue Reading
-
News
15 Nov 2021
UK government proposes new rules for digital supply chain security
Proposals could see IT service providers legally required to adhere to the NCSC’s Cyber Assessment Framework, among other things Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
15 Nov 2021
Security Think Tank: What to find out before investing in SASE
Petra Wenham of the BCS shares her thoughts on what organisations need to consider as they investigate whether or not to invest in secure access service edge technology Continue Reading
By -
News
12 Nov 2021
BT applies Covid-19 R number modelling to threat response
A prototype cyber security tool developed at BT uses epidemiological principles to detect and respond to cyber threats Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Nov 2021
AT&T launches a managed SASE offering with Cisco
AT&T aims its latest managed SASE service at enterprises using Cisco hardware. The offering's features range from firewall and secure web gateway functionality to DNS layer security. Continue Reading
By- Madelaine Millar, TechTarget
-
News
11 Nov 2021
HPE’s Aruba networking unit hit by cyber attack
Undisclosed threat actor compromised data buckets used to run the Aruba Central cloud environment using a stolen access key Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
11 Nov 2021
Zero trust: Now is the time
The cyber security industry has been talking about a zero-trust approach to security for just over a decade, but now it’s time to move towards full implementation because it is more appropriate than ever, and it is rapidly gaining support from suppliers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Nov 2021
November Patch Tuesday drop fixes bugs in Excel, Exchange Server
Another relatively light Patch Tuesday drop from Microsoft addresses 55 vulnerabilities, two of them already being exploited Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
10 Nov 2021
Digital surveillance of remote workers may increase enterprise risk
From productivity tools to security threats, we explore how digital surveillance is forcing remote workers towards shadow IT Continue Reading
-
Feature
05 Nov 2021
Immutable snapshots aim to neutralise ransomware
Snapshots – usually immutable anyway – get functionality to stop ransomware intruders moving or deleting snapshots, so customers know they have clean copies of data to restore from Continue Reading
By- Antony Adshead, Storage Editor
-
News
04 Nov 2021
The Netherlands works on resilience with large-scale national cyber exercise
For the Netherlands, the biggest challenge in a large-scale cyber crisis is to maintain speed while exercising due care Continue Reading
By- Kim Loohuis
-
Opinion
03 Nov 2021
Security Think Tank: SASE – marketing buzz or the future of security?
SASE architectures promise to prevent multiple types of cyber attacks, but deciding whether SASE is right for your organisation will require understanding whether SASE is a fit for your use cases in IT Continue Reading
By- Martin Kuppinger, KuppingerCole
-
News
03 Nov 2021
BlackMatter ransomware crew shuts down, leaves victims in a bind
The BlackMatter ransomware gang appears to be winding down its activities, possibly due to pressure from law enforcement Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
01 Nov 2021
Is SASE mere vendor hype? It’s more nuanced than that
There’s no doubt that SASE is being overhyped, but nevertheless the concept holds value that security teams should not discount, according to PA Consulting analysts Continue Reading
By- Toby Sibley, William Blackwell, Farrukh Ahmad
-
Opinion
29 Oct 2021
Changing the rules against cyber attacks
UKRI’s John Goodacre reveals how projects supported by the Digital Security by Design Challenge aim to improve cyber security resilience, beginning with the very fundamentals of computing Continue Reading
By- John Goodacre
-
News
27 Oct 2021
Government commits millions to security investment
Spending Review adds more than £750m of funding to improve cyber security resilience across government Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Oct 2021
Cyber experts on how to nobble a Nobelium attack
A recent spate of attempted Nobelium cyber attacks were mostly unsuccessful, but serve as a reminder to pay attention to some more fundamental aspects of security Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Oct 2021
Airport operator MAG boosts threat visibility with hybrid SOC
With budget concerns weighing heavy during the pandemic, Manchester Airports Group ditched an impending capex-heavy cyber investment in favour of a hybrid managed/in-house approach. Learn more about its experience Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Oct 2021
APAC organisations warm to zero trust
Two-thirds of APAC organisations have a zero-trust strategy even as they grapple with the lack of skills and other organisational challenges, study finds Continue Reading
By- Aaron Tan, TechTarget
-
News
20 Oct 2021
US intelligence agencies issue advisory on BlackMatter gang
Joint advisory on ransomware gang warns about potential of further attacks on critical infrastructure providers Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
20 Oct 2021
LightBasin hackers breach 13 telcos in two years
Hackers have obtained an undisclosed volume of subscriber information and call metadata in a sustained campaign against telecommunications firms Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Feature
19 Oct 2021
Back on the office network: What are the risks for mobile users?
Many people are returning to offices and bringing their mobile devices with them. What are the cyber security implications of this? Continue Reading
-
News
18 Oct 2021
How Samlesbury, Lancashire became the home of the National Cyber Force
The National Cyber Force, a new branch of the military, is gearing up to fight battles in cyber space from the fields of Lancashire. Its presence is expected to bring a high-tech renaissance to the region Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
18 Oct 2021
DCMS appoints Plexal to drive telecoms diversity strategy
Government chooses UK innovation company to understand and develop the role of SMEs in the telecoms market with particular reference to how to create a diverse market that supports the creation of home-grown, sovereign technology Continue Reading
By- Joe O’Halloran, Computer Weekly
-
E-Zine
14 Oct 2021
CW APAC, October 2021: Tech Career Guide
Despite marked improvements, tech still faces a diversity problem. In this handbook, focused on cyber security’s gender gap in the Asia-Pacific region, Computer Weekly looks at the mentoring programmes aiming to combat the issue, the career path of IAG’s Elaine Muir, how hacking won Claudean Zheng a job and what else needs to be done to tackle the ongoing gender imbalance Continue Reading
-
News
14 Oct 2021
NHS Digital enhances in-house cyber awareness drive
Keep IT Confidential campaign aims to help NHS staff understand more about security threats and learn how to reduce risk Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Oct 2021
Google Cybersecurity Action Team springs into life
Google has announced a new Cybersecurity Action Team, with a mission to support security and digital transformation in governments, critical infrastructure, enterprises and small businesses Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Oct 2021
FCA warns over future hybrid working security risks
Earlier this week, the Financial Conduct Authority issued fresh guidance to regulated organisations on keeping hybrid workers safe and secure Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Oct 2021
Microsoft thwarts mega-DDoS attack on Azure platform
2.4Tbps DDoS attack on an undisclosed Microsoft Azure customer may have been the largest ever attempted against a single target Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Oct 2021
Singapore refreshes cyber security strategy
The city-state updates its national cyber security strategy to shore up the security of critical infrastructure and enterprises while growing its cyber security industry, among other goals Continue Reading
By- Aaron Tan, TechTarget
-
News
08 Oct 2021
Fast-moving Ryuk campaign targets healthcare organisations
Newly designated FIN12 gang leverages the work of the cyber criminal ecosystem to conduct lightning-fast ransomware attacks Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
07 Oct 2021
Addressing the backup dilemma to ransomware recovery
Everyone knows good backups are essential if one is to recover from a ransomware attack, but using them effectively poses challenges that IT teams need to know about Continue Reading
By- W Curtis Preston
-
News
07 Oct 2021
Twitch data breach investigations continue
Investigations are ongoing into a 125GB data breach that hit livestreaming platform Twitch, apparently the work of hacktivists Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Oct 2021
Israeli Orca to invest in UK cyber scene
Tel Aviv-headquartered Orca Security wants to set up a new R&D centre in the UK Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
05 Oct 2021
Layer Two Tunneling Protocol (L2TP)
Layer Two Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling Protocol (PPTP) used by an internet service provider (ISP) to enable the operation of a virtual private network (VPN) over the internet. Continue Reading
By -
News
05 Oct 2021
Facebook unplugged for six hours due to configuration error
A configuration change effectively disconnected Facebook from the internet, with billions affected by loss of services Continue Reading
By- Cliff Saran, Managing Editor
-
News
30 Sep 2021
NUS and Thales to develop quantum technologies
The National University of Singapore and Thales have joined hands to test quantum technologies for commercial applications in security and sensing Continue Reading
By- Aaron Tan, TechTarget
-
News
28 Sep 2021
How one red team exercise averted a new SolarWinds-style attack
Palo Alto Networks shares details of how its red teamers found and sealed a customer vulnerability that could have led to another SolarWinds-style supply chain attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Sep 2021
Threat actors target VMware vCenter Server users
Users of VMware vCenter Server are advised to patch a series of vulnerabilities post haste Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 Sep 2021
Dutch education administrators underestimate threat of cyber crime
Research shows educational establishments in the Netherlands are becoming favoured targets of cyber criminals and administrators are underestimating the risks Continue Reading
By- Kim Loohuis
-
News
14 Sep 2021
BT advances hollow core fibre research with world’s first trial of quantum-secure comms
Incumbent UK telco announces latest innovations in hollow core fibre by conducting trial of ultra-secure network communications using commercial equipment over a 6km long Lumenisity CoreSmart cable Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Definition
13 Sep 2021
promiscuous mode
In computer networking, promiscuous mode is a mode of operation, as well as a security, monitoring and administration technique. Continue Reading
By -
Definition
13 Sep 2021
deep packet inspection (DPI)
Deep packet inspection (DPI) is an advanced method of examining and managing network traffic. Continue Reading
-
News
09 Sep 2021
Latest Microsoft zero-day being actively exploited
New Microsoft zero-day CVE-2021-40444 affects multiple versions of Windows and is probably being exploited through convincing phishing attacks Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Sep 2021
REvil reappearance may herald new ransom campaigns
The re-emergence of the infamous REvil ransomware gang is a likely sign that more high-profile attacks will unfold over the coming weeks Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Sep 2021
OT security in APAC remains work in progress
Two operational technology security experts shed light on the state of OT security in the region, and what’s being done to address skills, competency and organisational challenges Continue Reading
By- Aaron Tan, TechTarget
-
News
07 Sep 2021
ICO in bid to end cookie pop-ups
Outgoing information commissioner Elizabeth Denham will call on her equivalents across the G7 group of countries to collaborate on an overhaul of cookie consent pop-ups Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Sep 2021
How NZ schools are tapping managed network services
Using managed network services has freed up time and resources for New Zealand school teachers and alleviated the pressure and challenges of maintaining technology infrastructure Continue Reading
By- Aaron Tan, TechTarget
-
News
02 Sep 2021
Finance firms faced up to £760,000 costs per DNS attack during pandemic
Financial services firms have been the focus of attacks by cyber criminals during the Covid-19 crisis Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
01 Sep 2021
Remote workers routinely bypassed security tools during pandemic
New data from Palo Alto Networks reveals that over 25% of UK security leaders saw their employees circumventing or switching off security measures at the height of the pandemic Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
27 Aug 2021
Supply chain cyber security is only as strong as the weakest link
A spate of high-profile cyber attacks has highlighted the criticality of supply chain security and put new pressures on security leaders. How can we ensure that cyber security remains robust down the full length of supply chains? Continue Reading
By- Martin Smith, SASIG
-
Opinion
27 Aug 2021
How the cyber security market is evolving
The cyber security market has gained even greater importance in the post-Covid era and continues to grow and evolve. But what factors are driving trends in that market and what should your organisation consider when making cyber security investments? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Aug 2021
Tech giants commit to Biden's cyber security action plan
Some of the world’s most prominent tech giants have made a series of commitments to enhance the US’ national cyber security posture following a high-profile meeting with president Biden Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Aug 2021
Half of MS Exchange servers at risk in ProxyShell debacle
Up to 50% of MS Exchange users in the UK are exposed to three vulnerabilities that are now being actively exploited Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Aug 2021
Swedish IT industry braced for China’s response to Huawei 5G ban
Swedish IT and communications equipment suppliers fear economic backlash from China following Huawei ban Continue Reading
By- Gerard O'Dwyer
-
News
18 Aug 2021
MoD seeks security tech to harden military systems
The Defence and Security Accelerator has launched a programme to root out technology that will reduce the military’s exposure to cyber attacks Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
17 Aug 2021
How to choose between SIEM and SOAR
In this week’s Computer Weekly, our buyer’s guide examines the use of SIEM and SOAR to improve IT security, and asks which you should use, and when? We look at what you need to know about NVMe over Fabrics, the emerging storage networking technology. And we find out how Oracle customers are introducing its Fusion Cloud suite. Read the issue now. Continue Reading
-
News
13 Aug 2021
Cyber Runway programme supports new security businesses
The Cyber Runway programme is a government-backed scheme to support entrepreneurs, startups and scaleups in launching and growing new security businesses Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Aug 2021
Microsoft fixes seven critical bugs on light Patch Tuesday
All seven critical vulnerabilities in Microsoft’s August Patch Tuesday were related to remote code execution, and there was one zero-day related to Windows Update Medic Service Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
11 Aug 2021
The Netherlands still lacks digital resilience, says report
Report by National Coordinator for Counterterrorism and Security says the Netherlands’ digital resilience has improved, but is still insufficient Continue Reading
By- Kim Loohuis
-
News
10 Aug 2021
Researchers uncover database with 126 million unsecured records
Business-to-business marketing firm OneMoreLead was storing tens of millions of records in an unsecured database, exposing at least 63 million people to fraud, identify theft and phishing campaigns Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
09 Aug 2021
Possible ransomware attack hits Italian vaccine booking system
It is still unclear who is behind the attack that caused Covid-19 vaccine bookings in Lazio, Italy, to grind to a halt, as despite masses of files being encrypted no specific ransom demands have been made for the decryptor Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
05 Aug 2021
Nine security flaws found in critical hospital infrastructure
The ‘PwnedPiper’ vulnerabilities identified in systems used by 80% of US hospitals could be used to launch ransomware attacks Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
05 Aug 2021
Cloud misconfiguration a growing cause of security incidents
Rapid cloud adoption during the pandemic has increased the attack surface and heightened the risk of misconfiguring services, leaving organisations more vulnerable to cyber attacks Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
04 Aug 2021
Six Isle of Wight schools hit by ransomware attack
Authorities are still working to manage the fallout from the attack, which has already forced at least one school to delay the start of the new term in September Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
04 Aug 2021
Initial access brokers unaffected by ransomware content bans
Banning ransomware content from cyber crime forums has done little to prevent initial access brokers from advertising their services, with the number of access listings increasing in the second quarter of 2021 Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
03 Aug 2021
UK MoD turns to hackers to help secure digital assets
Hackers given direct access to internal Ministry of Defence systems to identify and report security vulnerabilities Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Definition
02 Aug 2021
FCAPS (fault, configuration, accounting, performance and security)
FCAPS (fault, configuration, accounting, performance and security) is a network management framework created by the International Organization for Standardization (ISO). Continue Reading
By -
News
29 Jul 2021
Technical hiccups force Babuk ransomware gang to change tactics
The Babuk ransomware operation backed away from encrypting its victims’ files, and technical difficulties may be to blame, reports McAfee Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Jul 2021
Top vulnerabilities target perimeter devices
The most frequently exploited CVEs of the year so far are to be found in perimeter and network access devices, according to a joint advisory from the NCSC and partners Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
28 Jul 2021
Security Think Tank: Consider cyber policies and procedures as you welcome employees back
With Covid-19 restrictions easing, offices are welcoming back remote workers this summer, bringing with them their notebooks and mobiles, and creating an endpoint management headache for CISOs. What do security teams need to account for to protect their returning office workers? Continue Reading
By- Simon Backwell
-
News
27 Jul 2021
TikTok sets up cyber security hub in Dublin
Dublin-based cyber centre will oversee the security of TikTok’s users across Europe Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Jul 2021
How IBM is solving the data privacy problem
IBM’s fully homomorphic encryption technology lets enterprises apply analytics and machine learning to encrypted data without compromising data privacy Continue Reading
By- Aaron Tan, TechTarget
-
Definition
26 Jul 2021
network access control (NAC)
Network access control (NAC), also called network admission control, is a method to bolster the security, visibility and access management of a proprietary network. Continue Reading
-
News
26 Jul 2021
No More Ransom initiative saves £850m over five years
Initiative’s free ransomware decryption tools have been used by more than six million people since 2016 Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
26 Jul 2021
Government-led innovation can help cyber startups find a market
There are many reasons why early-stage cyber startups often struggle to get off the ground, but government-backed programmes can help them find a path Continue Reading
By- Saj Huq, Plexal
-
News
25 Jul 2021
Tokyo 2020 hit by data breach
The user names and passwords of Tokyo 2020 ticket holders and event volunteers were reportedly compromised, but government official claims the data leak was not large Continue Reading
By- Aaron Tan, TechTarget
-
Definition
22 Jul 2021
SYN scanning
SYN scanning is a tactic that a malicious hacker can use to determine the state of a communications port without establishing a full connection. Continue Reading
-
Feature
21 Jul 2021
Five ways to ensure remote working security and compliance
A mix of on-site and remote working has become a fact of life for many organisations. We look at five key things you should consider to ensure compliance and security Continue Reading
By- Valéry Rieß-Marchive, Rédacteur en chef
- Antony Adshead, Storage Editor
-
Opinion
20 Jul 2021
Sparsely staffed offices: the new post-pandemic cyber gap
With many offices still operating at limited capacity, a red teaming expert reveals how his job is getting easier, and why this is a problem Continue Reading
By- Kyle Gaertner
-
Opinion
20 Jul 2021
The Secret IR Insider’s Diary: It’s all gone quie...
The ‘Q’ word isn’t one that’s really used in incident response, says the Secret IR Insider, largely because as soon as you use it, something happens Continue Reading
By- The Secret IR Insider, Check Point