Network security management
-
Opinion
19 Dec 2024
Innovation, insight and influence: the CISO playbook for 2025 and beyond
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Mandy Andress, Elastic
-
News
18 Dec 2024
The Security Interviews: Martin Lee, Cisco Talos
Threat intel expert and author Martin Lee, EMEA technical lead for security research at Cisco Talos, joins Computer Weekly to mark the 35th anniversary of the first ever ransomware attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Jul 2021
UK, US confirm Chinese state backed MS Exchange Server attacks
UK and US governments, alongside the EU and Nato, have formally attributed the March 2021 Microsoft Exchange Server attacks to Chinese state-backed actors Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Jul 2021
Pegasus mobile RAT abused to monitor journalists and activists
Israel-based surveillance specialist NSO Group is facing renewed pressure after it emerged its Pegasus mobile surveillance tool may be being widely abused by repressive regimes Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 Jul 2021
Legacy SonicWall kit exploited in ransom campaign
Users of older versions of SonicWall Secure Mobile Access 100 and Secure Remote Access products are at risk from a new ransomware campaign Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
15 Jul 2021
CW APAC: Trend Watch on supply chain security
In this handbook, Computer Weekly looks at the rise of supply chain attacks, the challenges that come with zero trust security and attacks on the Covid-19 vaccine supply chain Continue Reading
-
News
15 Jul 2021
Privacy Shield: US surveillance law reforms essential for EU-US data, says EU parliamentary study
EU Committee on Civil Liberties, Justice and Home Affairs study calls for major reforms of US spying laws to enable an EU-US data-sharing agreement to replace Privacy Shield Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
15 Jul 2021
Singapore to invest S$50m in ‘digital trust’ capabilities
The Singapore government is pumping in S$50m to bolster research in technologies that will foster digital trust in areas such as privacy protection and identity management Continue Reading
By- Aaron Tan, TechTarget
-
News
14 Jul 2021
REvil ransomware crew drops offline, reasons murky
The REvil ransomware operation appears to have gone dark, but claims about its demise are almost certainly exaggerated Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Jul 2021
Multiple Microsoft bugs being actively exploited
Microsoft’s July Patch Tuesday update fixes 117 vulnerabilities, 13 rated as critical and four already being actively exploited Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
13 Jul 2021
passive attack
A passive attack is a network attack in which a system is monitored and sometimes scanned for open ports and vulnerabilities. Continue Reading
-
News
13 Jul 2021
Modipwn vulnerability puts millions of building systems at risk
Authentication bypass vulnerability in a Schneider Electric product could lead to device takeover Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Jul 2021
Secureworks sets up in EU datacentre for XDR services
New datacentre location helps Secureworks’ customers meet EU data residency requirements Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Jul 2021
Kaseya VSA services coming online after week-long outage
Kaseya has successfully deployed a patch to its ransomware-hit VSA product as per a revised schedule, and customers are beginning to come back online Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Jul 2021
NSW department of education hit by cyber attack
Australia’s New South Wales department of education takes some systems offline as a precautionary measure in response to a cyber attack last Thursday Continue Reading
By- Aaron Tan, TechTarget
-
News
11 Jul 2021
Ransomware and botnets among top cyber threats in Singapore
The city-state saw more ransomware threats and command-and-control servers hosted out of its highly connected network infrastructure last year, as threat actors capitalised on the pandemic Continue Reading
By- Aaron Tan, TechTarget
-
Definition
08 Jul 2021
Snort
Snort is an open source network intrusion detection system (NIDS) created by Sourcefire founder and former CTO Martin Roesch. Continue Reading
-
News
08 Jul 2021
PrintNightmare haunts Microsoft as patch may miss mark
Microsoft dropped an out-of-band patch to fix PrintNightmare, but there are concerns it may not be totally effective. This does not mean it shouldn’t be applied Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
08 Jul 2021
Security Think Tank: Reopening is an opportunity to reassess wider security posture
With Covid-19 restrictions easing, offices are welcoming back remote workers this summer, bringing with them their notebooks and mobiles, and creating an endpoint management headache for CISOs. What do security teams need to account for to protect their returning office workers? Continue Reading
By- Louise Barber, Turnkey Consulting
-
News
07 Jul 2021
Opportunists seen targeting Kaseya REvil victims
Malwarebytes researchers highlight new spam campaign targeting businesses impacted by the ongoing Kaseya REvil ransomware incident Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Jul 2021
BA reaches settlement in data breach group action
A group action against BA following its 2018 data breach has been successfully settled Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
06 Jul 2021
Security Think Tank: Returning workers to the office: Is your security posture up to date?
With Covid-19 restrictions easing, offices are welcoming back remote workers this summer, bringing with them their notebooks and mobiles, and creating an endpoint management headache for CISOs. What do security teams need to account for to protect their returning office workers? Continue Reading
By- Rasika Somasiri
-
05 Jul 2021
Buying a VPN? Here’s what you need to know
VPNs are an effective cyber security tool for businesses and remote workers, but there are many things to consider before purchasing and implementing one. We explore some of these Continue Reading
-
Opinion
05 Jul 2021
Going back to office networks, only to dismantle them once and for all
With Covid-19 restrictions easing, offices are welcoming back remote workers this summer, bringing with them their notebooks and mobiles, and creating an endpoint management headache for CISOs. What do security teams need to account for to protect their returning office workers? Continue Reading
By- Alexei Balaganski
-
News
02 Jul 2021
Cyber attackers up the ante on embattled IT teams
Opportunistic threat actors are pouncing on embattled IT teams that are under pressure to expand remote work arrangements Continue Reading
By- Aaron Tan, TechTarget
-
News
01 Jul 2021
US Cybersecurity and Infrastructure Security Agency launches ransomware assessment tool
Newly launched service will help US organisations understand how prepared they are to deal with a ransomware attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
01 Jul 2021
Cyber espionage campaign targeted central Asian states
The Afghan, Kyrgyz and Uzbek governments are all thought to have been targeted by the same APT Continue Reading
-
News
01 Jul 2021
Nominations open for 2021 Security Serious Unsung Heroes Awards
Nominations are now open for this year’s edition of the Unsung Heroes Awards for cyber professionals and educators Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Jun 2021
Cops seize criminal VPN used by ransomware gangs
A coordinated sting has ended the operations of the DoubleVPN service, the owners of which are accused of harbouring cyber criminal activity Continue Reading
By- Alex Scroxton, Security Editor
-
Quiz
30 Jun 2021
12 official practice questions for the CCNA 200-301 exam
These practice questions for CCNA 200-301 lay out what readers need to know about network security and IP routing in the LAN, from 'CCNA 200-301 Official Cert Guide, Volumes 1 and 2.' Continue Reading
By- Michaela Goss, Senior Site Editor
- Jennifer English, Executive Editor
- Pearson Education
-
Opinion
30 Jun 2021
Ethical hacking: What, why, and overcoming concerns
We find out why and how hitting your own business with a cyber attack can help improve security Continue Reading
By- Declan Doyle
-
News
29 Jun 2021
New Nobelium attacks a reminder to attend to cyber basics
A new campaign from the same threat group that broke into SolarWinds serves as a reminder that cyber crime gangs will try to exploit any avenue they can, even if technically unsophisticated Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Jun 2021
UK’s FCA bans crypto exchange Binance as crackdown spreads
Ban on Binance Markets comes amid a wider global crackdown on the largely unregulated global market for cryptocurrencies and related assets. Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Jun 2021
Lazada rolls out public bug bounty programme
Regional e-commerce giant Lazada is looking to uncover more vulnerabilities that could compromise data security in a public bug bounty programme that offers up to $10,000 per bounty Continue Reading
By- Aaron Tan, TechTarget
-
News
24 Jun 2021
Make ransomware payments illegal, say 79% of cyber pros
Report produced for MSSP Talion claims overwhelming support for the criminalisation of ransomware payments Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Jun 2021
City of York picks Barracuda Networks for data protection
York Council needed to refresh its backup service to bring new security protections after it went ‘all-in’ on Microsoft Office 365 Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Jun 2021
Time to patch increases significantly during pandemic
New data from US-based endpoint management specialist Automox reveals some of the challenges security teams face in keeping up with endpoint security Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Jun 2021
Cloudflare announces new integrations with Microsoft, others
New security integrations with Microsoft Azure Sentinel, Splunk, Datadog and Sumo Logic will supposedly make it easier for users to analyse network security data Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Jun 2021
Innova and RISE drive node development in Sweden
Swedish cyber security project, National Node, opens its doors to the country’s security firms Continue Reading
By- Gerard O'Dwyer
-
News
22 Jun 2021
UK SMEs lack capacity to fend off cyber attacks
Three-quarters of UK SME leaders would not have sufficient capacity or expertise to deal with a cyber attack, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
18 Jun 2021
ping sweep (ICMP sweep)
A ping sweep (also known as an ICMP sweep) is a basic network scanning technique used to determine which of a range of IP addresses map to live hosts (computers). Continue Reading
-
News
18 Jun 2021
Lorca Ignite programme targets breakout cyber talent
Six of the most successful companies to have come through Lorca’s existing accelerators are being inducted into an intensive programme Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Jun 2021
Carnival Cruises hit by fourth cyber incident in a year
Latest data breach at Covid-hit cruise line comes hot on the heels of two recent ransomware attacks and a spring 2020 breach Continue Reading
By- Alex Scroxton, Security Editor
-
News
17 Jun 2021
UnitingCare Queensland restores IT systems after cyber attack
Australian healthcare service provider has restored key corporate systems and integrations between applications following a cyber attack earlier this year Continue Reading
By- Aaron Tan, TechTarget
-
News
15 Jun 2021
The Security Interviews: How to build a government model to ‘hack for good’
Kyle Hanslovan started Huntress to give back after a career in the intelligence sector. After US authorities took action to help people hit by the Microsoft Exchange attacks, we discussed how governments can ‘hack for good’ Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Jun 2021
FBI planned a sting against An0m cryptophone users over drinks with Australian investigators
Australian Federal Police and the FBI came up with the idea over drinks: build a cryptophone network with a built-in backdoor and sell it to crime gangs around the world Continue Reading
By- Bill Goodwin, Computer Weekly
-
Opinion
11 Jun 2021
Security Think Tank: To secure printers think process, technology and people
Though rarely discussed in a cyber context, the prevalence of connected printers and MFPs poses security risks both technological and physical. What does a print security strategy need to take into account? Continue Reading
By- Louise Barber, Turnkey Consulting
-
News
11 Jun 2021
UK promises tougher line on cyber crime
Speaking ahead of the G7 Summit, foreign secretary Dominic Raab says the UK is ready to take on cyber criminals and other malicious actors wherever they may be Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
10 Jun 2021
How the pandemic changed backup
The Covid-19 pandemic forced big changes in how people work – we look at impacts on backup, including increased reliance on the cloud, plus security and compliance vulnerabilities and ransomware Continue Reading
-
Opinion
10 Jun 2021
Security Think Tank: Time to accept printers will leak data
Though rarely discussed in a cyber context, the prevalence of connected printers and MFPs poses security risks both technological and physical. What does a print security strategy need to take into account? Continue Reading
By- Andy Jones, Information Security Forum (ISF)
-
News
10 Jun 2021
Australian organisations face heightened cyber attacks
Nearly three in four Australian organisations experienced cyber attacks that largely resulted from a growing remote workforce in 2020 Continue Reading
By- Aaron Tan, TechTarget
-
News
09 Jun 2021
FBI arrests distributors accused of selling An0m encrypted phones to crime groups
Working with overseas law enforcement, the FBI has arrested eight people and named a further 13 accused of distributing An0m phones to organised crime groups Continue Reading
By- Bill Goodwin, Computer Weekly
-
Feature
08 Jun 2021
The rise and rise of supply chain attacks
Supply chain attacks in Asia-Pacific and elsewhere have intensified as cyber threat actors look to exploit the weakest links in business and digital supply chains Continue Reading
By- Aaron Tan, TechTarget
-
News
07 Jun 2021
DNS attacks on the rise in APAC
Attacks on the domain name system in Asia-Pacific grew by 15% last year, with Malaysian organisations seeing the sharpest rise in damages among countries in the region Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
04 Jun 2021
Security Think Tank: Printers can’t be an ‘add-on’ in your cyber strategy
Though rarely discussed in a cyber context, the prevalence of connected printers and MFPs does pose security risks both technological and physical. What does a print security strategy need to take into account? Continue Reading
By- Michael Howard and Kimberlee Ann Brannock, ISACA
-
News
04 Jun 2021
Secrecy around EncroChat cryptophone hack breaches French constitution, court hears
French lawyers claim that investigators are unlawfully withholding details of a cryptophone hacking operation in a case that could impact UK prosecutions Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
03 Jun 2021
Reports raise alarm over Huawei access to Dutch networks
Espionage accusations raise security questions for Netherlands organisations using Chinese supplier’s equipment and services Continue Reading
By- Kim Loohuis
-
Definition
03 Jun 2021
distributed denial-of-service (DDoS) attack
A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource. Continue Reading
By- Ben Lutkevich, Site Editor
- Kevin Beaver, Principle Logic, LLC
-
News
03 Jun 2021
Norway’s auditor general lifts lid on energy industry’s cyber security risks
Auditor General’s Office questions the security posture of Norway’s energy industry Continue Reading
By- Gerard O'Dwyer
-
News
03 Jun 2021
FireEye sold to private equity, Mandiant regains independence
FireEye has agreed to sell its products business and name to a private equity consortium, while Mandiant will spin out as an independent threat intel business Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Jun 2021
Pandemic a ‘once-in-a-lifetime’ chance to reshape security
The volume of remote working has made it hard to paint an accurate picture of the true state of enterprise cyber security, but it presents an opportunity to change things up Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
02 Jun 2021
Security Think Tank: Steps to a coherent print security strategy
Though rarely discussed in a cyber context, the prevalence of connected printers and MFPs poses security risks both technological and physical. What does a print security strategy need to take into account? Continue Reading
-
Feature
02 Jun 2021
What the Telecommunications (Security) Bill means for UK industry
The Telecommunications (Security) Bill is intended to reinforce the security of the UK telecommunications infrastructure, but what are the implications for industry? Continue Reading
-
Feature
02 Jun 2021
Buying a VPN? Here’s what you need to know
VPNs are an effective cyber security tool for businesses and remote workers, but there are many things to consider before purchasing and implementing one. We explore some of these Continue Reading
-
Opinion
02 Jun 2021
Security Think Tank: Printer risks go deep into IT history
Though rarely discussed in a cyber context, the prevalence of connected printers and MFPs does pose security risks both technological and physical. What does a print security strategy need to take into account? Continue Reading
By- Mike Lloyd, RedSeal
-
Opinion
01 Jun 2021
Long-term thinking is vital to secure UK’s critical infrastructure
To face down the threat of cyber warfare against UK CNI, the government needs long-term thinking that looks beyond the next general election cycle, says Advent-IM’s Mike Gillespie Continue Reading
-
Feature
28 May 2021
Network reconnaissance techniques for beginners
In this excerpt of 'How Cybersecurity Really Works,' author Sam Grubb breaks down common network reconnaissance techniques used by adversaries to attack wired networks. Continue Reading
By- Katie Donegan, Social Media Manager
- No Starch Press
-
News
25 May 2021
Legacy vulnerabilities may be biggest enterprise cyber risk
While high-profile cyber attacks and zero-days grab headlines, statistics gathered by network security specialists Cato suggest CISOs should be addressing legacy threats Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 May 2021
Dutch researchers build security software to mimic human immune system
Software could help IT systems develop immunity to some cyber attacks in a similar way to how the body fights infection Continue Reading
By- Kim Loohuis
-
News
24 May 2021
Why the security stack needs to move to the edge
Akamai’s chief technology officer Robert Blumofe makes the case for a decentralised security model to address cyber threats that are emanating from the network edge Continue Reading
By- Aaron Tan, TechTarget
-
News
20 May 2021
HP taps micro virtual machines in endpoint security
HP’s Wolf Security technology stack uses an endpoint security controller to run computing tasks in micro virtual machines so that any potential malware can be isolated and contained Continue Reading
By- Aaron Tan, TechTarget
-
News
18 May 2021
Cisco acquires Kenna Security amid security expansion
Cisco announces a new acquisition alongside service enhancements around XDR and SASE in support of its security customers Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
18 May 2021
The real-life consequences of ransomware attacks
In this week’s Computer Weekly, after a ransomware attack shut a major US oil pipeline, we examine the real-life consequences for organisations facing similar threats. We ask the experts for their top tips in reducing datacentre running costs. And we hear how data science skills are helping government make better decisions. Read the issue now. Continue Reading
-
News
17 May 2021
Conti ransomware syndicate behind attack on Irish health service
More details continue to emerge of the significant ransomware attack on Ireland’s HSE Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 May 2021
Colonial Pipeline paid $5m ransom, reports say
Colonial Pipeline may have paid a significant ransom within hours of being attacked, it has emerged, but it’s unlikely the story ends here Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 May 2021
Publishing exploit code does more harm than good, says report
Disclosing exploit code before patches are available gives malicious actors a ‘massive’ head-start, says Kenna Security Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 May 2021
Biden beefs up public-private security cooperation
Joe Biden has signed a new Executive Order to harden US cyber security and government networks, with an emphasis on information sharing Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 May 2021
Verizon DBIR underscores year of unprecedented cyber challenge
Verizon 2021 Data Breach Investigations Report draws predictable conclusions as the impact of the Covid-19 pandemic continues to be felt Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 May 2021
Inside DarkSide: Researchers share intel on break-out cyber gang
Security researchers swap information on the newly famous DarkSide ransomware gang, the group that doesn’t appear to understand what ‘being a criminal’ actually means Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 May 2021
UK to fund national cyber teams in Global South
Government will commit millions of pounds to supporting vulnerable countries in establishing cyber capacity Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 May 2021
Microsoft fixes four critical bugs on lighter Patch Tuesday
Four critical RCE vulnerabilities put users of various Microsoft products at risk, and should be patched right away Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 May 2021
The Security Interviews: Why helpful bots could hurt vaccine roll-outs
Earlier this year, spikes in traffic to websites containing information about Covid-19 vaccines were attributed by Imperva to automated bots scraping data. Why is that a problem? Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 May 2021
Collaboration key to success of UK’s Cyber Security Council
The founders of the UK’s Cyber Security Council have been setting out their plans to professionalise the cyber sector at the NCSC’s CyberUK 2021 event Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 May 2021
SolarWinds CEO calls for collective action against state attacks
SolarWinds CEO tells NCSC’s CyberUK conference he is exploring the possibility of collaborating with other companies on collective cyber action against attacks backed by nation states Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 May 2021
Colonial Pipeline ransomware attack has grave consequences
The ramifications of a major ransomware attack against a US fuel pipeline operator could spread far and wide Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 May 2021
NCSC Active Cyber Defence blocks surge of pandemic scams
The NCSC responded to a surge in online scams last year as it moved to protect both the general public and critical national services during the pandemic Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
07 May 2021
Despite confusion, zero-trust journey underway for many
Zero trust is a catchy phrase with seemingly lofty goals. Uncover the reality behind one of infosec's hottest buzzphrases, and learn why it's within reach for many companies today. Continue Reading
By- Sharon Shea, Executive Editor
-
Feature
07 May 2021
How do I get my users to pay attention to security training?
As cyber security risks grow daily, businesses must educate staff about these through cyber awareness training. But how can they ensure this is taken seriously by employees? Continue Reading
-
News
07 May 2021
NCSC, CISA publish new information on Russia’s Cozy Bear
New intelligence from UK and US cyber agencies suggests that APT29, or Cozy Bear, has been switching up its tactics Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 May 2021
NCSC publishes smart city security guidelines
Guidance for local authorities, IT and cyber professionals aims to ensure the security of connected, smart city projects Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 May 2021
Ransomware, supply chain attacks show no sign of abating
Security experts at Black Hat Asia 2021 discuss the state of ransomware and supply chain attacks, two of the most common attack vectors that offer high returns for threat actors Continue Reading
By- Aaron Tan, TechTarget
-
News
05 May 2021
Dysfunctional cyber, network teams disrupt digital transformation
Despite shared goals, combative and dysfunctional relationships within specialist tech teams are putting digital transformation projects at risk, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 May 2021
Half of organisations breached via a third party in 12 months
New report highlights the risks of outsourcing key business processes without paying due care and attention to your service provider’s security Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 May 2021
New standard to simplify IoT device onboarding
Fido Alliance’s device onboarding protocol will automate the process of connecting internet-of-things devices to device management platforms while improving security Continue Reading
By- Aaron Tan, TechTarget
-
News
30 Apr 2021
EncroChat: Top lawyer warned CPS of risk that phone hacking warrants could be unlawful
Lord David Anderson QC warned prosecutors that there were formidable arguments against the lawfulness of a police operation to infiltrate the encrypted phone network, EncroChat Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
28 Apr 2021
Covid-19 security challenges leave bank customers at risk
Challenges arising from the pandemic have left gaping holes in banking security, putting consumers at risk of fraud Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Apr 2021
Recruiters can’t afford to hold out for cyber ‘unicorns’
The perfect security candidate is hard to find, so hiring policy needs to be more pragmatic Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Apr 2021
Office 365 compromise likely led to Merseyrail ransomware attack
Compromise of Merseyrail employee data seems to have begun after a key email account was hacked Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
27 Apr 2021
Why we need to reset the debate on end-to-end encryption to protect children
Private messaging is the front line of abuse, yet E2EE in its current form risks engineering away the ability of firms to detect and disrupt it where it is most prevalent Continue Reading
By- Andy Burrows, NSPCC
-
News
27 Apr 2021
North London school wins NCSC girls’ cyber challenge
Highgate School in North London is the winner of this year’s CyberFirst Girls security competition Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Apr 2021
UnitingCare Queensland hit by cyber attack
Healthcare service provider UnitingCare Queensland was reportedly hit by a ransomware attack that crippled several IT systems Continue Reading
By- Aaron Tan, TechTarget
-
News
26 Apr 2021
How Toffs is seizing Asia’s CDN market
Toffs Technologies is eyeing second- and third-tier cities in Asia as it bolsters its infrastructure and experiments with the use of home networks as content delivery networks Continue Reading
By- Aaron Tan, TechTarget