Network security strategy
-
E-Zine
11 May 2023
CW EMEA: The future of work
In this month’s CW EMEA, we look at the future of work in Europe after the pandemic forced a change in entrenched human behaviour. For years, people talked about flexible working being the way forward, but scepticism within the management of large companies held it back. This all changed when Covid-19 began to spread out of control and governments and businesses quickly told people to work from home where possible. We also look at the increasing problem of IT failures in Dutch hospitals and how they are affecting patient care, highlighting the need to improve IT security in hospitals. Read the issue now. Continue Reading
-
E-Zine
11 Mar 2021
CW Europe: Nordic tech startups create blueprint for post-Covid working environment
Business can learn lessons from Nordic tech startups to prepare employees to return to the office after Covid restrictions end. Also read why Netherlands police need a training ‘roadmap’ to get them up to speed to tackle cyber crime. Continue Reading
-
News
14 Sep 2023
Google, Microsoft and Mozilla push browser updates to foil zero-day
A zero-day in Google’s Chrome browser was first reported by surveillance researchers at The Citizen Lab and Apple, but also affects other browsers Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Sep 2023
As vehicle safety regulations loom, carmakers fret over cyber risks
Global, UN-backed car safety and security regulations come into force next year, and automotive bosses say they are not only unprepared, but “swamped” by a tide of compliance and security risks Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Sep 2023
Networking tech firms scrum down for Rugby World Cup
Leading communications providers look to form off-pitch connectivity spine of team with infrastructures using advanced networking and mixed reality technologies at pinnacle of world rugby Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
08 Sep 2023
How Netskope is driving growth in APAC
Netskope is growing at over 50% year on year in the Asia-Pacific region, but the single-vendor SASE supplier is not limiting its customers to its own offerings Continue Reading
By- Aaron Tan, TechTarget
-
News
04 Sep 2023
How startup Once.net and Cloudflare secured the 2023 Eurovision vote
When the Eurovision Song Contest introduced paid-for public voting from outside Europe in 2023, it faced new cyber challenges. Learn how Dutch startup Once.net and Cloudflare teamed up to secure and support the big night Continue Reading
By- Alex Scroxton, Security Editor
-
News
01 Sep 2023
Threat actors exploiting unpatched Juniper Networks devices
A series of vulnerabilities in Juniper Networks firewalls and switches appear to be being exploited in the wild to enable remote code execution, with thousands of devices thought to be exposed Continue Reading
By- Alex Scroxton, Security Editor
-
News
17 Aug 2023
Carlsberg turns tap on massive global SASE deployment
Global brewer addresses strategic IT challenges at scale, improving application delivery, modernising network security capabilities and standardising IT service delivery across more than 200 locations and 25,000 remote users Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
15 Aug 2023
Nokia, Nomios Group to triple capacity for GÉANT European research network
10-year frame agreement pegs comms provider as sole IP critical-network provider for massive backbone network migration to deliver capacity to support long-term scientific collaboration Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
25 Jul 2023
Tetra radio users’ comms may have been exposed for years
A number of flaws in the encryption algorithms used in the secure Tetra radio communications standard have potentially left users exposed to snooping Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Jul 2023
Citrix NetScaler users told to patch new zero-day urgently
A vulnerability disclosed and patched last week by Citrix appears to be being exploited by China-backed threat actors as a zero-day, prompting warnings from government cyber bodies Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
21 Jul 2023
Future Cyber Threats: The four ‘horsemen of the apocalypse’
How to deal with emerging security threats from deep fake humans to the end of secure encryption Continue Reading
By- Jim Tiller, CISO, Nash Squared
-
Opinion
21 Jul 2023
The problem with ‘secure’ messaging
Secure instant messaging is becoming a norm for business communications but it raises three important security and compliance questions Continue Reading
By- Andersen Cheng, Executive Chairman, Post-Quantum
-
Feature
21 Jul 2023
What the Product Security and Telecommunications Infrastructure Act means for UK industry
For years, many network-connected devices have lacked adequate security, putting their users and others at risk of cyber attacks. The UK’s PSTI Act aims to prevent this by mandating minimum security requirements, but what impact will this have on industry? Continue Reading
-
News
21 Jul 2023
Government boosts protection for encryption in Online Safety Bill but civil society groups concerned
House of Lords adopts amendment to require Ofcom to commission a report before requiring technology companies to scan encrypted messages, but drops proposals for judicial oversight Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
20 Jul 2023
Attention-seeking KillNet hacktivists becoming more dangerous
The KillNet DDoS gang seems to be becoming more dangerous, but its primary goal remains to create a lot of noise and draw media attention, according to latest analysis Continue Reading
By- Alex Scroxton, Security Editor
-
News
17 Jul 2023
Shift towards ‘smarter’ digital life as broadband security, sustainability become key needs
Cisco survey finds consumer expectations will reshape the needs and economics of the internet Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Tip
10 Jul 2023
What are the elements of modern network security architecture?
Modern network security is a mix of several elements, including secure access service edge, virtualization technologies, segmentation and zero-trust models. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
-
News
05 Jul 2023
Germany: European Court of Justice hears arguments on lawfulness of EncroChat cryptophone evidence
The European Court of Justice will decide whether the collection and sharing of data intercepted by law enforcement from EncroChat crypto phone network is compatible with European law Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
04 Jul 2023
How Maxeon is forging the path to SASE
Maxeon Solar Technologies is building out its security service edge capabilities with an eye on a SASE implementation that combines best of breed offerings from different suppliers Continue Reading
By- Aaron Tan, TechTarget
-
News
28 Jun 2023
Dubai Smart IoT unclear on deadline, but not ambition
While the Dubai Smart IoT strategy reads like any other ambitious – and equally ambiguous – plan for the overhaul of a gulf state economy, there is still a clear message that the country is serious about technology Continue Reading
By- Pat Brans, Pat Brans Associates/Grenoble Ecole de Management
-
News
28 Jun 2023
Stolt-Nielsen SASE looks to optimise global connectivity, security for hybrid workers
Bulk liquid logistics and sustainable land-based aquaculture expert advances secure digital transformation plans and operational efficiency Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
27 Jun 2023
Three years on, EncroChat cryptophone hack nets 6,500 arrests and seizures of €900m
French and Dutch prosecutors say three years after they infiltrated the EncroChat cryptophone network in a novel hacking operation, Europe’s courts are opening the way for more collaboration and data sharing between law enforcement agencies Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
22 Jun 2023
Orange Business leads team to deliver cloud-native managed SASE to enterprises
Enterprise division of the global telco taps in-house cyber security practice and leading cyber security technology provider to offer simpler operational model for customers with end-to-end accountability, improved agility, efficiency and performance Continue Reading
By- Joe O’Halloran, Computer Weekly
-
E-Zine
20 Jun 2023
How to keep network costs affordable
In this week’s Computer Weekly, as demands for networking performance and speed increase, we examine how to keep a handle on costs. Chip makers are investing in PLC technology – the next generation of flash storage – but some think it won’t be worth the effort; we investigate. And we listen in as tech industry leaders and politicians discuss the regulation of AI. Read the issue now. Continue Reading
-
News
19 Jun 2023
Huawei slams EU high-risk supplier claims as against principles of free trade
Comms tech giant comes out swinging against being singled out by EC commissioner as having high-risk supplier status in 5G mobile infrastructures Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
19 Jun 2023
Early June Microsoft outages were result of large-scale DDoS hit
Investigations into recent outages on Microsoft Azure and Outlook services have turned up evidence of a massive distributed denial-of-service attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Jun 2023
Extreme Networks emerges as victim of Clop MOVEit attack
Network equipment and services supplier Extreme Networks has revealed its instance of Progress Software’s MOVEit tool was compromised in the ongoing Clop cyber attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Jun 2023
Barracuda ESG users told to throw away their hardware
Owners of Barracuda Email Security Gateway appliances are being told that they will need to throw out and replace their kit after it emerged that a patch for a recently disclosed vulnerability had not done the job Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 May 2023
Executive interview: DNS designer David Holtzman discusses net security
How is it possible for criminals to lure people onto fake websites? Holtzman says it’s because DNS is fundamentally insecure Continue Reading
By- Cliff Saran, Managing Editor
-
Opinion
16 May 2023
Why we need a secure side door for encrypted apps, not a back door
Splitting a decryption key into multiple fragments held by 'guardians', including privacy rights group, may be an answer to policing encrypted messages Continue Reading
By- Andersen Cheng
-
News
11 May 2023
Investigatory Powers Tribunal finds NCA EncroChat hacking warrants were lawful
Investigatory Powers Tribunal refers questions over whether messages obtained from the EncroChat encrypted phone network are legally admissible back to the criminal court Continue Reading
By- Bill Goodwin, Computer Weekly
-
E-Zine
11 May 2023
CW EMEA: The future of work
In this month’s CW EMEA, we look at the future of work in Europe after the pandemic forced a change in entrenched human behaviour. For years, people talked about flexible working being the way forward, but scepticism within the management of large companies held it back. This all changed when Covid-19 began to spread out of control and governments and businesses quickly told people to work from home where possible. We also look at the increasing problem of IT failures in Dutch hospitals and how they are affecting patient care, highlighting the need to improve IT security in hospitals. Read the issue now. Continue Reading
-
News
10 May 2023
MPLS and SD-WAN fail to meet needs of modern enterprise
Study from network architect argues modern uses cases have broken the network edge, with both traditional topology and much-touted software-defined replacement not cutting it Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
08 May 2023
Chat control: EU lawyers warn plans to scan encrypted messages for child abuse may be unlawful
Leaked legal advice warns that European ‘chat control’ proposals to require tech companies to scan private and encrypted messages for child abuse are likely to breach EU law Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
05 May 2023
IT Priorities 2023: Distributed IT and hybrid work drive adoption of new networks
Research shows security continues to dominate networking needs, along with the need to support users wherever they are, with firms more than ready to invest in future of work initiatives Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Tip
27 Apr 2023
6 steps for rapid geographic network segmentation
When segmenting network operations in certain parts of the world, modular network design and geographic domain definition are two vital elements to consider. Continue Reading
By- Johna Till Johnson, Nemertes Research
-
News
24 Apr 2023
Emergency alert test review confirmed after ‘small number’ of mobile users excluded
In wake of emergency alert test on 23 April, government confirms review into why some 4G and 5G mobile phones were excluded Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
19 Apr 2023
Orange joins forces with industry, academia to build French quantum comms
Leading telco joins industry leaders, start-ups and academic players announce the official launch of a programme in charge of deploying Quantum secure communications networks in France. Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
19 Apr 2023
Cisco urges users to keep its network hardware up-to-date
In the wake of a campaign of threat activity targeting a six-year-old Cisco router vulnerability, the networking giant has warned users to be on high alert and update their hardware Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Apr 2023
Enterprise networking sees age of SASE and network as a service
Report reveals complexity of third workspace has transformed how modern IT organisations view network and security, with 98% of IT executives planning to increase investment in cloud services Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
18 Apr 2023
Tech companies and NGOs urge rewrite of Online Safety Bill to protect encrypted comms
The Online Safety Bill faces amendments in the House of Lords amid concerns that it could weaken the security of end-to-end encrypted communications for UK citizens Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
13 Apr 2023
Thousands at risk from critical RCE bug in legacy MS service
Thousands of organisations worldwide are at risk from three vulnerabilities – one critical – in a legacy Microsoft service that they may not be aware they are running Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Apr 2023
Netskope claims hybrid work ‘revolution’ with SASE client and endpoint SD-WAN
Netskope looks to deliver consistent security and superior user experience for hybrid workers through reduced costs and complexity from extended borderless SD-WAN and SASE Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Definition
03 Apr 2023
Temporal Key Integrity Protocol (TKIP)
Temporal Key Integrity Protocol (TKIP) is an encryption protocol included in the Institute of Electrical and Electronics Engineers (IEEE) 802.11i standard for wireless local area networks (WLANs). Continue Reading
By -
News
07 Mar 2023
APAC IT leaders bullish on tech spending
Over half of respondents in this year’s IT Priorities study have bigger IT budgets as they continue to make strategic investments in cyber security, cloud and automation, among other areas Continue Reading
By- Aaron Tan, TechTarget
-
Podcast
06 Mar 2023
Podcast: 2023 compliance and storage outlook
Geopolitical instability casts its shadow as organisations must think about cyber attacks, data location and what to do if things change quickly. We talk to Mathieu Gorge, CEO of Vigitrust Continue Reading
By- Antony Adshead, Storage Editor
-
News
02 Mar 2023
WH Smith staff data accessed in cyber attack
The retailer has said that customer data has not been affected by the incident as it is held in different systems, and that investigations into the attack are ongoing Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Tip
24 Feb 2023
3 important SD-WAN security considerations and features
Device onboarding, control plane security and data plane security are three crucial SD-WAN security considerations enterprises should research when choosing an SD-WAN vendor. Continue Reading
By- Kevin Tolly, The Tolly Group
-
News
13 Feb 2023
Russian spear phishing campaign escalates efforts toward critical UK, US and European targets
Russian hacking group Seaborgium refines its tactics in a continuation of attacks against targets including not-for-profit organisations with geopolitical affiliations Continue Reading
By- Simone Bateson
-
News
13 Feb 2023
Killnet DDoS attacks disrupt Nato websites
A series of distributed denial of service attacks on various public websites belonging to the Nato alliance were largely repelled but some resources remain unavailable Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Feb 2023
Extreme extends network fabric to the edge with enhanced SD-WAN
With ever-increasing threat blanket in wide-area network, cloud networking provider announces automated workflows, user experiences and 10Gbps throughput to boost application performance, lower operating cost and reduce mean time to resolution Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
08 Feb 2023
Russian hacking group Seaborgium targets SNP MP Stewart McDonald
Scottish National Party MP Stewart McDonald says his personal emails have been hacked by a group linked to the Russian state in a targeted phishing attack Continue Reading
By- Bill Goodwin, Computer Weekly
-
Feature
07 Feb 2023
APAC buyer’s guide to SASE
In this buyer’s guide on secure access service edge services, we look at the benefits of the technology, key considerations and the market landscape Continue Reading
By- Aaron Tan, TechTarget
-
News
01 Feb 2023
Cisco fixes two bugs that could have led to supply chain attacks on users
Two vulnerabilities uncovered in Cisco hardware could have opened the door to serious supply chain cyber attacks, according to the Trellix researchers who found them Continue Reading
By- Alex Scroxton, Security Editor
-
News
31 Jan 2023
Russian DDoS hacktivists seen targeting western hospitals
A swathe of attacks by the Putin-supporting DDoS operation known as Killnet has targeted hospitals and other infrastructure in several Nato countries, with the UK thought to be at risk Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Jan 2023
Uncertainty persists, but enterprises rush to adopt network as a service
Research shows that enterprise network-as-a-service opportunities abound but comms service providers will need to overhaul investment and go-to-market strategies before adoption becomes widespread Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
18 Jan 2023
How Aruba is tapping opportunities in networking
Aruba is planning to expand its product portfolio, make deeper inroads into datacentres and drive adoption of network as a service, among other efforts to tap opportunities in the networking market Continue Reading
By- Aaron Tan, TechTarget
-
News
17 Jan 2023
Orange juices JDE expansion with SD-WAN
Telco’s Business Services division selected by global coffee company to secure end-to-end connectivity offerings for more than 120 locations worldwide Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
17 Jan 2023
Cloudflare urged to clamp down on pirates, counterfeiters
A whitepaper produced by brand protection specialist Corsearch calls on Cloudflare to do more to stop online content piracy and sales of counterfeit goods Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Jan 2023
Cloudflare completes SASE offer with Magic WAN Connector
Software-defined wide-area network functionality released by online application acceleration and infrastructure provider Cloudflare to complete single-supplier secure access service edge offering Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
05 Jan 2023
Warning over ransomware attacks spreading via Fortinet kit
Following the disclosure of a critical vulnerability in October 2022, Fortinet VPN devices were exploited in two known ransomware attacks, with access likely sold on the dark web Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Dec 2022
Top 10 networking stories of 2022
Here are Computer Weekly’s top 10 networking stories of 2022 Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
28 Dec 2022
Complaints that NCA failed in duty of candour over EncroChat warrants ‘incredible’, court hears
NCA lawyers argue that a decision by an NCA intelligence officer to disclose notes of a key meeting after two-and-a-half years boosts her credibility as a witness Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
16 Dec 2022
UK unis implement new IP traffic policies to combat ransomware
Jisc will introduce new measures to protect UK universities and research institutions from ransomware attacks that exploit the Remote Desktop Protocol remote-access feature Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Dec 2022
Cops dismantle 48 DDoS-for-hire websites
An operation combining law enforcement from the UK, US, Netherlands and Europol has disrupted 48 of the world’s most popular DDoS booter websites Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
13 Dec 2022
ISO 27001
ISO 27001, formally known as ISO/IEC 27001:2022, is an information security standard created by the International Organization for Standardization (ISO), which provides a framework and guidelines for establishing, implementing and managing an information security management system (ISMS). Continue Reading
-
News
11 Dec 2022
How Zscaler is cracking APAC’s cloud security market
Zscaler’s head in Asia-Pacific and Japan talks up the company’s growth momentum in the region and what it is doing to address areas where it can do better Continue Reading
By- Aaron Tan, TechTarget
-
News
06 Dec 2022
Industrial IoT focus of next NCSC startup challenge
The NCSC for Startups programme is looking for innovative ideas to encrypt and secure the industrial internet of things Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
06 Dec 2022
Wireless security: WEP, WPA, WPA2 and WPA3 differences
As wireless networks have evolved, so have the protocols for securing them. Get an overview of WLAN security standards, and learn the differences among WEP, WPA, WPA2 and WPA3. Continue Reading
By- Alissa Irei, Senior Site Editor
- Jessica Scarpati
-
News
25 Nov 2022
CityFibre identifies massive economic gains for Cheltenham, Portsmouth areas through full fibre
Leading independent gigabit broadband provider reveals positive economic and productivity impacts in Gloucestershire and south-coast cities where it has introduced full fibre, running to £145m and £335m respectively Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
18 Nov 2022
Enterprises embrace SD-WAN but miss benefits of integrated approach to security
Research from managed network and security services provider finds virtually all enterprises have deployed software-defined wide area networks or plan to do so within the next 24 months, but nearly half reported they either don’t have security integrated with SD-WAN or have no specific SD-WAN security at all Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
16 Nov 2022
Global network fragmentation a source of increasing risk
Risk consultancy’s report says the weaponisation of cyber space and geopolitical clashes herald a breakdown of global networks into distinct regional or national architectures Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
27 Oct 2022
Cloud, security and automation alter networking roles
Networking pros are no longer in their own bubbles, even if they prefer it that way. The growth of cloud, security and automation is expanding traditional networking roles. Continue Reading
By- Jennifer English, Executive Editor
-
News
25 Oct 2022
US authorities charge two Chinese spies over telco security probe
Two Chinese nationals have been charged with attempting to obstruct the criminal prosecution of a prominent Chinese telecoms firm Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Oct 2022
The Security Interviews: Why now for ZTNA 2.0?
With organisations facing escalating online threats, security teams need to improve their defences using zero-trust network access to preserve the integrity of their systems. Palo Alto Networks’ Simon Crocker shares his views on zero-trust network access Continue Reading
-
Definition
13 Oct 2022
Secure File Transfer Protocol (SSH File Transfer Protocol)
SFTP is a term that refers to either Secure File Transfer Protocol or SSH File Transfer Protocol, and is a computing network protocol for accessing and managing files on remote systems. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
-
Definition
05 Oct 2022
network security
Network security encompasses all the steps taken to protect the integrity of a computer network and the data within it. Continue Reading
By- Nick Barney, Technology Writer
- Ben Lutkevich, Site Editor
-
Tip
04 Oct 2022
How to build a zero-trust network in 4 steps
While network teams are responsible for deploying the elements of a zero-trust network, security teams should also be involved in developing the overall zero-trust framework. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
E-Zine
20 Sep 2022
A gold medal performance for networking
In this week’s Computer Weekly, we find out how the IT team behind the 2022 Commonwealth Games in Birmingham delivered a winning performance. We also look at how the centuries-old London insurance market is going digital, thanks to Lloyd’s of London. And we find out how low-cost high street stores succumbed to the inevitable and are going online. Read the issue now. Continue Reading
-
E-Zine
15 Sep 2022
CW APAC: Trend Watch: Cloud networking
Organisations are waking up to the importance of utilising updated cloud services. In this handbook, focused on cloud networking in the Asia-Pacific region, Computer Weekly looks at the technology’s advantages, how Cloudflare keeps its customers protected, Tata’s efforts to strengthen its offerings, and how networking and security might evolve in the future. Continue Reading
-
Definition
13 Sep 2022
computer worm
A computer worm is a type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems. Continue Reading
By- Crystal Bedell
- Peter Loshin, Former Senior Technology Editor
- Katie Terrell Hanna
-
News
12 Sep 2022
CISOs should spend on critical apps, cloud, zero-trust, in 2023
Faced with a global recession next year, security buyers should try to direct investment towards technology that protects customer-facing and revenue-generating workloads, say analysts Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Aug 2022
UK government presses on with new cyber rules for telcos
Government has finalised new security rules for telecoms companies and will move to make them binding in the near future Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Aug 2022
Amazon Ring vulnerability could have been used to spy on users
A now-patched vulnerability in the Amazon Ring mobile app could have been exploited to expose users’ video recordings, but was complex to exploit, according to the researchers who stumbled upon it Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Aug 2022
Ukraine war drives DDoS attack volumes ever higher
There has been a boom in distributed denial-of-service attacks in the first six months of 2022, according to a report, with Russia’s war on Ukraine helping to drive activity Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Aug 2022
Researcher finds 10 vulnerabilities in Cisco firewalls
At Black Hat USA, Rapid7 researchers report on 10 security issues in popular Cisco firewall products, many of which do not yet have patches Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Aug 2022
Cisco averts cyber disaster after successful phishing attack
A potentially serious cyber attack on Cisco’s systems that began after a threat actor successfully exploited an employee’s carelessly secured credentials was thwarted without major damage Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Aug 2022
Seacom teams up with BT to deliver enterprise communications services across Africa
Deal with leading UK telco intended for customers of Africa’s first broadband submarine cable system to benefit from what is claimed to be world-class portfolio of network services Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Feature
10 Aug 2022
APAC organisations warm to cloud networking
Organisations in Asia-Pacific are getting up to speed with cloud networking services, even as they grapple with the challenges of managing a hybrid cloud environment Continue Reading
By- Aaron Tan, TechTarget
-
News
05 Aug 2022
Reliance on PSN may have exacerbated cyber attack impact
As it seeks a new supplier to reinvigorate the migration away from the Public Services Network, the Cabinet Office says relying on the legacy network may be putting public sector bodies at heightened risk in cyber attacks Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Aug 2022
GSMA warns of potential 5G benefits loss through lack of 6GHz wireless band allocation
Trade body for the global mobile industry publishes industry ecosystem review and rails further against plans to offer the full 6GHz band to unlicensed use, warning a significant portion of the expected benefits of mid-band 5G could be lost if no additional mid-band spectrum is assigned to mobile services in the near future Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
03 Aug 2022
Shift to remote work sees major rise in cyber crime
Survey finds almost four in five cyber security teams agree that recent changes to working practices have adversely affected their organisation’s cyber security, with one-fifth banning the use of public Wi-Fi by policy Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
03 Aug 2022
DrayTek patches SOHO router bug that left thousands exposed
Network hardware supplier has fixed an unauthenticated RCE vulnerability in multiple routers in its Vigor line, after being alerted by Trellix researchers Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Jul 2022
Cato aims to bust cyber myths as it extends network protections
Cato Networks is beefing up its platform’s security features with ransomware and data loss protections, and the firm’s security strategy lead Etay Maor is using the occasion – and his unique access to billions of data points from the firm’s network – to explode some cyber myths Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Jul 2022
Vodafone, Virgin Media O2 commit to mobile access across London Underground
Global communications infrastructure provider announces that all four major mobile networks have now committed to high-speed 4G and 5G-ready mobile connectivity across the Tube network Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
07 Jul 2022
Netskope focuses on network transformation with ‘elite’ advisory group
Network technologies provider announces formation of Network Visionaries group featuring former AWS, Crowdstrike execs to offer cloud, hyperscale, security and networking expertise Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
05 Jul 2022
Cato Networks opens Copenhagen point of presence
Cato opens PoP in Danish capital to bolster resiliency and extend converged security and networking capabilities across Nordic region Continue Reading
-
News
29 Jun 2022
Colt Technology Services gets SASE with enhanced enterprise network
Customers of enterprise network provider now have access to an integrated service that brings together the software-defined wide area network Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
27 Jun 2022
A1 Telekom Austria offers VMware SD-WAN
Covering Seven Sites in the CEE Area, leading telco teams with IT services provider to offer a new range managed software-defined wide area network services Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
23 Jun 2022
Ukraine cyber agency enlists Radware to protect government networks
Ukraine’s State Service of Special Communications and Information Protection is using Radware cloud DDoS protection and web application firewall services to protect the government from persistent Russian attacks Continue Reading
By- Alex Scroxton, Security Editor