Security policy and user awareness
-
Feature
19 Nov 2024
Storage technology explained: Ransomware and storage and backup
We look at ransomware attacks, and the importance of good backup practice as well as immutable snapshots, air-gapping, network segmentation, AI anomaly detection and supplier warranties Continue Reading
By- Antony Adshead, Storage Editor
-
Opinion
19 Nov 2024
Underfunded, under pressure: We must act to support cyber teams
With almost half of cyber pros experiencing more incidents this year, security leaders say their teams are coming under increasing strain. Businesses must be more proactive approach about building a resilient, future-ready workforce Continue Reading
-
News
14 Apr 2015
Security risk potential linked to young, mobile users
A study conducted by wireless supplier Aruba Networks has identified a distinct cohort of high-risk, security-agnostic workers Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Mar 2015
How to ensure your hot-desking colleagues keep their data secure
Once hot-desking is implemented, data security suddenly demands greater attention Continue Reading
By- Christian Cawley
-
Feature
06 Mar 2015
How to secure the SDN infrastructure
As more enterprises look to deploy software-defined networking, the need for security from the ground up should not be underestimated Continue Reading
By -
News
27 Feb 2015
Case study: Norwegian insurer invests in Darktrace machine-learning cyber defence
Shipping insurance company DNK hopes to inspire the rest of the shipping industry to adopt Darktrace’s cyber defence system Continue Reading
-
News
06 Feb 2015
Symantec continues cloud investment in spite of poor Q3 results
Symantec has reported third quarter 2015 revenue of $1.64bn, a drop of 4% compared with $1.70bn over the same period in 2014 Continue Reading
By- Cliff Saran, Managing Editor
-
E-Zine
26 Jan 2015
Why we need cyber war games
In this week’s Computer Weekly, the UK and US are starting a cyber war on each other – all in the name of testing each other’s defences. We look at why the cyber war games are needed. We examine what IT managers can learn from the car industry to improve supplier relationship management. And we find out why innovation should be top of the IT agenda in 2015. Read the issue now. Continue Reading
-
News
13 Jan 2015
Obama calls for single US data breach notification law
The US president is calling for a single US data breach notification law as part of proposed legislation to improve data security Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Jan 2015
Traditional security putting UK businesses at risk, study shows
Traditional approaches to security are exposing UK businesses to heightened risk of attack, a study shows Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
05 Jan 2015
CW Europe – January 2015 Edition
As we start another new year we look back at what technology has been playing a vital role in keeping Europe safe. Headlines are regularly filled with threats about cyber wars and attacks which, although are important to bring to light, can sometimes overshadow the role technology plays in keeping us safe. Continue Reading
-
News
05 Jan 2015
Hackers can exploit free mobile apps to steal data, study shows
Hackers can access private data by exploiting vulnerabilities mainly in free mobile apps, according to security researchers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
17 Dec 2014
Cabinet Office begins procurement for next stage of Gov.uk Verify
The Cabinet Office has submitted a tender notice for a £150m three-year framework for the provision of identity assurance services Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
15 Dec 2014
Lloyd’s Register Foundation grants £10m to Alan Turing Institute
The Lloyd’s Register Foundation has announced £10m in funding over five years to support research by the Alan Turing Institute Continue Reading
By- Brian McKenna, Senior Analyst, Business Applications
-
News
10 Dec 2014
Social media threats to business on the rise, says report
Social media threats to business are increasing, according to the first in-depth analysis covering Fortune 100 companies Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 Nov 2014
CGI secures communications between pilots and air traffic control
Satellite communications firm Inmarsat has outsourced the provision of security IT and services to CGI Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
27 Nov 2014
BSI urges UK businesses to bolster cyber security
UK businesses are at risk of reputational damage due to lack of awareness on how to protect their data assets, BSI research shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Oct 2014
Many firms still unprepared for cyber attack, EY survey shows
More than a third of organisastions have no real-time insight on cyber risks necessary to combat rising threats, a survey has shown Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Oct 2014
Cloud providers rush to build European datacentres over data sovereignty
Cloud providers IBM and Google build datacentres in the EU as enterprises insist on keeping their data in Europe Continue Reading
By- Archana Venkatraman, Datacentre Editor
-
E-Zine
27 Oct 2014
Securing critical industrial systems
In this week’s Computer Weekly, we examine the security threats to the industrial control systems that power the UK’s critical national infrastructure, and ask what can be done to better protect them. We look at the key considerations when choosing an infrastructure as a service supplier. And we compare six of the top hybrid flash array products from the leading storage hardware providers. Read the issue now. Continue Reading
-
News
15 Oct 2014
Cyber security failing in execution, says ex-US cyber czar
Cyber security suffers from a lack of execution, former White House cyber security co-ordinator Howard Schmidt has said. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Oct 2014
Azure CTO Mark Russinovich's top ten public cloud security risks
Microsoft Azure cloud CTO Mark Russinovich identified ten key security risks of public cloud services Continue Reading
By- Archana Venkatraman, Datacentre Editor
-
News
08 Oct 2014
Malware being used to steal cash from ATMs
Criminals are using malware to steal cash from ATMs without debit and credit cards Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
E-Zine
06 Oct 2014
The future of digital government in the UK
In this week’s Computer Weekly, as the last political party conferences before the election come to an end, we examine the future of digital government in the UK, featuring interviews with Whitehall’s digital chief Mike Bracken and Labour’s policy leader Chi Onwurah. Also, we look at the growth of the open-source cloud computing platform Openstack, and find out what it’s like to be on the receiving end of a data breach. Read the issue now. Continue Reading
-
E-Zine
03 Oct 2014
CW Europe - October 2014 Edition
BYOD policies: What’s allowed and what’s banned? As IT departments still try to come to terms with the notion of BYOD, CW Europe takes a look at what policies are being implemented to keep security under control. Continue Reading
-
E-Zine
29 Sep 2014
Hacking IT from the inside
In this week’s Computer Weekly, car giant Daimler talks about its IT security strategy and the benefits of having its own in-house hacking team. App developers are under fire for collecting too much personal data – we examine the latest best practice. Our new buyer’s guide looks at virtualisation backup. And our review of Microsoft’s Surface Pro 3 tablet asks whether it can replace the laptop. Read the issue now. Continue Reading
-
News
26 Aug 2014
Local authorities can improve data protection, says ICO audit
There is room for improvement in how local authorities protect personal data, says an audit report by the ICO Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Aug 2014
Load balancing supports Kent County Council's VDI project
Kent County Council picks Kemp Technologies load balancers to support a deployment of VMware Horizon View and Workspace across its estate Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Jul 2014
Info sharing key to cyber defence, says financial services firm
Threat information sharing is key to success in combating cyber attacks, says the Depository Trust and Clearing Corporation Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Jul 2014
Barclays passes government’s ‘internet-born threat’ test
Barclays Bank has been awarded the government’s cyber security certificate for digital banking services after independent tests of services such as Pingit Continue Reading
-
E-Zine
22 Apr 2014
Adapting to life after Heartbleed
In this week’s Computer Weekly, we investigate the most significant flaw in recent history to impact the internet. The Heartbleed bug in OpenSSL leaves millions of internet servers vulnerable to attack. Hackers have already exploited Heartbleed to steal passwords from the Mumsnet parenting site. What can websites do to foil future attacks? Continue Reading
-
News
04 Apr 2014
Cabinet Office vetoed Home Office plans for 'critical' e-Borders replacement
Home Office plans for IT systems to replace ageing border security systems that contain “critical vulnerabilities” were vetoed by the Cabinet Office Continue Reading
By- Bryan Glick, Editor in chief
-
Feature
14 Mar 2014
Hacktivism: good or evil?
IT lawyer Dai Davis looks at the rise of hacktivism and its impact on business and international politics Continue Reading
By- Dai Davis, Percy Crow Davis & Co
-
News
04 Mar 2014
IT Security Salary Index (UK)
Are you being paid the right rate for the job? Check out this IT Security salary index from Acumin. Continue Reading
-
News
26 Feb 2014
Indian CISOs to develop more business skills to succeed
Organizations require Chief Information Security Officers (CISOs) to be much more than just a technical expert but also possess business skills in today’s growing technology driven Indian market Continue Reading
By- Shaleen Sinha
-
News
19 Feb 2014
UK firms see 1,000+ internal data breaches a day, study finds
Internal threats are not a high priority for UK firms despite more than 1,000 internal data breaches a day Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Feb 2014
Bank of England publishes Waking Shark II cyber security exercise results
Bank of England publishes the results of its Waking Shark II security exercise, which tested financial institutions' contingency plans for cyber attack Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
17 Jan 2014
Internet at risk of 'cybergeddon' says WEF
Internet is at risk of fragmenting amid concerns over spying and cyber crime, says World Economic Forum Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
14 Jan 2014
Top European IT initiative to support business in 2014?
Expanding IT to support business growth is one of the biggest areas of focus for IT departments in 2014, so what does this mean? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Jan 2014
Security considerations for UK enterprises
This Research Snapshot from Vanson Bourne looks at IT security spending trends, awareness of cyber-threats, and the factors perceived as the biggest security risks for organisations. Continue Reading
-
News
07 Jan 2014
Security Think Tank: Information security strategy should support the business
How should Edward Snowden's revelations about the NSA and GCHQ influence future information security strategies in the UK? Continue Reading
By- Adrian Davis, (ISC)²
-
News
30 Dec 2013
Bank robberies down 90% thanks to technology, says report
Robberies at British banks have fallen by over 90% in two decades, according to a report by the British Bankers’ Association Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
E-Zine
16 Dec 2013
Can BlackBerry restore its business appeal?
In this week’s issue of Computer Weekly, we examine whether former Sybase chief, John Chen, will be able to stem the decline of BlackBerry and reinvent the the smartphone maker as a software business for the “bring your own device” (BYOD) era. Our buyer’s guide to the internet of things concludes with a look at how universal connectivity will yield insights in fields as diverse as aviation and hospitality. And we analyse Google’s attempts to compete with Amazon Web Services in public cloud. Continue Reading
-
News
04 Dec 2013
Proof-of-concept malware jumps air gap with sound card
Researchers demonstrate proof-of-concept malware exfiltrating data using high-frequency transmissions inaudible to humans Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Dec 2013
The Guardian denies Snowden stories damaged national security
Guardian editor Alan Rusbridger defends decision to publish stories on documents leaked by whistleblower Edward Snowden Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Dec 2013
UK proposes formal talks on cyber security with China
Prime minister David Cameron has called on China to be more open about cyber security Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 Nov 2013
EU calls on US to rebuild trust in post-Snowden era
The EC has called on the US to provide guarantees to restore trust in the wake of spying revelations Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Nov 2013
European Parliament closes Wi-Fi after man-in-the-middle attack
A number of mailboxes have been compromised and users’ smartphones could be at risk following a man-in-the-middle attack on the European Parliament’s public Wi-Fi Continue Reading
By- Jennifer Scott, TechTarget
-
News
26 Nov 2013
FTSE 350 firms complete cyber risk assessment
Most FTSE 350 companies put cyber risk on the board agenda, but many need to improve how they manage that risk Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Nov 2013
Facebook authentication - Like?
As Cisco teams up with Facebook to offer authentication for public Wi-Fi, is this option safe for businesses? Continue Reading
By -
News
12 Nov 2013
Mass surveillance a bad idea, says Information Commissioner Christopher Graham
Information Commissioner Christopher Graham says issues of national security must not overshadow concerns of legitimate public interest Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Nov 2013
Global profiles of the fraudster
Computers, rather than conmen, are set to be the future face of fraud, as criminals turn to robotics in an effort to avoid detection, this report from KPMG reveals. Continue Reading
-
News
29 Oct 2013
Analysis: RSA says security needs to change, but what does that mean?
RSA executive chairman Art Coviello has issued a call to action to the security industry to improve technology and collaboration Continue Reading
-
News
15 Oct 2013
The ICO issues BYOD warning after breach
The ICO is calling on organisations to ensure data protection policies reflect how employees are using personal devices for work Continue Reading
By- Warwick Ashford, Senior analyst
-
Photo Story
15 Oct 2013
10 security reasons to upgrade to iOS 7
Even if it did not include numerous security fixes, iOS 7 has compelling reasons for corporates to adopt it to improve their security Continue Reading
By- Rob Buckley
-
News
14 Oct 2013
Is India’s cyber policy all words and no action?
The Indian government is trying to strengthen cyber security with the new cyber policy, but little is yet understood about how the ambitious proposals will be put in place Continue Reading
By- Viraj V Desai
-
Opinion
03 Oct 2013
Privacy concerns in the digital world
Considering the full spectrum of privacy, people need to ask themselves if they are comfortable with all their characteristics in the public domain Continue Reading
By- Yves Le Roux, (ISC)2
-
News
19 Sep 2013
NSA reveals how Snowden accessed secret Prism files
Prism whistleblower Edward Snowden accessed secret documents through a file-share, the NSA has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Sep 2013
NSA and GCHQ unlock online privacy encryption
UK and US intelligence agencies have unlocked the technology used to encrypt online services, including email, online banking and medical records. Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
05 Sep 2013
Windows 2012 Server Network Security
This book chapter offers an introduction to Windows 8 and Windows Server 2012 network security and IPv6. It includes a 30% discount code for Computer Weekly readers. Continue Reading
-
News
05 Sep 2013
Windows Server 2012 Security from End to Edge and Beyond
This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask. Continue Reading
-
News
05 Sep 2013
Printing: a false sense of security?
Louella Fernandes and Bob Tarzey show how secure printing technology can provide authentication, authorisation and accounting capabilities, helping businesses improve document security and meet compliance regulations. Continue Reading
-
Photo Story
29 Aug 2013
Rapid7 United 2013 Security Summit
View the pics from Rapid7’s recent security summit in Boston. Continue Reading
By- Kayleigh Bateman, Computer Weekly
-
News
21 Aug 2013
Case study: Keeping it private at Beth Israel Deaconess after the Boston Marathon Attacks
Doctor and healthcare CIO shares his lessons learned from the Boston Marathon attacks and how to protect patient data Continue Reading
By- Kayleigh Bateman, Computer Weekly
-
News
20 Aug 2013
Targeted attacks and how to defend against them
Analysts Bob Tarzey and Louella Fernandes assess the scale and real impact of targeted attacks the measures being taken to defend against them. Continue Reading
-
Feature
19 Aug 2013
Top 10 Android security tips
As Android becomes more prevalent in the enterprise, Computer Weekly gives you 10 top tips for keeping your devices secure Continue Reading
By- Paul Marchant
-
News
05 Aug 2013
Websites hacked to show child abuse images
More than 25 business websites worldwide have been hacked to show illegal images of child sex abuse Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
Feature
30 Jul 2013
Big data journalism exposes offshore tax dodgers
How journalists harnessed big data to challenge offshore financial secrecy Continue Reading
By- Duncan Campbell and Craig Shaw
-
News
26 Jul 2013
FireEye partners with Phishme for multi-layered security
Security technology developer FireEye has partnered with phishing awareness training firm PhishMe to offer a multi-layered approach to securing information networks Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Jul 2013
Insider threat: Balancing security with privacy
How can organisations increase security without affecting productivity or encroaching on employees’ right to privacy? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Jul 2013
IT security case studies
Four critical IT security case-studies selected from the winners of Computer Weekly's European User Awards for security Continue Reading
-
News
18 Jul 2013
Needle in a Datastack: The rise of big security data
This research from McAfee investigates how well organisations are positioned to address the challenges of managing security in a world of ever increasing amounts and types of data. Continue Reading
-
News
17 Jul 2013
2013 Cost of Data Breach Study: UK
The cost of data breaches has risen for UK organisations over the past year, the Ponemon Institute reveals. Continue Reading
-
News
17 Jul 2013
Security Think Tank Download: Bring your own device
Downloadable guide. How to make your company secure when you introduce BYOD. Continue Reading
-
News
17 Jul 2013
IT Security Case Studies
Warwick Ashford presents 4 essential IT security case-studies selected from the winners of Computer Weekly's European User Awards. Continue Reading
-
News
04 Jul 2013
FBI warns of increased spear phishing attacks
The FBI has issued a warning about an increase in spear-phishing attacks targeting multiple industry sectors Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Jun 2013
Most firms underestimate volume of malware, study shows
Most companies greatly underestimate the number of malicious programs appearing daily, a global survey of more than 2,000 IT professionals has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Jun 2013
Government launches cyber awareness campaign
UK government debuts the first stage of a £4m cyber awareness campaign as part of the National Cyber Security Programme Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Jun 2013
2013 Cost of Data Breach Study: UK
The cost of data breaches has risen for UK organisations over the past year, but companies that appoint chief information security officers with enterprise-wide responsibilities can reduce their costs, this report from the Ponemon Institute reveals Continue Reading
-
News
05 Jun 2013
Human error causes most data breaches, Ponemon study finds
Human errors and system problems caused two-thirds of data breaches in 2012, according to a study from Symantec and the Ponemon Institute Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 May 2013
Privileged accounts key to most APT attacks, says Cyber-Ark
The theft, misuse and exploitation of privileged accounts is becoming an increasingly key tactic in advanced persistent threat attacks Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 May 2013
Cyber criminals hack Washington court system
Hackers gain access to the personal data of 160,000 US citizens after compromising Washington State court service servers Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
03 May 2013
Computer Weekly European User Awards for Security: Winners
The winners are in for the Computer Weekly European User Awards for Security. See who made the top spots. Continue Reading
By- Kayleigh Bateman, Computer Weekly
-
News
01 May 2013
CW buyer's guide: context-aware security
This 11-page Computer Weekly buyer's guide looks at how organisations should approach context-aware security technologies and what business benefits they can deliver. Continue Reading
-
News
01 May 2013
CW Special Report on CSC
This 16-page report from Computer Weekly analyses the challenges facing CSC, its financial performance, the services it offers, its place in the IT market and its future strategy. Continue Reading
-
News
29 Apr 2013
Another online firm hit by data breach
Online deals service LivingSocial is the latest company to report a breach of its computer systems that may mean attackers accessed customer details Continue Reading
-
News
24 Apr 2013
Protecting against modern password cracking
This article in our Royal Holloway Security Thesis series explains just how insecure passwords are and offers advice on alternative methods of security. Continue Reading
-
Feature
16 Apr 2013
How to create a good information security policy
Information security policies provide vital support to security professionals, yet few organisations take the time to create decent policies Continue Reading
By- Andi Scott
-
News
11 Apr 2013
Bots and web apps among top threats to data security, says Check Point
Bots, viruses, breaches and attacks are a constant and real threat to the information security of organisations Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Apr 2013
Porn websites pose malware risk, says researcher
Browsing popular pornography internet sites pose a growing risk of malware infection, according to a security researcher Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Apr 2013
Effective print security for SMBs
Analysts Louella Fernandes and Clive Longbottom discuss how integrated print management provides SMBs with a simple and scalable approach for print security. Continue Reading
-
News
03 Apr 2013
US Army practises poor data security on mobile devices
Pentagon inspector general finds smartphones and tablets the US Army buys are not configured to protect sensitive data and allow remote wipe Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Mar 2013
Employees ignore security rules, say infosec pros
Most information security professionals believe corporate employees wilfully ignore security rules, survey at RSA Conference 2013 reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Mar 2013
Phishing emails sent in pairs to lend authenticity, says training company
Phishing emails are now being deployed in pairs to create the illusion of authenticity, says security awareness training company PhishMe Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
05 Mar 2013
The security risk sweeping Europe
Never have we been so open about the information we share online, without so little concern for our privacy. Social media can be a threat to a company, not just to what information an employee chooses to disclose, but because social media sites are prime targets for cybercrime. In this issue of CW Europe read how the increase in social media usage has created new privacy concerns for businesses. Continue Reading
-
News
05 Mar 2013
Security the future: Keeping up with the business
Gareth Lindahl-Wise, group information security manager at British American Tobacco, explains the company's approach to enterprise security architecture. Continue Reading
-
News
27 Feb 2013
350,000 different types of spam SMS messages were targeted at mobile users in 2012
350,000 different variants of unsolicited spam SMS messages were accounted for in 2012, with 53,000 variants logged for December alone Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
27 Feb 2013
Health records should be protected like bank details, says BCS
The BCS and NHS say people should protect their online medical records in the same way they look after their bank details Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
18 Feb 2013
The Demise in Effectiveness of Signature and Heuristic Based Antivirus
Anti-virus technology is failing to protect organisations from malicious attacks. Security professionals should look at alternative strategies, the NNC group argues in this report. Continue Reading
-
News
15 Feb 2013
Bad outsourcing decisions cause 63% of data breaches
Bad outsourcing decisions nearly two-thirds of data breaches investigated by security firm Trustwave in the past year Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
11 Feb 2013
How to find the most vulnerable systems on your internal network
Most corporate networks share common vulnerabilities, but many could be mitigated with education in “hacker thinking” for technical staff Continue Reading
By- Peter Wood, First Base Technologies LLP
-
Feature
07 Feb 2013
Social media: A security challenge and opportunity
Generation Y workers are posing increasing security challenges to their employers as they share data unreservedly Continue Reading
By- Warwick Ashford, Senior analyst