Hackers and cybercrime prevention
-
News
22 May 2025
Microsoft raises posse to target dangerous Lumma malware
Microsoft, along with a consortium of partners, has seized and disrupted a significant part of the Lumma malware-as-a-service network used to steal data and funds Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 May 2025
How to tackle your infrastructure technical debt
Gartner analysts explain how infrastructure and operations teams can address the accumulation of outdated systems and make a compelling business case for upgrades Continue Reading
-
Feature
11 Jun 2018
How Australia is keeping pace with ICS threats
Besides bridging the security gap between IT and operational technology teams, Australia is driving efforts to bolster the security of IoT devices Continue Reading
-
News
11 Jun 2018
Security Think Tank: Data flow visibility is essential to security
Why is it important to know where data flows, with whom it is shared and where it lives at rest, and what is the best way of achieving this? Continue Reading
By- Elisabetta Zaccaria, Secure Chorus
-
News
11 Jun 2018
Coinrail cyber heist highlights need for exchange security
A cyber heist at South Korea’s Coinrail has prompted fresh calls for industry regulations to drive better cyber security at cryptocurrency exchanges Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Jun 2018
APAC remains a hotbed for software piracy
The Asia-Pacific region is still seeing the highest use of unlicensed software installations globally, making enterprises more susceptible to cyber attacks from malware Continue Reading
By- Kimberly Chua
-
News
08 Jun 2018
Parliamentary computers at risk after staff targeted by phone phishing
Police are investigating phone phishing attacks targeted against Parliament. Staff warned not to disclose details of their computers to fraudulent callers. Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
08 Jun 2018
BYOD for mobile ‘a year away’ for Williams F1
Companies in the Williams Group – the Formula One racing operation Williams Grand Prix Engineering and its high-growth sister operation Williams Advanced Engineering – are investing with mobile security front-of-mind to enable more agile working practices within 12 months Continue Reading
-
Opinion
08 Jun 2018
Security Think Tank: Focus on data protection, but do not rely on DLP alone
Why is it important to know where data flows, with whom it's shared and where it lives at rest – and what is the best way of achieving this? Continue Reading
By- Emma Bickerstaffe, Information Security Forum (ISF)
-
News
08 Jun 2018
Businesses must report cyber crime, panel urges
By reporting cyber crimes, private enterprise can help improve national and international cyber defences and bring criminals to justice, according to an expert panel Continue Reading
By- Warwick Ashford, Senior analyst
-
News
07 Jun 2018
Cyber security focus too much on tech, says Domino’s CISO
Many organisations are still focusing only on technology and compliance, which means their cyber defences are not as solid as they think, according to Domino’s Pizza chief information security officer Continue Reading
By- Warwick Ashford, Senior analyst
-
News
07 Jun 2018
IT spending reaches 10-year high as CIOs struggle with digital technology strategy
IT leaders have seen their budgets and headcounts rise for the first time in 10 years, but face challenges implementing their digital strategies Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
07 Jun 2018
Nation state cyber attacks affect all, says former GCHQ boss
Cyber attacks by nation states used to be a small part of the problem for state authorities to address, but now all organisations are potential targets of nation state attacks, according to former GCHQ head Continue Reading
By- Warwick Ashford, Senior analyst
-
News
07 Jun 2018
Business not learning from past cyber security incidents
Businesses are still not getting the basics right and they are not learning from past security incidents, according to world-renowned security blogger and trainer Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
07 Jun 2018
Security Think Tank: Understand data for risk-based protection
Why is it important to know where data flows, with whom it is shared and where it lives at rest, and what is the best way of achieving this? Continue Reading
By- Simon Persin, Turnkey Consulting
-
News
06 Jun 2018
Understanding is key to security awareness, says specialist
Only if people understand why cyber security matters will they change their behaviours as a result of awareness training, according to a human behaviour specialist and cyber security consultant Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
06 Jun 2018
Security Think Tank: Ignorance about data is tantamount to negligence
Why is it important to know where data flows, with whom it's shared and where it lives at rest, and what is the best way of achieving this? Continue Reading
By- Tim Holman, 2-sec
-
News
06 Jun 2018
Cyber attacks not sophisticated, says Just Eat CISO
The chief information security officer of Just Eat has challenged the perception that all cyber attacks are sophisticated and that it is impossible to fill cyber security jobs Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Jun 2018
Boards not asking right security questions, says Dido Harding
Former TalkTalk CEO says boards are still not asking the right cyber security questions, do not understand that they should be making cyber risk decisions, and are not communicating with engineers Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
05 Jun 2018
Application security more important than ever
Applications have an increasingly crucial role in our lives, yet they are also a real security threat, with hackers always finding new ways to bypass security defences. Computer Weekly looks at how organisations are responding to the challenge Continue Reading
-
Opinion
05 Jun 2018
Security Think Tank: Use data flow information to protect systems
Why is it important to know where data flows, with whom it's shared and where it lives at rest, and what is the best way of achieving this? Continue Reading
-
News
04 Jun 2018
Technology key to new UK counter-terrorism strategy
Technologies such as machine learning and data analytics are key to the UK government’s updated counter-terrorism strategy Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Jun 2018
One-third of firms would pay ransoms rather than invest in security
Report says businesses are still making the same mistakes, failing to make any progress in crucial areas such as cyber security awareness and preparedness Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
04 Jun 2018
Security Think Tank: Data governance is essential to data security
Why is it important to know where data flows, with whom it's shared and where it lives at rest – and what is the best way of achieving this? Continue Reading
-
News
04 Jun 2018
Offensive AI unlikely in the near future, says Mikko Hypponen
Cyber criminals are not close to being able to use AI for attack purposes, according to industry veteran Mikko Hypponen, who has been at the forefront of AI use in cyber defence for several years Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 Jun 2018
Huge rise in TSB-themed mobile phishing attacks after IT meltdown
Scammers have used bank’s IT problems as an opportunity to target its customers with mobile phishing attacks Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
01 Jun 2018
Ethical hacker, 86, rises to Santander’s challenge
Elderly hacker with little computing experience was able to hack WiFi and create phishing attack Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Feature
01 Jun 2018
Cyber resilience key to securing industrial control systems
Operators of industrial control systems can build greater cyber resilience by getting IT and operational technology teams to work more closely together and improving the visibility of their infrastructure, among other security measures Continue Reading
By- Aaron Tan, Informa TechTarget
-
Opinion
01 Jun 2018
Security Think Tank: Data controllers are essential in modern business environment
Why is it important to know where data flows, with whom it's shared and where it lives at rest, and what is the best way of achieving this? Continue Reading
By -
News
01 Jun 2018
Security suppliers need to interact with community, says researcher
Security suppliers need to interact with the community to get feedback on their products before launch to ensure they have not missed any vulnerabilities, a security researchers advises Continue Reading
By- Warwick Ashford, Senior analyst
-
News
31 May 2018
VPN hacks can be lethal, warns security expert
Organisations should not overlook the need to secure VPN connections because failure to do so could be fatal, but 2FA alone is not enough, warns a security expert Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
31 May 2018
Security Think Tank: Data governance is good for business and security
Why is it important to know where data flows, with whom it's shared and where it lives at rest, and what is the best way of achieving this? Continue Reading
By- Maxine Holt, Omdia
-
Opinion
30 May 2018
Security Think Tank: Information management means better security
Why is it important to know where data flows, with whom it's shared and where it lives at rest – and what is the best way of achieving this? Continue Reading
-
News
30 May 2018
Security community urged to prepare for quantum computing
A top European chief information security officer is urging the security community to prepare for quantum computing to ensure their encryption processes are ready in time Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 May 2018
US issues warning about North Korean malware
US government has identified more than 85 networks compromised by two malware families believed to be North Korean in origin Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 May 2018
US jails Canadian resident who helped Russia hack Yahoo emails
A US court has jailed a hacker on charges of computer fraud for hacking Yahoo email accounts on behalf of the Russian government Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 May 2018
Business still not addressing insider threat
Businesses are still not addressing inside threats when it comes to cyber security, leaving themselves wide open to data breaches as a result, according to a security analyst Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 May 2018
UK security spend low despite breaches
The UK is the most breached country in Europe, but IT security spend remains low compared with other countries in the region, a report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
29 May 2018
Tech's role in tackling humanitarian crises
In this week’s Computer Weekly, we learn about how mobile connectivity is a lifeline for Syrian refugees in Turkey, thanks to the mobile network operators in that country. Our latest buyer’s guide examines how modern network security enables digital transformation at a range of companies. And we find out about the technology strategy of logistics firm Hermes from its CIO, and about British Airways’ use of Salesforce to globalise its B2B sales. Read the issue now. Continue Reading
-
News
25 May 2018
Former Macedonian PM convicted in corruption case exposed by illegal government surveillance
Information exposed by leaked recordings that were part an illegal mass surveillance campaign orchestrated under the government of former prime minster Nikola Gruevski have led to his conviction for corruption. He was found guilty of rigging a tender and receiving a luxury Mercedes as a bribe. He may still appeal the ruling Continue Reading
By -
News
25 May 2018
Commitment is the watchword on GDPR D-Day
New rules for protecting European citizens’ personal data are now enforceable by law, and organisations are being advised to focus broadly on commitment rather than narrowly on compliance Continue Reading
By- Warwick Ashford, Senior analyst
-
News
24 May 2018
Grab outlines its approach to cyber security
Singapore-based ride-hailing company prefers detective controls rather than preventive ones to deter cyber threats – an approach it claims is less intrusive and costly to implement Continue Reading
By- Aaron Tan, Informa TechTarget
-
E-Zine
24 May 2018
CW Nordics: Finland delays e-voting plan
Security concerns have re-emerged to further frustrate the Finnish government’s plans to launch a national e-voting system. Also read about a study by the Stockholm School of Economics that looks at the likely impact of AI, machine learning and robotics on people’s lives. And find out why Norway has accelerated plans to scale up its national cyber security infrastructure. Continue Reading
-
News
24 May 2018
EU cyber security agencies pledge to up cooperation
Four European cyber security agencies have agreed to increase collaboration in five key areas Continue Reading
By- Warwick Ashford, Senior analyst
-
News
23 May 2018
Mobile fraud up 680% since 2015, RSA reports
Fake profiles and throw-away devices are transforming social media into a cyber criminal marketplace, a fraud report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
23 May 2018
Application and device security under the spotlight
The security of internet-connected devices and associated applications has become a significant concern, prompting suggestions legislation may be required, while the UK government’s recent Secure by Design review suggests several solutions, including legislative measures Continue Reading
-
News
23 May 2018
Skills shortage a major cyber security risk
Skill shortages remain a major risk to long-term information security capability and business is still struggling to defend against cyber breaches – but it is getting better at dealing with them, an IISP survey shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 May 2018
Legit tools exploited in bank heists
Cyber criminals attacking the finance and other industry sector are continuing to exploit legitimate administration tools to hide their activities, highlighting the need for threat hunting, a report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 May 2018
Security researchers find fourth CPU flaw
Security researchers have reported another flaw in common microprocessor chips related to the Meltdown and Spectre vulnerabilities Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
22 May 2018
GDPR is here – are you ready?
The EU’s new data protection regulation, GDPR, comes into force this week. In this edition of Computer Weekly, we ask if companies are ready for it and look at what happens if you’re not yet compliant. Our latest buyer’s guide examines digital transformation and the role of the CIO. And we find out how technology is changing the traditional sport of cricket. Read the issue now. Continue Reading
-
News
22 May 2018
Finland government examines centralised cyber defence
The Finnish government is attempting to centralise its fight against increasing cyber threats to its infrastructure Continue Reading
By- Gerard O'Dwyer
-
News
21 May 2018
Pen testers find weaknesses in banks’ cyber security
Humans are the biggest weakness in banks’ cyber defences, but there are several others that also need attention, penetration testers have revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 May 2018
UK government promises laws to police 'Wild West Internet'
UK government plans laws to make online activity safer after green paper reveals more needs to be done to protect citizens Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
21 May 2018
APAC organisations could lose $1.75tn from cyber attacks
A study by Frost and Sullivan has found that losses from cyber security incidents could account for 7% of the region’s GDP in 2017 Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
18 May 2018
NCSC calls for greater interaction with UK business
The UK’s cyber security agency has called for greater interaction with business, particularly when it comes to cyber security incidents Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 May 2018
BYOD in UK SMEs linked to security incidents
Bring your own device practices have been identified as a cyber security risk for six in 10 SMEs in research published a week ahead of the GDPR compliance deadline Continue Reading
By- Warwick Ashford, Senior analyst
-
Blog Post
17 May 2018
E-commerce in APAC is thriving, but so is online fraud
E-commerce in Asia-Pacific is booming, with 71% of consumers in the region already shopping online. But so is the risk of fraud, with one in five consumers falling victim, according to new report ... Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
17 May 2018
Report highlights security risk of open source code to business
Increased adoption of open source code is introducing vulnerabilities into commercial software, with many audited codebases containing the Apache Struts flaw that enabled the Equifax breach, a report shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
17 May 2018
GDPR impact on Whois data raising concern
The negative impact of the GDPR on internet domain registration information is raising concern in cyber security circles because the data is key to cyber crime fighting operations Continue Reading
By- Warwick Ashford, Senior analyst
-
News
17 May 2018
European cyber attacks up nearly a third in first quarter 2018
The volume of cyber attacks hitting digital transactions in Europe was up by almost a third in the first quarter of 2018 compared with same period a year ago, a report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 May 2018
US considers UK-style cyber defence model
The US is considering adopting a similar cyber defence model to the UK’s in recognition of the growing threat to all levels of society Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 May 2018
SMEs more worried about GDPR’s threat to reputation than fines
SMEs are more worried about the damage GDPR non compliance will do to their reputations than their wallets Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
15 May 2018
Credential theft a top priority, Rapid 7 report shows
Credential theft is still a top priority for organisations to address in terms of making it more difficult for cyber attackers to gain unauthorised access to their networks, report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 May 2018
Cross-site scripting a top vulnerability, hackers find
Despite the much-publicised advances in cyber attack techniques, a well-known, well-documented and avoidable vulnerability is still the most popular for attackers to exploit – along with others like it that are often overlooked, white hat hackers reveal Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 May 2018
Cage director Rabbani heads for Supreme Court after appeals court rules password demands lawful
Muhammad Rabbani, director of campaigning group Cage, will appeal to the Supreme Court after Court of Appeal rules that police did not act unlawfully by demanding his computer and mobile phone passwords under Section 7 of the Terrorism Act Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
15 May 2018
Enterprise cyber threat remediation ineffective, study shows
Enterprise cyber threat remediation needs to improve in several key areas, according to an analysis of common remediation strategies Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 May 2018
BSI launches kitemark for internet of things devices
The British Standards Institution has launched a new kitemark for IoT devices, designed to improve consumer trust in the technology Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
15 May 2018
Will government IT be ready for Brexit?
In this week’s Computer Weekly, as the UK government struggles to get new IT systems up and running before Brexit, we examine the challenges ahead and the departments with the biggest problems. We look at serverless computing and ask why this emerging cloud technology is so important for IT leaders. And we discuss the latest best practice in mobile strategy for SMEs. Read the issue now. Continue Reading
-
News
15 May 2018
No need to panic about Efail attacks
Initial reports about vulnerabilities in email encryption technologies have urged organisations to disable encryption tools, but some security experts are taking a more balanced approach Continue Reading
By- Warwick Ashford, Senior analyst
-
News
14 May 2018
Technology continues to transform crime, warns NCA
The UK’s National Crime Agency warns that developments in technology will continue to transform the future crime landscape, in its latest report on serious and organised crime Continue Reading
By- Warwick Ashford, Senior analyst
-
News
14 May 2018
IoT and personal devices pose huge security risk to enterprises
After years of speculation about the risk IoT and personal devices pose to enterprise security, research has revealed the threat is “immense” and probably greater than most firms realise Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 May 2018
WannaCry’s EternalBlue exploit still a threat
A year after the global WannaCry attacks, the EternalBlue exploit that was a key enabler for the malware is still a threat to many organisations, and many UK firms have not taken action, security researchers warn Continue Reading
By- Warwick Ashford, Senior analyst
-
Blog Post
11 May 2018
Do ISPs need to do more to protect their users from scams?
Are Britain’s internet service providers (ISPs) coming up short when it comes to helping their less tech-savvy users protect themselves against the scourge of telephone scams and online fraud? In a ... Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 May 2018
Citrix touts digital workspace app in services play
Software supplier Citrix’s cloud-based workspace app is part of its efforts to deliver integrated services that support the modern workplace Continue Reading
-
Opinion
10 May 2018
Hacking the internet of things just got easier – it’s time to look at your security
Are you taking security for internet-connected devices seriously enough? Continue Reading
By- Dan Mosca, PA Consulting
-
E-Zine
10 May 2018
CW Benelux: Rotterdam charts course to become world’s smartest port
The Port of Rotterdam in the Netherlands is using internet of things and artificial intelligence technology from IBM in a bid to become the world’s smartest port. Also read how companies in the Netherlands are only partly ready for the country’s version of the EU’s General Data Protection Regulation (GDPR), and why the European Central Bank thinks cash will remain in use in the Eurozone for a very long time. Continue Reading
-
News
09 May 2018
CNI providers face hefty fines for cyber security failings
UK providers of critical national infrastructure face hefty fines for cyber security failings from 10 May 2018 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 May 2018
Equifax breach lessons not learned
Businesses are still downloading vulnerable versions of the software that was at the heart of the Equifax data breach and failing to update to safe versions, a security firm has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 May 2018
Breach disclosure time still high, report shows
Companies are getting faster at disclosing breaches, but the average is still too high in the light of the GDPR and other breach disclosure regulations, a report shows Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
08 May 2018
Security Think Tank: Five tips for killing the campers on your network
Why is reducing cyber attacker dwell time important and how should this be tackled? Continue Reading
By- Adrian Davis, (ISC)²
-
News
08 May 2018
Nigerian cyber attackers up their game
Nigerian cyber attackers have modernised their approach to cyber crime, security researchers warn Continue Reading
By- Warwick Ashford, Senior analyst
-
News
08 May 2018
Financial sector cyber-related laws are a bellwether, says Deloitte
As the regulatory landscape becomes more complex, organisations should look to the financial sector to see what else is coming, as well as focus on three key areas of GDPR compliance, according to Deloitte Continue Reading
By- Warwick Ashford, Senior analyst
-
News
08 May 2018
Majority of security professionals favour shorter disclosure deadline
Google’s Project Zero unit’s 90-day deadline for software suppliers to disclose vulnerabilities has always been controversial, but a survey reveals that most security professionals feel even that is too long Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
04 May 2018
Security Think Tank: More time equals more opportunity for cyber attackers
Why is reducing cyber attacker dwell time important and how should this be tackled? Continue Reading
By -
News
04 May 2018
Security pros must avoid hype, demonstrate value, says RBS CISO
Security professionals must avoid over-hyping cyber threats, and penetration testers need to reinvent themselves to demonstrate value to businesses to remain relevant, says RBS CISO Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 May 2018
Twitter password security bug underlines need for industry change
Twitter has revealed that a bug in its systems resulted in some passwords being stored in a log in clear text, underlining the need for alternative authentication methods, say industry commentators Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 May 2018
City Police use Lego simulation to teach businesses cyber security
City of London Police are offering to train business leaders and IT security in cyber security using a Lego simulation that is surprisingly close to real life Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
03 May 2018
Redscan warns of GDPR phishing scams
Cyber criminals are using fake GDPR-related privacy notices to trick recipients into disclosing personal data and spread malware, a security firm warns Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
03 May 2018
Security Think Tank: Prevention and detection are key to limit dwell time
Why is reducing cyber attacker dwell time important and how should this be tackled? Continue Reading
By- Emma Bickerstaffe, Information Security Forum (ISF)
-
Opinion
02 May 2018
Security Think Tank: Containment should be top priority in cyber breaches
Why is reducing cyber attacker dwell time important, and how should this be tackled? Continue Reading
-
News
02 May 2018
ARM aims to boost physical security of IoT
Chipmaker ARM announces microprocessor aimed at improving the physical security capabilities of devices making up the internet of things Continue Reading
By- Warwick Ashford, Senior analyst
-
News
02 May 2018
Critical infrastructure firms urged to patch Schneider Electric flaws
Critical infrastructure suppliers and manufacturing firms are being urged to ensure that their systems are patched up to date, after researchers discover Schneider Electric remote code execution vulnerability Continue Reading
By- Warwick Ashford, Senior analyst
-
News
02 May 2018
Ransomware still a threat to business, F-Secure warns
Ransomware attacks tapered off towards the end of 2017 after an explosion in such attacks earlier in the year, but ransomware remains a threat to big business, a report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
02 May 2018
Security industry welcomes City of London Police cyber initiative
The security industry has welcomed plans to fight cyber crime in the heart of London using a community-based approach, but says more investment in cyber security skills is required Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 May 2018
Google Chrome helps clean up certificate authority industry
The security industry has welcomed the introduction of measures by the Google Chrome browser aimed at achieving certificate transparency Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
01 May 2018
Security Think Tank: Reducing cyber attacker dwell time is critical
Why is reducing cyber attacker dwell time important, and how should it be tackled? Continue Reading
By- Simon Persin, Turnkey Consulting
-
News
01 May 2018
Password practices still poor despite increased threats
Despite growing cyber threats and heightened global awareness of hacking and data breaches, password behaviours remain poor and UK users are in denial, a study has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 May 2018
UK critical services need to up cyber defences to avoid fines
UK critical infrastructure providers could be liable for fines of millions of pounds if they do not improve their cyber defences and resilience of their IT infrastructure, a study reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
30 Apr 2018
Security Think Tank: Reducing dwell has never been more important
Why is reducing cyber attacker dwell time important, and how should this be tackled? Continue Reading
By -
News
30 Apr 2018
Getting cyber security innovation to market is key, says NCSC
Getting cyber security innovation to market is an important area of focus, according to the National Cyber Security Centre, which runs a cyber accelerator programme and recently stated a Dragons Den style security innovation pitch at the 2018 CyberUK conference Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Apr 2018
Security industry welcomes NHS move to Windows 10
Representatives of the security industry have welcomed the announcement that the NHS will be migrating to Windows 10 as part of a multi-million pound deal with Microsoft, but warn that the move will not be without its challenges Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
27 Apr 2018
Security Think Tank: GDPR compliance one good reason to cut attacker dwell time
Why is reducing cyber attacker dwell time important, and how should this be tackled? Continue Reading
By- Maxine Holt, Omdia