IT security
-
News
25 Oct 2024
Dutch critical infrastructure at risk despite high leadership confidence
Stark paradox in Dutch cyber security landscape has business leaders expressing high confidence in their IT infrastructure as cyber attacks rise Continue Reading
-
News
11 Jul 2024
Dutch research firm TNO pictures the SOC of the future
In only a few years, security operations centres will have a different design and layout, and far fewer will remain Continue Reading
-
Definition
27 Sep 2024
What is a cloud access security broker (CASB)?
A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Dan Sullivan
-
News
27 Sep 2024
How UEM Sunrise is driving transformation with Salesforce and AI
Malaysian property developer UEM Sunrise is leveraging Salesforce and AI to boost sales and enhance customer experience while prioritising data sovereignty and a diversified cloud strategy Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
27 Sep 2024
Closing the curtain on cyber security theatre
Leaders must redefine expectations, rethink responsibility and eliminate unproductive practices to move towards real security, says Gartner vice-president analyst Richard Addiscott Continue Reading
By- Richard Addiscott
-
News
26 Sep 2024
Racist Network Rail Wi-Fi hack was work of malicious insider
Police have revealed that this week’s racist cyber attack on public Wi-Fi networks at stations across the UK appears to have been the work of a malicious insider, after arresting an employee of one of the service providers Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Sep 2024
Islamophobic cyber attack downs Wi-Fi at UK transport hubs
An apparent hacktivist attack disrupted public-facing Wi-Fi networks at UK rail stations to display Islamophobic content Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Sep 2024
CrowdStrike apologises to US government for global mega-outage
CrowdStrike executive Adam Meyers appears before a US government committee to explain the series of errors that led directly to one of the biggest IT outages in history Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Sep 2024
Splunk and Cisco integration moving apace
Splunk is rapidly integrating with Cisco’s technology to enable seamless transitions between their platforms while delivering advanced threat detection capabilities Continue Reading
By- Aaron Tan, TechTarget
-
News
24 Sep 2024
Money transfer firm MoneyGram rushes to contain cyber attack
Money transfer specialist MoneyGram services remain down several days after a network outage developed into a full-blown cyber security incident Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
24 Sep 2024
What is a business continuity plan (BCP)?
A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue operating during an unplanned event. Continue Reading
By- Cameron Hashemi-Pour, Site Editor
- Vicki-Lynn Brunskill
-
News
24 Sep 2024
Unique malware sample volumes seen surging
BlackBerry’s latest ‘Global threat intelligence’ report details a surge in unique malware samples as threat actors ramp up the pace of targeted attacks Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
24 Sep 2024
How to respond when your cyber company becomes the story
The Computer Weekly Security Think Tank panel considers incident response in the wake of the July CrowdStrike incident, sharing their views on what CrowdStrike got wrong, what it did right, and next steps Continue Reading
By- Stephen McDermid
-
News
23 Sep 2024
Microsoft shares progress on Secure Future Initiative
Microsoft has published a progress report on its Secure Future Initiative, launched last year in the wake of multiple security incidents, and made a series of commitments to improve its internal cyber culture Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
23 Sep 2024
Powering Britain’s economy – datacentres gain in status
In this week’s Computer Weekly, the UK government has finally classified datacentres as critical national infrastructure – we ask, what took it so long? We assess the impact of the EU’s new energy efficiency rules on datacentre operators. And we discuss the power of information and diversity with the chief data officer at Legal & General. Read the issue now. Continue Reading
-
Opinion
23 Sep 2024
Security Think Tank: Win back lost trust by working smarter
The Computer Weekly Security Think Tank panel considers incident response in the wake of the July CrowdStrike incident, sharing their views on what CrowdStrike got wrong, what it did right, and next steps Continue Reading
By- Vladimir Jirasek, Foresight Cyber
-
News
23 Sep 2024
Home Office eVisa scheme is ‘broken’, says Open Rights Group
Digital rights campaigners say the Home Office’s plan to make its new electronic Visa scheme a real-time online-only process is part and parcel of the 'hostile environment' around immigration status Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
23 Sep 2024
Gartner: Mitigating security threats in AI agents
Agents represent a step-change in the use of artificial intelligence in the enterprise - as attendees at Salesforce's annual conference saw first hand this month - but do not come without their risks Continue Reading
By- Avivah Litan, Gartner
-
News
23 Sep 2024
UK, US and Canada to collaborate on AI and cyber security
International collaboration agreement will see the governments of Canada, the UK and the US work together to research, evaluate and test new defence technologies Continue Reading
By -
News
23 Sep 2024
Medtech startup brings Oracle AI to bear on cancer drug research
Learn how Oracle Cloud Infrastructure and its cutting-edge AI features are bringing new benefits to cancer care by helping doctors identify better treatment options Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
20 Sep 2024
CrowdStrike incident shows we need to rethink cyber
The Computer Weekly Security Think Tank panel considers incident response in the wake of the July CrowdStrike incident, sharing their views on what CrowdStrike got wrong, what it did right, and next steps Continue Reading
-
News
19 Sep 2024
HSBC tests post-quantum VPN tunnel for digital ledgers
Encryption required for post-quantum cryptography will have a material impact on the performance of distributed ledgers Continue Reading
By- Cliff Saran, Managing Editor
-
News
18 Sep 2024
NCSC exposes Chinese company running malicious Mirai botnet
The NCSC and its Five Eyes allies have published details of the activities of a China-based cyber security company that is operating a Mirai IoT botnet in the service of government-backed intrusions Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Sep 2024
Europol provides detail on Ghost encrypted comms platform takedown
Law enforcement bodies from across the world have revealed how they collaborated to bring down encrypted network Ghost and the new ways of working that have been established with Europol at the centre Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
18 Sep 2024
Global AI regulation is heating up: can the UK afford to remain silent?
Why UK lawmakers should be pro-active about introducing AI regulation Continue Reading
By- Peter van der Putten, Director, AI Lab, Pegasystems
-
Definition
18 Sep 2024
What is email spam and how to fight it?
Email spam, also known as 'junk email,' refers to unsolicited email messages, usually sent in bulk to a large list of recipients. Humans send spam, but more often, botnets are responsible for sending it. Continue Reading
-
News
18 Sep 2024
Police make arrests after hacking Ghost encrypted comms app
An international police operation has penetrated an end-to-end encrypted communications service allegedly used by organised criminals in Australia, Ireland, Sweden and Italy Continue Reading
By- Bill Goodwin, Computer Weekly
-
Definition
17 Sep 2024
What is passive keyless entry (PKE)?
Passive keyless entry (PKE) is an automotive security system that operates automatically when the user is in proximity to the vehicle, unlocking the door on approach or when the door handle is pulled, and locking it when the user walks away or touches the car on exit. Continue Reading
-
Feature
17 Sep 2024
Misinformation runs deeper than social media
While social media may contribute to the increasing rapid spread and reach of misinformation, the root causes of the problem go much deeper than the role of a particular company or way of using technology to communicate Continue Reading
-
News
17 Sep 2024
Salesforce’s agentic AI platform to transform business automation
CRM giant’s Agentforce lets organisations build and deploy autonomous agents to automate business processes through advanced learning and data integration Continue Reading
By- Aaron Tan, TechTarget
-
News
17 Sep 2024
First CyberBoost Catalyse startup cohort named
The first group of companies named to a cyber incubator programme run by Plexal and the National University of Singapore includes two growing UK businesses Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
16 Sep 2024
Will autonomous weapons make humans passive participants in war?
Experts warn the emergence and adoption of AI-powered military systems may eventually push battlefield decision-making beyond the limits of human cognition Continue Reading
By- Kyle Hiebert, Computer Weekly
-
News
16 Sep 2024
Crest secures FCDO funding to help overseas countries increase their cyber-readiness
Non-profit Crest is launching an initiative to help overseas, private-sector firms get better prepared for cyber threats Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
Feature
16 Sep 2024
Automation driving SD-WAN optimisation
AIOps is being deployed to help manage highly distributed enterprise networking configurations Continue Reading
By- Cliff Saran, Managing Editor
-
News
15 Sep 2024
UK unites nations to discuss closing global cyber skills gap
The UK government invites representatives from around the world to a summit to discuss how to address global IT security skills gap Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
13 Sep 2024
UN-backed cyber security report highlights global shortfalls in preparedness
In the three years since the UN-backed cyber security report was published, countries have been making a concerted effort to protect themselves from cyber threats, but there’s more to do Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
13 Sep 2024
Cyber workforce must almost double to meet global talent need
Research from ISC2 finds global cyber workforce needs additional 4.8 million people to fully secure businesses Continue Reading
By- Clare McDonald, Business Editor
-
Feature
12 Sep 2024
Kubernetes disaster recovery: Five key questions
We look at disaster recovery for Kubernetes environments, the key challenges to deployment of K8s DR, the risks we aim to mitigate, how to build a plan and the key infrastructure requirements Continue Reading
-
News
12 Sep 2024
Teenager arrested in TfL cyber attack investigation
New security measures following the cyber attack, which took down some of TfL’s services, have led to delays in contactless roll-out Continue Reading
By- Cliff Saran, Managing Editor
-
News
12 Sep 2024
Lord introduces bill to regulate public sector AI and automation
A private members’ bill seeking to regulate the use of artificial intelligence (AI) and other automated technologies throughout the public sector has been brought to Parliament Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
12 Sep 2024
Data sharing for immigration raids ferments hostility to migrants
Data sharing between public and private bodies for the purposes of carrying out immigration raids helps to prop up the UK’s hostile environment by instilling an atmosphere of fear and deterring migrants from accessing public services Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
12 Sep 2024
European enterprise networking lacks hybrid maturity
Deploying a complex hybrid and multicloud IT architecture has an impact on enterprise network management Continue Reading
By- Cliff Saran, Managing Editor
-
News
11 Sep 2024
Datacentres granted critical national infrastructure status
The global IT outage caused by CrowdStrike has shown why keeping datacentres secure and safe is critical to the UK Continue Reading
By- Cliff Saran, Managing Editor
-
News
11 Sep 2024
September Patch Tuesday: Update before 1 October
Four critical remote code execution bugs in Windows and three critical elevated privileges vulnerabilities will keep admins busy Continue Reading
By- Cliff Saran, Managing Editor
-
News
11 Sep 2024
How Sonar is elevating code quality in the age of AI
Sonar’s code quality platform helps developers maintain secure, high-quality code amid the rise of artificial intelligence-based coding assistants, now expanding into the Asian market Continue Reading
By- Aaron Tan, TechTarget
-
News
11 Sep 2024
ICO and NCA sign MoU to provide joint support for cyber crime victims
UK data protection watchdog joins forces with law enforcement agency to provide more support for organisations that fall victim to cyber crime and ransomware attacks Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
10 Sep 2024
JFrog and GitHub unveil open source security integrations
Secure software specialist JFrog is working with code development service GitHub to integrate the onboard capabilities of its Software Supply Chain Platform service into GitHub’s platform Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Sep 2024
ANZ CIOs to prioritise cyber security investments in 2025
Cyber security remains high on the agenda for ANZ CIOs, followed by data analytics, cloud and generative AI Continue Reading
By- Aaron Tan, TechTarget
-
E-Zine
10 Sep 2024
The flight to data success
In this week’s Computer Weekly, we look at how Manchester Airport Group has set course to become the world’s most intelligent airport through its data-led approach. After much hype about artificial intelligence, we look at the failings of AI initiatives as the tech hits roadblocks, as well as explore what can be done to improve success. And we take a peek at what support networks are available to those new in the CISO role. Read the issue now. Continue Reading
- 09 Sep 2024
-
News
09 Sep 2024
Multiple Veeam vulns spark concern among defenders
Veeam users are urged to patch a series of vulnerabilities in the firm’s Backup & Replication product to get out ahead of potential exploitation by ransomware gangs Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
09 Sep 2024
Developing nations need the UN cyber crime treaty to pass
The UN cyber crime treaty is flawed but represents a move in the right direction for developing nations seeking greater digital sovereignty Continue Reading
By- Kyle Hiebert, Computer Weekly
-
News
06 Sep 2024
Longstanding Darktrace CEO Poppy Gustafsson to step down
Darktrace CEO Poppy Gustafsson is to leave the AI cyber company she helped build with Mike Lynch after more than a decade, following its acquisition by a private equity firm Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Sep 2024
Tencent Cloud debuts palm scanning tech in global markets
Tencent Cloud launches palm verification technology for global markets, offering AI-driven identity authentication to support contactless payments and security access management Continue Reading
By- Aaron Tan, TechTarget
-
Definition
05 Sep 2024
What is shared responsibility model?
A shared responsibility model is a cloud security framework that dictates the security obligations of a cloud computing provider and its users to ensure accountability. Continue Reading
By- Kathleen Casey, Site Editor
- Stephen J. Bigelow, Senior Technology Editor
-
News
05 Sep 2024
NCSC and allies call out Russia's Unit 29155 over cyber warfare
The NCSC and counterpart agencies from the US and other countries have exposed a long-running campaign of Russian cyber espionage and warfare conducted by GRU Unit 29155 Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
05 Sep 2024
What is an ESG score?
An ESG score is a way to assign a quantitative metric, such as a numerical score or letter rating, to the environmental, social and governance (ESG) efforts or an organization. Continue Reading
By- Cameron Hashemi-Pour, Site Editor
- Sean Michael Kerner
-
News
05 Sep 2024
Fog ransomware crew evolving into wide-ranging threat
The emergent Fog ransomware gang appears to be changing up its victimology in search of more cash-rich victims Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Sep 2024
Ongoing TfL cyber attack takes out Dial-a-Ride service
The Dial-a-Ride assisted transit service for disabled people had to temporarily suspend part of its operations as Transport for London deals with an ongoing cyber attack, but the service has now been recovered Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
05 Sep 2024
Resetting our relationship with data
We need to have an open and honest debate about data, data collection and, just as important, the timely disposal of the information when it is no longer needed.While there are many good reasons ... Continue Reading
By- Cliff Saran, Managing Editor
-
News
05 Sep 2024
Canadian arrested by France after cooperating with US on Sky ECC cryptophone investigation
Thomas Herdman, who faces charges in France over his involvement in distributing Sky ECC encrypted phones, was arrested by French police despite agreeing to cooperate with US law enforcement Continue Reading
By- Bill Goodwin & Morgan Ayre
-
News
04 Sep 2024
PyPI loophole puts thousands of packages at risk of compromise
Thousands of PyPI packages are at risk of an attack technique dubbed Revival Hijack, which exploits a loophole in the platform’s package naming feature Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Sep 2024
Retailers question using live facial recognition for shoplifting
Retailers praise benefits of retrospective over live facial recognition in dealing with shoplifting, but stress there are ongoing concerns around the ethical, legal and safety implications of using the technology in stores Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
04 Sep 2024
Fraud and scam complaints hit highest ever level in UK
The Financial Ombudsman Service says it recorded almost 9,000 complaints about fraud and scams from April to June, the most ever recorded Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
04 Sep 2024
Cyber firms need to centre their own resilience
The Computer Weekly Security Think Tank panel considers incident response in the wake of the July CrowdStrike incident, sharing their views on what CrowdStrike got wrong, what it did right, and next steps Continue Reading
By- Niel Harper
-
News
03 Sep 2024
Chief data officers highlight data integrity woes
In a report from the company co-founded by web inventor Tim Berners-Lee, CDOs discuss the challenges of artificial intelligence and using increasing amounts of personal data Continue Reading
By- Cliff Saran, Managing Editor
-
News
03 Sep 2024
Transport for London hit by cyber attack
London’s transport network provider TfL experiences cyber security incident, but reassures customers there is no impact on services Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
02 Sep 2024
UK and Ukraine digital trade deal comes into force
The UK eases access to the deep tech startup community in Ukraine through digital-only agreement Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
30 Aug 2024
Siegwerk strengthens global manufacturing operations with managed SD-WAN
Global manufacturer enhances operational security and digitisation with managed SD-WAN, managed security and professional services Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
30 Aug 2024
MEF association claims SASE milestone
Leading technology provider achieves first milestone in secure access service edge programme, with SASE certification now generally available to trade association’s technology and service provider members Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
30 Aug 2024
Norwegian Refugee Council leverages Okta for Good cyber scheme
Pietro Galli, CIO of the Norwegian Refugee Council, reveals how the globally distributed NGO has been taking advantage of the Okta for Good CSR programme to improve its own cyber security and data protection practice, and elevate good practice in the third sector Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
29 Aug 2024
What is ESG reporting?
ESG reporting is a type of corporate disclosure that details the environmental, social and governance (ESG) promises, efforts and progress of an organization. Continue Reading
By- Cameron Hashemi-Pour, Site Editor
- Sean Michael Kerner
-
News
29 Aug 2024
Check Point secured for annual Security Serious cyber awards
The annual Security Serious Unsung Heroes awards, recognising the champions of the UK cyber security industry, are back once again, with a new headline sponsor joining the party Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Aug 2024
Telegram CEO Pavel Durov under formal investigation, released on bail
European Commission confirms it has powers to place Telegram under ‘direct supervision’ if it meets the threshold for regulation under the Digital Services Act Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
29 Aug 2024
Iranian APT caught acting as access broker for ransomware crews
Members of Iran-backed Pioneer Kitten APT appear to be trying to supplement their pay packets by helping Russian-speaking ransomware gangs to access their victims in exchange for a cut of the profits Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
29 Aug 2024
Cyber law reform should be top of Labour's policy list
With Labour returning to 10 Downing Street after 14 years, the Computer Weekly Security Think Tank panellists share advice and wish lists for the new government Continue Reading
By- Craig Watt
-
News
29 Aug 2024
Study highlights secure software supply chain best practices
Security trends report from open source firm shows the approaches IT leaders take to secure their software supply chain Continue Reading
By- Cliff Saran, Managing Editor
-
News
29 Aug 2024
US offers $2.5m bounty for on-the-run malware dev
US State Department puts a $2.5m bounty on the head of Angler exploit kit developer and ransomware crew member Volodymyr Kadariya as part of a major developing case Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Aug 2024
Met Police deploy LFR in Lewisham without community input
The Met’s latest live facial recognition deployment in Catford has raised concerns over the lack of community engagement around the police force’s use of the controversial technology Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
28 Aug 2024
A coherent Labour cyber strategy depends on consistency
With Labour returning to 10 Downing Street after 14 years, the Computer Weekly Security Think Tank panellists share advice and wish lists for the new government Continue Reading
By- Aled Lloyd Owen
-
News
28 Aug 2024
Iranian APT Peach Sandstorm teases new Tickler malware
Peach Sandstorm, an Iranian state threat actor, has developed a dangerous new malware strain that forms a key element of a rapidly evolving attack sequence Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Aug 2024
Global cyber spend to rise 15% in 2025, pushed along by AI
Security spending will increase at pace in 2025, with artificial intelligence, cloud and consultancy services all pushing outlay to new highs, according to Gartner Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Aug 2024
Cambridge Enterprise saves big with Keepit SaaS backup
University innovation body avoids hardware spend and saves management time as it switches from tape to cloud-to-cloud backup, instant recovery and decades-long retention from Keepit Continue Reading
By- Antony Adshead, Storage Editor
-
News
28 Aug 2024
Telegram founder Pavel Durov questioned over cyber crime charges
Billionaire founder of Telegram accused of failing to co-operate with law enforcement requests for lawful interception Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
28 Aug 2024
How Kaspersky is driving growth in APAC
Kaspersky is leveraging its threat intelligence capabilities and local market knowledge to navigate geopolitical tensions and expand its footprint across the Asia-Pacific region Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
27 Aug 2024
Extending zero-trust principles to endpoints
By combining zero-trust principles with other security strategies and continuously monitoring and improving their security posture, organisations can effectively mitigate risks and protect their resources, says Gartner's Nikul Patel Continue Reading
By- Nikul Patel
-
Opinion
27 Aug 2024
The US courts may have thrown a wrench into cyber regulation
A recent decision by the US Supreme Court to overrule the longstanding Chevron Deference has serious implications for global cyber security regulation Continue Reading
By- Brian Arnold
-
Opinion
27 Aug 2024
Public education on security must be a top priority for Labour
With Labour returning to 10 Downing Street after 14 years, the Computer Weekly Security Think Tank panellists share advice and wish lists for the new government Continue Reading
By -
News
27 Aug 2024
Palo Alto Networks bets on ‘precision AI’
Palo Alto Networks’ regional leader, Steven Scheurmann, explains how machine learning, neural networks and generative AI can help to prevent breaches in what it calls ‘precision AI’ Continue Reading
By- Aaron Tan, TechTarget
-
News
22 Aug 2024
New Qilin tactics a ‘bonus multiplier’ for ransomware chaos
Sophos X-Ops caught the Qilin ransomware gang stealing credentials stored by victims' employees in Google Chrome, heralding further cyber attacks and breaches down the line. Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Aug 2024
Pakistani national arrested over Southport ‘cyber terrorism’
Authorities in Pakistan have arrested a man on suspicion of cyber terrorism over his role in the spread of online misinformation in the wake of the Southport knife attack Continue Reading
By- Alex Scroxton, Security Editor
-
Video
21 Aug 2024
An explanation of cybersecurity
Cybersecurity protects internet-connected systems from attacks, covering hardware, software and data. Continue Reading
By- Tommy Everson, Assistant Editor
-
Podcast
21 Aug 2024
Podcast: Ransomware and what data storage can do about it
We talk to NetApp’s Chris McKean about ransomware attacks and the role of data storage in protecting against them Continue Reading
By- Antony Adshead, Storage Editor
-
Opinion
20 Aug 2024
From manifesto to material: What No. 10 needs to make reality
With Labour returning to 10 Downing Street after 14 years, the Computer Weekly Security Think Tank panellists share advice and wish lists for the new government Continue Reading
By- Paul Lewis, Nominet
-
News
20 Aug 2024
ICO launches privacy notice tool for SMEs
ICO tool designed to make it easier for small businesses and sole traders operating online to create bespoke data privacy notices for compliance purposes Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Aug 2024
Phishing links becoming bigger threat than email attachments
Phishing techniques are evolving away from malicious email attachments, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
20 Aug 2024
How to avoid joining the Dead Java Code Society
Unused or dead Java code is bogging down software engineers and developers, causing weird dependencies and security risks Continue Reading
-
20 Aug 2024
Mitigating the risks of modern application development
Organisations need to have visibility over their software supply chain, secure and monitor interfaces to legacy systems and adopt zero trust to mitigate the risks of modern application development. Continue Reading
-
News
20 Aug 2024
Helsinki braced for elevated cyber attacks
The City of Helsinki is increasing its collaboration with cyber security and crime investigators following a major attack on its systems Continue Reading
By- Gerard O'Dwyer
-
Definition
19 Aug 2024
What is ICD-9-CM (International Classification of Diseases, Ninth Revision, Clinical Modification)?
The International Classification of Diseases, Ninth Revision, Clinical Modification, also known simply as ICD-9-CM, is the U.S. healthcare system's adaptation of the World Health Organization's (WHO) ICD-9 standard list of six-character alphanumeric codes to describe medical diagnoses and procedures and to track diseases and mortality. Continue Reading
By- Rahul Awati
- Don Fluckinger, Senior News Writer
-
News
19 Aug 2024
Challenges of deploying PQC globally
Quantum computers will eventually be powerful and reliable enough to crack strong encryption. PQC is the answer, but it could take years to deploy Continue Reading
By- Cliff Saran, Managing Editor
-
News
19 Aug 2024
Popular Microsoft apps for Mac at risk of code injection attacks
Researchers at Cisco Talos turn up evidence suggesting that Microsoft apps running on the Apple macOS operating system are not as secure as they seem Continue Reading
By- Alex Scroxton, Security Editor