IT security



Preventing identity theft in a data breach
In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
News : IT security
-
December 31, 2020
31
Dec'20
Top 10 networking stories of 2020
Here are Computer Weekly’s top 10 networking stories of 2020
-
December 31, 2020
31
Dec'20
Top 10 technology and ethics stories of 2020
Here are Computer Weekly’s top 10 technology and ethics stories of 2020
-
December 31, 2020
31
Dec'20
Top 10 investigations and national security stories of 2020
Here are Computer Weekly’s top 10 investigations and national security stories of 2020
-
December 30, 2020
30
Dec'20
Top 10 ASEAN IT stories of 2020
Here are Computer Weekly’s top 10 ASEAN IT stories of 2020
In Depth : IT security
-
How to monitor remote workers humanely
Monitoring employees who work remotely has taken on a whole extra dimension in the Covid-19 pandemic year of 2020. Financial services firms are among those which suggest ways of doing it humanely and legally Continue Reading
-
Editor's picks: Top cybersecurity articles of 2020
As the year no one could have predicted comes to a close, SearchSecurity takes a 30,000-foot view of the cybersecurity trends and challenges that defined the last 12 months. Continue Reading
-
Security Long Reads: Cyber insiders reveal what’s to come in 2021
In this long read, we gather together the thoughts of cyber security insiders from across the industry to get their take on what will happen in 2021 Continue Reading
Blog Posts : IT security
-
NPCC brings the Christmas present of partnership to UK Cyber Policing
The combination of the Cyber Resilience Centres, Police Cyber Alarm and The Cyber Helpline provides a major advance towards joining up the UK approach to policing the on-line world, Continue Reading
-
My Question Answered: Neteventing (not not eventing) In Cyberspace...
My fine friends at Netevents have continued to battle the global lockdown elements (and we now know in England that the words "lockdown" and "tier" mean the same thing - who would have guessed?) ... Continue Reading
-
Why Security As A Service Makes Common Sense...
Let us go back in time to 2019 – a time when we could actually attend IT events in a physical way. There I am, on the top level of a stand, having a coffee and scanning the hall, seeing “me too” ... Continue Reading
Opinion : IT security
-
How to manage non-human identities
Identity management has traditionally focused on human identities, but non-human identities are proliferating and must not be overlooked. Businesses can reduce risk by managing both types of identity in the same way using a services-based approach Continue Reading
-
It’s time to accept that disinformation is a cyber security issue
Tackling the manipulation of truth and facts is no easy task, and it’s time for the cyber security sector to take up the challenge Continue Reading
-
Negotiating the complexities of international transfers of personal data
How to navigate international data transfers, standard contractual clauses and the impact of Brexit on data protection Continue Reading
Videos : IT security
-
How Zoom is keeping pace with demand for conferencing tools
Magnus Falk, CIO advisor at Zoom, offers insights on how the company is scaling up its resources to meet the growing usage of its service
-
CW500 Interview: Jonathan Moreira, CTO of PrimaryBid.com
In this CW500 video, Jonathan Moreira, CTO of PrimaryBid.com, gives a fintech startup’s perspective on the security challenges small businesses can face when adopting new technologies.
-
CW500 Interview: Paddy Francis, CTO, Airbus CyberSecurity
In this CW500 video, Paddy Francis, CTO, Airbus CyberSecurity shares his advice and experiences of keeping tabs on security when trying to introduce emerging digital technologies into large organisations.