Network security management



Preventing identity theft in a data breach
In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
News : Network security management
-
December 31, 2020
31
Dec'20
Top 10 networking stories of 2020
Here are Computer Weekly’s top 10 networking stories of 2020
-
December 24, 2020
24
Dec'20
Top 10 cyber crime stories of 2020
Here are Computer Weekly’s top 10 cyber crime stories of 2020
-
December 23, 2020
23
Dec'20
Top 10 cyber security stories of 2020
Here are Computer Weekly’s 10 top cyber security stories of 2020
-
December 18, 2020
18
Dec'20
SolarWinds cyber attack is ‘grave risk’ to global security
More victims of the SolarWinds Orion Sunburst cyber attack are being identified as the massive scale of the Russia-linked cyber espionage campaign becomes more clear
In Depth : Network security management
-
Security Long Reads: Cyber insiders reveal what’s to come in 2021
In this long read, we gather together the thoughts of cyber security insiders from across the industry to get their take on what will happen in 2021 Continue Reading
-
Post-pandemic approaches to IAM for cloud security
Cloud technology may have saved businesses from catastrophe during the pandemic, but it has also introduced additional challenges around identity and access management. Here’s why IAM policies are crucial in the new normal Continue Reading
-
This Christmas, Covid-19 heightens retail security risks for everyone
Do you think it’s only retailers and consumers who need to consider cyber security when shopping online during the holidays? You’re dead wrong. This year, the Covid-19 pandemic and the shift to remote working has thrown a spanner in the works Continue Reading
Blog Posts : Network security management
-
Huawei furore leads inevitably to a global polarisation of the tech sector
The sacking of defence minister Gavin Williamson is another indication of how technology is influencing politics, and vice versa. While his crime was to leak details from a national security ... Continue Reading
-
Cybersecurity needs both psychologists and field marshals
Many cybersecurity professionals like military analogies. Indeed, some security pros are ex-military. But after a recent security exercise involving IBM’s new lorry-mounted SOC (security operations ... Continue Reading
-
WannaCry? Not really. A report from the 11th Eskenzi PR IT Analyst and CISO Forum
This year was the 10th anniversary of the annual Eskenzi PR IT Analyst and CISO forum. The latest event took place in the immediate aftermath of the WannaCry ransomware outbreak. Proceedings were ... Continue Reading
Opinion : Network security management
-
How to manage non-human identities
Identity management has traditionally focused on human identities, but non-human identities are proliferating and must not be overlooked. Businesses can reduce risk by managing both types of identity in the same way using a services-based approach Continue Reading
-
Security Think Tank: Integration between SIEM/SOAR is critical
SIEM and SOAR share much in common but there are key differences between the two that may influence the best fit for your organisation. What should security pros consider when making a choice? Continue Reading
-
Security Think Tank: SOAR to the next level with automation
SIEM and SOAR have much in common, but there are key differences between the two that may influence the best fit for your organisation. What should security pros consider when making a choice? Continue Reading
Videos : Network security management
-
Lauri Love: how reformed hackers halted the WannaCry virus
Lauri Love presents a compelling story of the WannaCry malware that nearly brought down the NHS, and the behind the scenes work of former hackers, and security researchers that helped to prevent lives being lost. Love is facing extradition to the US after allegedly taking part in a hacking protest over the death of internet pioneer Aaron Swartz, who faced jail for using a hidden computer to downloading academic journals at MIT.
-
2017 IT Priority Study: Trends in the EMEA security market
Find out what security initiatives IT decision makers are planning in 2017
-
Security across your enterprise mobile devices - what you need to know
Computer Weekly talks to experts at BlackBerry about the challenges of securing mobile phones and tablets as their use in the enterprise grows