Email Alerts
-
Cyber security will change ideas of the nation state, says Stonesoft
The lack of cyber security is a major threat to the civilised world and will change how people see the nation state, says security firm Stonesoft News | 15 Nov 2012
-
Operation High Roller fraud puts US finance companies on red alert
Fraud ring Operation High Roller has spread from Europe to countries including the US in recent months, says McAfee’s latest threat report News | 14 Nov 2012
-
The Global State of Information Security Survey 2013: Key Findings
This global study examines the state of cyber-security and the impact of cyber crime and offers advice to businesses on reducing the risks. News | 13 Nov 2012
-
Mobile Security Strategies
This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise. News | 13 Nov 2012
-
IT security budgets mismatched to hacker targets, study shows
IT security budgets are not being used to provide defence technologies in some areas most likely to be targeted by hackers, a study shows News | 30 Oct 2012
-
XSS attacks remain top threat to web applications
Cross-site scripting (XSS) attacks remain the top threat to web applications, databases and websites, a study from FireHost reveals News | 22 Oct 2012
-
RSA Europe: New intelligence-led security model needed
A new model of security makes sense as nation states, criminals and hacktivists continue to take obscene advantage of the way things are, says Art Coviello, executive chairman of RSA News | 09 Oct 2012
-
MDM, security vendors scramble to address BYOD security issues
Organisations are looking beyond NAC and MDM to resolve BYOD security issues; MDM, security and hybrid vendors are responding with new products. News | 18 May 2012
-
Investigation reveals serious cloud computing data security flaws
Context Information Security found that data stored by a cloud customer could be accessed by the next customer to spin up a VM on the same disk. News | 24 Apr 2012
-
Report: Corporate mobile device policy must align security, job roles
In the debate between BYOD and company-issued devices, a new report compares mobile platforms and recommends devices based on users’ job roles. News | 13 Apr 2012
- See More: News on Application security and coding requirements
-
Royal Holloway 2012: Risks of multi-tenancy cloud computing
In his Royal Holloway 2012 thesis, Jacobo Ros examines the risks of multi-tenancy cloud computing. Feature
-
Royal Holloway 2012: PCI compliance, cloud computing are a costly pair
It is possible to achieve PCI DSS compliance in a cloud environment, but it may not be cost-effective, as explained in this Royal Holloway article. Feature
-
Opinion: Firms can’t or won’t address social networking security risks
It's a common refrain: Even companies that are aware of social networking security risks don't do anything about them. Opinion
-
Hypervisor security: New techniques for securing virtual machines
Learn about virtual monitoring and introspection in this article from Royal Holloway MSc student Fotios Tsifountidis and lecturer Geraint Price. Royal Holloway 2011
-
Virtualisation security for enterprise servers
Don't fall prey to virtual server security myths. In this Security School lesson, expert Ben Chai explains how to implement server virtualisation securely. Security School
-
Threat assessment model: Testing open source software for security
To mitigate the risks of using open source software, Yoav Aner and Carlos Cid propose a new threat modelling method for testing the security of open source software. Royal Holloway eBook Seri
-
How to tackle a buffer overflow attack and avoid vulnerabilities
Despite the research and learned papers on the subject, buffer overflow exploits seem to be as popular – and as successful – as ever Royal Holloway eBook Seri
-
2009 Royal Holloway University of London MSc thesis series
Read a group of information security articles -- from the highly technical to the basic -- authored by recent MSc graduates of Royal Holloway University of London (RHUL). Royal Holloway eBook Seri
-
Royal Holloway University of London MSc thesis Series
This is a series of 12 thesis articles from MSc students at the Royal Holloway University of London, discussing security issues of the future. Royal Holloway eBook Seri
-
Trusted computing for industrial control systems and infrastructure
The Trusted Computing Group’s open standards now include specifications for securing industrial control systems and infrastructure Opinion
-
Computer Weekly and FT video debates: Tackling cyber crime
In a series of video debates, Computer Weekly and the Financial Times invite a panel of experts to discuss business and IT issues. Video
-
RSA Conference Europe coverage 2012
Read all the news coverage from RSA Conference Europe 2012, in London. guide
-
Cyber security will change ideas of the nation state, says Stonesoft
The lack of cyber security is a major threat to the civilised world and will change how people see the nation state, says security firm Stonesoft News
-
Operation High Roller fraud puts US finance companies on red alert
Fraud ring Operation High Roller has spread from Europe to countries including the US in recent months, says McAfee’s latest threat report News
-
The Global State of Information Security Survey 2013: Key Findings
This global study examines the state of cyber-security and the impact of cyber crime and offers advice to businesses on reducing the risks. News
-
Mobile Security Strategies
This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise. News
-
Trusted computing for industrial control systems and infrastructure
The Trusted Computing Group’s open standards now include specifications for securing industrial control systems and infrastructure Opinion
-
IT security budgets mismatched to hacker targets, study shows
IT security budgets are not being used to provide defence technologies in some areas most likely to be targeted by hackers, a study shows News
-
XSS attacks remain top threat to web applications
Cross-site scripting (XSS) attacks remain the top threat to web applications, databases and websites, a study from FireHost reveals News
-
RSA Conference Europe coverage 2012
Read all the news coverage from RSA Conference Europe 2012, in London. guide
-
RSA Europe: New intelligence-led security model needed
A new model of security makes sense as nation states, criminals and hacktivists continue to take obscene advantage of the way things are, says Art Coviello, executive chairman of RSA News
-
Computer Weekly and FT video debates: Tackling cyber crime
In a series of video debates, Computer Weekly and the Financial Times invite a panel of experts to discuss business and IT issues. Video
- See More: All on Application security and coding requirements