Email Alerts
-
Ruby on Rails flaws expose thousands of websites to attack
More than 240,000 websites that use Ruby on Rails web applications are at risk of being exploited by attackers Cyber security | 10 Jan 2013
-
US military gets new software testing rules
The US has introduced new policies for military software engineers aimed at pre-empting software supply chain attacks News | 09 Jan 2013
-
UK military at risk of cyber attack, warn MPs
UK military reliance on technology could leave it fatally compromised by cyber attack, says the parliamentary defence select committee News | 09 Jan 2013
-
Dutch government publishes security flaw disclosure guide
The Netherlands has published guidelines to encourage the responsible release of security flaws News | 07 Jan 2013
-
Malware spammers target Android OS
Google’s mobile operating system, Android, has been hit again by malicious malware causing devices to send out spam SMS messages News | 19 Dec 2012
-
2012 Cost of Cyber Crime Study: UK
The 2012 Cost of Cyber Crime Study: United Kingdom is independently conducted by Ponemon Institute. The benchmark study, sponsored by HP Enterprise Security is based on a representative sample of 38 organisations in various industry sectors. News | 06 Dec 2012
-
IT Security Purchasing Intentions 2013
This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe. Security | 03 Dec 2012
-
Cyber security will change ideas of the nation state, says Stonesoft
The lack of cyber security is a major threat to the civilised world and will change how people see the nation state, says security firm Stonesoft News | 15 Nov 2012
-
Operation High Roller fraud puts US finance companies on red alert
Fraud ring Operation High Roller has spread from Europe to countries including the US in recent months, says McAfee’s latest threat report News | 14 Nov 2012
-
The Global State of Information Security Survey 2013: Key Findings
This global study examines the state of cyber-security and the impact of cyber crime and offers advice to businesses on reducing the risks. News | 13 Nov 2012
- See more News on Application security and coding requirements
-
Royal Holloway 2012: Risks of multi-tenancy cloud computing
In his Royal Holloway 2012 thesis, Jacobo Ros examines the risks of multi-tenancy cloud computing. Feature
-
Royal Holloway 2012: PCI compliance, cloud computing are a costly pair
It is possible to achieve PCI DSS compliance in a cloud environment, but it may not be cost-effective, as explained in this Royal Holloway article. Feature
-
Using open source intelligence software for cybersecurity intelligence
Discover the information that may be leaking out of your organisation before hackers use it to launch an attack against your organization. Tip
-
Securing NoSQL applications: Best practises for big data security
NoSQL is great for big data, but security is often lacking in NoSQL applications. Davey Winder provides best practises for NoSQL security. Tip
-
With mobile payments, security teams must move quickly
As employees make payments on their mobile devices, the security team must act quickly to ensure corporate assets remain secure. Tip
-
Building a secure website and maintaining good website design
As a new website is developed, security goals often lose out to design aspirations. Learn how to keep security at the top of the priority list. Tip
-
A compliance strategy for the controversial cookie opt-in regulation
Businesses face many concerns with the PECR cookie law. Compliance expert Alan Calder offers a compliance strategy for the cookie opt-in regulation. Tip
-
Session fixation protection: How to stop session fixation attacks
Session fixation attacks rely on poorly managed Web application cookies. Rob Shapland answers a reader’s question on session fixation protection. Ask the Expert
-
Using Burp Suite proxy tool to examine client-side requests
The free Burp Suite proxy tool can be used for good or for bad. Expert Rob Shapland provides usage scenarios for both. Tip
-
How to apply PCI DSS guidance to virtualisation technology
Learn how to apply best practices from the recently released PCI DSS virtualisation guidance to your virtual environment. Tip
- See more Features on Application security and coding requirements
-
Trusted computing for industrial control systems and infrastructure
The Trusted Computing Group’s open standards now include specifications for securing industrial control systems and infrastructure Opinion
-
Computer Weekly and FT video debates: Tackling cyber crime
In a series of video debates, Computer Weekly and the Financial Times invite a panel of experts to discuss business and IT issues. Video
-
RSA Conference Europe coverage 2012
Read all the news coverage from RSA Conference Europe 2012, in London. guide
-
Ruby on Rails flaws expose thousands of websites to attack
More than 240,000 websites that use Ruby on Rails web applications are at risk of being exploited by attackers Cyber security
-
US military gets new software testing rules
The US has introduced new policies for military software engineers aimed at pre-empting software supply chain attacks News
-
UK military at risk of cyber attack, warn MPs
UK military reliance on technology could leave it fatally compromised by cyber attack, says the parliamentary defence select committee News
-
Dutch government publishes security flaw disclosure guide
The Netherlands has published guidelines to encourage the responsible release of security flaws News
-
Malware spammers target Android OS
Google’s mobile operating system, Android, has been hit again by malicious malware causing devices to send out spam SMS messages News
-
2012 Cost of Cyber Crime Study: UK
The 2012 Cost of Cyber Crime Study: United Kingdom is independently conducted by Ponemon Institute. The benchmark study, sponsored by HP Enterprise Security is based on a representative sample of 38 organisations in various industry sectors. News
-
IT Security Purchasing Intentions 2013
This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe. Security
-
Cyber security will change ideas of the nation state, says Stonesoft
The lack of cyber security is a major threat to the civilised world and will change how people see the nation state, says security firm Stonesoft News
-
Operation High Roller fraud puts US finance companies on red alert
Fraud ring Operation High Roller has spread from Europe to countries including the US in recent months, says McAfee’s latest threat report News
-
The Global State of Information Security Survey 2013: Key Findings
This global study examines the state of cyber-security and the impact of cyber crime and offers advice to businesses on reducing the risks. News
- See more All on Application security and coding requirements