Email Alerts
-
Researchers uncover advanced cyber espionage campaign
An elusive cyber espionage campaign has been targeting diplomatic, governmental and scientific research organisations for several years, analysis by Kaspersky Lab has revealed Cyber security | 14 Jan 2013
-
US military gets new software testing rules
The US has introduced new policies for military software engineers aimed at pre-empting software supply chain attacks News | 09 Jan 2013
-
2012 Cost of Cyber Crime Study: UK
The 2012 Cost of Cyber Crime Study: United Kingdom is independently conducted by Ponemon Institute. The benchmark study, sponsored by HP Enterprise Security is based on a representative sample of 38 organisations in various industry sectors. News | 06 Dec 2012
-
Computer Weekly European User Awards Criteria and Information
Read the entry criteria and general information about entering the Computer Weekly European User Awards. News | 05 Dec 2012
-
IT Security Purchasing Intentions 2013
This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe. Security | 03 Dec 2012
-
Cybergeddon unlikely, say experts
Cybergeddon, a complete takedown of the internet, is within the power of some nation states, but unlikely, say security industry experts News | 29 Nov 2012
-
Google among firms hit in Pakistan hack
Technology firms including Google, Apple, eBay and Yahoo were among almost 300 companies whose websites were hit by Pakistan hack attack cyber crime | 27 Nov 2012
-
GCHQ aims to tackle open source security clearance problem
UK security services have begun bridging the gap that has stopped open source software getting security clearance for use in government Analysis | 23 Nov 2012
-
Evasion threat to critical systems goes ignored, says Stonesoft
Many organisations continue to rely on ineffective intrusion prevention systems (IPS), says security firm Stonesoft News | 16 Nov 2012
-
Cyber security will change ideas of the nation state, says Stonesoft
The lack of cyber security is a major threat to the civilised world and will change how people see the nation state, says security firm Stonesoft News | 15 Nov 2012
- See more News on Network security management
-
Business priorities: what to protect, monitor and test
How information security professionals can prioritise what to protect, monitor and test in the light of current budget and resource constraints Feature
-
CW500 Security Club: Dealing with attacks inside networks
Perimeter defences are no longer enough to keep data safe, experts told IT security leaders at the CW500 Security Club CW500
-
The new EU data protection regulation: Planning for compliance
The new data protection rule will impact businesses worldwide. Discover quick wins for SMBs and projects for large businesses to move to compliance. Tip
-
Using open source intelligence software for cybersecurity intelligence
Discover the information that may be leaking out of your organisation before hackers use it to launch an attack against your organization. Tip
-
“Click-for-tickets” fraud: Teaching users to sidestep Olympic scams
Attackers are expected to use the Games to foster email and Internet fraud. Learn how to help users sidestep Olympics-related scams. Tip
-
With mobile payments, security teams must move quickly
As employees make payments on their mobile devices, the security team must act quickly to ensure corporate assets remain secure. Tip
-
Using Burp Suite proxy tool to examine client-side requests
The free Burp Suite proxy tool can be used for good or for bad. Expert Rob Shapland provides usage scenarios for both. Tip
-
Stop phone tracking and GPS data leakage
GPS-enabled smartphones and other GPS devices may leak confidential or sensitive data, making it easy for attackers to target your employees. Tip
-
A pen tester’s perspective on creating a secure password
A pen tester explains the importance of creating a secure password Tip
-
OpenVAS how-to: Creating a vulnerability assessment report
In this OpenVAS how-to, learn how to use the free scanner to create a vulnerability assessment report and assess threat levels. Tip
- See more Features on Network security management
-
Security Think Tank: In M&As;, watch the exits
What is the role of IT security professionals in mergers and acquisitions? Opinion
-
Security Think Tank: Least privilege is key to blocking IP theft
Intellectual property (IP) theft: Who should be tackling it and how? Opinion
-
Security Zone: Passwords: Help users discover what is available!
As company policy requires passwords to be stronger than ever, here are some tips to help employees cope Opinion
-
How to ensure you are getting the right cloud service
How can an organisation use an indirect governance to assure trust in cloud services? Opinion
-
RSA Conference Europe coverage 2012
Read all the news coverage from RSA Conference Europe 2012, in London. guide
-
Researchers uncover advanced cyber espionage campaign
An elusive cyber espionage campaign has been targeting diplomatic, governmental and scientific research organisations for several years, analysis by Kaspersky Lab has revealed Cyber security
-
US military gets new software testing rules
The US has introduced new policies for military software engineers aimed at pre-empting software supply chain attacks News
-
Business priorities: what to protect, monitor and test
How information security professionals can prioritise what to protect, monitor and test in the light of current budget and resource constraints Feature
-
2012 Cost of Cyber Crime Study: UK
The 2012 Cost of Cyber Crime Study: United Kingdom is independently conducted by Ponemon Institute. The benchmark study, sponsored by HP Enterprise Security is based on a representative sample of 38 organisations in various industry sectors. News
-
Computer Weekly European User Awards Criteria and Information
Read the entry criteria and general information about entering the Computer Weekly European User Awards. News
-
IT Security Purchasing Intentions 2013
This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe. Security
-
Cybergeddon unlikely, say experts
Cybergeddon, a complete takedown of the internet, is within the power of some nation states, but unlikely, say security industry experts News
-
Google among firms hit in Pakistan hack
Technology firms including Google, Apple, eBay and Yahoo were among almost 300 companies whose websites were hit by Pakistan hack attack cyber crime
-
GCHQ aims to tackle open source security clearance problem
UK security services have begun bridging the gap that has stopped open source software getting security clearance for use in government Analysis
-
Evasion threat to critical systems goes ignored, says Stonesoft
Many organisations continue to rely on ineffective intrusion prevention systems (IPS), says security firm Stonesoft News
- See more All on Network security management