
from WIRED https://www.wired.com/2016/12/obama-russia-hacking-sanctions-diplomats/
from Tumblr http://zoehamilton671.tumblr.com/post/155134271150
via Zoe Hamilton
Here is a rundown of Computer Weekly’s most popular stories on HR technology in 2016
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404616/Top-10-HR-Stories-of-2016
A look back at Computer Weekly’s most-read networking stories of 2016
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404603/Top-10-networking-stories-of-2016
This year saw the UK introduce the Snoopers’ Charter, legalising some of the most extensive government surveillance powers in the world. Computer Weekly exposed state monitoring of Parliamentary emails, and reported on activist Lauri Love’s legal battle to be tried in the UK over alleged hacking in the US
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404654/Top-10-state-surveillance-investigatory-powers-and-activism-stories-of-2016
Parts of the controversial Investigatory Powers Act relating to the bulk collection of communications data have been ruled unlawful by the European Court of Justice
from ComputerWeekly: IT security http://www.computerweekly.com/news/450409635/European-court-delivers-blow-to-Snoopers-Charter
Here are Computer Weekly’s top 10 IT security stories of 2016:
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404341/Top-10-IT-security-stories-of-2016
Read the most popular articles about enterprise IT in the Middle East
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403785/Top-10-CW-Middle-East-stories-of-2016
Read the top 10 Nordic enterprise IT stories from Computer Weekly
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403696/Top-10-CW-Nordics-stories-of-2016
Here are Computer Weekly’s top 10 cyber crime stories of 2016:
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404344/Top-10-cyber-crime-stories-of-2016
The Middle East could pioneer the use of blockchain, transforming the processes used by organisations in the region
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404690/Could-blockchain-revolutionise-the-Middle-East
Typographical mistake in an email warning of a phishing attack on the US Democrats led to thousands of private emails being accessed and published by Russian-backed hackers
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404682/Typo-allowed-Russian-hackers-to-access-US-Democratic-Party-emails
Yahoo confirms details of a historic data breach, dating back to 2013, affecting one billion users
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404680/Yahoo-hacked-One-billion-users-affected-by-August-2013-data-breach-company-confirms
Significant robotic process automation skills included in ISG’s $74m acquisition of Alsbridge
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404611/IT-services-advisory-sector-consolidates-as-ISG-acquires-Alsbridge
The Swedish financial services regulator FI fines Nasdaq Stockholm and its clearing operation for not managing its security supplier adequately
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404605/Swedish-trading-venue-Nasdaq-Stockholm-fined-for-cyber-security-failures
Fast food giant has emailed all 1.2 million members of its loyalty scheme, urging them to change their passwords after its recent data breach
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404526/KFC-hacked-Customers-urged-to-reset-loyalty-scheme-passwords
In spite of Microsoft and VMware encroaching on its core product areas, Citrix is a company which seems to have “staying power”
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404338/Citrix-How-the-great-survivor-challenges-the-tech-giants
Professional services giant KPMG says UK businesses cannot afford to ignore incoming European data protection requirements if they want to continue to trade successfully with the continent in future
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404457/KPMG-cautions-CEOs-against-ignoring-GDPR-requirements-over-post-Brexit-data-protection-uncertainty
In this concluding part of a two-part series, Computer Weekly looks at ways of testing disaster recovery plans, with methods including array-based replication and hypervisor-based approaches
from ComputerWeekly: IT security http://www.computerweekly.com/feature/Disaster-recovery-testing-Technology-systems-to-test-DR
The 2017 Computer Weekly/TechTarget IT Priorities survey shows growing interest in network privacy, security and management, but SDN and NFV are still lagging
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404334/IT-Priorities-2017-Buyers-look-for-network-privacy-visibility-tools
After dropping devices to concentrate on mobile device management, Blackberry is poised to take on IoT security under John Chen’s leadership
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404392/Blackberry-changes-tack-to-secure-enterprise-internet-of-things
Administrators should upgrade to the latest version of Microsoft PowerShell and enable extended logging and monitoring capabilities in the light of a surge in related security threats, warn researchers
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404333/PowerShell-security-threats-greater-than-ever-researchers-warn
How can information security professionals help businesses to understand the cyber risks across increasingly digital businesses?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Simplify-infosec-messages-If-not-X-then-Y-and-Z
Security researchers are urging ISPs to issue emergency patches for Marai botnet infections after 2,374 TalkTalk routers were linked in a regional botnet
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404326/More-than-2000-TalkTalk-routers-hijacked-by-Mirai-botnet-variant
The UAE is already a leader in areas such as smart city developments, and 2017 looks set to see organisations in the country increase its adoption of other transformational IT
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404250/The-United-Arab-Emirates-enterprise-IT-trends-for-2017
Most iOS apps in the enterprise pose potential security risks, according to research by Appthority
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404262/Few-iOS-apps-in-enterprises-meet-Apples-new-security-mandate
Each year, TechTarget looks at how CIOs and senior IT decision-makers will be investing in IT in the 12 months ahead
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404188/IT-Priorities-2017-What-will-IT-decision-makers-be-focusing-on
How can information security professionals help organisations to understand the cyber risks across increasingly digital businesses?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Communication-is-key-to-cyber-security-in-digital-era
Forty companies sign up to apply IBM’s Watson cognitive computing systems to cyber security, but threat intelligence experts caution against total reliance on such systems
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404252/40-firms-to-trial-IBM-Watson-cognitive-computing-for-cyber-security
The latest breach of millions of user details prompts fresh calls for better security of user data and an alternative to passwords
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404205/Dailymotion-breach-prompts-calls-for-password-alternatives
How can information security professionals help businesses to understand the cyber risks across increasingly digital businesses?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-How-to-make-cyber-risk-easier-for-business-to-understand
Global confidence in ability to accurately assess cyber risk has fallen in the past year, but the UK has fallen below the global average
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404174/UK-falls-below-global-cyber-security-confidence
The UK was a keen participant in the formulation of new data protection laws for the European Union, but its electorate has since voted to leave the EU. How is that likely to affect data protection in the UK once Brexit is accomplished?
from ComputerWeekly: IT security http://www.computerweekly.com/feature/What-happens-to-data-protection-when-we-leave-the-EU
Former British diplomat Rob Luke takes up the role of the ICO’s second deputy commissioner in January 2017
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404130/The-ICO-drafts-in-expertise-of-former-diplomat
Europol and MasterCard hold a retail cyber attack simulation exercise to raise awareness of the issue and how to respond to attacks, as well as promote information sharing in the sector
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404120/Europol-hosts-simulated-cyber-attack-on-retail-sector
How can information security professionals help businesses to understand the cyber risks across increasingly digital businesses?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Cyber-risk-not-just-an-IT-issue
Data protection is to remain a key focus for IT security investment for European firms in 2017, but the emphasis is on cloud and mobile security as companies move to these technology platforms
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404112/UK-and-European-firms-to-continue-to-invest-in-data-protection-ahead-of-GDPR
Here is a rundown of Computer Weekly’s most popular ANZ enterprise IT articles for 2016
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403537/Top-10-ANZ-enterprise-IT-stories-of-2016
The 10 most popular Asean articles of 2016
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403540/Top-10-Asean-enterprise-IT-stories-of-2016
How can information security professionals help organisations to understand the cyber risks across increasingly digital businesses?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Cyber-security-must-be-recognised-as-a-fundamental-component-of-business
UK firms should prioritise defence against spear phishing as a key component of cyber attacks, according to security veteran Peter Wood
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404028/Security-veteran-urges-firms-to-prioritise-spear-phishing-defence
The UK’s National Crime Agency has contributed to the takedown of a cloud-based cyber crime network in a collaborative law enforcement operation involving 30 countries
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404018/UK-helps-dismantle-Avalanche-global-cyber-network
UK academics uncover a vulnerability in online payment systems, which they say could have been used in the Tesco Bank cyber heist
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403998/Academics-link-payment-card-vulnerability-to-Tesco-Bank-cyber-heist
Broadband providers Post Office Broadband and Kcom are among a number of operators to have been hit by a hack targeting Zyxel routing hardware
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403957/Mirai-botnet-hits-Post-Office-Broadband-and-Kcom-customers
The US has introduced wide new hacking powers for federal agents a day after the UK’s Investigatory Powers Act firmed up bulk surveillance powers for intelligence and polices services
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403905/US-and-UK-government-expand-surveillance-powers
How can information security professionals help organisations to understand the cyber risks across increasingly digital businesses?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Cyber-security-is-everyones-responsibility
Users of Tor anonymous browsing urged to update to the latest versions of relevant software to block an exploit that collects IP and MAC addresses to identify users
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403896/Mozilla-and-Tor-issue-patches-for-Firefox-flaw-exposing-Tor-users
National Lottery operator Camelot says the log-in details of thousands of people who do the lottery online have been stolen
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403786/Thousands-of-National-Lottery-accounts-hacked
Disaster recovery provision is worthless unless you test out your plans. In this two-part series, Computer Weekly looks at disaster recovery testing in virtualised datacentres
from ComputerWeekly: IT security http://www.computerweekly.com/feature/Disaster-recovery-testing-A-vital-part-of-the-DR-plan
How can information security professionals help businesses to understand the cyber risks across increasingly digital businesses?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Managing-cyber-risk-requires-genuine-understanding
How can information security professionals help businesses to understand the cyber risks across increasingly digital businesses?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Cyber-risk-Overlooked-Ignored-Under-appreciated
German telco says its broadband outages are linked to a botched attempt to hijack routers, which security experts say further underlines the cyber threat to internet connected infrastructure
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403678/Deutsche-Telekom-botnet-attack-underlines-infrastructure-vulnerabilities
Computer giant reportedly pays $30m to Australian government as reports are released from two inquiries into DDoS attacks on census website
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403576/IBM-blamed-for-Australian-census-website-crash
San Francisco’s transport agency appears to be the latest target of cyber criminals using encryption malware to hold organisations to ransom
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403594/San-Francisco-transport-system-hit-by-ransomware-attack
HMRC is first department to implement technology to block phishing emails as part of UK government’s active cyber defence programme and self-testing strategy
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403583/HMRC-blocks-500000-phishing-emails-in-2015
Open Rights Group has called on parliament to debate the Investigatory Powers Bill and review it in light of pending court actions, after petition against the bill tops 100,000 signatories
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403572/Petition-to-force-Mps-to-consider-debate-on-surveillance-bill
Mergers and acquisitions continue at pace in the information security market, but these are not necessarily signs of consolidation, writes Martin Kuppinger
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Is-the-infomation-security-supplier-market-really-consolidating
At least one in four Wi-Fi hotspots are open to attack, a study by Kaspersky Lab reveals
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403539/One-in-four-Wi-Fi-hotspots-vulnerable-to-attack-study-finds
The personal details of more than 130,000 current and former US Navy personnel have been exposed in a breach linked to the compromise of third-party supplier’s laptop
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403530/US-Navy-breach-highlights-third-party-cyber-risk
Most UK firms lack the time and resources to ensure adequate cyber security and data protection, according to a survey of IT managers
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403521/UK-firms-neglecting-cyber-security-say-74-of-IT-managers
Technology and service providers should focus on customer data integration to help businesses improve customer satisfaction, says CXP Group consultant Nicole Dufft
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403505/Customer-data-integration-a-market-opportunity-says-CXP-Group-consultant
Gigya, Ping Identity, Salesforce, ForgeRock are the current leaders in the consumer identity and access management market, according to a report by KuppingerCole
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403494/Gigya-is-consumer-identify-leader-finds-KuppingerCole
A cyber security college is to be set up at Bletchley Park, home to the men and women who decoded German cyphers during the Second World War
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403493/Bletchley-Park-to-teach-teenagers-to-become-cyber-experts
A bi-modal, integrated IAM system will help avoid the pitfalls associated with other approaches to consumer identity, according to Martin Kuppinger
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403480/A-single-integrated-consumer-ID-system-is-best-says-Martin-Kuppinger
The UK government and financial sector is working together to meet the need for high-assurance identity globally
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403412/High-assurance-identity-top-priority-for-government-and-finance
Customer identity evolves through a series of interactions to enable richer data for improved marketing and customer experiences, says Gigya co-founder Rooly Eliezerov
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403413/Customer-identity-evolves-over-time-says-Gigya
Alibaba has opened a datacentre in Dubai to attract businesses in the Middle East to its public cloud services
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403353/Alibaba-brings-public-cloud-to-the-Middle-East
Customer identity and access management has benefits for consumers and service providers alike, but is key to digital transformation, says KuppingerCole
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403350/Consumer-identity-key-to-digital-transformation
Supporters fear for activist Lauri Love if his extradition to face hacking charges to the US goes ahead
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403348/Alleged-hacker-Lauri-Loves-life-will-be-destroyed-under-Trump-regime
Labour’s shadow home secretary Diane Abbott says that wider society must now debate the controversial Investigatory Powers Bill, despite Parliamentary approval
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Fight-against-Investigatory-Powers-Bill-may-not-be-over
Customer data breaches continue to demonstrate that companies are still not treating cyber risk like every other business risk, says Adrian Davis of (ISC)2
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403187/Three-breach-highlights-several-security-issues-says-ISC2
Cryptology expert Bart Preneel says the European security industry must commit to secure communication for the masses and open source is the key to secure infrastructure
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403176/European-security-industry-has-failed-users-says-expert
Three men arrested in connection with mobile handset upgrade fraud enabled by unauthorised access to customer data
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403170/Hackers-arrested-in-Three-mobile-upgrade-scam
Cyber attacks on internet shopping are expected to increase in the run up to Christmas, with a million attacks targeted at UK retailers alone
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403101/One-million-cyber-attacks-on-UK-retailers-forecast-for-Christmas
Rights groups have vowed to continue to oppose the controversial Investigatory Powers Bill, which is now just two steps away from becoming law
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403089/Investigatory-Powers-Bill-looks-set-to-become-law
What should organisations consider if they are to prepare for cyber insurance?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Cyber-insurance-may-not-provide-cover-where-it-is-most-needed
Security, privacy and identity are key to digital transformation, which is an evolutionary process, according to Martin Kuppinger
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403020/Digital-transformation-not-a-finite-process-says-Martin-Kuppinger
Cyber attackers are turning to machine learning to create smarter attacks and defenders will require similar technology to detect them, warns Darktrace
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403013/Business-needs-AI-defence-against-AI-attacks-says-Darktrace
What should organisations consider if they are to prepare for cyber insurance?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Ensure-cyber-insurance-is-right-and-helps-reduce-risk
Adobe discovers ways of addressing security challenges of scalability, diverse technology stacks and business criticality
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403002/Adobe-uses-shared-responsibility-to-meet-security-challenges
Identity for online gambling presents a potential market opportunity, because no suppliers are meeting the industry’s consumer identify requirements
from ComputerWeekly: IT security http://www.computerweekly.com/news/450402936/Identity-for-online-gambling-industry-a-potential-market-opportunity
Software giant’s identity architect calls on enterprises to professionalise the way they relate to customers to help replace online identity infrastructure that is not fit for purpose
from ComputerWeekly: IT security http://www.computerweekly.com/news/450402942/Online-identity-needs-to-be-fixed-says-Microsofts-Kim-Cameron
A year after a major data security breach laid waste to its reputation, TalkTalk boss Dido Harding says things are turning around
from ComputerWeekly: IT security http://www.computerweekly.com/news/450402930/TalkTalk-bouncing-back-a-year-on-from-cyber-attack-says-CEO
Vigitrust’s Mathieu Gorge reports from Web Summit 2016 on the explosion of data that comes with the internet of things and its implications for data storage and compliance
from ComputerWeekly: IT security http://www.computerweekly.com/podcast/The-internet-of-things-data-explosion-and-storage-and-compliance
Ebola was a wake-up call. Marc Touitou joined the World Health Organisation as the outbreak started and set about being a catalyst for change
from ComputerWeekly: IT security http://www.computerweekly.com/news/450402779/CIO-interview-Marc-Touitou-the-World-Health-Organisation
What should organisations consider if they are to prepare for cyber insurance?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Lower-insurance-premiums-through-security-certification
Another huge data breach has exposed poor security of user details and continued poor user password practices
from ComputerWeekly: IT security http://www.computerweekly.com/news/450402859/412-million-user-accounts-exposed-in-FriendFinder-Networks-hack
What should organisations consider if they are to prepare for cyber insurance?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Six-key-factors-in-cyber-insurance
NCSC technical director Ian Levy details some of the initiatives being pursued as part of its Active Cyber Defence Programme
from ComputerWeekly: IT security http://www.computerweekly.com/news/450402794/National-Cyber-Security-Centre-to-trial-cyber-defence-initiatives-on-government
Early draft of new GDS strategy reveals an ambitious target for its identity assurance service
from ComputerWeekly: IT security http://www.computerweekly.com/news/450402789/GDS-aiming-for-25-million-users-of-Govuk-Verify-by-2020
DDoS attacks on Russian banks have been linked to IoT botnets, further confirming this worrying trend and highlighting the need for IoT suppliers to improve security capabilties
from ComputerWeekly: IT security http://www.computerweekly.com/news/450402778/Russian-banks-hit-by-IoT-enabled-DDoS-attacks
Romanian police arrest 24 members of a card skimming and cloning operation and identify 47 other suspects
from ComputerWeekly: IT security http://www.computerweekly.com/news/450402767/24-cyber-criminals-arrested-in-Europol-operation
The General Data Protection Regulation is likely to help boost the data protection profession, with 75,000 data protection officers needed worldwide for organisations to comply with new EU rules
from ComputerWeekly: IT security http://www.computerweekly.com/news/450402719/GDPR-will-require-75000-DPOs-worldwide-study-shows
What should organisations consider if they are to prepare for cyber insurance?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Understand-data-assets-and-risks-for-insurance-success
In its latest SEC filing, Yahoo admits some people knew of the 2014 breach shortly after, that the true cost of the breach is still unknown, and that the breach could affect its deal with Verizon
from ComputerWeekly: IT security http://www.computerweekly.com/news/450402692/Yahoo-admits-data-breach-may-affect-Verizon-acquisition
Science advisor Mark Walport voices concerns around transparency, accountability and personal security with regard to the use of artificial intelligence by the government
from ComputerWeekly: IT security http://www.computerweekly.com/news/450402688/Government-must-tread-carefully-on-AI-ethics
Five-year research collaboration agreement will support government efforts to address cyber security challenges
from ComputerWeekly: IT security http://www.computerweekly.com/news/450402638/HP-sponsors-cyber-security-research-chair-at-Birmingham-University
What should organisations consider if they are to prepare for cyber insurance?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Cyber-insurance-factor-in-all-costs-and-obligations
The end of Safe Harbour left many European businesses exposed in terms of data privacy, but Dropbox now has a German datacentre hosted on Amazon Web Services
from ComputerWeekly: IT security http://www.computerweekly.com/news/450402606/Aller-Group-deploys-Dropbox-for-Business-in-European-AWS-cloud
The FCA expresses concern about the cyber security of banks after 9,000 Tesco Bank customers lost £2.5m in fraudulent transactions
from ComputerWeekly: IT security http://www.computerweekly.com/news/450402600/Financial-Conduct-Authority-concerned-about-cyber-security-of-banks
Intel Security is working with a select group of customers on developing systems to enable human-machine teaming to get the best of both worlds in applying cyber threat intelligence
from ComputerWeekly: IT security http://www.computerweekly.com/news/450402539/Human-machine-teaming-key-to-cyber-defence-says-Intel-Security
CISO says there is no need to sacrifice security to pursue innovation in the cloud, as he reveals how the cloud giant safeguards customer information in its datacentres
from ComputerWeekly: IT security http://www.computerweekly.com/news/450402535/AWS-shares-datacentre-security-secrets-to-inspire-more-enterprise-cloud-adoption
Fifth annual joint workshop seeks to foster better co-operation between national cyber incident response teams and law enforcement agencies to establish a network to discuss topics of mutual interest
from ComputerWeekly: IT security http://www.computerweekly.com/news/450402529/European-agencies-seek-to-bolster-co-operation-on-cyber-crime
What should organisations consider if they are to prepare for cyber insurance?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Cyber-insurance-a-great-complement-to-good-security-practice
Tesco Bank compromise should act as a wake up call to UK businesses to take cyber security more seriously, says security industry commentators
from ComputerWeekly: IT security http://www.computerweekly.com/news/450402510/Tesco-Bank-theft-shows-need-to-take-cyber-security-more-seriously
What should organisations consider if they are to prepare for cyber insurance?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Back-up-risk-assessment-with-broker-advice-on-cyber-insurance
Tesco Bank halts online banking after thousands of current account customers were hit by fraudulent transactions by hackers at the weekend
from ComputerWeekly: IT security http://www.computerweekly.com/news/450402439/Tesco-Bank-halts-online-banking-after-weekend-hacker-fraud
The government has introduced stringent new responsibilities on IT suppliers in its latest cyber security strategy
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/New-cyber-security-strategy-changes-relationship-between-government-and-IT-suppliers
Veteran investigative reporter Ted Koppel says a cyber attack on the US power grid is likely, but preparations for such an event are not up to scratch
from ComputerWeekly: IT security http://www.computerweekly.com/news/450402362/Failure-to-prepare-for-cyber-attack-could-be-catastrophic-warns-Ted-Koppel
The window of opportunity for addressing security risks in internet of things devices is closing rapidly, according to Intel’s IoT security manager
from ComputerWeekly: IT security http://www.computerweekly.com/news/450402361/IoT-security-window-closing
Intel Security Innovation Alliance continues to grow as security firm opens up McAfee data exchange layer
from ComputerWeekly: IT security http://www.computerweekly.com/news/450402310/Check-Point-Huawei-join-Intel-Security-Innovation-Alliance
Intel Security has detailed a wave of product innovations at Focus 2016, but promises more to come when it is spun out as an independent company under the McAfee banner
from ComputerWeekly: IT security http://www.computerweekly.com/news/450402263/Intel-Security-to-become-McAfee-in-April-2017
There is still a lot of work to be done to change the perception of cyber security and corporate culture to attract more women to the profession, according to a panel of security professionals
from ComputerWeekly: IT security http://www.computerweekly.com/news/450402264/Cyber-security-image-putting-women-and-girls-off-says-panel
Intel Security has outlined its strategy to protect the new digital economy as it gears up for innovation as a new independent pure-play security firm under the McAfee banner
from ComputerWeekly: IT security http://www.computerweekly.com/news/450402196/Pure-play-cyber-security-has-real-value-says-incoming-McAfee-head
Intel Security adjusts its channel strategy in response to a market shift towards services-based security
from ComputerWeekly: IT security http://www.computerweekly.com/news/450402166/Intel-Security-shifts-channel-strategy
Speaking at the Microsoft Future Decoded event in London, the Chancellor revealed how Britain would take an offensive stance to protect infrastructure
from ComputerWeekly: IT security http://www.computerweekly.com/news/450402111/Philip-Hammond-goes-on-the-attack-to-target-cyber-threat-to-UK-economy
Report suggests that half of UK adults would switch telecoms and broadband provider in the event of a security breach, and identifies revenue opportunities in building trust among consumers
from ComputerWeekly: IT security http://www.computerweekly.com/news/450402100/Path-to-telco-revenues-lies-through-improved-user-trust-says-KPMG
Five-year spending increase - announced by Chancellor Philip Hammond 12 months after George Osborne did so - will support new UK cyber security strategy
from ComputerWeekly: IT security http://www.computerweekly.com/news/450402098/UK-government-re-announces-19bn-cyber-security-spend
The Information Commissioner’s Office is to publish a revised timeline for the UK implementing the EU’s General Data Protection Regulation after Brexit
from ComputerWeekly: IT security http://www.computerweekly.com/news/450402036/ICO-prepares-for-post-Brexit-GDPR
SDN promises to bring the efficiency gains achieved in server virtualisation to networking, while also boosting security
from ComputerWeekly: IT security http://www.computerweekly.com/news/450402016/How-software-defined-networking-can-secure-critical-systems
There’s a rumour out there in the IT and business world that blockchains could be the magic elixir when it comes to users’ full control and power over their own digital identities. But is that really so?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Self-sovereign-identity-on-the-block-ideal-or-no-deal
Insider threats have been around for a long time, but it is only recently that people have begun to acknowledge the true danger they pose
from ComputerWeekly: IT security http://www.computerweekly.com/feature/The-cyber-threats-lurking-within-every-company
United Utilities deploys mobile device management software AirWatch to secure Samsung devices running a SAP workforce management app
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401925/United-Utilities-protects-field-engineering-deployment-with-AirWatch
The Australian Red Cross Blood Service has responded quickly to a breach of 550,000 donor details, but security commentators say the incident shows security is still not a priority for many organisations
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401910/Red-Cross-data-breach-shows-security-is-still-not-a-priority
A US man is given a sentence of 18 months in jail for hacking into celebrity iCloud and Gmail accounts after investigators failed to find a link with the leak of celebrity nude photos online in 2014
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401905/Apple-iCloud-and-Gmail-hacker-gets-18-months-in-jail
DNS services provider Dyn, which was the victim of a large-scale DDoS attack perpetrated by an IoT botnet earlier in October, discusses details of its experience
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401857/Dyn-reveals-details-of-complex-and-sophisticated-IoT-botnet-attack
By helping to create a thriving, diverse and open information security community, (ISC)2 hopes to ensure a steep rise for the profession
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401850/Information-security-set-for-steep-trajectory-says-ISC2
Schneider Electric has patched a security flaw that highlights the vulnerability of industrial control systems to cyber attack
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401831/Schneider-Electric-praised-for-positive-response-to-ICS-security-flaw
The US government is calling on financial institutions to share more cyber attack information as concerns grow about the sector’s vulnerability
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401745/US-Treasury-tells-banks-to-provide-more-cyber-attack-information
SAP guarantees technicians outside of Europe will not be able to access companies’ sensitive personnel and other records
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401728/SAP-steps-up-data-privacy-in-Europe
Partnership is in response to requests from AIG customers for a more comprehensive risk management approach to cyber insurance
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401655/Malaysian-insurer-partners-IT-supplier-to-tailor-cyber-security-policies
Despite the promise of improved application security, DevOps is failing to deliver due to some key barriers, an HPE study shows
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401645/DevOps-largely-failing-to-improve-security-study-shows
Last week’s DDoS attack on DNS firm Dyn has highlighted both the vulnerability of the world’s internet infrastructure, and the dangers of leaving internet of things devices unsecured
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401576/Dyn-DDoS-attack-highlights-vulnerability-of-global-internet-infrastructure
Identity is vital for presenting a consistent customer relationship across digital channels, but not everyone in all organisations understands this shift, according to identity veteran Ian Glazer
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401590/In-the-digital-era-customer-identity-is-key
UK MPs across all parties call for US President to save activist from extradition to the US on hacking charges on humanitarian grounds
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401567/More-than-100-MPs-ask-Obama-to-halt-extradition-bid-against-Lauri-Love
There needs to be greater understanding of cyber threats facing business, and the UK’s new National Cyber Security Centre is a step in the right direction, says CNI expert Barrie Millett
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401575/UK-National-Cyber-Security-Centre-a-positive-development-says-CNI-expert
MPs across all parties call for President Barack Obama to save activist Lauri Love from extradition to the US on hacking charges on humanitarian grounds.
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401567/Over-100-MPs-sign-letter-to-Obama-asking-him-to-drop-extradition-against-alleged-hacker-Lauri-Love
Two of the most valuable lessons in cyber security are to know your enemy and not to rely on users to be secure, according to industry veteran Mikko Hypponen
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401510/No-endgame-for-cyber-security-says-Mikko-Hypponen
DNS provider Dyn experiences a large DDoS attack, causing disruption to online services
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401515/Major-DDoS-attack-on-Dyn-causes-internet-disruption
Only through collaboration between all customer-facing parts of a business can it deliver the customer experience that is crucial to survival in the digital era, according to CXP Group consultant Nicole Dufft
from ComputerWeekly: IT security http://www.computerweekly.com/news/450401502/Many-firms-failing-on-crucial-customer-experience-in-digital-era