
from WIRED https://www.wired.com/2016/12/obama-russia-hacking-sanctions-diplomats/
from Tumblr http://zoehamilton671.tumblr.com/post/155134271150
via Zoe Hamilton
Here is a rundown of Computer Weekly’s most popular stories on HR technology in 2016
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404616/Top-10-HR-Stories-of-2016
A look back at Computer Weekly’s most-read networking stories of 2016
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404603/Top-10-networking-stories-of-2016
This year saw the UK introduce the Snoopers’ Charter, legalising some of the most extensive government surveillance powers in the world. Computer Weekly exposed state monitoring of Parliamentary emails, and reported on activist Lauri Love’s legal battle to be tried in the UK over alleged hacking in the US
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404654/Top-10-state-surveillance-investigatory-powers-and-activism-stories-of-2016
Parts of the controversial Investigatory Powers Act relating to the bulk collection of communications data have been ruled unlawful by the European Court of Justice
from ComputerWeekly: IT security http://www.computerweekly.com/news/450409635/European-court-delivers-blow-to-Snoopers-Charter
Here are Computer Weekly’s top 10 IT security stories of 2016:
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404341/Top-10-IT-security-stories-of-2016
Read the most popular articles about enterprise IT in the Middle East
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403785/Top-10-CW-Middle-East-stories-of-2016
Read the top 10 Nordic enterprise IT stories from Computer Weekly
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403696/Top-10-CW-Nordics-stories-of-2016
Here are Computer Weekly’s top 10 cyber crime stories of 2016:
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404344/Top-10-cyber-crime-stories-of-2016
The Middle East could pioneer the use of blockchain, transforming the processes used by organisations in the region
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404690/Could-blockchain-revolutionise-the-Middle-East
Typographical mistake in an email warning of a phishing attack on the US Democrats led to thousands of private emails being accessed and published by Russian-backed hackers
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404682/Typo-allowed-Russian-hackers-to-access-US-Democratic-Party-emails
Yahoo confirms details of a historic data breach, dating back to 2013, affecting one billion users
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404680/Yahoo-hacked-One-billion-users-affected-by-August-2013-data-breach-company-confirms
Significant robotic process automation skills included in ISG’s $74m acquisition of Alsbridge
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404611/IT-services-advisory-sector-consolidates-as-ISG-acquires-Alsbridge
The Swedish financial services regulator FI fines Nasdaq Stockholm and its clearing operation for not managing its security supplier adequately
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404605/Swedish-trading-venue-Nasdaq-Stockholm-fined-for-cyber-security-failures
Fast food giant has emailed all 1.2 million members of its loyalty scheme, urging them to change their passwords after its recent data breach
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404526/KFC-hacked-Customers-urged-to-reset-loyalty-scheme-passwords
In spite of Microsoft and VMware encroaching on its core product areas, Citrix is a company which seems to have “staying power”
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404338/Citrix-How-the-great-survivor-challenges-the-tech-giants
Professional services giant KPMG says UK businesses cannot afford to ignore incoming European data protection requirements if they want to continue to trade successfully with the continent in future
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404457/KPMG-cautions-CEOs-against-ignoring-GDPR-requirements-over-post-Brexit-data-protection-uncertainty
In this concluding part of a two-part series, Computer Weekly looks at ways of testing disaster recovery plans, with methods including array-based replication and hypervisor-based approaches
from ComputerWeekly: IT security http://www.computerweekly.com/feature/Disaster-recovery-testing-Technology-systems-to-test-DR
The 2017 Computer Weekly/TechTarget IT Priorities survey shows growing interest in network privacy, security and management, but SDN and NFV are still lagging
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404334/IT-Priorities-2017-Buyers-look-for-network-privacy-visibility-tools
After dropping devices to concentrate on mobile device management, Blackberry is poised to take on IoT security under John Chen’s leadership
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404392/Blackberry-changes-tack-to-secure-enterprise-internet-of-things
Administrators should upgrade to the latest version of Microsoft PowerShell and enable extended logging and monitoring capabilities in the light of a surge in related security threats, warn researchers
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404333/PowerShell-security-threats-greater-than-ever-researchers-warn
How can information security professionals help businesses to understand the cyber risks across increasingly digital businesses?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Simplify-infosec-messages-If-not-X-then-Y-and-Z
Security researchers are urging ISPs to issue emergency patches for Marai botnet infections after 2,374 TalkTalk routers were linked in a regional botnet
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404326/More-than-2000-TalkTalk-routers-hijacked-by-Mirai-botnet-variant
The UAE is already a leader in areas such as smart city developments, and 2017 looks set to see organisations in the country increase its adoption of other transformational IT
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404250/The-United-Arab-Emirates-enterprise-IT-trends-for-2017
Most iOS apps in the enterprise pose potential security risks, according to research by Appthority
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404262/Few-iOS-apps-in-enterprises-meet-Apples-new-security-mandate
Each year, TechTarget looks at how CIOs and senior IT decision-makers will be investing in IT in the 12 months ahead
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404188/IT-Priorities-2017-What-will-IT-decision-makers-be-focusing-on
How can information security professionals help organisations to understand the cyber risks across increasingly digital businesses?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Communication-is-key-to-cyber-security-in-digital-era
Forty companies sign up to apply IBM’s Watson cognitive computing systems to cyber security, but threat intelligence experts caution against total reliance on such systems
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404252/40-firms-to-trial-IBM-Watson-cognitive-computing-for-cyber-security
The latest breach of millions of user details prompts fresh calls for better security of user data and an alternative to passwords
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404205/Dailymotion-breach-prompts-calls-for-password-alternatives
How can information security professionals help businesses to understand the cyber risks across increasingly digital businesses?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-How-to-make-cyber-risk-easier-for-business-to-understand
Global confidence in ability to accurately assess cyber risk has fallen in the past year, but the UK has fallen below the global average
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404174/UK-falls-below-global-cyber-security-confidence
The UK was a keen participant in the formulation of new data protection laws for the European Union, but its electorate has since voted to leave the EU. How is that likely to affect data protection in the UK once Brexit is accomplished?
from ComputerWeekly: IT security http://www.computerweekly.com/feature/What-happens-to-data-protection-when-we-leave-the-EU
Former British diplomat Rob Luke takes up the role of the ICO’s second deputy commissioner in January 2017
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404130/The-ICO-drafts-in-expertise-of-former-diplomat
Europol and MasterCard hold a retail cyber attack simulation exercise to raise awareness of the issue and how to respond to attacks, as well as promote information sharing in the sector
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404120/Europol-hosts-simulated-cyber-attack-on-retail-sector
How can information security professionals help businesses to understand the cyber risks across increasingly digital businesses?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Cyber-risk-not-just-an-IT-issue
Data protection is to remain a key focus for IT security investment for European firms in 2017, but the emphasis is on cloud and mobile security as companies move to these technology platforms
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404112/UK-and-European-firms-to-continue-to-invest-in-data-protection-ahead-of-GDPR
Here is a rundown of Computer Weekly’s most popular ANZ enterprise IT articles for 2016
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403537/Top-10-ANZ-enterprise-IT-stories-of-2016
The 10 most popular Asean articles of 2016
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403540/Top-10-Asean-enterprise-IT-stories-of-2016
How can information security professionals help organisations to understand the cyber risks across increasingly digital businesses?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Cyber-security-must-be-recognised-as-a-fundamental-component-of-business
UK firms should prioritise defence against spear phishing as a key component of cyber attacks, according to security veteran Peter Wood
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404028/Security-veteran-urges-firms-to-prioritise-spear-phishing-defence
The UK’s National Crime Agency has contributed to the takedown of a cloud-based cyber crime network in a collaborative law enforcement operation involving 30 countries
from ComputerWeekly: IT security http://www.computerweekly.com/news/450404018/UK-helps-dismantle-Avalanche-global-cyber-network
UK academics uncover a vulnerability in online payment systems, which they say could have been used in the Tesco Bank cyber heist
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403998/Academics-link-payment-card-vulnerability-to-Tesco-Bank-cyber-heist
Broadband providers Post Office Broadband and Kcom are among a number of operators to have been hit by a hack targeting Zyxel routing hardware
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403957/Mirai-botnet-hits-Post-Office-Broadband-and-Kcom-customers
The US has introduced wide new hacking powers for federal agents a day after the UK’s Investigatory Powers Act firmed up bulk surveillance powers for intelligence and polices services
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403905/US-and-UK-government-expand-surveillance-powers
How can information security professionals help organisations to understand the cyber risks across increasingly digital businesses?
from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Cyber-security-is-everyones-responsibility
Users of Tor anonymous browsing urged to update to the latest versions of relevant software to block an exploit that collects IP and MAC addresses to identify users
from ComputerWeekly: IT security http://www.computerweekly.com/news/450403896/Mozilla-and-Tor-issue-patches-for-Firefox-flaw-exposing-Tor-users