Warwick Ashford, ComputerWeekly

Warwick Ashford

ComputerWeekly

United Kingdom

Contact Warwick

Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.

Start free trial

Recent:
  • Unknown
Past:
  • ComputerWeekly

Past articles by Warwick:

Enabling secure remote working is once again a top priority

The pandemic has bought many new security risks, particularly around remote working. As the UK government once again urges people to work from home under its 'Plan B' restrictions, these risks must be tackled as a priority → Read More

Invest in cyber security with confidence using a structured approach

Cyber security has never been more challenging or important than it is today in rapidly changing business, regulatory, IT, and threat environments. There is therefore a need for a more structured approach to ensuring the right investment to support a comprehensive cyber defence capability. → Read More

How the cyber security market is evolving

The cyber security market has gained even greater importance in the post-Covid era and continues to grow and evolve. But what factors are driving trends in that market and what should your organisation consider when making cyber security investments? → Read More

Choose the right ITSM tool for digital era success

IT service management (ITSM) tools are essential for many organisations to help optimise the design, delivery, support, use and governance of IT, but not all ITSM solutions are created equal, therefore selecting the right one is crucial. → Read More

Policies key to revolutionising Identity Governance and Administration

The proliferation of digital identities, applications, data, security threats and compliance requirements means that Identity Governance and Administration (IGA) has never been more important, but not all organisations are approaching it in an effective and efficient way → Read More

Why your business needs SOC as a service

Security in the digital era demands that businesses monitor their entire IT estate and resolve all alerts, but for many organisations the most effective way of doing that is SOCaaS → Read More

Can AI ever match the power of the brain?

In this week’s Computer Weekly, artificial intelligence is still no match for the brain – we talk to Intel’s neuromorphic computing lab to see how researchers are trying to address that. Our buyer’s guide examines identity and access management. And we find out why datacentres are becoming a new target for financial investors. Read the issue now. → Read More

How to manage non-human identities

Identity management has traditionally focused on human identities, but non-human identities are proliferating and must not be overlooked. Businesses can reduce risk by managing both types of identity in the same way using a services-based approach → Read More

How to modernise identity governance and administration

Modernising identity governance and administration (IGA) capabilities is essential for organisations to manage identities effectively to ensure they remain competitive, compliant and secure → Read More

Risk and reward: How to succeed in digital transformation

Most organisations are seeking to step up their digital transformation efforts, but history has shown that such efforts can be doomed to failure if they take the wrong approach. → Read More

Why business resilience management should be high on the agenda

Business resilience management is key to business survival in the face of rapidly changing IT, cyber threat and regulatory environments. → Read More

How to tackle the IAM challenges of multinational companies

The rapidly changing business, regulatory and IT environment makes IAM a tough nut to crack for large multinationals. → Read More

Time to rethink business continuity and cyber security

Business continuity and cyber security remain largely in separate siloes. But changes in the IT and cyber threat landscapes mean there is an urgent need for organisations to alter their approach. → Read More

Data-driven marketing, the real risk boards are missing

Boards need to act to break the cycle of privacy compliance failures, and shift focus to aligning business purpose with privacy and to dealing with the real risk of data driven marketing, warns PwC’s GDPR and data protection lead → Read More

Security pros doubt officials can enact effective security laws

Elected officials cannot be trusted to enact effective cyber security legislation and social media firms should be subject to strict privacy regulation, according to most information security professionals in a survey. → Read More

Tide Foundation aims to boost password security

While passwordless security remains just out of reach, a non-profit organisation has developed a mechanism that it says makes passwords exponentially more difficult to crack. → Read More

Latest Facebook security lapse exposes millions to account hijack

18 million UK users are among the more than 400 million at risk of account hijacking after phone numbers linked to their Facebook accounts were found in an open online database → Read More

Check Point warns of Android phishing attacks

Researchers at Check Point have identified a security flaw in Android-based smartphones that exposes vulnerable users to phishing attacks. → Read More

TrickBot Trojan switches to stealthy Ostap downloader

Operators of the TrickBot banking Trojan have switched to a new downloader to evade detection and analysis for a high-volume malicious spam campaign targeting business, researchers warn → Read More

Cyber criminals tap into web social engineering toolkit

Security researchers have discovered a web social engineering toolkit that enables cyber criminals to create fake update notification campaigns. → Read More