Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.
Recent: |
|
Past: |
|
The pandemic has bought many new security risks, particularly around remote working. As the UK government once again urges people to work from home under its 'Plan B' restrictions, these risks must be tackled as a priority → Read More
Cyber security has never been more challenging or important than it is today in rapidly changing business, regulatory, IT, and threat environments. There is therefore a need for a more structured approach to ensuring the right investment to support a comprehensive cyber defence capability. → Read More
The cyber security market has gained even greater importance in the post-Covid era and continues to grow and evolve. But what factors are driving trends in that market and what should your organisation consider when making cyber security investments? → Read More
IT service management (ITSM) tools are essential for many organisations to help optimise the design, delivery, support, use and governance of IT, but not all ITSM solutions are created equal, therefore selecting the right one is crucial. → Read More
The proliferation of digital identities, applications, data, security threats and compliance requirements means that Identity Governance and Administration (IGA) has never been more important, but not all organisations are approaching it in an effective and efficient way → Read More
Security in the digital era demands that businesses monitor their entire IT estate and resolve all alerts, but for many organisations the most effective way of doing that is SOCaaS → Read More
In this week’s Computer Weekly, artificial intelligence is still no match for the brain – we talk to Intel’s neuromorphic computing lab to see how researchers are trying to address that. Our buyer’s guide examines identity and access management. And we find out why datacentres are becoming a new target for financial investors. Read the issue now. → Read More
Identity management has traditionally focused on human identities, but non-human identities are proliferating and must not be overlooked. Businesses can reduce risk by managing both types of identity in the same way using a services-based approach → Read More
Modernising identity governance and administration (IGA) capabilities is essential for organisations to manage identities effectively to ensure they remain competitive, compliant and secure → Read More
Most organisations are seeking to step up their digital transformation efforts, but history has shown that such efforts can be doomed to failure if they take the wrong approach. → Read More
Business resilience management is key to business survival in the face of rapidly changing IT, cyber threat and regulatory environments. → Read More
The rapidly changing business, regulatory and IT environment makes IAM a tough nut to crack for large multinationals. → Read More
Business continuity and cyber security remain largely in separate siloes. But changes in the IT and cyber threat landscapes mean there is an urgent need for organisations to alter their approach. → Read More
Boards need to act to break the cycle of privacy compliance failures, and shift focus to aligning business purpose with privacy and to dealing with the real risk of data driven marketing, warns PwC’s GDPR and data protection lead → Read More
Elected officials cannot be trusted to enact effective cyber security legislation and social media firms should be subject to strict privacy regulation, according to most information security professionals in a survey. → Read More
While passwordless security remains just out of reach, a non-profit organisation has developed a mechanism that it says makes passwords exponentially more difficult to crack. → Read More
18 million UK users are among the more than 400 million at risk of account hijacking after phone numbers linked to their Facebook accounts were found in an open online database → Read More
Researchers at Check Point have identified a security flaw in Android-based smartphones that exposes vulnerable users to phishing attacks. → Read More
Operators of the TrickBot banking Trojan have switched to a new downloader to evade detection and analysis for a high-volume malicious spam campaign targeting business, researchers warn → Read More
Security researchers have discovered a web social engineering toolkit that enables cyber criminals to create fake update notification campaigns. → Read More