Dutch research institute TNO, in collaboration with various partners, has developed self-healing security software. This software is based on the functioning of the human immune system, based on the... Read more »
With a strategic five-year plan, Bureau Veritas (BV) set out on its digital transformation project in 2015. Core to that transformation was migration of the vast bulk of its... Read more »
MEPs have urged the European Commission (EC) to revise its draft decision to provide data adequacy to the UK to ensure that citizens in the European Union (EU) have... Read more »
In this episode of the Computer Weekly Downtime Upload podcast, Caroline Donnelly and Brian McKenna are joined by Alex Scroxton, security editor, to discuss the recent CyberUK conference, bees... Read more »
The discovery of 23 leaky Android applications by Check Point Research (CPR) – which may, collectively, have put the personal data of more than 100 million users at risk... Read more »
Considering the dramatic increase in remote access to IT resources during the COVID-19 pandemic, management of remote access security has become an essential activity. Organizations should establish policies and... Read more »
The dramatic expansion of the average person’s digital footprint due to Covid-19 restrictions is causing increased anxiety over personal privacy, and a feeling for many people that they are... Read more »
Malicious actors begin to scan for at-risk systems within an average of 15 minutes of the disclosure of a new Common Vulnerability and Exposure (CVE), and in many instances... Read more »
In a new low for the cyber criminal “fraternity”, the Conti ransomware gang has started to leak personally identifiable information about Irish hospital patients, stolen in its attack on... Read more »
Networking lynchpin Cisco is further cementing its dual role as a security supplier with a proposed acquisition of risk-based vulnerability management specialist Kenna Security, alongside a number of additions... Read more »