Legacy vulnerabilities may be biggest enterprise cyber risk

Cyber attacks exploiting vulnerabilities in unpatched legacy systems, via consumer applications such as TikTok, and originating from friendly countries may be a bigger risk to the average organisation than... Read more »

Air India is latest victim of Sita hack

A cyber attack on the systems of airline IT services specialist Sita, first reported earlier in 2021, has claimed another victim in the aviation sector, after Air India revealed... Read more »

Dutch researchers build security software to mimic human immune system

Dutch research institute TNO, in collaboration with various partners, has developed self-healing security software.   This software is based on the functioning of the human immune system, based on the... Read more »

How Bureau Veritas migrated 85% of its applications to the AWS cloud

With a strategic five-year plan, Bureau Veritas (BV) set out on its digital transformation project in 2015. Core to that transformation was migration of the vast bulk of its... Read more »

MEPs urge European Commission to revise UK adequacy decisions

MEPs have urged the European Commission (EC) to revise its draft decision to provide data adequacy to the UK to ensure that citizens in the European Union (EU) have... Read more »

CyberUK, bees and datacentres, Red Cross digital mapping – Computer Weekly Downtime Upload podcast

In this episode of the Computer Weekly Downtime Upload podcast, Caroline Donnelly and Brian McKenna are joined by Alex Scroxton, security editor, to discuss the recent CyberUK conference, bees... Read more »

Lack of developer attention to cloud security prompts alerts

The discovery of 23 leaky Android applications by Check Point Research (CPR) – which may, collectively, have put the personal data of more than 100 million users at risk... Read more »

Create a remote access security policy with this template

Considering the dramatic increase in remote access to IT resources during the COVID-19 pandemic, management of remote access security has become an essential activity. Organizations should establish policies and... Read more »

Pandemic tech use heightens consumer privacy fears

The dramatic expansion of the average person’s digital footprint due to Covid-19 restrictions is causing increased anxiety over personal privacy, and a feeling for many people that they are... Read more »

Malicious scans for at-risk systems start minutes after disclosure

Malicious actors begin to scan for at-risk systems within an average of 15 minutes of the disclosure of a new Common Vulnerability and Exposure (CVE), and in many instances... Read more »
Subscribe to our Newsletter