Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-16 08:25:58 |
Financial services CISOs prioritise GDPR – but their service providers might not have (lien direct) |
Survey shows 52% of CISOs working in the finance sector have made compliance with the EU's General Data Protection Regulation an investment priority |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-16 07:09:17 |
Ransomware: Protect yourself with good backup and cloud policies (lien direct) |
More ransomware attacks are likely. The best way to protect against them is to have up-to-date in-house backups and to ensure cloud backups are adequately protected and available |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-16 04:30:37 |
Qatar\'s Milaha Maritime and Logistics upgrades firewall to ensure global network performance (lien direct) |
Middle East marine and logistics company has improved its firewall to support global expansion |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-16 04:30:05 |
Five steps for business after WannaCry cyber attack (lien direct) |
WannaCry reveals some important facts about our dependence on the internet and IT |
|
Wannacry
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-15 11:47:07 |
Global ransomware attack could be long-awaited wake-up call (lien direct) |
A failure by many organisations to take cyber security seriously has long been blamed on the lack of a single significant event to shake things up. Does WannaCry fit the bill? |
|
Wannacry
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-15 09:01:20 |
MPs and peers urged not to use personal email as WannaCry spreads (lien direct) |
MPs and peers have been warned not to use personal emails on parliamentary Windows computers in the wake of WannaCry ransomware outbreak |
|
Wannacry
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-15 08:39:04 |
Attackers have no need of zero-days, breach data shows (lien direct) |
Cyber attackers do not have to use previously unseen or extremely sophisticated attacks to bypass defences, analysis of publicly reported breaches in the past year reveals |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-15 05:45:40 |
Businesses urged to apply Windows patch to avert WannaCry attacks (lien direct) |
Security advisers are urging organisations to patch their Windows systems to avert a possible second wave of an unprecedented, indiscriminate ransomware attack |
|
Wannacry
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-15 04:59:46 |
GDPR: a quick start guide (lien direct) |
We look at how UK organisations can prepare for the General Data Protection Regulation |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-12 11:47:47 |
NHS hospitals hit in global ransomware attack (lien direct) |
Hospitals across England are reporting problems with IT systems that are affecting healthcare treatment, caused by what could be a global ransomware campaign enabled by a leaked NSA exploit |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-12 10:45:48 |
Five cyber security imperatives for all companies (lien direct) |
There are five things all companies should ensure they are doing in terms of cyber security |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-12 07:00:30 |
ICO reports record number of data breaches and fines (lien direct) |
The UK privacy watchdog reports that it has dealt with more data breach reports and issued more fines in the past year than ever before |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-12 06:45:02 |
Mixed reaction to Trump\'s cyber security executive order (lien direct) |
The latest US presidential executive order on cyber security has been met mainly with praise, but critics say there is nothing really new and takes no decisive action |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-12 06:30:46 |
Why smart cities need to become smarter about technology (lien direct) |
Cities are experimenting with smarter ways to use technologies to improve the life of citizens, but their projects are fragmented. Is there a better approach? |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-11 04:15:42 |
Allianz researchers working with car makers on cyber security (lien direct) |
Allianz Germany is working with the local car manufacturing industry to highlight the vulnerabilities in the electronics systems of vehicles that can be exploited by criminals |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-10 08:15:36 |
Automation can turn tables on cyber attackers (lien direct) |
Security defenders should use automation to turn the tables on attackers, according to the CTO of the US Department of Homeland Security |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-10 03:30:37 |
Blockchain economy on the horizon (lien direct) |
Blockchain technologies will enable many new and disruptive business models than the internet itself, an expert predicts |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-09 19:15:38 |
Blockchain gains momentum in the Middle East (lien direct) |
Blockchain is gathering pace in the Middle East, with the United Arab Emirates leading the way |
Guideline
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-09 10:45:36 |
Cognitive security is the future, says Martin Kuppinger (lien direct) |
Modern computing capabilities combined with cognitive technology has huge potential for tackling unknown attack patterns and addressing the security skills shortage, says Martin Kuppinger |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-07 19:00:55 |
Barclays launches £10m UK digital safety campaign (lien direct) |
Barclays is to lead a £10m campaign against digital fraud as research reveals London, Bristol and Birmingham are scam hotspots, with young adults most at risk |
Guideline
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-05 10:22:46 |
Debenhams data breach underlines need for supply chain security (lien direct) |
Data breach at retailer again highlights the importance of data protection and ensuring cyber security standards across an organisation's entire supply chain, say security commentators |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-05 06:40:57 |
Ex-government privacy advisor calls for \'fundamental review\' of Gov.uk Verify identity scheme (lien direct) |
Former Cabinet Office privacy group co-chair says the Verify identity assurance programme needs 'honest and fundamental reset' |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-05 06:30:57 |
Gov.uk Verify and identity assurance - it\'s time for a rethink (lien direct) |
The government's Verify identity platform is not meeting user needs - it's time to step back and review how best to make online identity for public services work |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-05 05:45:23 |
Lib Dems decry surveillance plans exposed in leaked documents (lien direct) |
After the election, the UK government plans to introduce extreme mass surveillance capabilities, according to documents leaked to the Open Rights Group |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-04 11:25:35 |
Testing is key to IoT security, says researcher (lien direct) |
Building an effective testing process across all elements associated with a product is key to securing the internet of things, according to a researcher in the field |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-04 07:15:49 |
Phishing gets personal with fake Google Docs app (lien direct) |
A phishing scam targeting users of Google Docs demonstrates that attacks on personal accounts to steal credentials and other personal data are likely to increase to get around corporate security controls |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-03 09:39:02 |
Cognitive security is key to cyber arms race, says KuppingerCole (lien direct) |
Cognitive computing technology is an area of artificial intelligence that is expected to help provide businesses with the security tools they need to deal with new and emerging cyber threats |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-03 08:00:05 |
Fake tech support spiders on the world wide web (lien direct) |
Fake tech support should be incorporated into security awareness training as it can be a highly effective way to trick employees into granting access to enterprise computer systems |
|
|
★★★
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-02 08:00:07 |
UBS applies data protection for compliance and competitive advantage (lien direct) |
Swiss bank UBS aims to get greater value out of investments in sensitive data protection systems by using its security capabilities as a differentiator |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-02 06:05:10 |
\'Internet terrorist\' Samata Ullah jailed for eight years (lien direct) |
Samata Ullah, an unemployed resident of Cardiff, has been sentenced after pleading guilty to five terrorism offences |
Guideline
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-02 06:00:55 |
DDoS a top security and business issue, study shows (lien direct) |
DNS should be at the core of information security strategies as DDoS attacks increasingly form part of wider cyber attacks and continue to ramp up to unprecedented levels, warns Neustar |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-02 05:15:59 |
Intel urges business to patch critical remote-execution flaw (lien direct) |
Intel advises business customers to apply a security update for some versions of its administration firmware for vPro processors to fix a remote execution flaw |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-02 02:34:46 |
Dealing with data under GDPR (lien direct) |
With the General Data Protection Regulation due to be enforced next year, Computer Weekly looks at how to address the requirements to suit your business |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-29 13:14:41 |
IS supporter Samata Ullah branded a “new and dangerous breed of terrorist" (lien direct) |
A 34 year old man from Cardiff, Samata Ullah, who posted encryption training videos on a radical Islamic blog was a dangerous “cyber terrorist,†a court heard yesterday.
|
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-28 09:27:49 |
Many companies lack GDPR plan, PwC data shows (lien direct) |
Many organisations around the world do not have a coherent plan to prepare for compliance with the EU's new data protection laws |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-28 08:30:31 |
Facebook pledges to counteract government propaganda (lien direct) |
Facebook has pledged to take action to stop governments exploiting its platform to influence opinion in other countries |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-28 04:30:39 |
Education key to reducing systems attacks, says university security manager (lien direct) |
Central Lancashire University's IT networks and security manager says educating users is key to avoiding cyber security flaws |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-27 09:12:30 |
Forge ahead with GDPR, says ICO (lien direct) |
UK organisations cannot afford to lose the public's trust in their ability to safeguard personal data and should be working to ensure they have that capability, says the Information Commissioner's Office |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-27 05:00:57 |
(Déjà vu) Security Think Tank: How one organisation\'s incident can become everyone\'s defence (lien direct) |
How can organisations use red teaming to identify security gaps? |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-27 00:01:59 |
Cyber espionage up, but basic defences still down, DBIR shows (lien direct) |
Organisations are still failing to address basic security issues and well-known attack methods, Verizon's latest Data Breach Investigations Report reveals for a second year in a row |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-26 10:30:32 |
McAfee links Saudi Shamoon attacks (lien direct) |
McAfee has published data showing the evolution of Shamoon malware campaigns as the company announces increased commitment to cyber threat research |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-26 07:30:25 |
(Déjà vu) Security Think Tank: Red teaming benefits to business can be profound (lien direct) |
How can organisations use red teaming to identify security gaps? |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-26 04:55:27 |
Russian cyber espionage highlights need to improve email security (lien direct) |
Security experts are advising political parties and businesses to pay more attention to email security after the latest revelations about a Russian cyber espionage group |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-26 03:45:24 |
Danish defence minister accuses Russia of cyber espionage (lien direct) |
Government officials in Denmark believe they have been under attack from Russia-based hackers |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-26 00:00:47 |
Cyber attackers are more ambitious than ever, Symantec warns (lien direct) |
Cyber attackers displayed new levels of ambition in 2016, according to the latest threat report from security firm Symantec |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-25 09:25:21 |
Court grants Lauri Love appeal against extradition (lien direct) |
Alleged hacker's appeal court hearing will be the first major test of the UK's forum bar, designed to protect vulnerable people from extradition |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-25 05:15:35 |
Storm clouds gather for US-EU Privacy Shield data deal (lien direct) |
The European Parliament justice committee launches unprecedented criticism of Privacy Shield, while the Irish Court mulls future of binding corporate contracts |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-25 04:45:52 |
(Déjà vu) Security Think Tank: How to maximise the value of red team exercises (lien direct) |
How can organisations use red teaming to identify security gaps? |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-25 02:45:23 |
Tips on how to get a Hana implementation off the ground (lien direct) |
The confusion around SAP's in-memory database is holding many customers back. We look at some of the approaches being taken to simplify implementation |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-24 19:15:53 |
One in eight people have suffered a healthcare data breach (lien direct) |
A quarter of victims had their NI number compromised and 18% saw their biometric identifiers compromised, but most people trust healthcare providers with their data |
|
|
|