Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-24 07:31:48 |
Cyber security centre of excellence to open at Cardiff University (lien direct) |
Cardiff University and Airbus have launched the first centre of its kind in Europe to tackle cyber attacks on critical infrastructure |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-24 07:30:47 |
(Déjà vu) Security Think Tank: Red teaming can help businesses identify best security controls (lien direct) |
How can organisations use red teaming to identify security gaps? |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-24 04:46:57 |
Collaboration is key to fighting cyber crime, say UK police (lien direct) |
Cyber crime will be defeated only through collaboration, according to UK police, the Global Cyber Alliance, Cyber Defence Alliance and Verizon |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-21 10:30:57 |
Information security key to digital era business models (lien direct) |
Security will become increasingly important as industries seek to collaborate and use each other's capabilities to enable new business models, with the banking sector leading the way |
Guideline
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-21 08:00:37 |
Security Think Tank: How to get the best out of red team exercises (lien direct) |
How can organisations use red teaming to identify security gaps? |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-21 06:30:46 |
UK likely to face national cyber emergency, says NCSC (lien direct) |
The UK is likely to face a level-1 cyber attack at some point in the future, according to the National Cyber Security Centre (NCSC) |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-20 09:15:51 |
Mastercard integrates biometric technology into cards (lien direct) |
MasterCard tests out biometric technology embedded into payment cards, with further trials in Europe planned |
|
|
★★★
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-20 07:05:22 |
Banks suffer average of 85 attempted serious cyber attacks a year, and one-third are successful (lien direct) |
Banks face daily cyber attacks, many of which succeed in stealing data, research finds |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-20 06:24:31 |
Security Think Tank: Red teaming will benefit security mature organisations most (lien direct) |
How can organisations use red teaming to identify security gaps? |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-20 05:53:53 |
People present the biggest challenge, say infosec professionals (lien direct) |
More than 80% of security professionals identify people as the industry's biggest challenge, but companies are becoming better prepared to deal with cyber breaches, a survey reveals |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-20 04:00:40 |
InterContinental Hotel Group reveals extent of malware attack (lien direct) |
Hotel group InterContinental (IHG) reveals that malware attempting to glean payment card details sat undetected on its network in the US for three months |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-20 03:45:53 |
Human interaction still key to cyber attacks, study reveals (lien direct) |
An analysis of threats faced by organisations in the first quarter of 2017 reveals that cyber attackers still rely heavily on user interaction |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-19 10:55:31 |
Conflicting advice blurs cyber safety (lien direct) |
Companies are being overloaded with information about cyber threats and complain of a lack of relevant advice |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-19 09:00:14 |
Skype most popular communication channel for cyber criminals (lien direct) |
The cyber criminal network is truly global and collaborative, making use of popular messaging services, a study has revealed |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-06 10:45:07 |
Anti-trust complaints target Microsoft in the European Union (lien direct) |
Microsoft comes under pressure as software suppliers raise market abuse complaints with the European Commission over bundling of Defender security software with Windows |
|
|
★★
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-06 07:15:42 |
McAfee report reveals five challenges to cyber threat intelligence (lien direct) |
McAfee Labs' latest report details the challenges facing threat intelligence sharing efforts and reveals growing trends in malware, ransomware, mobile malware and other threats |
|
|
★★★★
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-06 04:18:19 |
Interview: F-Secure\'s Mikko Hyppönen on the Nordics, Russia and the internet of insecure things (lien direct) |
Computer Weekly sat down with Finnish cyber security expert Mikko Hyppönen to talk about security in the Nordics, Russia and the trouble with connected devices
|
|
|
★★
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-05 19:15:51 |
Middle East enterprises urged to embrace governance, risk and compliance (lien direct) |
The enforcement of corporate governance issues is still variable throughout the Middle East and making a strong business case for investment in GRC can be a challenge. |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-05 11:00:46 |
Tablet loan service helps Emirates get round US device ban (lien direct) |
Emirates is attempting to mitigate the impact of the laptop and tablet ban on flights travelling to the US by offering tablet loans to business and first class passengers |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-05 09:00:38 |
No More Ransom expands capacity (lien direct) |
More organisations have joined an anti-ransomware cross-industry initiative, boosting its capacity to help victims of ransomware as attackers begin to focus on business targets |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-05 04:44:01 |
Nearly a quarter of security pros are blind to encrypted threats (lien direct) |
A sizeable proportion of security professionals do not know how their organisation is addressing cyber threats hiding in encryption |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-04 09:15:50 |
Chinese hacking group targeted firms though IT MSPs (lien direct) |
Security researchers have uncovered a China-based cyber espionage campaign that targeted IT services firms and their customers, underlining the need for supply chain security |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-04 06:30:37 |
Trump signs bill to repeal Obama-era internet privacy protections (lien direct) |
US president Donald Trump approves the repeal of planned privacy protections, opening the way for ISPs to sell customer browsing data
|
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-04 04:36:32 |
McAfee re-established as independent cyber security firm (lien direct) |
Intel has spun out its security division as independent firm McAfee, which says it is dedicated to enabling technology, people and organisations to work together
|
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-03 06:45:12 |
UK nuclear stations on terror alert for cyber attacks (lien direct) |
The cyber security industry has been urged to co-operate with government to protect UK critical national infrastructure from cyber attacks. |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-04-03 06:15:04 |
WikiLeaks publishes code that could expose CIA hacking operations (lien direct) |
The latest files published by WikiLeaks reveal techniques used by the CIA to hide its hacking tools, potentially making it possible to identify the agency's hacking operations |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-03-31 12:00:36 |
UK leading in using red team cyber security testing (lien direct) |
Red teaming is set to become a key approach to ensuring cyber security controls and processes are fit for purpose and compliant with regulations, and the UK is leading the way |
Guideline
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-03-31 09:30:36 |
Enterprise wireless: trends and developments in 2017 (lien direct) |
What will be the main developments in wireless this year and what challenges will this bring to enterprises? |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-03-31 05:45:24 |
Rudd backs down on end-to-end encryption (lien direct) |
Lib Dems welcome government's apparent U-turn on seeking to restrict end-to-end encryption for popular messaging apps and online communication services |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-03-30 11:00:12 |
(Déjà vu) Security Think Tank: Business input will help keep security usable and cost effective (lien direct) |
How can organisations maintain usability and keep support costs low without compromising on security?
|
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-03-30 08:30:45 |
First cyber security startups graduate from GCHQ accelerator (lien direct) |
The first group of companies has completed a government-led cyber accelerator programme aimed at helping UK startups take the lead in producing the next generation of cyber security systems, with another round to be announced in 2017 |
Guideline
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-03-30 05:55:10 |
More than a quarter of SME staff lack cyber threat training (lien direct) |
Data from cyber insurance provider CFC Underwriting shows that 38% of its claims in 2016 could have been avoided through better staff education and training on cyber risks |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-03-30 05:30:04 |
Nearly a third of malware attacks are zero-day exploits (lien direct) |
Companies could be missing up to third of malware that is targeting them, according to a report by WatchGuard
|
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-03-29 12:30:57 |
Thorn CEO on using machine learning and tech partnerships to tackle online child sex abuse (lien direct) |
The CEO of US-based no-profit Thorn explains how cross-industry collaboration and machine learning is helping her organisation stay one step ahead of online child sex abusers |
|
|
★★★★
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-03-29 09:24:31 |
Girls across UK take part in cyber skills event to promote tech careers (lien direct) |
Young women from across the UK took part in cyber security event CyberFirst Girls, designed to promote girls with cyber skills and encourage them to pursue careers in technology |
|
|
★★★
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-03-29 07:15:50 |
(Déjà vu) Security Think Tank: Four guidelines on how balance security, usability and cost (lien direct) |
How can organisations maintain usability and keep support costs low without compromising on security? |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-03-29 07:00:35 |
Belfast Waterfront centre equipped with state of the art network (lien direct) |
Belfast City Council has refitted its Waterfront conference and entertainment venue with new smart building connectivity to enhance the staff and visitor experience |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-03-29 06:43:16 |
Non-malware attacks pose bigger threat than malicious software (lien direct) |
Malware-free cyber attacks are on the rise and artificial intelligence in cyber security is still far from replacing humans, according to most cyber security researchers |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-03-29 06:08:51 |
Cyber attacks cost financial firms up to £1.6m a time (lien direct) |
The costs associated with cyber attacks on the financial sector are rising as organisations face increasingly sophisticated threats, research shows |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-03-29 05:30:26 |
In-flight electronics ban unsustainable, says IATA (lien direct) |
The IATA calls on the American and British governments to urgently find alternatives to restricting the carry-on of laptops and tablets on Middle Eastern flights |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-03-29 04:30:25 |
US internet users\' browsing history may soon be up for sale (lien direct) |
US president Donald Trump is expected to approve a resolution repealing planned privacy protections that will enable ISPs to sell customer browsing data |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-03-28 19:15:50 |
Threats grow in Saudi Arabia\'s cyber sector (lien direct) |
Saudi Arabia's wealth makes it an attractive target for cyber criminals, but what have been the recent trends in cyber crime? |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-03-28 06:04:35 |
(Déjà vu) Security Think Tank: Use flexible tech backed by security policy for competitive edge (lien direct) |
How can organisations maintain usability and keep support costs low without compromising on security? |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-03-27 12:00:28 |
(Déjà vu) Security Think Tank: Enable people using good security and risk methodology (lien direct) |
How can organisations maintain usability and keep support costs low without compromising on security? |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-03-27 11:16:26 |
Nearly half of UK businesses lack a cyber security strategy (lien direct) |
Commentators call on security industry to do more to help businesses understand the value of data and how best to protect it
|
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-03-27 08:00:17 |
UK business least likely to offer rewards to infosec professionals (lien direct) |
UK firms need to rethink incentives to attract and retain people with cyber security skills, according to the findings of a recent global study |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-03-24 13:00:04 |
UK impersonation fraud up 39% in last quarter of 2016 (lien direct) |
Just ahead of the end of the UK tax year, a survey underlines the importance of guarding against business email compromise aimed at stealing data and money |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-03-24 11:15:34 |
Case study: How the Department for Education deployed flexible IT (lien direct) |
The Department of Education has upgraded its ageing datacentre to the Azure cloud and Office 365, and rolled out Microsoft Surface devices |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-03-24 08:20:12 |
(Déjà vu) Security Think Tank: Minimise data to cut costs and comply with GDPR (lien direct) |
How can organisations maintain usability and keep support costs low without compromising on security? |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-03-24 07:45:49 |
FBI director reiterates call for action on encryption (lien direct) |
The world is wasting time in resolving the conflict between privacy and public safety, and should consider an international framework on encrypted data access, says FBI director James Comey |
|
|
|