Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-20 12:00:30 |
GDPR: Five myths you will encounter on your compliance journey (lien direct) |
The General Data Protection Regulation comes into force in May 2018. We explore common myths surrounding GDPR |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-20 11:30:42 |
Testing was key to Rio Olympics cyber security success (lien direct) |
Two years of testing in the run up to the Rio 2016 Olympics were vital to ensuring cyber defences were effective, according to the chief information security officer for the games |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-20 08:15:51 |
Web hosting firm agrees to pay $1m ransomware demand (lien direct) |
South Korean hosting firm Nayana agrees to pay more than $1m to restore data that was encrypted by a ransomware attack on its Linux servers on 10 June 2017 |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-20 04:43:44 |
Republican contractor exposes personal data of nearly 200 million US voters (lien direct) |
A misconfigured database containing the sensitive personal details of more than 198 million US voters was left exposed to the internet by a firm working on behalf of the Republican National Committee |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-20 04:30:12 |
Emirates Islamic uses blockchain to reduce cheque fraud (lien direct) |
Islamic finance firm is using a combination of blockchain technology and QR codes to minimise the use of fraudulent cheques |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-20 03:23:18 |
Nordic CIO interview: René Engman, Viking Line (lien direct) |
Viking Line CIO tells Computer Weekly about his strategy for meeting the upcoming EU General Data Protection Regulation |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-19 19:15:31 |
Abu Dhabi uses surveillance tech to protect Grand Prix (lien direct) |
Police use surveillance technology and monitoring software to ensure public safety when Formula One visits the UAE each year |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-19 07:00:31 |
The Macedonian surveillance scandal that brought down a government (lien direct) |
Macedonia has been accused of using surveillance technology for covert spying - the subsequent political protests were instrumental in the ruling party losing power after 10 years |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-19 04:50:31 |
MEPs propose ban on encryption backdoors (lien direct) |
A European parliamentary committee has proposed a ban on backdoors that allow governments to access encrypted communications |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-16 04:00:09 |
10 ways to prevent breaches and minimise impact (lien direct) |
Attackers are continually adapting to security technologies to fly under the radar, but taking action in 10 key areas can reduce the risk of breaches and minimise their impact, according to a resilience expert |
|
|
★★★
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-15 09:29:52 |
University College London hit by ransomware attack (lien direct) |
University restricts access to several IT systems and file shares to halt spread of malware |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-15 04:00:50 |
PaloAlto Networks partners with US Girl Scouts on security skills (lien direct) |
Palo Alto Networks is partnering with the Girl Scouts of the USA to develop cyber security badges to foster knowledge of the topic and support interest in the profession |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-14 09:05:00 |
Risk of major database attack, warns Rapid7 (lien direct) |
There will be a major database attack in the next year, unless businesses act to put in appropriate protection measures, a security firm has warned |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-14 07:15:30 |
Microchips implanted in hands could be in use for payments in 20 years (lien direct) |
UK consumers are becoming more accepting that biometric authentication will become the norm for payments |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-14 05:00:34 |
Palo Alto Networks set to drive new era in security innovation (lien direct) |
Palo Alto Networks announces a cloud-based application framework the company claims will enable its security platform to disrupt and change the security industry completely within a decade |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-12 07:30:00 |
Virgin Media patches routers after researchers find flaw (lien direct) |
Virgin Media has patched its wireless routers to fix a flaw that could allow attackers to gain unauthorised administrative-level access to the devices |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-09 08:55:51 |
Infosec17: UK business should be working on GDPR compliance, says ICO (lien direct) |
With less than a year to the deadline for compliance with the General Data Protection Regulation, all companies should have assessed what they need to do and should be working on that, says the Information Commissioner's Office |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-09 07:45:03 |
Infosec17: Society needs to address encryption dilemma (lien direct) |
There needs to be a discussion about how to balance the interests of privacy, security and the tech industry, says Infosecurity Europe Hall of Fame inductee |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-09 07:33:48 |
Patent group prepares for tough data protection laws by moving HR to the cloud (lien direct) |
CPA Global to replace ERP-based HR system as it gears up to comply with the General Data Protection Regulation |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-08 11:10:23 |
Watchdog fails to audit intelligence agencies\' sharing of surveillance data with industry (lien direct) |
New privacy concerns raised after intelligence watchdog confirms it has never audited or inspected the way intelligence services share sensitive surveillance databases with industry partners |
|
|
★★★★★
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-07 11:12:34 |
Rethink risk through the lens of antifragility (lien direct) |
Antifragility is an exciting alternative that fuses value and risk, and CIOs and IT executives are well positioned to help |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-07 10:00:07 |
Infosec17: IoT security regulation coming, warns Bruce Schneier (lien direct) |
A security expert urges the security industry to engage with government to ensure that regulation of IoT security is smart regulation |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-07 05:45:14 |
Infosec17: WannaCry could be demise of ransomware (lien direct) |
WannaCry could lead to the decline and even demise of ransomware due to its poor implementation and its role in underlining the importance of defending against this threat, says a security expert |
Guideline
|
Wannacry
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-07 04:17:42 |
Many non-voters would vote if they could do it online (lien direct) |
An online voting system would increase turnout in general elections if it was available in the UK |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-06 11:00:24 |
Executive interview: Brian Kelly, chief security officer, Rackspace (lien direct) |
The IT security business is a cat-and-mouse game to thwart attacks, and arm-wrestling determined hackers who adapt their code until they succeed, says Rackspace CSO |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-06 09:48:53 |
UK voters worried that election will be targeted by hackers (lien direct) |
Online voting is being held back in the UK because of fears that cyber criminals could influence the results |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-06 08:36:39 |
Infosec17: Recruit agile people for agile security teams (lien direct) |
Organisations should enlist agile people to join agile security teams that are able to deal with the continually changing cyber threat landscape, say security team leaders |
Guideline
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-06 05:51:35 |
Vodafone mobilises against fake news and hate speech (lien direct) |
Mobile network operator has introduced new global rules to prevent its advertising from appearing on outlets that create and share hate speech and fake news |
|
|
★★★★
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-06 05:39:33 |
Tieto and Verisec to develop eID for Sweden\'s public sector services (lien direct) |
Suppliers are reacting to the rapid adoption of digital government in Sweden with electronic ID technology that will replace passwords |
|
|
★★★
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-06 04:00:51 |
UK firms stockpiling bitcoins for ransomware attacks (lien direct) |
Large UK firms are prepared to pay out more than £136,000 on average to cyber criminals who launch ransomware attacks, a survey has revealed |
|
|
★★★
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-05 19:00:58 |
Europe faces shortage of 350,000 cyber security professionals by 2022 (lien direct) |
European companies are expected to go on the world's biggest cyber security hiring spree in the next 12 months, driving demand for cyber talent that will far outstrip supply, a report has revealed |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-05 08:00:29 |
(Déjà vu) Security Think Tank: Scan, educate and back up to block email threats (lien direct) |
What strategies should organisations follow to block malware attachments which continue to account for two-thirds of malware infections that result in data breaches? |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-05 05:30:09 |
Mixed reactions to PM\'s calls to regulate cyber space to prevent terrorism (lien direct) |
Prime minister Theresa May's call for regulation of the internet to prevent terrorism planning has drawn support from some quarters but criticism from others |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-05 04:31:54 |
Mass collection of data on population \'illegal\', UK court told (lien direct) |
Investigatory Powers Tribunal hearing challenges GCHQ over legality of mass surveillance, as government plans moves to control encryption
|
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-02 12:15:40 |
(Déjà vu) Security Think Tank: Equip employees to guard against malicious malware (lien direct) |
What strategies should organisations follow to block malware attachments which continue to account for two-thirds of malware infections that result in data breaches? |
|
|
★★★
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-02 09:45:19 |
GDPR about change management, says startup DPO (lien direct) |
There are threats and risks associated with the GDPR, but one data protection officer believes organisations should focus on the business opportunities instead |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-02 09:00:04 |
Doug Cutting, \'father\' of Hadoop, talks about big data tech evolution (lien direct) |
In a Q&A interview, the “father†of Hadoop, Doug Cutting, talks about the cyber-security applications of the stack, as well as Hadoop's evolution |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-02 06:30:31 |
Kmart cyber attack highlights PoS vulnerabilities (lien direct) |
The cyber attack on Kmart should be a major wake up call for retailers to review the security of their point-of-sale systems, say security experts |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-02 04:25:19 |
Financial malware more than twice as prevalent as ransomware (lien direct) |
While ransomware continues to make the headlines, particularly in the wake of WannaCry, research has revealed that financial threats are 2.5 times more prevalent |
|
Wannacry
|
★★★★★
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-01 06:38:14 |
Catching phish: How to avoid users getting hooked (lien direct) |
Effective IT security boils down to user education. We find out how one company got on with testing its staff |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-01 06:31:31 |
(Déjà vu) Security Think Tank: Don\'t blame employees – give them secure working environments (lien direct) |
What strategies should organisations follow to block malware attachments which continue to account for two-thirds of malware infections that result in data breaches? |
|
|
★★
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-01 05:51:33 |
Enterprises struggle with emergency patching (lien direct) |
Companies are struggling to maintain emergency patch cycles, despite the fact that enterprise reliance on legacy systems often means emergency patches are an everyday fact of life, a survey shows
|
|
|
★★★★
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-06-01 04:45:39 |
Top UK firms\' websites violate key GDPR principle (lien direct) |
Just over one-third of all the public web pages of leading UK companies that collect personal information violate a key principle of new European data protection regulations |
Guideline
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-31 19:00:58 |
UK issues record data protection fines in the past year (lien direct) |
The UK was one of the most active regions for regulatory enforcement action in Europe last year in terms of fines and enforcement notices issued over data protection |
|
|
★★★★
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-31 09:46:57 |
WannaCry shows validity of risk-based security, says RSA head (lien direct) |
WannaCry and other recent cyber attacks underline the importance of adopting a risk-based approach to security, says RSA president |
|
Wannacry
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-31 05:34:11 |
(Déjà vu) Security Think Tank: Key things to consider to block malicious email attachments (lien direct) |
What strategies should organisations follow to block malware attachments which continue to account for two-thirds of malware infections that result in data breaches? |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-31 04:34:28 |
Shadow Brokers prepares zero-day subscription service (lien direct) |
Businesses may face an onslaught of zero-day attacks soon as the group that leaked the NSA exploits used in the WannaCry ransomware attacks prepares to release more stolen code |
|
Wannacry
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-26 11:15:50 |
Understanding the economic value of your personal data (lien direct) |
Your personal data is worthless – it's only when it's processed by the Facebooks or Googles of this world that it has business value |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-26 09:15:22 |
(Déjà vu) Security Think Tank: Employees are one of the greatest defences (lien direct) |
What strategies should organisations follow to block malware attachments which continue to account for two-thirds of malware infections that result in data breaches? |
|
|
|
![ComputerWeekly.webp](./Ressources/img/ComputerWeekly.webp) |
2017-05-26 09:08:05 |
People can be strongest link in cyber security, says NCSC (lien direct) |
People are often seen as the weakest link when it comes to cyber security, but that must change, says the National Cyber Security Centre |
|
|
|