Identity and access management products
-
News
25 Feb 2025
Singapore rolls out guidelines to bolster cloud and datacentre resilience
New advisory guidelines to enhance resilience and security of cloud services and datacentres in Singapore amid potential service disruptions and growing cyber threats Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
31 Jan 2025
Can security operations ever be fully autonomous?
Focusing on targeted improvements, not full automation, is key to scaling security operations with AI Continue Reading
-
Definition
27 Feb 2025
What is a domain controller?
A domain controller is a server that processes requests for authentication from users and computers within a computer domain. Continue Reading
By- Gavin Wright
- Peter Loshin, Former Senior Technology Editor
-
News
26 Feb 2025
US intelligence chief Tulsi Gabbard probes UK demand for Apple’s encrypted data
A secret order issued by the UK against Apple would be a ‘clear and egregious violation’ if it provides back door access to Americans’ encrypted data, says US director of national intelligence Continue Reading
By- Bill Goodwin, Computer Weekly
-
Opinion
26 Feb 2025
Everything, everywhere, all at once: automated decision-making in public services
Despite the UK government's fervent embrace of artificial intelligence, there is still little meaningful transparency around the scope of the technology's deployment throughout public services Continue Reading
By- Jasleen Chaggar, Big Brother Watch
-
News
26 Feb 2025
Scottish police fail to record ethnicity in DNA database
Scottish policing bodies are failing to properly record and publish data on the ethnicity of arrested people, making it impossible to determine whether they are discriminating against certain sections of the population Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
25 Feb 2025
Singapore rolls out guidelines to bolster cloud and datacentre resilience
New advisory guidelines to enhance resilience and security of cloud services and datacentres in Singapore amid potential service disruptions and growing cyber threats Continue Reading
By- Aaron Tan, TechTarget
-
News
11 Feb 2025
F1’s Red Bull charges 1Password to protect its 2025 season
For the upcoming 2025 Formula 1 season, Oracle Red Bull Racing adds cyber security partner 1Password to its roster of team suppliers and sponsors Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
04 Feb 2025
A driving licence in an app is a boost for digital identity - but not for angry suppliers
It’s rare that a digital government development attracts interest from mainstream media, but last month’s announcement of a digital driving licence brought widespread national coverage and a mass ... Continue Reading
By- Bryan Glick, Editor in chief
-
Definition
31 Jan 2025
What is biometric verification?
Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing biological traits. Continue Reading
By- Michael Cobb
- Alexander S. Gillis, Technical Writer and Editor
- Rahul Awati
-
Opinion
31 Jan 2025
Can security operations ever be fully autonomous?
Focusing on targeted improvements, not full automation, is key to scaling security operations with AI Continue Reading
By- Pete Shoard
-
Definition
31 Jan 2025
What is biometrics?
Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics. Continue Reading
By- Cameron Hashemi-Pour, Former Site Editor
- Alexander S. Gillis, Technical Writer and Editor
- Peter Loshin, Former Senior Technology Editor
-
News
27 Jan 2025
Three sentenced over OTP.Agency MFA fraud service
Three men have been sentenced over their role in a cyber criminal subscription service that offered access to online accounts using illicitly obtained one-time passcodes Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Jan 2025
Inside CyberArk’s security strategy
CyberArk CIO Omer Grossman talks up the company’s security-first ethos, the importance of an assumed breach mentality and how the company is addressing threats from the growing use of AI Continue Reading
By- Aaron Tan, TechTarget
-
News
24 Jan 2025
High Court: Sky Betting ‘parasitic’ in targeting problem gambler
UK High Court rules that Sky Betting acted unlawfully after breaching a customer’s data protection rights when it obtained his personal data through cookies and used it to profile him for the purposes of direct marketing, despite his ‘impaired’ ability to provide meaningful consent Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Definition
23 Jan 2025
What is SSL (Secure Sockets Layer)?
SSL (Secure Sockets Layer) is a networking protocol that secures connections between web clients and web servers over internal networks or the internet by encrypting the data sent between those clients and servers. Continue Reading
By- Rahul Awati
- Michael Cobb
- Peter Loshin, Former Senior Technology Editor
-
News
23 Jan 2025
UK eVisa system problems persist despite repeated warnings
Travellers are already having issues boarding UK-bound flights, while refugees have been left with no way to prove their immigration status in the UK, just two weeks after the Home Office transitioned to electronic visas Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
16 Jan 2025
Biden signs new cyber order days before Trump inauguration
With days left in the White House, outgoing US president Joe Biden has signed a wide-ranging cyber security executive order with far-reaching implications Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Jan 2025
US bank FNBO uses Pindrop to tackle voice fraud, deepfakes
Learn how First National Bank of Omaha in the US is enhancing customer authentication and verification in its contact centres, eliminating friction points and making life easier for its customer service teams, with Pindrop voice security technology Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Dec 2024
Top 10 police technology stories of 2024
Here are Computer Weekly’s top 10 police technology stories of 2024 Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Definition
23 Dec 2024
What is a public key and how does it work?
In cryptography, a public key is a large numerical value that is used to encrypt data. Continue Reading
By -
News
20 Dec 2024
Top 10 data and ethics stories of 2024
Here are Computer Weekly’s top 10 data and ethics stories of 2024 Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Definition
19 Dec 2024
What is a public key certificate?
A public key certificate is a digitally signed document that serves to validate the sender's authorization and name. Continue Reading
By -
News
18 Dec 2024
Top 10 cyber security stories of 2024
Data breaches, data privacy and protection, and the thorny issue of open source security were all hot topics this year. Meanwhile, security companies frequently found themselves hitting the headlines, and not always for good reasons. Here are Computer Weekly's top 10 cyber security stories of 2024 Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
18 Dec 2024
Look to the future: How the threat landscape may evolve next
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Elliott Wilkes, ACDS
-
News
18 Dec 2024
Top 10 cyber crime stories of 2024
From ransomware targeting the NHS to nation-state-backed intrusions, 2024 was another big year for cyber criminals and cyber spooks alike, but they didn't have it all their own way as the good guys fought back Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
17 Dec 2024
What is PKI (public key infrastructure)?
PKI (public key infrastructure) is the underlying framework that enables the secure exchange of information over the internet using digital certificates and public key encryption. Continue Reading
By -
Definition
17 Dec 2024
What is passwordless authentication?
Passwordless authentication allows a user to sign into a service without using a password. This is often done using certificates, security tokens, one-time passwords (OTPs) or biometrics. Continue Reading
By- Kinza Yasar, Technical Writer
- Gavin Wright
- Alexander S. Gillis, Technical Writer and Editor
-
Opinion
12 Dec 2024
CISOs: Don’t rely solely on technical defences in 2025
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Deepti Gopal, Gartner
-
Opinion
10 Dec 2024
Defending against cyber grinches: AI for enhanced security
On the Seventh Day of AI, Defending against cyber grinches: AI for enhanced security, we explore the double-edged sword of AI in cybersecurity and how businesses can protect themselves against the cyber grinches. Continue Reading
By- Justin Young, ANS
-
News
10 Dec 2024
UK police continue to hold millions of custody images unlawfully
Annual report from the biometrics and surveillance camera commissioner of England and Wales highlights the ongoing and unlawful retention millions of custody images of innocent people never charged with a crime by police Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
E-Zine
10 Dec 2024
On the road to change at Aston Martin
In this week’s Computer Weekly, we talk to the CIO at luxury car maker Aston Martin to find out how technology is helping tackle the huge challenges facing the automotive sector. The new National Cyber Security boss explains why organisations need to be extra vigilant against the growing online threats. And we examine the future of secure remote connectivity in the cloud era. Read the issue now. Continue Reading
-
Opinion
09 Dec 2024
In 2025: Identities conquer, and hopefully unite
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Stephen McDermid, Okta
-
Definition
09 Dec 2024
What is user authentication?
User authentication refers to the process of verifying the identity of a user attempting to gain access to a computer network, system or device. This process runs in the background and can be done through different means, such as asking the user to enter a password, provide a PIN or provide a fingerprint. Continue Reading
By -
Definition
09 Dec 2024
What is a session key?
A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session between a user and another computer or between two computers. Continue Reading
By -
Opinion
06 Dec 2024
Six trends that will define cyber through to 2030
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Pierre-Martin Tardif, ISACA
-
News
05 Dec 2024
Met Police challenged on claim LFR supported by ‘majority of Lewisham residents’
A community impact assessment for the Met Police’s deployment of live facial-recognition tech in Lewisham brings into question the force’s previous claims to Computer Weekly that its use of the technology is supported by ‘the majority of residents’ Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
04 Dec 2024
Nordics move to deepen cyber security cooperation
Nordic countries are increasing collaboration on cyber security amid more sophisticated and aggressive attacks Continue Reading
By- Gerard O'Dwyer
-
E-Zine
03 Dec 2024
Curing cancer with computers
In this week’s Computer Weekly, we go behind the scenes at the Francis Crick Institute to find out how data science and AI support its groundbreaking medical research. As courts on both sides of the Atlantic target Google, we analyse the legal threats for Big Tech. And our latest buyer’s guide examines cloud and object storage. Read the issue now. Continue Reading
-
Opinion
02 Dec 2024
CISOs will face growing challenges in 2025 and beyond
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Mike Gillespie and Ellie Hurst, Advent IM
-
News
02 Dec 2024
UK economy could see £600m boost through digital IDs for businesses
Government-backed organisation kicks off initiative to widen use of digital identities, in an effort to streamline financial services and cut hundreds of millions of pounds of economic crime Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
29 Nov 2024
Second Merseyside hospital hit by cyber attack
Hot on the heels of a major cyber attack at a nearby NHS trust, one of Europe’s biggest and busiest children’s hospitals is reportedly scrambling to deal with ransomware gang Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Opinion
27 Nov 2024
In the cloud, effective IAM should align to zero-trust principles
The Security Think Tank considers best practices in identity and access management and how can they be deployed to enable IT departments to combat cyber-attacks, phishing attacks and ransomware Continue Reading
By- Vladimir Jirasek, Foresight Cyber
-
E-Zine
26 Nov 2024
The Most Influential Women in UK Technology 2024
In this week’s Computer Weekly, we reveal the 50 most influential women in UK technology for 2024. Read an interview with the winner, co-CEO of Tech She Can, Sheridan Ash. And meet this year’s rising stars – six women with a bright future in IT leadership. Read the issue now. Continue Reading
-
News
25 Nov 2024
Metropolitan Police officer dismissed for unlawfully accessing Sarah Everard files
Over 100 Met Police officers and staff have been investigated for accessing sensitive data related to the Sarah Everard case, leading to the dismissal of a Roads and Transport officer who accessed the information while off-duty Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Feature
25 Nov 2024
IAM within the framework of defence in depth
If it is deployed correctly, identity and access management is among the plethora of techniques that can help to secure enterprise IT Continue Reading
By- Cliff Saran, Managing Editor
-
News
21 Nov 2024
Brit charged in US over Scattered Spider cyber attacks
A UK national named as Tyler Robert Buchanan has been charged in the US over his alleged involvement in cyber attacks perpetrated by the Scattered Spider gang Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Nov 2024
Government issues strategic priorities for online safety regulator Ofcom
Technology secretary Peter Kyle sets out the government’s strategic priorities for how Ofcom should approach regulating online safety, including embedding safety by design and supporting innovation in technologies to help protect people online Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
E-Zine
19 Nov 2024
Adventures in AI at Tripadvisor
In this week’s Computer Weekly, we find out how travel site Tripadvisor is embracing AI to offer new products and services to its users. Gartner says the chance of a successful digital project is like ‘flipping a coin’ – we went to its annual IT leadership symposium to ask why. And we examine what companies must do to comply with the EU’s new NIS2 cyber security rules. Read the issue now. Continue Reading
-
News
18 Nov 2024
AWS widening scope of MFA programme after early success
AWS reports strong take-up of multi-factor authentication among customers since making it compulsory for root users earlier this year, and plans to expand the scope of its IAM programme in spring 2025 Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Nov 2024
Denmark’s AI-powered welfare system fuels mass surveillance
Research reveals the automated tools used to flag individuals for benefit fraud violate individuals’ privacy and risk discriminating against marginalised groups Continue Reading
By- Josh Osman, Computer Weekly
-
Definition
18 Nov 2024
What is acceptable use policy (AUP)?
An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to or use of a corporate network, the internet or other computing resources. Continue Reading
By -
News
14 Nov 2024
MPs hold first ever debate on live facial recognition
MPs have held an open debate on police use of live facial recognition technology for the first time since it was initially deployed by the Met Police in August 2016 Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
14 Nov 2024
Ping CEO on ForgeRock integration and future of identity
Ping Identity CEO Andre Durand discusses the company’s unified roadmap, commitment to customer stability and growth plans in the evolving identity landscape following the merger with ForgeRock Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
12 Nov 2024
Strengthening cyber: Best IAM practices to combat threats
The Security Think Tank considers best practices in identity and access management and how can they be deployed to enable IT departments to combat cyber-attacks, phishing attacks and ransomware Continue Reading
By- Andrew Peel, Scott Swalling, PA Consulting
-
News
12 Nov 2024
Police cloud project raises data protection concerns despite legal reforms
Ongoing data protection issues with the use of hyperscale public cloud infrastructure by UK police could complicate the ambitions of nine forces to move their common records management system into the cloud Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
11 Nov 2024
IAM: Enterprises face a long, hard road to improve
Poor identity and access management puts enterprise data at risk, but the path to stronger IAM remains complex Continue Reading
-
News
11 Nov 2024
Fresh concerns over NHS England registries procurement
Clinicians and technologists behind a number of medical devices registries being brought together by NHS England on a new common platform have accused the health service of flouting public sector procurement regulations Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
11 Nov 2024
IAM: Enterprises face a long, hard road to improve
Poor identity and access management puts enterprise data at risk, but the path to stronger IAM remains complex Continue Reading
-
Feature
08 Nov 2024
Beyond VPNs: The future of secure remote connectivity
As more companies adopt cloud services and remote work, the limitations of VPNs are becoming obvious. We explore what’s next for secure remote connectivity Continue Reading
By -
News
07 Nov 2024
Google Cloud MFA enforcement meets with approval
Latest Google Cloud policy to enforce multifactor authentication across its user base is welcomed by security professionals Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Nov 2024
Interview: Petra Molnar, author of ‘The walls have eyes’
Refugee lawyer and author Petra Molnar speaks to Computer Weekly about the extreme violence people on the move face at borders across the world, and how increasingly hostile anti-immigrant politics is being enabled and reinforced by a ‘lucrative panopticon’ of surveillance technologies Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
06 Nov 2024
Lords shoplifting inquiry calls for facial recognition laws
A Lords committee has expressed concern about the use of facial recognition technology by retailers to combat shoplifting, and is calling on the government to introduce new laws to ensure there are minimum standards for their deployments Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
06 Nov 2024
Starmer announces tech-enabled crackdown on people smuggling
The UK government has announced a further £75m of funding for its Border Security Command, meaning it will now have £150m over two years to spend on new technologies and staff Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
05 Nov 2024
User-centric security should be core to cloud IAM practice
The Security Think Tank considers best practices in identity and access management and how can they be deployed to enable IT departments to combat cyber-attacks, phishing attacks and ransomware Continue Reading
-
Definition
31 Oct 2024
What is face detection and how does it work?
Face detection, also called facial detection, is a computer technology that identifies human faces in digital images and video. Continue Reading
By- Robert Sheldon
- Nick Barney, Technology Writer
- Corinne Bernstein
-
Opinion
30 Oct 2024
IAM best practices for cloud environments to combat cyber attacks
The Security Think Tank considers best practices in identity and access management and how can they be deployed to enable IT departments to combat cyber-attacks, phishing attacks and ransomware Continue Reading
By- Varun Prasad, ISACA
-
Definition
28 Oct 2024
What is two-factor authentication (2FA)?
Two-factor authentication (2FA), sometimes referred to as two-step verification or dual-factor authentication, is a security process in which users provide two different authentication factors to verify themselves. Continue Reading
By- Paul Kirvan
- Peter Loshin, Former Senior Technology Editor
- Michael Cobb
-
News
25 Oct 2024
Dutch critical infrastructure at risk despite high leadership confidence
Stark paradox in Dutch cyber security landscape has business leaders expressing high confidence in their IT infrastructure as cyber attacks rise Continue Reading
By- Kim Loohuis
-
News
22 Oct 2024
Danish government reboots cyber security council amid AI expansion
Denmark’s government relaunches digital security initiative to protect business sectors and society at large Continue Reading
By- Gerard O'Dwyer
-
News
21 Oct 2024
Can AI be secure? Experts discuss emerging threats and AI safety
International cyber security experts call for global cooperation and proactive strategies to address the security challenges posed by artificial intelligence Continue Reading
By- Aaron Tan, TechTarget
-
Feature
15 Oct 2024
Reinventing security operations for the modern threat landscape
The growing pace of digital transformation has opened new avenues for attackers, making traditional security measures obsolete. Organisations must modernise their security operations to fortify their defences and navigate the evolving threat landscape Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
11 Oct 2024
Robust cloud IAM should align to zero-trust principles
The Security Think Tank considers best practices in identity and access management and how can they be deployed to enable IT departments to combat cyber-attacks, phishing attacks and ransomware. Continue Reading
By- Ricky Simpson, Quorum Cyber
-
News
10 Oct 2024
UK and US pledge closer working on children’s online safety
In their first agreement on the subject of children’s online safety, the UK and US governments have said they will create a new working group to boost cooperation Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
03 Oct 2024
Microsoft files lawsuit to seize domains used by Russian spooks
Microsoft has been given permission to seize multiple domains used by the Russian state threat actor Star Blizzard as part of a coordinated disruption effort undertaken ahead of the US elections Continue Reading
By- Alex Scroxton, Security Editor
-
News
02 Oct 2024
Amazon Mechanical Turk workers suspended without explanation
A likely glitch in Amazon Payments resulted in hundreds of Mechanical Turk workers being suspended from the platform without proper explanation or pay Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Definition
27 Sep 2024
What is access control?
Access control is a security technique that regulates who or what can view or use resources in a computing environment. Continue Reading
By- Gavin Wright
- Ben Lutkevich, Site Editor
-
News
27 Sep 2024
UK on high alert over Iranian spear phishing attacks, says NCSC
The NCSC and counterpart agencies in the US have issued a warning over enhanced Iranian spear phishing activity targeting politicians, journalists, activists and others with an interest in Middle Eastern affairs Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Sep 2024
Microsoft shares progress on Secure Future Initiative
Microsoft has published a progress report on its Secure Future Initiative, launched last year in the wake of multiple security incidents, and made a series of commitments to improve its internal cyber culture Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Sep 2024
Home Office eVisa scheme is ‘broken’, says Open Rights Group
Digital rights campaigners say the Home Office’s plan to make its new electronic Visa scheme a real-time online-only process is part and parcel of the 'hostile environment' around immigration status Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
23 Sep 2024
Gartner: Mitigating security threats in AI agents
Agents represent a step-change in the use of artificial intelligence in the enterprise - as attendees at Salesforce's annual conference saw first hand this month - but do not come without their risks Continue Reading
By- Avivah Litan, Gartner
-
News
18 Sep 2024
Europol provides detail on Ghost encrypted comms platform takedown
Law enforcement bodies from across the world have revealed how they collaborated to bring down encrypted network Ghost and the new ways of working that have been established with Europol at the centre Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Definition
17 Sep 2024
What is passive keyless entry (PKE)?
Passive keyless entry (PKE) is an automotive security system that operates automatically when the user is in proximity to the vehicle, unlocking the door on approach or when the door handle is pulled, and locking it when the user walks away or touches the car on exit. Continue Reading
-
News
17 Sep 2024
First CyberBoost Catalyse startup cohort named
The first group of companies named to a cyber incubator programme run by Plexal and the National University of Singapore includes two growing UK businesses Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
16 Sep 2024
Will autonomous weapons make humans passive participants in war?
Experts warn the emergence and adoption of AI-powered military systems may eventually push battlefield decision-making beyond the limits of human cognition Continue Reading
By- Kyle Hiebert, Computer Weekly
-
News
13 Sep 2024
Cyber workforce must almost double to meet global talent need
Research from ISC2 finds global cyber workforce needs additional 4.8 million people to fully secure businesses Continue Reading
By- Clare McDonald, Business Editor
-
News
12 Sep 2024
Data sharing for immigration raids ferments hostility to migrants
Data sharing between public and private bodies for the purposes of carrying out immigration raids helps to prop up the UK’s hostile environment by instilling an atmosphere of fear and deterring migrants from accessing public services Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
09 Sep 2024
Developing nations need the UN cyber crime treaty to pass
The UN cyber crime treaty is flawed but represents a move in the right direction for developing nations seeking greater digital sovereignty Continue Reading
By- Kyle Hiebert, Computer Weekly
-
News
05 Sep 2024
Tencent Cloud debuts palm scanning tech in global markets
Tencent Cloud launches palm verification technology for global markets, offering AI-driven identity authentication to support contactless payments and security access management Continue Reading
By- Aaron Tan, TechTarget
-
News
04 Sep 2024
Retailers question using live facial recognition for shoplifting
Retailers praise benefits of retrospective over live facial recognition in dealing with shoplifting, but stress there are ongoing concerns around the ethical, legal and safety implications of using the technology in stores Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
30 Aug 2024
Norwegian Refugee Council leverages Okta for Good cyber scheme
Pietro Galli, CIO of the Norwegian Refugee Council, reveals how the globally distributed NGO has been taking advantage of the Okta for Good CSR programme to improve its own cyber security and data protection practice, and elevate good practice in the third sector Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Aug 2024
Met Police deploy LFR in Lewisham without community input
The Met’s latest live facial recognition deployment in Catford has raised concerns over the lack of community engagement around the police force’s use of the controversial technology Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
28 Aug 2024
Iranian APT Peach Sandstorm teases new Tickler malware
Peach Sandstorm, an Iranian state threat actor, has developed a dangerous new malware strain that forms a key element of a rapidly evolving attack sequence Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Aug 2024
Global cyber spend to rise 15% in 2025, pushed along by AI
Security spending will increase at pace in 2025, with artificial intelligence, cloud and consultancy services all pushing outlay to new highs, according to Gartner Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Aug 2024
New Qilin tactics a ‘bonus multiplier’ for ransomware chaos
Sophos X-Ops caught the Qilin ransomware gang stealing credentials stored by victims' employees in Google Chrome, heralding further cyber attacks and breaches down the line. Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
20 Aug 2024
From manifesto to material: What No. 10 needs to make reality
With Labour returning to 10 Downing Street after 14 years, the Computer Weekly Security Think Tank panellists share advice and wish lists for the new government Continue Reading
By- Paul Lewis, Nominet
-
News
16 Aug 2024
Thousands of NetSuite customers accidentally exposing their data
Misconfigured permissions across live websites are leaving thousands of NetSuite users open to having their valuable customer data stolen, researchers say Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 Aug 2024
Campaigners criticise Starmer post-riot public surveillance plans
A UK government programme to expand police facial recognition and information sharing after racist riots is attracting criticism from campaigners for exploiting the far-right unrest to generally crack down on protest and increase surveillance Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
15 Aug 2024
Google's cookie conundrum: What comes next?
Google's revised approach to third-party cookies shouldn't come as a surprise, and may also be welcome Continue Reading
By- Christian Ward
-
News
14 Aug 2024
Automated police tech contributes to UK structural racism problem
Civil society groups say automated policing technologies are helping to fuel the disparities that people of colour face across the criminal justice sector, as part of wider warning about the UK’s lack of progress in dealing with systemic racism Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
13 Aug 2024
NIST debuts three quantum-safe encryption algorithms
NIST has launched the first three quantum-resistant encryption algorithms, and as the threat of quantum-enabled cyber attacks grows greater, organisations are encouraged to adopt them as soon as they can Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
09 Aug 2024
Deep dive into quantum-resistant cryptography for email security
Quantum computers have the potential to crack many of the encryption methods we currently rely on to keep our digital communications safe. Quantum-resistant cryptography may be the answer Continue Reading
By