McAfee to change terms of auto-renewing consumer plans

Consumer users of McAfee’s antivirus products who found their service contracts auto-renewed for another year will now be able to end their contracts and obtain a refund for the... Read more »

Industry reflects on three years of GDPR

In the past year, it would be eminently fair to say that the focus of the cyber security industry has not necessarily been on compliance with the General Data... Read more »

Legacy vulnerabilities may be biggest enterprise cyber risk

Cyber attacks exploiting vulnerabilities in unpatched legacy systems, via consumer applications such as TikTok, and originating from friendly countries may be a bigger risk to the average organisation than... Read more »

Air India is latest victim of Sita hack

A cyber attack on the systems of airline IT services specialist Sita, first reported earlier in 2021, has claimed another victim in the aviation sector, after Air India revealed... Read more »

Dutch researchers build security software to mimic human immune system

Dutch research institute TNO, in collaboration with various partners, has developed self-healing security software.   This software is based on the functioning of the human immune system, based on the... Read more »

How Bureau Veritas migrated 85% of its applications to the AWS cloud

With a strategic five-year plan, Bureau Veritas (BV) set out on its digital transformation project in 2015. Core to that transformation was migration of the vast bulk of its... Read more »

MEPs urge European Commission to revise UK adequacy decisions

MEPs have urged the European Commission (EC) to revise its draft decision to provide data adequacy to the UK to ensure that citizens in the European Union (EU) have... Read more »

CyberUK, bees and datacentres, Red Cross digital mapping – Computer Weekly Downtime Upload podcast

In this episode of the Computer Weekly Downtime Upload podcast, Caroline Donnelly and Brian McKenna are joined by Alex Scroxton, security editor, to discuss the recent CyberUK conference, bees... Read more »

Lack of developer attention to cloud security prompts alerts

The discovery of 23 leaky Android applications by Check Point Research (CPR) – which may, collectively, have put the personal data of more than 100 million users at risk... Read more »

Create a remote access security policy with this template

Considering the dramatic increase in remote access to IT resources during the COVID-19 pandemic, management of remote access security has become an essential activity. Organizations should establish policies and... Read more »
Subscribe to our Newsletter