It's vital for the IT department to get executives on the company board to properly understand security threats if maximum possible security against cyber attacks is going to be achieved. That was the consensus between experts during a ...
Tags: Computer Products, software
The Bank of England has revealed that several of the UK's banks have been hit by cyber attacks in the last six months, which have led to the institutions making financial losses. In its Financial Stability Report, the bank said that the ...
Tags: Computer Products, software
Intel-owned security software vendor McAfee is to acquire Finnish firewall software maker Stonesoft in a $389m (£250m) cash deal. The deal, subject to the agreement of Helsinki Stock Exchange-listed Stonesoft's shareholders, will ...
Tags: Stonesof, Computer Products
The Cyber Security Challenge, a series of national events designed to encourage talented professionals to join the UK IT security industry, has just announced its latest winner, 28-year-old chemist Stephen Miller. Government cyber ...
Tags: Cyber Security Challenge, IT security industry, cyber security
Anti-virus software vendors have unveiled a number of upgrades to their systems, including new heuristic detection based on their signature databases, and new protections against botnets. Trend Micro has introduced new tools in its Custom ...
The UK and India are expected to strike a deal to become trusted partners in the growing battle against cyber criminals and nation states, prime minister David Cameron has said. Reuters reports that the UK hopes that by setting up a joint ...
Arms vendors are moving into the cyber security sector in response to a decline in sales of their traditional weapons, according to the Stockholm International Peace Research Institute It is the first time that annual arms sales have ...
Tags: cyber security, Arms, annual arms sales
A disgruntled employee, angry at missing out on a pay rise, conducted a three-year campaign of sabotage against his company's computers by spraying the cleaning product Cillit Bang into the grills of the servers. Credit controller Edward ...
The UK has joined 25 countries in committing to a set of principles intended, they claim, to make digital networks more secure and resilient. Foreign secretary William Hague signed the World Economic Forum's Partnering for Cyber ...
Tags: digital networks, Cyber Resilience, UK Cyber Security Strategy U
Nine out of 10 companies do not believe that they are vulnerable to hackers,despite the fact that half have faced a"security incident"in the past year. That is the conclusion of a report into computer security by consultants Deloitte ...
Tags: Nine out of 10 companies not vulnerable, security incident
Software engineers working for the US military will have to follow new testing procedures to reduce the risk of security flaws in their code. That is one of a number of computer security-related measures contained in the 2013 National ...
Tags: Software, US Military, Legal Checks
Digital certificates issued by an authority in Turkey are being used for "man in the middle" attacks on Google properties, according to warnings issued by both Microsoft and Google. The security flaw was traced to a fraudulent digital ...
Tags: Computer Products, Soft
The challenge of attracting more women in to the technology sector has been an issue for some time now, but 2012 saw some interesting steps forward in the gender equality debate. Below are some the biggest and most interesting women in IT ...
Tags: women, IT stories, technology sector, 2012, Top 10
Digital certificates issued by an authority in Turkey are being used for "man in the middle" attacks on Google properties, according to warnings issued by both Microsoft and Google. The security flaw was traced to a fraudulent digital ...
Tags: Microsoft, Google, Turkey, security flaw
Technology is taking an ever more central role in the way we work, live and play. The future for the IT community is bright, and IT professionals have a unique opportunity to lead their organisations to a successful economic recovery. But ...
Tags: IT community, technology, workforce, IT skill