Dutch researchers build security software to mimic human immune system

Dutch research institute TNO, in collaboration with various partners, has developed self-healing security software.   This software is based on the functioning of the human immune system, based on the... Read more »

How Bureau Veritas migrated 85% of its applications to the AWS cloud

With a strategic five-year plan, Bureau Veritas (BV) set out on its digital transformation project in 2015. Core to that transformation was migration of the vast bulk of its... Read more »

MEPs urge European Commission to revise UK adequacy decisions

MEPs have urged the European Commission (EC) to revise its draft decision to provide data adequacy to the UK to ensure that citizens in the European Union (EU) have... Read more »

CyberUK, bees and datacentres, Red Cross digital mapping – Computer Weekly Downtime Upload podcast

In this episode of the Computer Weekly Downtime Upload podcast, Caroline Donnelly and Brian McKenna are joined by Alex Scroxton, security editor, to discuss the recent CyberUK conference, bees... Read more »

Lack of developer attention to cloud security prompts alerts

The discovery of 23 leaky Android applications by Check Point Research (CPR) – which may, collectively, have put the personal data of more than 100 million users at risk... Read more »

Create a remote access security policy with this template

Considering the dramatic increase in remote access to IT resources during the COVID-19 pandemic, management of remote access security has become an essential activity. Organizations should establish policies and... Read more »

Pandemic tech use heightens consumer privacy fears

The dramatic expansion of the average person’s digital footprint due to Covid-19 restrictions is causing increased anxiety over personal privacy, and a feeling for many people that they are... Read more »

Malicious scans for at-risk systems start minutes after disclosure

Malicious actors begin to scan for at-risk systems within an average of 15 minutes of the disclosure of a new Common Vulnerability and Exposure (CVE), and in many instances... Read more »

Reports of stolen Irish health service data being leaked online

In a new low for the cyber criminal “fraternity”, the Conti ransomware gang has started to leak personally identifiable information about Irish hospital patients, stolen in its attack on... Read more »

Cisco acquires Kenna Security amid security expansion

Networking lynchpin Cisco is further cementing its dual role as a security supplier with a proposed acquisition of risk-based vulnerability management specialist Kenna Security, alongside a number of additions... Read more »
Subscribe to our Newsletter