#cyber-security

[ follow ]
#cryptocurrency

Australians Lost $122M Worth of Crypto to Scams in 12 Months: Police

Investment scams in Australia amounted to A$382 million in 2023-24, with 47% involving cryptocurrency.

Email scam sends out 'convincing' fake invoice purporting to be from PayPal

Beware of convincing scam emails regarding cryptocurrency purchases from PayPal, especially during high-traffic shopping seasons like Black Friday and Cyber Monday.

Australians Lost $122M Worth of Crypto to Scams in 12 Months: Police

Investment scams in Australia amounted to A$382 million in 2023-24, with 47% involving cryptocurrency.

Email scam sends out 'convincing' fake invoice purporting to be from PayPal

Beware of convincing scam emails regarding cryptocurrency purchases from PayPal, especially during high-traffic shopping seasons like Black Friday and Cyber Monday.
morecryptocurrency
#national-security

Trudeau government bans TikTok from operating in Canada but Canadians can still use it | CBC News

The Canadian government has ordered TikTok to close its operations due to national security concerns, but access for users remains unaffected.

A coherent Labour cyber strategy depends on consistency | Computer Weekly

The new Labour government needs to act decisively on cyber security and digital identity protections following recent cyber incidents in the UK.

UK underestimates threat from hostile states, says new NCSC head

The UK is underestimating severe cyber threats from hostile nations, warns NCSC's Richard Horne.

British SMBs are glaringly unprotected - will the new Cyber Security and Resilience Bill be enough to raise the bar?

New UK cyber legislation aims to enhance national infrastructure resilience but may overlook smaller firms crucial to supply chains.

Trudeau government bans TikTok from operating in Canada but Canadians can still use it | CBC News

The Canadian government has ordered TikTok to close its operations due to national security concerns, but access for users remains unaffected.

A coherent Labour cyber strategy depends on consistency | Computer Weekly

The new Labour government needs to act decisively on cyber security and digital identity protections following recent cyber incidents in the UK.

UK underestimates threat from hostile states, says new NCSC head

The UK is underestimating severe cyber threats from hostile nations, warns NCSC's Richard Horne.

British SMBs are glaringly unprotected - will the new Cyber Security and Resilience Bill be enough to raise the bar?

New UK cyber legislation aims to enhance national infrastructure resilience but may overlook smaller firms crucial to supply chains.
morenational-security

Russia exploiting UK's technology dependence to cause maximum destruction'

The Independent emphasizes the importance of on-the-ground reporting to provide balanced insights on critical issues like reproductive rights, cyber security, and political integrity.

Blue Yonder ransomware attack breaks systems at UK retailers | Computer Weekly

Blue Yonder's ransomware attack severely disrupted multiple UK retailers' supply chain operations, causing significant logistical challenges.
#ransomware

Australia Passes Groundbreaking Cyber Security Law

Australia's Cyber Security Act mandates reporting ransomware payments to strengthen national defenses against cyber threats.

Advanced faces fine over LockBit attack that crippled NHS 111 | Computer Weekly

A software supplier faces a potential fine of £6.09m for failing to implement cyber security measures, leading to a data breach affecting over 80,000 people.

21K Equinox patients, employees notified of data theft

Equinox faced a data breach affecting 21,565 clients and employees, compromising sensitive personal and health information.

Suspected leader of 'prolific' Reveton ransomware group arrested and deported to US

Maksim Silnikau, a ransomware group leader, was arrested, marking a significant blow to a criminal operation affecting half a billion victims globally.

SOCI Act 2024: Insights on Critical Infrastructure

Ransomware incidents are increasing in critical infrastructure, with poor preparedness and significant human error contributing to the risks.
Organizations must adopt multi-layered security strategies to protect against ransomware and improve response plans.

Ransomware warning signs and effective detection strategies - London Business News | Londonlovesbusiness.com

Ransomware detection is crucial for preventing significant damage to systems, employing automated tools and human oversight for effective threat detection.

Australia Passes Groundbreaking Cyber Security Law

Australia's Cyber Security Act mandates reporting ransomware payments to strengthen national defenses against cyber threats.

Advanced faces fine over LockBit attack that crippled NHS 111 | Computer Weekly

A software supplier faces a potential fine of £6.09m for failing to implement cyber security measures, leading to a data breach affecting over 80,000 people.

21K Equinox patients, employees notified of data theft

Equinox faced a data breach affecting 21,565 clients and employees, compromising sensitive personal and health information.

Suspected leader of 'prolific' Reveton ransomware group arrested and deported to US

Maksim Silnikau, a ransomware group leader, was arrested, marking a significant blow to a criminal operation affecting half a billion victims globally.

SOCI Act 2024: Insights on Critical Infrastructure

Ransomware incidents are increasing in critical infrastructure, with poor preparedness and significant human error contributing to the risks.
Organizations must adopt multi-layered security strategies to protect against ransomware and improve response plans.

Ransomware warning signs and effective detection strategies - London Business News | Londonlovesbusiness.com

Ransomware detection is crucial for preventing significant damage to systems, employing automated tools and human oversight for effective threat detection.
moreransomware

Scientists demonstrate Pixelator deepfake image verification tool | Computer Weekly

York St John University developed Pixelator v2, a tool to detect deepfake images effectively, aiding in cyber security and misinformation.

Cybercriminals Exploit Popular Game Engine Godot to Distribute Cross-Platform Malware

The Godot Engine is being exploited by cybercriminals for malware distribution, affecting over 17,000 systems since June 2024.
#nhs

Second Merseyside hospital hit by cyber attack | Computer Weekly

Alder Hey Hospital is facing a serious data breach with sensitive patient information leaked online, affecting its operations.

Customer Stories - south west London integrated care board security assessment.

Cyber security threats have significant repercussions on healthcare services and patient care.

NHS major 'cyber incident' forces hospitals to pen and paper

The NHS Trust is currently using paper operations due to a serious cyber security incident affecting its IT systems.

Second Merseyside hospital hit by cyber attack | Computer Weekly

Alder Hey Hospital is facing a serious data breach with sensitive patient information leaked online, affecting its operations.

Customer Stories - south west London integrated care board security assessment.

Cyber security threats have significant repercussions on healthcare services and patient care.

NHS major 'cyber incident' forces hospitals to pen and paper

The NHS Trust is currently using paper operations due to a serious cyber security incident affecting its IT systems.
morenhs

Microsoft calls on Trump to 'push harder' on cyber threats | Computer Weekly

Brad Smith urges the Trump administration to continue strong cyber security measures against state-sponsored threats from nations like Russia, China, and Iran.
#education

Robots are used to draw teens into cyber security

The event inspired students to explore careers in cyber security, addressing the national skills gap in the industry.

NCSC expands school cyber service to academies and private schools | Computer Weekly

The NCSC is providing free cyber defense services to all schools in the UK to enhance their resilience against online threats.

Robots are used to draw teens into cyber security

The event inspired students to explore careers in cyber security, addressing the national skills gap in the industry.

NCSC expands school cyber service to academies and private schools | Computer Weekly

The NCSC is providing free cyber defense services to all schools in the UK to enhance their resilience against online threats.
moreeducation
#risk-management

Dutch critical infrastructure at risk despite high leadership confidence | Computer Weekly

Dutch business leaders are confident in their IT infrastructure, yet significantly unprepared for future risks and vulnerabilities.
There exists a stark contrast between confidence in current IT capabilities and the readiness to address future risks.

What DORA means for business

The EU's Digital Operational Resilience Act (DORA) establishes minimum security requirements for financial entities, promoting a systematic, risk-based cyber security approach.

5 Techniques for Collecting Cyber Threat Intelligence

Understanding the current cyber threat landscape is essential for organizations to defend against threats effectively.

Defaulting to open: Decoding the (very public) CrowdStrike event | Computer Weekly

The CrowdStrike IT outage raises questions about our dependence on certain organizations and their role in maintaining cyber security.

Government launches cyber standard for local authorities | Computer Weekly

The Ministry of Housing, Communities and Local Government launched a Cyber Assessment Framework to bolster cyber resilience in local authorities across the UK.

If no security we are safe?

Security encompasses measures to protect people, property, and information from harm, including both physical and cyber protection techniques.

Dutch critical infrastructure at risk despite high leadership confidence | Computer Weekly

Dutch business leaders are confident in their IT infrastructure, yet significantly unprepared for future risks and vulnerabilities.
There exists a stark contrast between confidence in current IT capabilities and the readiness to address future risks.

What DORA means for business

The EU's Digital Operational Resilience Act (DORA) establishes minimum security requirements for financial entities, promoting a systematic, risk-based cyber security approach.

5 Techniques for Collecting Cyber Threat Intelligence

Understanding the current cyber threat landscape is essential for organizations to defend against threats effectively.

Defaulting to open: Decoding the (very public) CrowdStrike event | Computer Weekly

The CrowdStrike IT outage raises questions about our dependence on certain organizations and their role in maintaining cyber security.

Government launches cyber standard for local authorities | Computer Weekly

The Ministry of Housing, Communities and Local Government launched a Cyber Assessment Framework to bolster cyber resilience in local authorities across the UK.

If no security we are safe?

Security encompasses measures to protect people, property, and information from harm, including both physical and cyber protection techniques.
morerisk-management
#compliance

Microsoft security tools probed for workplace surveillance

Excessive workplace surveillance transforms employees into suspects, raising concerns about privacy and the necessity of such measures in business compliance.

EU cyber security bill NIS2 hits compliance deadline | Computer Weekly

NIS2 mandates stricter cyber security regulations across the EU, requiring compliance from various sectors or risk facing significant fines.

Overcoming the cyber paradox: Shrinking budgets - growing threats | Computer Weekly

Economic pressures and compliance drive a plateau in cyber security spending despite increasing threats.

How UK firms can get ready for the implementation of NIS2 | Computer Weekly

NIS2 directive enhances EU cyber security by standardizing rules and requiring CSIRT establishment by member states and critical sector businesses.

Microsoft security tools probed for workplace surveillance

Excessive workplace surveillance transforms employees into suspects, raising concerns about privacy and the necessity of such measures in business compliance.

EU cyber security bill NIS2 hits compliance deadline | Computer Weekly

NIS2 mandates stricter cyber security regulations across the EU, requiring compliance from various sectors or risk facing significant fines.

Overcoming the cyber paradox: Shrinking budgets - growing threats | Computer Weekly

Economic pressures and compliance drive a plateau in cyber security spending despite increasing threats.

How UK firms can get ready for the implementation of NIS2 | Computer Weekly

NIS2 directive enhances EU cyber security by standardizing rules and requiring CSIRT establishment by member states and critical sector businesses.
morecompliance

Telecoms cable in Baltic Sea may have been severed, says Finnish owner

A fibre optic cable linking Finland and Germany has potentially been severed by external forces, leading to an investigation into the incident.
#cloud-services

Beyond VPNs: The future of secure remote connectivity | Computer Weekly

VPNs are becoming inadequate for remote work and cloud services due to scalability, internal threats, and lack of dynamic security controls.

Conscia expands UK&I presence with PlanNet21 Group acquisition

Conscia has acquired PlanNet21 to expand their cyber security and networking solutions in Ireland and enhance customer service offerings.

Beyond Telecoms: Why BT is the perfect tech partner for your small business

BT provides a diverse range of affordable and adaptable products and services for small businesses, simplifying IT procurement and enhancing security solutions.

Beyond VPNs: The future of secure remote connectivity | Computer Weekly

VPNs are becoming inadequate for remote work and cloud services due to scalability, internal threats, and lack of dynamic security controls.

Conscia expands UK&I presence with PlanNet21 Group acquisition

Conscia has acquired PlanNet21 to expand their cyber security and networking solutions in Ireland and enhance customer service offerings.

Beyond Telecoms: Why BT is the perfect tech partner for your small business

BT provides a diverse range of affordable and adaptable products and services for small businesses, simplifying IT procurement and enhancing security solutions.
morecloud-services
#artificial-intelligence

Using artificial intelligence (AI) to track and analyze cyber risks

AI is set to transform cyber security, improving threat detection and productivity but may lead to overreliance by professionals.

Where will AI take security, and are we ready?

AI is seen as pivotal for cyber security, yet there's a lack of clarity on its implementation road map.

Where will AI take security, and are we ready?

AI is crucial for the future of cyber security, but clarity is needed in its roadmap and implementation.

AWS introduces Mithra advanced threat intelligence neural network | App Developer Magazine

AWS employs advanced threat intelligence tools to protect customer data, ensuring quick identification and counteraction of cyber threats.

How AI can augment security professionals' capabilities

The rise of generative AI is transforming cyber security practices and technologies, with significant adoption rates across businesses.

AI a force multiplier for the bad guys, say cyber pros | Computer Weekly

Many in cyber security believe AI benefits attackers more than defenders.
There is a significant lack of AI risk awareness among UK businesses.
The cyber security sector must prioritize education about AI threats.

Using artificial intelligence (AI) to track and analyze cyber risks

AI is set to transform cyber security, improving threat detection and productivity but may lead to overreliance by professionals.

Where will AI take security, and are we ready?

AI is seen as pivotal for cyber security, yet there's a lack of clarity on its implementation road map.

Where will AI take security, and are we ready?

AI is crucial for the future of cyber security, but clarity is needed in its roadmap and implementation.

AWS introduces Mithra advanced threat intelligence neural network | App Developer Magazine

AWS employs advanced threat intelligence tools to protect customer data, ensuring quick identification and counteraction of cyber threats.

How AI can augment security professionals' capabilities

The rise of generative AI is transforming cyber security practices and technologies, with significant adoption rates across businesses.

AI a force multiplier for the bad guys, say cyber pros | Computer Weekly

Many in cyber security believe AI benefits attackers more than defenders.
There is a significant lack of AI risk awareness among UK businesses.
The cyber security sector must prioritize education about AI threats.
moreartificial-intelligence
#data-protection

Transport for London hit by cyber attack | Computer Weekly

Transport for London is facing a cyber security incident but assures customers their data is safe and services remain unaffected.

TfL faces 'ongoing cyber security incident'

TfL is under cyber attack but no customer data has been compromised and services are unaffected.

TfL cyber attack disrupts internal networks, but transport services unaffected

TfL's cyber attack primarily affects internal networks without compromising customer-facing services or data.

TfL dealing with ongoing cyber security incident'

TfL is responding to a cyber security incident but claims customer data remains safe.

TfL hit by major cyber attack as it issues important message to customers

TfL is dealing with a cyber security incident with no reported customer data compromise or service impact.

TfL reopens key Oyster card applications after cyber attack

TfL resumed Oyster photocard applications after addressing a sophisticated cyber security incident, ensuring customer data protection and service restoration.

Transport for London hit by cyber attack | Computer Weekly

Transport for London is facing a cyber security incident but assures customers their data is safe and services remain unaffected.

TfL faces 'ongoing cyber security incident'

TfL is under cyber attack but no customer data has been compromised and services are unaffected.

TfL cyber attack disrupts internal networks, but transport services unaffected

TfL's cyber attack primarily affects internal networks without compromising customer-facing services or data.

TfL dealing with ongoing cyber security incident'

TfL is responding to a cyber security incident but claims customer data remains safe.

TfL hit by major cyber attack as it issues important message to customers

TfL is dealing with a cyber security incident with no reported customer data compromise or service impact.

TfL reopens key Oyster card applications after cyber attack

TfL resumed Oyster photocard applications after addressing a sophisticated cyber security incident, ensuring customer data protection and service restoration.
moredata-protection
#digital-transformation

Protect, recover, and get more from your data

Modern enterprises require a unified data management platform for effective data protection, security, and insights amid complex challenges and evolving cyber threats.

MEF association claims SASE milestone | Computer Weekly

MEF's SASE certification program enhances trust in SD-WAN and cyber security services for enterprise digital transformation.

Rivada, Colt collaborate to claim 'unique' LEO satellite connectivity | Computer Weekly

Colt and Rivada's partnership will revolutionize satellite connectivity with the Outernet, enhancing data security and digital transformation.

Labour should focus on talent to improve UK's cyber posture | Computer Weekly

Cyber security is a crucial aspect of state responsibility, requiring top technical talent for success.

Protect, recover, and get more from your data

Modern enterprises require a unified data management platform for effective data protection, security, and insights amid complex challenges and evolving cyber threats.

MEF association claims SASE milestone | Computer Weekly

MEF's SASE certification program enhances trust in SD-WAN and cyber security services for enterprise digital transformation.

Rivada, Colt collaborate to claim 'unique' LEO satellite connectivity | Computer Weekly

Colt and Rivada's partnership will revolutionize satellite connectivity with the Outernet, enhancing data security and digital transformation.

Labour should focus on talent to improve UK's cyber posture | Computer Weekly

Cyber security is a crucial aspect of state responsibility, requiring top technical talent for success.
moredigital-transformation
#gchq

UK needs cyber security professionals, but won't pay up

GCHQ's salaries for cyber security roles are not competitive with the private sector, risking recruitment challenges.

NCSC celebrates eight years as Horne blows in | Computer Weekly

The NCSC has transformed the UK's approach to cyber security over eight years, emphasizing the crucial link between cyber security and intelligence.

UK needs cyber security professionals, but won't pay up

GCHQ's salaries for cyber security roles are not competitive with the private sector, risking recruitment challenges.

NCSC celebrates eight years as Horne blows in | Computer Weekly

The NCSC has transformed the UK's approach to cyber security over eight years, emphasizing the crucial link between cyber security and intelligence.
moregchq

UK's CybaVerse secures 1.3M funding - Silicon Canals

CybaVerse has secured over £1.1M in funding to enhance platform development and expand its team.
#threat-intelligence

Phishing links becoming bigger threat than email attachments | Computer Weekly

Cyber criminals are shifting from malware attachments to malicious links, significantly increasing email attack volumes in 2024.

Hybrid Analysis Utilizes Criminal IP's Robust Domain Data For Better Malware Detection | HackerNoon

The partnership strengthens cybersecurity threat intelligence through advanced malware and domain analysis integration.

4 essential questions to ask about a prospective SIEM

The SIEM market is undergoing significant changes, impacting security tool decisions for many organizations.
Effective SIEM solutions are critical amid rising cyber threats and data management challenges.
Organizations should focus on essential features like threat intelligence, integration, and analytics in choosing SIEM.

Phishing links becoming bigger threat than email attachments | Computer Weekly

Cyber criminals are shifting from malware attachments to malicious links, significantly increasing email attack volumes in 2024.

Hybrid Analysis Utilizes Criminal IP's Robust Domain Data For Better Malware Detection | HackerNoon

The partnership strengthens cybersecurity threat intelligence through advanced malware and domain analysis integration.

4 essential questions to ask about a prospective SIEM

The SIEM market is undergoing significant changes, impacting security tool decisions for many organizations.
Effective SIEM solutions are critical amid rising cyber threats and data management challenges.
Organizations should focus on essential features like threat intelligence, integration, and analytics in choosing SIEM.
morethreat-intelligence
#data-breach

31M invoices, patient consent forms, more exposed online

Sensitive data, including 31.5 million documents, has been exposed due to a non-password protected database owned by ServiceBridge, posing significant security risks.

Contractor pays $300k to settle Medicare data breach

AFDS will pay $306,722 to settle claims of cyber security violations affecting Medicare beneficiaries' data.

Fallout from TfL cyber-attack is slow burning and potentially costly

TfL is managing a cyber-attack incident that led to data exposure for approximately 5,000 customers, but services remain largely unaffected.

TfL sends letters to 5,000 cyber attack customers whose details were hacked

TfL is addressing a cyber attack affecting 5,000 customers, with personal and banking details potentially compromised.

31M invoices, patient consent forms, more exposed online

Sensitive data, including 31.5 million documents, has been exposed due to a non-password protected database owned by ServiceBridge, posing significant security risks.

Contractor pays $300k to settle Medicare data breach

AFDS will pay $306,722 to settle claims of cyber security violations affecting Medicare beneficiaries' data.

Fallout from TfL cyber-attack is slow burning and potentially costly

TfL is managing a cyber-attack incident that led to data exposure for approximately 5,000 customers, but services remain largely unaffected.

TfL sends letters to 5,000 cyber attack customers whose details were hacked

TfL is addressing a cyber attack affecting 5,000 customers, with personal and banking details potentially compromised.
moredata-breach

With one year to go until Windows 10 end of life, here's what businesses should do to prepare

Businesses must prioritize migration from Windows 10 to Windows 11 in order to avoid security vulnerabilities and e-waste issues.
#russia

A secretive Russian submarine unit could sabotage the subsea network of cables that powers the internet

Russia poses an increasing threat to undersea internet cables, heightening concerns among Western allies about potential sabotage.

UK ambulance services targeted by Russian hackers

Russian hackers targeted the UK's Ambulance Radio Programme, indicating an increase in cyber warfare from Moscow amidst the ongoing Ukraine conflict.

A secretive Russian submarine unit could sabotage the subsea network of cables that powers the internet

Russia poses an increasing threat to undersea internet cables, heightening concerns among Western allies about potential sabotage.

UK ambulance services targeted by Russian hackers

Russian hackers targeted the UK's Ambulance Radio Programme, indicating an increase in cyber warfare from Moscow amidst the ongoing Ukraine conflict.
morerussia
from ComputerWeekly.com
1 month ago

Five zero-days to be fixed on October Patch Tuesday | Computer Weekly

Microsoft's October Patch Tuesday addressed five zero-day vulnerabilities, crucial for security teams to mitigate risks amidst Cyber Security Awareness Month.

Cyber UK's quickest growing tech field, but skills gap remains | Computer Weekly

Cyber security is the UK's fastest growing technology field, but there is a significant shortage of professionals.

'Shocked' MoneyGram hits back at Post Office | Computer Weekly

MoneyGram is disappointed with the UK Post Office's portrayal of their contract breakdown and insists a binding agreement was in place.
#ncsc

The NCSC and FBI just issued a major alert over a state-backed hacker group - here's what you need to know

Iran-linked hackers are using social engineering tactics to target officials related to Iranian and Middle Eastern affairs.

NCSC exposes Chinese company running malicious Mirai botnet | Computer Weekly

The UK National Cyber Security Centre warns of a massive botnet of over 250,000 devices, posing significant cyber security threats.

The NCSC and FBI just issued a major alert over a state-backed hacker group - here's what you need to know

Iran-linked hackers are using social engineering tactics to target officials related to Iranian and Middle Eastern affairs.

NCSC exposes Chinese company running malicious Mirai botnet | Computer Weekly

The UK National Cyber Security Centre warns of a massive botnet of over 250,000 devices, posing significant cyber security threats.
morencsc
#vulnerabilities

Protecting your cloud from malicious actors

Cyber security remains a top concern for IT decision-makers as technology evolves, particularly within cloud environments and their associated vulnerabilities.

GitLab releases security updates to fix 17 vulnerabilities

GitLab's recent security update addresses 17 vulnerabilities, including a critical flaw (CVE-2024-6678) with a CVSS score of 9.9 posing severe risks.

Protecting your cloud from malicious actors

Cyber security remains a top concern for IT decision-makers as technology evolves, particularly within cloud environments and their associated vulnerabilities.

GitLab releases security updates to fix 17 vulnerabilities

GitLab's recent security update addresses 17 vulnerabilities, including a critical flaw (CVE-2024-6678) with a CVSS score of 9.9 posing severe risks.
morevulnerabilities
#incident-response

Cyber companies need a best practice approach to major incidents. | Computer Weekly

Cyber security incidents cause significant disruption and financial loss, highlighting the need for effective crisis communication strategies.

Transport for London confirms cyberattack

TfL is addressing a cyber security incident while ensuring customer data remains secure and services are not affected.

Cyber companies need a best practice approach to major incidents. | Computer Weekly

Cyber security incidents cause significant disruption and financial loss, highlighting the need for effective crisis communication strategies.

Transport for London confirms cyberattack

TfL is addressing a cyber security incident while ensuring customer data remains secure and services are not affected.
moreincident-response

Islamophobic cyber attack' at major train stations sparks police investigation

A cyber attack displaying Islamophobic messages disrupted wifi at major UK railway stations, leading to police investigation and quick service shutdown for security reasons.

CrowdStrike apologises to US government for global mega-outage | Computer Weekly

CrowdStrike executives apologised for a major outage caused by a faulty update, impacting 8.5 million computers globally. Measures are being taken to prevent future occurrences.

Logpoint names Sren Grubov as SVP of engineering

Logpoint appoints Søren Grubov as senior VP of engineering to enhance cyber security product delivery and collaboration with customers.
#workforce-development

UK convenes international talks on cyber security

The UK is strengthening its cyber defenses through international cooperation and new initiatives focused on workforce skills and professional standards.

UK unites nations to discuss closing global cyber skills gap | Computer Weekly

UK government aims to lead a global dialogue on cyber security and skills.

UK convenes international talks on cyber security

The UK is strengthening its cyber defenses through international cooperation and new initiatives focused on workforce skills and professional standards.

UK unites nations to discuss closing global cyber skills gap | Computer Weekly

UK government aims to lead a global dialogue on cyber security and skills.
moreworkforce-development

Crest secures FCDO funding to help overseas countries increase their cyber-readiness | Computer Weekly

UK's FCDO funds Crest's initiative, Crest Camp, to enhance cyber security capabilities in select countries until March 2025.

Datacentres granted critical national infrastructure status | Computer Weekly

UK datacentres are now classified as critical national infrastructure to enhance support, security, and coordination against cyber threats and incidents.
#cyber-attack

Cyberattack targeting London transit system drags into weekend

Transport for London is facing online outages due to a cyber attack affecting ticketing and real-time information systems, though transit operations continue.

TfL still affected by 'ongoing cyber incident'

TfL is currently responding to a cyber attack by restricting access to online services, while ensuring no customer data has been compromised.

Cyberattack targeting London transit system drags into weekend

Transport for London is facing online outages due to a cyber attack affecting ticketing and real-time information systems, though transit operations continue.

TfL still affected by 'ongoing cyber incident'

TfL is currently responding to a cyber attack by restricting access to online services, while ensuring no customer data has been compromised.
morecyber-attack

'Catastrophic' cloud outages are keeping IT leaders up at night - is it time for businesses to rethink dependence?

Many UK IT leaders are concerned about the potential catastrophic impact of cloud outages on their organizations.

The US courts may have thrown a wrench into cyber regulation | Computer Weekly

The Supreme Court's ruling undermines the Biden administration's cyber security regulations by removing Chevron Deference, leading to uncertain future protections.

Global cyber spend to rise 15% in 2025, pushed along by AI | Computer Weekly

Cyber security spending is predicted to grow 15% year-on-year, reaching $212bn by 2025, driven by AI adoption and increasing threat levels.

Macron defends giving Telegram CEO Durov French citizenship DW 08/30/2024

Durov's detention raises questions about content moderation on Telegram and his contributions to the digital space.
#labour-party

How might the UK's cyber landscape change under Labour? | Computer Weekly

The Labour Party's electoral success may lead to significant reforms in the UK's cyber security strategy, addressing rising cyber threats effectively.

Cyber law reform should be top of Labour's policy list | Computer Weekly

Starmer's Labour Party plans to enhance cyber security legislation to combat the rising threat of cyber crime in the UK.

How might the UK's cyber landscape change under Labour? | Computer Weekly

The Labour Party's electoral success may lead to significant reforms in the UK's cyber security strategy, addressing rising cyber threats effectively.

Cyber law reform should be top of Labour's policy list | Computer Weekly

Starmer's Labour Party plans to enhance cyber security legislation to combat the rising threat of cyber crime in the UK.
morelabour-party

Why insider attacks are indicative of a need for security convergence

Security convergence merges physical and cyber security for a more effective defense against all types of crime.

UK proposes New Cyber Security and Resilience Bill to Boost the UK's Cyber Defences | Data Matters Privacy Blog

UK Government will introduce a new Cyber Security and Resilience Bill to enhance defenses against cyberattacks and safeguard critical infrastructure.

Cyber security adoption is vital to Scotland's space race | Computer Weekly

Scotland is a global leader in CubeSat manufacture, offering end-to-end space services and aiming for a secure cyber environment to attract investors.

The Future of Remote Work: Trends and Technologies Shaping the New Normal

The rise of remote work due to the COVID-19 pandemic is leading to the popularization of hybrid work models, changing the role of physical office spaces, and emphasizing the importance of cyber security.
[ Load more ]