Advertisement

cio summit 2020 article wide v8x2

Virtual Event

The much-anticipated annual gathering of senior IT executives and technology experts at the 2020 CIO Summit will be back this September, in a brand new virtual setting.

Intel Live Webinar

Virtual Event

Mobility, collaboration, Cloud computing in all its forms, and the ‘software defined’ enterprise have never been more important. Neither have the hardware foundations on which they are built. This Computerworld live webinar, in partnership with Intel, showcases the business benefits of the Intel vPro Platform in the current uncertain climate, the long-term benefits of the technology and gives an insight into some free and under-used tools already available to IT organisations.

Advertisement

2020 01 13

The inaugural CSO30 is a celebration of the role of the CSO and recognises the leading security executives in the UK.

open faucets leaking binary streams of data

What is DLP? How data loss prevention software works and why you need it

Data loss prevention (DLP) is a set of practices (and products) that ensure that an organization's sensitive or critical data is kept safe.


handshake

10 biggest cybersecurity M&A deals of 2019

This past year has been a very active one for mergers and acquisitions in the cybersecurity industry as companies seek to expand their offerings. What will the 2020 M&A market be like?


A hand holds a lightbulb swathed in leaves and surrounded by symbols of renewable energy.

Solar power shines light on security for the renewable energy industry

Solar power plants have massive numbers of vulnerable internet-connected devices. It's recent focus on cybersecurity is awakening the rest of the renewable energy industry to the threat.


DDOS attack

DDoS explained: How distributed denial of service attacks are evolving

A distributed denial of service (DDoS) attack is when attackers attempt to make it impossible for a service to be delivered, typically by drowning a system with requests for data. They have been part of the criminal toolbox for twenty...


cio 100 big

The CIO 100 is a showcase of the crucial technology projects, IT strategies, innovations, ideas, change management and transformation initiatives CIOs in and from the UK are delivering to customers, organisations, partners and sectors.

Advertisement

Binary code data flows through the cracked seal of a vault.

John the Ripper explained: An essential password cracker for your hacker toolkit

One of the oldest password cracking and testing tools, John the Ripper is still an essential pen testing tool.


Glowing blue montage of hand keying in password at ATM

Vulnerable drivers can enable crippling attacks against ATMs and POS systems

Newly discovered vulnerabilities could allow more persistent and destructive attacks on popular models of ATM and POS devices.


A hand moves a pawn through a conceptual maze of circuits. [navigating/negotiating/strategy/tactics]

10 essential negotiation tactics CISOs should know

Lose that winner takes all mentality and build your negotiation muscle with advice from security leaders and negotiation experts.


Brexit / privacy  >  Binary data + a U.K. umbrella drifting away on a sea branded with an E.U. flag

Brexit data protection decision uncertainty threatens UK-EU data flows

A no-deal Brexit scenario seems likely, and CISOs will need to adapt policies and procedures if the EU does not declare data protection adequacy for the UK.


A macro shot at the pixel level of a browser displays 'https' and a glowing lock in the address bar.

6 ways HTTP/3 benefits security (and 7 serious concerns)

HTTP/3 brings improved performance and reliability, along with various security and privacy benefits, but there are some noteworthy challenges.