Security technology

Encryption, tokenisation and proxies: the intricacies of cloud security

safe-cloud
Obscuring information before sending it to the cloud is a no-brainer, isn’t it? John Leonard investigates
10 Dec 2013

Your hard drive is playing up - should you stick it in the freezer?

icecream
John Leonard takes a look around the data recovery centre at Kroll Ontrack
05 Dec 2013

80 per cent of staff use 'risky' unauthorised apps on corporate networks

businessman-at-computer
McAfee report suggests corporations could be at risk through use of shadow IT, but others suggest IT department should adapt to new methods of working
04 Dec 2013

We should replace the word 'cloud' with 'somebody else's computer', says security expert

When thinking about security we need to remember the physical reality of cloud computing, Graham Cluley tells Computing
02 Dec 2013

NCG Banco: 'We will continue supporting BlackBerry as a corporate solution'

Large Spanish bank installs BES 10 and over 1,600 devices, even as C-level BlackBerry staff are shown the door
27 Nov 2013

Microsoft will encrypt messages in Office 365

Keeping the spies out
22 Nov 2013

Dreamforce 2013: Salesforce promises tougher security

Data drawn from third party sources should lock authentication up tight, says Leach
19 Nov 2013

How Qualys network security tools protect University of Westminster from cyber threats

The university's network security officer Ashley Pereira on why the institution chose QualysGuard Cloud Platform to protect against threats
07 Nov 2013

Dark Mail: Secure email project planned to combat the NSA and PRISM

Secure email providers collaborate on email platform designed to thwart government surveillance
04 Nov 2013

Company claims CAPTCHA-breaking AI breakthrough

Start-up Vicarious claims to have developed an algorithm that can break CAPTCHAs
28 Oct 2013

Home Office working with Google, Apple, Samsung to tackle growing number of mobile thefts

Government wants new security features to make handsets less attractive to thieves
14 Oct 2013

ICO insists its policy on fines is not biased against public sector

'I certainly wouldn’t suggest people have been let off’ says ICO tech group manager Rice
11 Oct 2013

Banks to undergo extensive cyber threat test

Simulated cyber attack to test strength of financial services firms' defences
07 Oct 2013

Banks ordered to bolster cyber defences by FPC

'Concrete plan' by banks to handle cyber attacks to be handed to Financial Policy Committee in six months
02 Oct 2013

Splunk 2013: Top enterprise cyber security 'appalling' - former NSA CIO/CTO

Dr Prescott Winter tells Splunk 2013 big data is key to upping poor cyber security among big business
02 Oct 2013

Hackers crack Apple iPhone 5S with warning that biometrics are 'inherently insecure'

Chaos Computer Club posts video of iPhone 5S breach to claim $13,000 reward for cracking Apple's security
23 Sep 2013

Eight arrested over £1.3m cyber-raid on Barclays bank branch

Attacker posed as an IT engineer to plant keyboard, video and mouse (KVM) switch with 3G modem in Barclays branch
20 Sep 2013

A quantum leap for network security

Dr Andrew Shields tells Danny Palmer that Toshiba’s research has brought the day when enterprises can secure their networks with quantum technology a lot closer
18 Sep 2013

Transforming a telecoms giant: an interview with Telefonica group CIO Phil Jordan

Jordan tells Sooraj Shah about the three projects that will transform the firm better known in the UK as O2
17 Sep 2013

Suspected hackers arrested over alleged plot to steal millions from Santander

Twelve men in London in custody after a device was fitted to a PC in Surrey Quays branch
13 Sep 2013

Will a lack of trust in the cloud prevent ‘encryption nirvana'?

Richard Moulds of Thales e-Security weighs up the various encryption models available to enterprises
04 Sep 2013

MobileIron integrates with Salesforce for enterprise mobility management

One billion mobile enterprise devices all need to be managed, says MobileIron's Ojas Rege
27 Aug 2013

GCHQ runs secret Middle East internet surveillance station as part of Tempora

Station intercepts all data that passes through underwater fibre-optic cables
23 Aug 2013

The future of cybersecurity and BYOD at Network Rail

Peter Gothard visits Network Rail's head of IS strategy, Simon Goodman, to find out more about the company's cybersecurity policy
19 Aug 2013