As we prepare to close out 2025, the Computer Weekly Security Think Tank panel looks back at the past year, and ahead to 2026.
If you’ve read anything about technology in the last few years, you may have seen the term “encryption” floating around. It’s a simple concept, but the realities of its use are enormously complicated.
Few complex professions change with the velocity of IT security. Practitioners are faced with an average of 5,000 to 7,000 new software vulnerabilities a year. Last year that number was a gob smacking ...
The recently discovered vulnerability involving fax lines on HP multi-function devices, termed Faxploit, are a reminder of the importance of fundamental security practices. I did something a few weeks ...
More than three-quarters of companies regularly take 10 common security steps to improve their overall defensive posture, including instrumenting their Secure Development Lifecycle (SDLC) and using ...
Learn how the dark web really works, from Tor anonymity to cyber threats. Essential cybersecurity learning for staying safe ...
In this article, we examine how security applies to Service Oriented Architecture (SOA). Before we discuss security for SOA, lets take a step back and examine what SOA is. SOA is an architectural ...
In this new work-from-anywhere environment that we're all in thanks to the COVID-19 pandemic, cybersecurity, trust, and protecting customer data is more important than ever. In conjunction with ...
This publication provides detailed guidance on developing, implementing, and integrating computer security as a key component of nuclear security. This guidance applies to computer security aspects of ...
Editor's note: Industry Insights are sponsored blogs submitted by manufacturers and suppliers serving the fire service industry. Earlier this year, a fire department reached out to our team at ...
Jim Alkove is the Chief Trust Officer at Salesforce, where he's responsible for enterprise-wide information security and compliance. In my last post, I talked about nailing the basics as the best way ...