IT for charity organisations
Charities have to operate at the lowest cost possible, and that includes the way they use IT. IT managers in the third sector have learned how to deploy cost-effective technology to support the critical work that charities and voluntary organisations do, and their experiences can offer relevant case studies for IT managers in other sectors.
-
News
03 Jan 2024
Artificial intelligence to the front in Sweden’s National Technology Strategy
Sweden focuses in on artificial intelligence in its latest far-reaching national IT strategy Continue Reading
-
Feature
07 Sep 2023
Interview: Ashish Gupta, head of EMEA, HCLTech
It’s not just enterprises that changed their operating models during and after Covid, but also the suppliers that took them on the journey, HCLTech Europe’s head explains Continue Reading
-
News
10 Apr 2014
TCG releases TPM 2 specification for improved security
The Trusted Computing Group has published an updated specification for the Trusted Platform Module Continue Reading
-
News
08 Apr 2014
Workday sees opportunity for cloud financial management in Europe
Workday plans to push cloud finance and accounting services to enterprise in Europe, but observers say its background in HR technology may prove an obstacle Continue Reading
-
News
28 Mar 2014
Google says government data requests are up 120% since 2009
Government requests for information about Google customers, have increased by 120% since 2009 Continue Reading
-
News
27 Mar 2014
Security an unnecessary expense, say one in six techies
One in six IT professionals see security as an unnecessary expense, a study has revealed Continue Reading
-
Feature
25 Mar 2014
Target data breach: Why UK business needs to pay attention
Late last year, US retailer Target was hit by one of the biggest data breaches in the industry's history. So what happened and why is it relevant to UK businesses? Continue Reading
-
News
21 Mar 2014
Customer privacy an ongoing challenge, says Unilever
Unilever has set up a programme to address the continually evolving challenge of privacy issues relating to customer data Continue Reading
-
News
19 Mar 2014
Pirated software malware to cost business $491bn in 2014, study shows
Malware deliberately loaded into pirated or counterfeit software is expected cost enterprises $491bn in 2014 Continue Reading
-
News
19 Mar 2014
Firms urged to take tough action on Unix-based cyber attack
Security researchers have urged businesses to take action on a cyber criminal campaign that has seized control of 25,000+ Unix servers worldwide Continue Reading
-
News
17 Mar 2014
Three-quarters of UK charities are failing to adapt to digital
Charities in the UK are failing to adopt digital agendas in their organisations Continue Reading
-
News
17 Mar 2014
SMEs believes they are immune to cyber attack
Most SMEs believe they are not at real risk of cyber attack, a survey has revealed Continue Reading
-
Feature
14 Mar 2014
Hacktivism: good or evil?
IT lawyer Dai Davis looks at the rise of hacktivism and its impact on business and international politics Continue Reading
-
News
12 Mar 2014
More than 162,000 WordPress sites used in DDoS attack
Security researchers have uncovered a DDoS attack that used more than 162,000 legitimate and unwitting WordPress websites Continue Reading
-
News
12 Mar 2014
Tim Berners-Lee calls for internet users’ "bill of rights"
World Wide Web creator marks its 25th anniversary by calling for a “free, open and truly global internet” enshrined in a "bill of rights" Continue Reading
-
News
10 Mar 2014
Dark web key enabler for cyber criminals, say McAfee researchers
The dark web is a key conduit for the malware industry to refine and distribute its products and services, say security researchers Continue Reading
-
Feature
03 Mar 2014
No more email? Why companies are turning to collaboration technology
Collaboration technologies are helping companies improve their employees' work-life balance Continue Reading
-
News
27 Feb 2014
Microsoft takes aim at passwords
Microsoft says it is determined to solve the problem of ineffective authentication that relies on usernames and passwords Continue Reading
-
News
21 Feb 2014
Employee mobiles expose firms to attack, says Webroot
Employees mobile devices expose companies to malicious applications and attacks, according to the latest mobile threat report from Webroot Continue Reading
-
News
19 Feb 2014
UK firms see 1,000+ internal data breaches a day, study finds
Internal threats are not a high priority for UK firms despite more than 1,000 internal data breaches a day Continue Reading
-
News
19 Feb 2014
NHS England puts patient database on hold
NHS England is to delay by six months the roll-out of its controversial Care.data scheme for sharing patient records through a central database Continue Reading
-
News
18 Feb 2014
Cut Microsoft admin rights to mitigate 92% of threats, study shows
Removing Microsoft admin rights from employees mitigates 92% of critical vulnerabilities reported in 2013 Continue Reading
-
News
11 Feb 2014
Rights groups call on White House to open privacy review
A coalition of 25 rights groups is calling for a 90-day US government review of big data and the future of privacy to be opened up to the public Continue Reading
-
News
11 Feb 2014
UK among targets of 'Mask' advanced cyber espionage campaign
The UK has been hit more than 100 times in an advanced global cyber espionage campaign that has gone undetected for more than five years Continue Reading
-
News
10 Feb 2014
Barclays bank leaks thousands of customer records
Regulators investigate Barclays after a whistleblower claims the bank leaked 27,000 customer records Continue Reading
-
News
06 Feb 2014
UK critical infrastructure at risk of cyber attack, says IET report
UK critical national infrastructure is at risk of cyber attack, says a report by consultancy Atkins for the Institution of Engineering and Technology (IET) Continue Reading
-
News
04 Feb 2014
NHS site malicious redirects are a warning to developers
A coding error that redirected NHS website visitors to malicious content should be a warning to developers, say security experts Continue Reading
-
News
31 Jan 2014
Hackers access Yahoo Mail with stolen passwords
Yahoo has revealed that hackers have tried to access some Yahoo Mail accounts with stolen passwords Continue Reading
-
News
29 Jan 2014
Cyber security quest strong in UK, says Isaca
There is a strong interest in cyber security in the UK, says Rob Stroud, international president-elect for Isaca Continue Reading
-
News
23 Jan 2014
New Snapchat security measure easily by-passed, says researcher
A new Snapchat security measure to verify users are human is easily by-passed, says researcher Continue Reading
-
News
23 Jan 2014
US startup aims to turn tables on hackers
US startup Shape Security is turning the tables against hackers by using one of their own techniques against them Continue Reading
-
News
22 Jan 2014
CIO interview: The challenge of delivering IT in a refugee camp
The United Nations (UN) looks after 58 million refugees. Naginder Kaur Dhanoa, CIO of the UN High Commission for Refugees speaks about the challenges Continue Reading
-
News
22 Jan 2014
CERT-UK to drive international cyber security collaboration
The UK’s new national computer emergency response team (CERT-UK) is set to drive international cyber security collaboration once it becomes operational Continue Reading
-
News
14 Jan 2014
Top European IT initiative to support business in 2014?
Expanding IT to support business growth is one of the biggest areas of focus for IT departments in 2014, so what does this mean? Continue Reading
-
News
07 Jan 2014
Security Think Tank: Information security strategy should support the business
How should Edward Snowden's revelations about the NSA and GCHQ influence future information security strategies in the UK? Continue Reading
-
News
06 Jan 2014
Infosec Skills, BCS announce winners of Cyber Security Challenge
Stuart Pringle, Simon Robinson and Robert Wyllie have won over £2,000 of training and a place in the semi-final of the current UK Cyber Security Challenge Continue Reading
-
News
06 Jan 2014
Yahoo claims malicious ads under control
Yahoo says the situation is under control after its advertising network served up malware to thousands of visitors last week Continue Reading
-
News
03 Jan 2014
FireEye acquires Mandiant in $1bn deal
Security firm FireEye has bought Mandiant in a deal worth just over $1bn Continue Reading
-
News
03 Jan 2014
Facebook faces lawsuit over monitoring private messages
Facebook is facing a lawsuit that claims it scans the contents of private messages to profile the user’s online activity Continue Reading
-
News
24 Dec 2013
Top 10 IT privacy stories of 2013
Stories related to whistleblower Edward Snowden’s revelations about internet mass surveillance programmes by the US and the UK have dominated this year Continue Reading
-
Opinion
19 Dec 2013
User acceptance testing needs real training, not just a short course
In spite of its importance, user acceptance testing (UAT) is often chaotic, problematic and ineffective Continue Reading
-
News
11 Dec 2013
Research reveals widespread mobile app hacking
The top 100 paid Android apps and 56% of the top 100 paid Apple iOS apps have been hacked, research has revealed Continue Reading
-
News
11 Dec 2013
Thirteen plead guilty to Anonymous DDoS attack on Paypal
Thirteen people have pleaded guilty to taking part in DDoS attacks on eBay’s Paypal, organised by the Anonymous hacker group in 2010 Continue Reading
-
News
11 Dec 2013
Ransomware looks set to increase, warns Sophos
Cyber criminals are planning to produce new forms of ransomware on an unprecedented scale, according to IT security firm Sophos Continue Reading
-
News
05 Dec 2013
Automation key to balancing agility and security, says AlgoSec
Automated critical business application management enables a more agile business and enhances security, says security policy management firm AlgoSec Continue Reading
-
News
04 Dec 2013
Proof-of-concept malware jumps air gap with sound card
Researchers demonstrate proof-of-concept malware exfiltrating data using high-frequency transmissions inaudible to humans Continue Reading
-
News
04 Dec 2013
The Guardian denies Snowden stories damaged national security
Guardian editor Alan Rusbridger defends decision to publish stories on documents leaked by whistleblower Edward Snowden Continue Reading
-
News
04 Dec 2013
UK proposes formal talks on cyber security with China
Prime minister David Cameron has called on China to be more open about cyber security Continue Reading
-
News
28 Nov 2013
EU calls on US to rebuild trust in post-Snowden era
The EC has called on the US to provide guarantees to restore trust in the wake of spying revelations Continue Reading
-
News
26 Nov 2013
NCA changed UK cyber crime fighting, says NCCU head
The NCA has changed the UK law enforcement landscape, says Andy Archibald, head of the NCA’s National Cyber Crime Unit Continue Reading
-
News
26 Nov 2013
Janet6 ‘offers the future’ for research networking needs
Jisc takes back the network from a managed service provider to light up its own fibre and offer a future proofed service to researchers, universities, colleges and schools across the UK Continue Reading
-
News
26 Nov 2013
Government lays out 2014 cyber security agenda
The UK government has reiterated its commitment to addressing cyber security and laid out some plans for 2014 at the Cyber Security Summit 2013 Continue Reading
-
News
26 Nov 2013
White hat Wi-Fi hacking shows vulnerability of business data
Whitehat hackers have shown that senstitive data can be sniffed easily from public Wi-Fi hotspots Continue Reading
-
News
26 Nov 2013
FTSE 350 firms complete cyber risk assessment
Most FTSE 350 companies put cyber risk on the board agenda, but many need to improve how they manage that risk Continue Reading
-
News
21 Nov 2013
CSA appoints Microsoft’s Adrienne Hall to board
The CSA has appointed Adrienne Hall, from Trustworthy Computing at Microsoft, to its board of directors Continue Reading
-
News
20 Nov 2013
Report highlights poor UK attitudes to mobile security
Businesses should note that many UK mobile users do not take security precautions and do not know how to guard against data theft Continue Reading
-
News
19 Nov 2013
Google reaches $17m multi-state settlement over Safari snooping
Google has reached a $17m settlement agreement with 10 US states for bypassing Apple Safari privacy settings Continue Reading
-
News
18 Nov 2013
Google and Microsoft to block searches for child porn
Google and Microsoft have announced measures to make it more difficult to find child abuse images online Continue Reading
-
News
15 Nov 2013
Cyber collateral damage a concern for all, says Lancope
All organisations could be affected by cyber attack collateral damage, says network security firm Lancope Continue Reading
-
News
12 Nov 2013
Mass surveillance a bad idea, says Information Commissioner Christopher Graham
Information Commissioner Christopher Graham says issues of national security must not overshadow concerns of legitimate public interest Continue Reading
-
News
12 Nov 2013
Web surveillance not a good idea, says Info Commissioner
Information Commissioner Christopher Graham says issues of national security cannot be allowed to overshadow concerns of legitimate public interest Continue Reading
-
News
08 Nov 2013
NSA and GCHQ mass surveillance violates EU law, study finds
Mass internet surveillance by US and UK intelligence agencies violates European law, according to a study by two academics Continue Reading
-
News
07 Nov 2013
UK intelligence heads defend mass surveillance operations
Heads of the UK’s intelligence services insist all they do in term of mass surveillance is strictly within the confines of UK law Continue Reading
-
News
29 Oct 2013
Analysis: RSA says security needs to change, but what does that mean?
RSA executive chairman Art Coviello has issued a call to action to the security industry to improve technology and collaboration Continue Reading
-
News
29 Oct 2013
Most businesses need to transform IT security, says RSA
No modern network or IT system can withstand the onslaught of a skilled adversary, given focus and time, says Amit Yoran, general manager of RSA Continue Reading
-
News
28 Oct 2013
Cyber attack shuts down Israeli toll road tunnel
A cyber attack has shut down a major link in Israel's national road network, experts claim Continue Reading
-
News
24 Oct 2013
Thales launches critical infrastructure cyber security lab
Thales has set up a cyber security lab dedicated to help improve the security of critical national infrastructure, government and business Continue Reading
-
News
23 Oct 2013
US publishes draft cyber security framework
The US has published a draft framework of voluntary cyber security standards aimed at reducing risks to critical national infrastructure Continue Reading
-
News
21 Oct 2013
Microsoft withdraws faulty Windows RT 8.1 update for Surface tablets
Microsoft has widthdrawn its Windows 8.1 update for Surface RT tablets after some users reported system crashes Continue Reading
-
News
17 Oct 2013
Dexter payment card malware variant hits South Africa
The Dexter payment card skimming malware discovered last year has resurfaced in South Africa, resulting in millions of pounds lost to fraud Continue Reading
-
News
16 Oct 2013
Neustar to host first DDoS awareness day
Communications firm Neustar is to host the first international awareness day on distributed denial of service (DDoS) attacks Continue Reading
-
News
15 Oct 2013
The ICO issues BYOD warning after breach
The ICO is calling on organisations to ensure data protection policies reflect how employees are using personal devices for work Continue Reading
-
Photo Story
15 Oct 2013
10 security reasons to upgrade to iOS 7
Even if it did not include numerous security fixes, iOS 7 has compelling reasons for corporates to adopt it to improve their security Continue Reading
-
News
15 Oct 2013
D-Link begins fixing router backdoor
D-Link has begun releasing security patches to close the backdoor discovered on some of its routers Continue Reading
-
News
11 Oct 2013
Legitimate users of Tor need not worry, says NCA
The National Crime Agency (NCA) says criminals cannot hide on the internet, but legitimate business users of anonymity software Tor are safe Continue Reading
-
News
07 Oct 2013
UK National Cyber Crime Unit becomes operational
The UK's National Cyber Crime Unit has become operational as part of the new National Crime Agency Continue Reading
-
News
03 Oct 2013
FBI shuts down Silk Road online drug market
The FBI has shut down the Silk Road online drug market and arrested kingpin Ross Ulbricht, previously known only as Dread Pirate Roberts Continue Reading
-
Opinion
03 Oct 2013
Privacy concerns in the digital world
Considering the full spectrum of privacy, people need to ask themselves if they are comfortable with all their characteristics in the public domain Continue Reading
-
News
02 Oct 2013
McAfee Focus 2013: McAfee leadership upbeat about Stonesoft acquisition
Intel-owned security firm McAfee is upbeat about its acquisition of Stonesoft and its future capability to tackle security differently Continue Reading
-
News
01 Oct 2013
IT security industry still immature, says (ISC)2 board member
The information security industry is still immature and failing to act or speak as one, says Dave Lewis, (ISC)2 board member Continue Reading
-
News
30 Sep 2013
Charity uses cloud HR system to keep track of staff working in danger zones
It took a disaster in Haiti to demonstrate to charity World Vision why it needed better HR systems Continue Reading
-
News
27 Sep 2013
Financial markets next big cyber target, says US expert
Manipulation of international financial markets will be the next evolution of cyber crime, says US Cyber Consequences Unit chief Continue Reading
-
News
27 Sep 2013
Top 10 cyber crime stories of 2013
Cyber crime featured heavily in security news coverage in 2013, with cyber criminals and cyber law enforcers upping their games with each passing month Continue Reading
-
News
27 Sep 2013
Software acquisition is risk acquisition, says industry panel
New software often means new security vulnerabilities, panel tells the (ISC)2 Security Congress 2013 Continue Reading
-
News
19 Sep 2013
NSA reveals how Snowden accessed secret Prism files
Prism whistleblower Edward Snowden accessed secret documents through a file-share, the NSA has revealed Continue Reading
-
News
16 Sep 2013
Risk assessment key to cloud adoption, says Isaca
There is mass confusion among small and medium businesses about cloud computing, says Amar Singh, chair of Isaca UK Continue Reading
-
News
09 Sep 2013
Most websites could be targeted through PHP, warns Imperva
Hackers are focusing on vulnerabilities in PHP web application development platform, threatening most websites, warns Imperva Continue Reading
-
News
06 Sep 2013
Chuggers drive up direct debit failure and charity costs
Pedestrians approached by street fundraisers are deliberately giving incorrect direct debit details, costing charities up to £50 each time Continue Reading
-
News
03 Sep 2013
Disinfecting PCs false security, says security expert
Many companies proud of their ability to identify and clean malware infected machines are missing a trick, says veteran security expert Continue Reading
-
News
22 Aug 2013
Charlie McMurdie joins PwC’s cyber practice
Charlie McMurdie, former head of the Metro Police central e-crime unit, is joining business consultancy firm PwC as its senior crime adviser Continue Reading
-
News
16 Aug 2013
UCAS adopts public cloud to process university admissions
Ten days before the A-level results, UCAS adopted a public cloud infrastructure to scale up its IT and to make admission process efficient Continue Reading
-
Opinion
14 Aug 2013
How to appoint a new outsourcing supplier
Outsourcing can come with its own security risks if not managed appropriately, making due diligence and clear contractual arrangements key Continue Reading
-
Opinion
30 Jul 2013
The ideology of hacking
Business leaders need to be educated on the true threats their firms face and IT security professionals have to arm their executives with that information Continue Reading
-
News
30 Jul 2013
ICO to investigate sale of online dating profiles
The UK’s data protection watchdog is to investigate the sale of 10,000 online dating profiles to the BBC’s Panorama programme Continue Reading
-
Feature
29 Jul 2013
An introduction to cyber liability insurance cover
Cyber liability insurance cover has been around for 10 years, but most security professionals seem to have not heard of it or know that it exists Continue Reading
-
News
29 Jul 2013
Continual vigilance key to security, says Damballa
UK businesses must update their approach to cyber security to look for signs of compromise continually Continue Reading
-
News
26 Jul 2013
FireEye partners with Phishme for multi-layered security
Security technology developer FireEye has partnered with phishing awareness training firm PhishMe to offer a multi-layered approach to securing information networks Continue Reading
-
News
25 Jul 2013
MI5 and GCHQ call for FTSE 350 cyber health check
Intelligence agencies MI5 and GCHQ call on UK’s top listed companies to take part in a cyber governance health check Continue Reading
-
News
23 Jul 2013
Cisco buys cyber security company Sourcefire for $2.7bn
Networking giant Cisco has reached an agreement to buy cyber security business Sourcefire in a $2.7bn deal Continue Reading
-
News
22 Jul 2013
Insider threat: Balancing security with privacy
How can organisations increase security without affecting productivity or encroaching on employees’ right to privacy? Continue Reading
-
News
22 Jul 2013
UK to block online porn by default
The UK is to block online pornography by default to all new internet users, David Cameron is to announce Continue Reading
-
Opinion
19 Jul 2013
How to assess the security of a cloud service provider
As businesses continue to put more information online, understanding cloud suppliers and agreements has never been more important Continue Reading