UK government, NHS and Windows XP support – what really happened

In all the debate about the NHS ransomware attack, much has been made of a...
Breach, rinse, repeat – when will companies get the IT security basics right?

The news that Yahoo suffered a security breach affecting half a billion users has heads shaking and critics justifiably slamming corporate security practices once more. We...
Does Heartbleed show it is time to ‘corporatise’ open source?

The exposure of the Heartbleed bug that causes a major security vulnerability in many websites has handed a gift to the anti-open source lobby.
One of...
The lesson from the NHS Care.data row: You can’t keep privacy issues private any more

The rumbling, growing row over the NHS England Care.data service has become an instruction manual for how not to handle data privacy in the digital age.
For anyone not aware of the...
EU cyber laws should target IT suppliers’ security negligence

Cyber security has made its ultimate mainstream breakthrough. This week, a relatively minor hack targeted at Apple not only made the BBC 10 O'clock News, but warranted a lengthy studio...
Gary McKinnon’s legacy

So Gary McKinnon stays free - for now.
At Computer Weekly, we've followed the self-confessed hacker's story for the 10 years it's taken to fight his extradition to the US. Along the way we've seen...
IT professionals must counter fear and ignorance of technology

We all know the good that technology can do, and the benefits it brings for the way we work, live and play. The future growth of the UK economy will be built on IT. Consumers are embracing technology in their everyday lives like never before.
Yet residual fear and ignorance is still...
Prepare now – mandatory data breach disclosure is on its way

We have Sony to thank for raising the bar of the world's biggest data breaches - with some 100 million people potentially affected by the hack on its Playstation...
Time for governments to heed calls for an international cyber peace treaty

When one of the top IT security labs in the US set about deconstructing the Stuxnet virus that attached Iranian nuclear facilities, their experts estimated that the code was so...
Users remain the weakest link in the IT security chain

It's a favourite refrain in every IT helpdesk: "Our jobs would be so much easier if it weren't for all those pesky users."
In a week when the IT security world gathered in San Francisco for the 2010 RSA conference, that was probably also a familiar cry around the cavernous halls of the...