ANALYSIS: If one goes strictly by the numbers, Whitman has had a successful reign. The stock of both HP Enterprise…
Police will now require independent authorisation to access data, but critics say the changes don't limit 'indiscriminate surveillance' of personal…
Departments handling sensitive data should avoid Russian security products as they face an 'increased risk' of hacking, while Barclays drops…
ANALYSIS: MPs admit to sharing passwords and leaving computers unlocked because of convenience, but the people deserve better
At the AWS re:Invent conference, CTO Werner Vogels emphasizes the critical importance of security in all cloud development
Supermarket Morrisons could be forced to pay compensation after rogue employee posted salary details online
What do you know about HP - the firm from the Silicon Valley garage that became HP Inc and HPE?
NATO members to draw up rules and on how and when to deploy its cyber warfare capabilities
Top secret army data found online after virtual image of hard disk was left on an AWS server
Hackers are using increasingly sophisticated tools and techniques for attacks against banks, SWIFT warns
UPDATED: MacOS High Sierra has a serious flaw with admin privileges, as researcher criticised for public disclosure
Uber tells ICO that 2016 hack saw names, numbers and email addresses stolen
A flaw in a new polling feature could have been manipulated by a malicious user to delete images of their…
McAfee's first major acquisition as an independent security firm is Skyhigh Networks
Blockchain could be used to give citizens control over how their identity information is shared with public services, argues the…
NHS Digital plots £20m division to help stop another WannaCry attack
The passwords were encrypted but may have been cracked using brute-force techniques, says Imgur's chief operating officer
Akamai CTO talks us through IPv6, the Apollo Lunar Module and why he would study foreign languages if he wasn't…
What do you know about Uber, its history and its services?
ICO and NCSC are looking into the scale of the Uber hack before they take next steps
Search engine collects location data on Android users, even when location services are switched off
Is it legal? Hundreds of websites are said to be tracking visitor keystrokes raising questions of legality
Security experts are astounded at revelations that Uber concealed a cyberattack but what can businesses learn from it?
Business PCs from Dell, Lenovo, HP and others contain flawed software that shipped with Intel processors
New Uber CEO comes clean about 2016 hack, claiming data was destroyed and new measures implemented. But can users and…
Queens University Belfast to host £5m institute that looks to make hardware more secure in era of IoT
Cisco is to contribute its world-spanning cyber-threat analysis to help battle increasingly sophisticated internet threats
ANALYSIS: You can’t prevent all attempts to penetrate your enterprise security, but you can impede the attackers and you can…
AWS re:Invent 2017: New government-focused region complements an existing deal that gives US intelligence agencies access to air-gapped cloud infrastructure
CA WORLD 2017: CA releases 20 new products and enhancements as it preaches the power of change through software