Regulatory compliance and standard requirements
-
News
31 Dec 2025
Top 10 surveillance, journalism and encryption stories of 2025
A transatlantic row between the UK and the Trump administration erupted after the UK attempted to force Apple to break its advanced encryption. That was just one of a series of stories reporting on the tension between state surveillance and privacy this year Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
29 Dec 2025
Top 10 cyber security stories of 2025
AI dominated all tech conversations this year, but the concerns of cyber security professionals extend far beyond. From remote work to supply chains, quantum to identity, there were plenty of other topics for the industry to chew over in 2025. Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Feb 2026
Infosecurity Europe launches cyber security startups stream
Infosecurity Europe 2026 will feature a cyber security startup exhibition zone and a competition for business support, in conjunction with the UK Cyber Flywheel organisation Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
03 Feb 2026
Banks on the hook for £173m in APP fraud reimbursement
Banks paid 88% losses claimed by customers that fell victim to authorised push payment fraud last year Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Feature
03 Feb 2026
Why the UK needs to rethink the Investigatory Powers Act and allow intercept evidence in court
The UK needs clear and unambiguous laws around the use of digital evidence in court. The law has become tangled following rulings in the country’s EncroChat prosecutions. It’s time to allow intercept data to be used as evidence in legal cases Continue Reading
By- Peter Sommer
-
E-Zine
03 Feb 2026
Datacentre indecision: UK government’s back and forth on planning
This week’s Computer Weekly ezine digs into the latest twist in a long-running datacentre planning saga, concerning a server farm in Iver, Buckinghamshire, that the government has now admitted it was wrong to grant planning permission for. We also hear from the head of advanced analytics at Dutch Bank ING about how its foray into using AI technologies is benefiting both its business and the customers it serves. Sticking with the AI theme, we take a deep dive into how the technology is being used as an enabler for the development of urban digital twins, and find out how it can be used to assist IT security teams. Read the issue now. NOTE: There are gremlins in the system, feasting on our download button, so for now, please paste this link into your browser to view the ezine: https://www.bitpipe.com/detail/RES/1770105656_805.html Continue Reading
-
News
02 Feb 2026
Canva uses 1Password to secure ID during growth phase
As it underwent a growth spurt in the early 2020s, graphic design platform Canva turned to 1Password to manage identity across its expanding organisation Continue Reading
By- Alex Scroxton, Security Editor
-
News
02 Feb 2026
Police intercept evidence from Sky ECC cryptophone network ‘unreliable’, Antwerp court told
Intercepted communications data used to prosecute drug crime gangs is unreliable and does not conform to international standards of evidence, according to an expert report presented to a court in Antwerp Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
30 Jan 2026
Ex-directors of firm linked to Satoshi Nakamoto imposter sue over whistleblowing retaliation claims
Two former directors of London tech company nChain, associated with a computer scientist who falsely claimed to be bitcoin inventor Satoshi Nakamoto, have told an employment tribunal they were dismissed in retaliation for whistleblowing Continue Reading
By- Bill Goodwin, Investigations Editor
-
E-Zine
27 Jan 2026
Tech nationalism: The need to build and protect UK digital sovereignty
This week’s edition of the Computer Weekly ezine has a focus on digital sovereignty, as we delve into why the Open Rights Group thinks it is high time the UK government has a formalised strategy, championing homegrown tech providers. The last in our recent run of buyer’s guides also touches on this topic. Elsewhere, we hear from the CISO of online retailer Zalando about how she’s drawing on her career in tech to reshape the firm’s approach to security. Rounding out the ezine, we find out how the adoption of AI is affecting employee autonomy in the workplace. Read the issue now. Continue Reading
-
Opinion
26 Jan 2026
AI claims are cheap: The challenge is to work out what's real
The Security Think Tank considers what CISOs and buyers need to know to cut through the noise around AI and figure out which AI cyber use cases are worth a look, and which are just hype. Continue Reading
By- Ellie Hurst, Advent IM
-
News
23 Jan 2026
US punts renewal of threat data sharing law to September
US lawmakers have extended the Cybersecurity Information Sharing Act of 2015 for another nine months, buying time to enact a replacement for the legislation. Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Jan 2026
Singapore debuts world’s first governance framework for agentic AI
The Infocomm Media Development Authority has released a guide to help enterprises deploy artificial intelligence agents safely and address specific risks such as unauthorised actions and automation bias Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
21 Jan 2026
AI slop pushes data governance towards zero-trust models
Organisations are implementing zero-trust models for data governance thanks to the proliferation of poor quality AI-generated data, often known as AI slop Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
20 Jan 2026
How open banking is evolving to unlock finances
In this week’s edition of the Computer Weekly ezine, we take a look at how – eight years after its introduction – the concept of open banking is expanding and evolving, and giving rise to new use cases within financial services. We also sit down with the CTO of Norsk Global and find out how swapping out its legacy VMware estate for Nutanix’s technology has saved it money and helped it shift away from having a reactive IT strategy. Elsewhere in the issue, we find out how agentic AI is shaking up business processes within the enterprise architecture landscape. And in the second of our three buyer’s guide features on digital sovereignty, we find out why this is a topic IT buyers and IT departments need to get a handle on in 2026. Read the issue now. Continue Reading
-
News
15 Jan 2026
Cyber body ISC2 signs on as UK software security ambassador
Professional cyber association ISC2 pledges support to UK government’s Software Security Ambassador scheme, part of the recently unveiled Cyber Action Plan Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Jan 2026
Zoho opens its first UAE datacentres to boost cloud adoption
New Dubai and Abu Dhabi facilities support data sovereignty, providing CIOs with local access to more than 100 Zoho and ManageEngine cloud services Continue Reading
By- Andrea Benito , Computer Weekly
-
News
14 Jan 2026
Texas judge throws out second lawsuit over CrowdStrike outage
A US judge has dismissed a lawsuit filed by CrowdStrike shareholders over the July 2024 outage that caused widespread disruption around the world Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
13 Jan 2026
Cutting through the noise: SaaS accelerators vs. enterprise AI
The Security Think Tank considers what CISOs and buyers need to know to cut through the noise around AI and figure out which AI cyber use cases are worth a look, and which are just hype. Continue Reading
By- Richard Watson-Bruhn, PA Consulting
-
E-Zine
13 Jan 2026
Every Post Office victim deserves an OBE, says Betty Brown
In the first edition of the Computer Weekly ezine for 2026, we reveal who in the world of tech has received gongs in the New Year Honours List, and why. We also sit down with competition lawyer Maria Luisa Stasi, who is in the midst of a legal action to secure billions of pounds in compensation for UK businesses that have been allegedly overcharged by Microsoft for opting to run its software in competing cloud environments. Elsewhere in the issue, we find out why automotive enterprises are being advised to revamp their networks and embrace openness. And in the first of our three buyer’s guide features on the knotty topic of digital sovereignty, we find out what role data auditing has to play in building a cast-iron data sovereignty strategy. Read the issue now. Continue Reading
-
News
12 Jan 2026
Business leaders see AI risks and fraud outpacing ransomware, says WEF
C-suite executives are more concerned with risks arising from AI vulnerabilities and cyber fraud than ransomware, according to the World Economic Forum Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Jan 2026
Ofcom begins investigation of explicit image generation on Grok
Elon Musk’s Grok image generator, from parent company X, is being investigated by the UK regulator under the Online Safety Act Continue Reading
By- Cliff Saran, Managing Editor
-
News
12 Jan 2026
Intersec Dubai highlights why AI has become critical in the race against cyber attackers
Cigna Healthcare’s Jean Wiles warns that healthcare security teams must act faster without sacrificing accuracy or compliance as threats driven by artificial intelligence scale Continue Reading
By- Andrea Benito , Computer Weekly
-
News
11 Jan 2026
UAE’s VentureOne to deploy secure autonomy technologies in Europe through Unikie and Solita partners
Partnerships with Finland’s Unikie and Solita will bring UAE-developed secure autonomy technologies to critical infrastructure, public safety and AI-enabled operations across Northern Europe Continue Reading
By- Andrea Benito , Computer Weekly
-
Opinion
09 Jan 2026
From promise to proof: making AI security adoption tangible
The Security Think Tank considers what CISOs and buyers need to know to cut through the noise around AI and figure out which AI cyber use cases are worth a look, and which are just hype. Continue Reading
By- Aditya K Sood, Aryaka
-
Opinion
09 Jan 2026
Computer Misuse Act reform is overdue - not all anniversaries should be celebrated
Let's not have any further anniversaries for the UK's outdated cyber security laws - the government has dragged its heels for too long and reform is urgently needed Continue Reading
By- Lord Chris Holmes, House of Lords
-
News
08 Jan 2026
Like it or not, AI will transform cyber strategy in 2026
Bubble or no bubble, from cyber skills to defensive strategies to governance, risk and compliance, artificial intelligence will remake the cyber world in 2026 Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
08 Jan 2026
Security Think Tank: Stop buying AI, start buying outcomes
The Security Think Tank considers what CISOs and buyers need to know to cut through the noise around artificial intelligence and figure out which AI cyber use cases are worth a look, and which are just hype Continue Reading
By- Rik Ferguson, Forescout
-
Feature
07 Jan 2026
Predictability emerging as enterprise IT's new north star
Across ERP cloud migration, desktop and compliance decision-making, enterprise IT teams are prioritizing predictability, locking in cost, control and accountability before go-live. Continue Reading
By- James Alan Miller, Senior Executive Editor
-
News
06 Jan 2026
Privacy will be under unprecedented attack in 2026
The UK and Europe are ramping up opposition to encryption and stepping up surveillance of private communications. Here is what to expect this year Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
05 Jan 2026
UK government to spend £210m on public sector cyber resilience
The UK government unveils a £120m Cyber Action Plan to help reinforce and promote IT security resilience across the country's public services Continue Reading
By- Alex Scroxton, Security Editor
-
News
31 Dec 2025
Top 10 surveillance, journalism and encryption stories of 2025
A transatlantic row between the UK and the Trump administration erupted after the UK attempted to force Apple to break its advanced encryption. That was just one of a series of stories reporting on the tension between state surveillance and privacy this year Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
29 Dec 2025
Top 10 cyber security stories of 2025
AI dominated all tech conversations this year, but the concerns of cyber security professionals extend far beyond. From remote work to supply chains, quantum to identity, there were plenty of other topics for the industry to chew over in 2025. Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
22 Dec 2025
Why the Middle East needs hybrid, human-led cyber security in the age of AI
Obrela’s Mark Morland says AI is accelerating detection, but regional context and human expertise remain essential as threats across the Gulf become more sophisticated and specific to sectors Continue Reading
By- Andrea Benito , Computer Weekly
-
News
19 Dec 2025
European Commission renews UK data adequacy agreement, ensuring continued free flow of data
Despite calls from some data protection campaigners, the UK's agreement to allow data movement with European Economic Area countries is extended until 2031 Continue Reading
By- Bryan Glick, Editor in chief
-
News
18 Dec 2025
AI safeguards improving, says UK government-backed body
Inaugural AI Security Institute report claims that safeguards in place to ensure AI models behave as intended seem to be improving Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
17 Dec 2025
Security platform consolidation in 2026: The AI imperative
As we prepare to close out 2025, the Computer Weekly Security Think Tank panel looks back at the past year, and ahead to 2026. Continue Reading
By- John Bruce, Quorum Cyber
-
News
15 Dec 2025
Top IT predictions in APAC in 2026
Enterprises across the Asia-Pacific region are expected to prioritise sovereign architectures, double down on securing agentic systems and rewrite their infrastructure playbooks, among other tech trends Continue Reading
By- Aaron Tan, Informa TechTarget
-
Opinion
15 Dec 2025
The three cyber trends that will define 2026
As we prepare to close out 2025, the Computer Weekly Security Think Tank panel looks back at the past year, and ahead to 2026. Continue Reading
By- Vladimir Jirasek, Foresight Cyber
-
Opinion
15 Dec 2025
In cyber security, basics matter, even in 2025
As we prepare to close out 2025, the Computer Weekly Security Think Tank panel looks back at the past year, and ahead to 2026. Continue Reading
By- Vladimir Jirasek, Foresight Cyber
-
Opinion
15 Dec 2025
What is driving the rise of infostealer malware?
Infostealer malware is a growing problem for cyber security teams, and these attacks have the potential to cause significant damage to businesses. What is enabling them to thrive? Continue Reading
By- Anne Heim, Socura
-
Opinion
12 Dec 2025
Quantum risk to quantum readiness: A PQC roadmap
No one knows exactly when quantum computing will arrive, but accelerating progress is prompting security and IT leaders to recognise the potential risks. So how do organisations begin implementing post-quantum cryptography? Continue Reading
By- Ben Packman, PQShield
-
Opinion
12 Dec 2025
What lies in store for cyber security skills in 2026?
As we prepare to close out 2025, the Computer Weekly Security Think Tank panel looks back at the past year, and ahead to 2026. Continue Reading
By- Haris Pylarinos, Hack The Box
-
Opinion
10 Dec 2025
Security pros should prepare for tough questions on AI in 2026
As we prepare to close out 2025, the Computer Weekly Security Think Tank panel looks back at the past year, and ahead to 2026. Continue Reading
By- Ellie Hurst, Advent IM
-
Opinion
09 Dec 2025
Are we mistaking regulation for resilience?
We have a growing number of cyber compliance regulations, yet our country’s cyber resilience remains fragile. What is going wrong? Continue Reading
By- Richard Starnes
-
Opinion
09 Dec 2025
Digital sovereignty about outcomes, not theoretical ideals
SAP’s chief executive counsels against abstractly idealistic conceptions of digital sovereignty that over-focus on physical data centres Continue Reading
By- Christian Klein, SAP
-
News
09 Dec 2025
OAIC to launch blitz on privacy compliance
Australia’s privacy watchdog will begin the new year with a compliance sweep targeting businesses that run afoul of privacy rules, including the over-collection of personal information in-person, warning that non-compliance could trigger fines Continue Reading
By- Aaron Tan, Informa TechTarget
-
Opinion
08 Dec 2025
Ethical hackers can be heroes: It's time for the law to catch up
The UK government's plan to finally rewrite the 1990 Computer Misuse Act to provide much-needed legal protections for ethical hackers is welcome, but now we need firm action. Continue Reading
By- Ed Parsons, Intigriti
-
News
08 Dec 2025
NCSC warns of confusion over true nature of AI prompt injection
Malicious prompt injections to manipulate GenAI large language models are being wrongly compared to classical SQL injection attacks. In reality, prompt injection may be a far worse problem, says the UK’s NCSC Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
03 Dec 2025
In 2026, collaboration, honesty and humility in cyber are key
As we prepare to close out 2025, the Computer Weekly Security Think Tank panel looks back at the past year, and ahead to 2026. Continue Reading
By- Rik Ferguson, Forescout
-
News
03 Dec 2025
UK government pledges to rewrite Computer Misuse Act
Campaigners celebrate as security minister Dan Jarvis commits to amending the outdated Computer Misuse Act to protect security professionals from prosecution Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Dec 2025
UK national security strategy failing to account for online world
The UK government’s national security strategy is falling short on online matters, according to the independent reviewer of terrorism Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Dec 2025
Post Office avoids £1m fine over botched website upgrade data breach
The Information Commissioner’s Office considered fining the Post Office £1m for a 2024 data breach that let subpostmasters down again Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
03 Dec 2025
Women in Cybersecurity Middle East marks five years of impact at Black Hat MEA
As AI reshapes the regional cyber security landscape, diversity and skills development remain at the heart of building a resilient digital workforce Continue Reading
By- Andrea Benito , Computer Weekly
-
News
03 Dec 2025
Black Hat MEA: Saudi Vision 2030 fuels surge in cyber security innovation
Global cyber firms are racing to support the Kingdom’s mega-projects, but building trusted partnerships remains key, says Exabeam CEO Pete Harteveld Continue Reading
By- Andrea Benito , Computer Weekly
-
Opinion
02 Dec 2025
UK's Cyber Bill should be just one part of a wider effort
New cyber legislation is necessary but a wider effort is needed to harden the UK's security and resilience. Continue Reading
By- James Morris, CSBR
-
Opinion
02 Dec 2025
Cyber's defining lessons of 2025, and what comes next
As we prepare to close out 2025, the Computer Weekly Security Think Tank panel looks back at the past year, and ahead to 2026. Continue Reading
By- Dave Gerry, Bugcrowd
-
Feature
02 Dec 2025
Inserting AI into cyber awareness
As industry looks to grasp the use of AI and automated features, how are security suppliers facing the challenge of adding these capabilities to their products and services? We talked to one provider to find out Continue Reading
By -
Opinion
01 Dec 2025
What lies in store for the security world in 2026?
As we prepare to close out 2025, the Computer Weekly Security Think Tank panel looks back at the past year, and ahead to 2026. Continue Reading
By- Anthony Young, Bridewell
-
Opinion
01 Dec 2025
How headlines can drive change in cyber security
Big news stories can shift attitudes. There’s no doubt that insurance vendors and brokers are using major cyber attacks to promote their products, but can security teams also use it to help their businesses be better prepared? Continue Reading
By- Robert Johnston, N-able
-
Feature
01 Dec 2025
A framework for software development self-service
Keeping software developers happy is an essential ingredient in IT project success. Developer self-service is the way forward, but with guardrails Continue Reading
By- Cliff Saran, Managing Editor
-
News
26 Nov 2025
US breach reinforces need to plug third-party security weaknesses
Cyber breach at US financial sector tech provider highlights the risk of third-party vulnerabilities in finance ecosystems Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
25 Nov 2025
MI5 made multiple applications for phone data to identify BBC journalist’s sources
MI5 discloses it made and authorised unlawful ‘sequential applications’ for Vincent Kearney’s phone data during his time at the BBC, but will neither confirm nor deny whether it undertook further ‘lawful’ surveillance of BBC journalists Continue Reading
-
Opinion
21 Nov 2025
Protecting the defenders: Addressing cyber's burnout crisis
The Computer Weekly Security Think Tank considers the burdens and responsibilities that accompany the role of chief information security officer, and share guidance on how to navigate a challenging career path. Continue Reading
By- Mandy Andress, Elastic
-
News
19 Nov 2025
UAE to launch first space-to-ground quantum communication network
Technology Innovation Institute and Space42 unveil a collaboration at the Dubai Airshow to deliver the UAE’s first space-enabled quantum communication network, strengthening national cyber resilience and advancing sovereign leadership in next-generation secure infrastructure Continue Reading
By- Andrea Benito , Computer Weekly
-
News
18 Nov 2025
Fintech leaders call for united front against AI-driven cyber crime
As AI makes financial scams more personalised and convincing, fintech experts have called for deeper collaboration and the use of behavioural analytics and other technologies to protect consumers Continue Reading
By- Aaron Tan, Informa TechTarget
-
Feature
17 Nov 2025
Data retention in the UK: How long should you keep data?
We look at data retention periods, what the key laws and regulations say, how long they recommend to keep different kinds of data, and the software tools that can help Continue Reading
By- Antony Adshead, Computer Weekly
-
News
16 Nov 2025
Australia lags regional peers in AI adoption
Report finds governance gaps, a lack of training and fear of risks as key reasons for the nation’s slow uptake of artificial intelligence compared with regional peers Continue Reading
-
News
14 Nov 2025
MI5 made multiple applications for phone data to identify BBC journalist’s sources
MI5 discloses it made and authorised unlawful ‘sequential applications’ for Vincent Kearney’s phone data during his time at the BBC, but will neither confirm nor deny whether it undertook further ‘lawful’ surveillance of BBC journalists Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
12 Nov 2025
US cyber intel sharing law set for temporary extension
The CISA 2015 cyber intelligence sharing law, which lapsed just over a month ago amid a wider shutdown, will receive a temporary lease of life should attempts to reopen the federal government succeed Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Nov 2025
IT services companies and datacentres face regulation as cyber security bill reaches Parliament
The Cyber Security and Resilience Bill will require large IT services companies, including datacentres, to report security incidents within 24 hours Continue Reading
By- Bill Goodwin, Investigations Editor
-
Opinion
10 Nov 2025
Who is really accountable for the online safety gap?
There has been a flurry of regulatory activity on online safety around the world with no consensus on the best approach. How should companies and governments respond? Continue Reading
By- Hayley Brady, Herbert Smith Freehills Kramer
-
News
09 Nov 2025
Nikkei data breach exposes personal data of over 17,000 staff
Hackers used stolen login details from an employee's computer to access the Japanese media giant’s Slack messaging platform, with names, email addresses and chat histories potentially exposed Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
07 Nov 2025
Popular LLMs dangerously vulnerable to iterative attacks, says Cisco
Cisco researchers probed some of the most widely used public GenAI LLMs and found many of them were dangerously susceptible to so-called multi-turn cyber attacks producing undesirable outputs Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
07 Nov 2025
Resilience for resilience: Managing burnout among cyber leaders
The Computer Weekly Security Think Tank considers the burdens and responsibilities that accompany the role of chief information security officer, and share guidance on how to navigate a challenging career path. Continue Reading
By- John Skipper and Farrukh Ahmad, PA Consulting
-
News
07 Nov 2025
Industry calls for clarity on government digital ID plans
The digital identity industry asks UK government for transparency on its digital identity scheme and proposes a formal collaboration agreement Continue Reading
By -
News
05 Nov 2025
Dutch boardroom cyber security knowledge gap exposed
Cyber security governance professor warns that executives lack the capability to assess cyber threats in implementation approaches Continue Reading
By- Kim Loohuis
-
News
04 Nov 2025
Ryt Bank taps agentic AI for conversational banking
Malaysia’s Ryt Bank is using its own LLM and agentic AI framework to allow customers to perform banking transactions in natural language, replacing traditional menus and buttons Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
04 Nov 2025
The Security Interviews: Colin Mahony, CEO, Recorded Future
Recorded Future’s CEO talks threat intelligence, AI in cyber security and the ever-changing cyber threat landscape Continue Reading
By -
News
04 Nov 2025
Nordic investors drive investment in region’s defence sector
Slush Startup in Helsinki will feature dual-use, defence and security events that bring suppliers together Continue Reading
By- Gerard O'Dwyer
-
News
04 Nov 2025
UAE Sovereign Launchpad begins nationwide roll-out with support from e& and AWS
The cloud infrastructure platform aims to strengthen digital resilience and regulatory compliance across government and regulated sectors in the United Arab Emirates Continue Reading
By- Andrea Benito , Computer Weekly
-
News
04 Nov 2025
Fewer data breaches in Australia, but human error now a bigger threat
Australian privacy commissioner warns that the human factor is a growing threat as notifications caused by staff mistakes rose significantly even as total breaches declined 10% from a record high Continue Reading
By- Aaron Tan, Informa TechTarget
-
Opinion
03 Nov 2025
CISOs in court: Balancing cyber resilience and legal accountability
The Computer Weekly Security Think Tank considers the burdens and responsibilities that accompany the role of chief information security officer, and share guidance on how to navigate a challenging career path. Continue Reading
By- Aditya K Sood, Aryaka
-
Opinion
03 Nov 2025
Just weeks left until Companies House ID changes: how to prepare
Just over two weeks remain before Companies House starts enforcing new digital identity verification procedures for company directors, but there's still time to get ready. Continue Reading
By- Tim Barnett, Credas Technologies
-
News
29 Oct 2025
Rapid7: Cyber defences stuck in the 1980s as threats mount
The company’s chief product officer notes that many defence tactics are still stuck in the past, urging organisations to adopt AI-driven security platforms to improve threat detection and response Continue Reading
-
News
29 Oct 2025
Scope of US state-level privacy laws expands rapidly in 2025
Nine state-level data protection laws have come into force in the US this year, and three more are slated for January 2026. Navigating this complex landscape is becoming a challenge Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Oct 2025
Effective cyber sanctions require a joined-up approach, says Rusi
Calling out and sanctioning cyber threat actors can be an effective tool, but is not a universal panacea, and needs to be considered as part of a wider, strategic approach, say Rusi think tank analysts Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
27 Oct 2025
Use second-layer tools for AI safety
While some enterprises find it difficult to adopt AI, they can now use second-layer AI tools that enable businesses to implement the technology safely Continue Reading
By- Sooyeon Kim
-
News
27 Oct 2025
Hamas lawyer seeks appeal following police’s seizure of his phone at Welsh port
Police say that solicitors cannot have a ‘cast iron defence’ to protect their electronic devices from ever being searched Continue Reading
By -
News
23 Oct 2025
Amid CISA cuts, US state launches first VDP
Legislators in Annapolis, Maryland, have teamed up with Bugcrowd to launch a statewide vulnerability disclosure programme Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Oct 2025
Ministry of Justice’s OpenAI deal paves way to sovereign AI
OpenAI has been busy signing deals with the UK government to bolster UK artificial intelligence. It’s now launching data residency for UK customers Continue Reading
By- Cliff Saran, Managing Editor
-
Opinion
23 Oct 2025
The US government shutdown is a wake-up call for cyber self-reliance
As the US government shutdown heads towards a second month, could the disruption to cyber security programmes be the impetus end-users need to pull themselves up by their own bootstraps? Continue Reading
By- John Paul Cunningham, Silverfort Inc
-
News
23 Oct 2025
Business leaders raise concerns over public cloud data sovereignty
The unpredictable geopolitical climate is having an impact on IT strategies, a report from Kyndryl has found Continue Reading
By- Cliff Saran, Managing Editor
-
News
22 Oct 2025
Singapore unveils efforts to govern agentic AI, prepare for post-quantum era
Guidelines and tools will help organisations in the city-state manage risks from AI agents and prepare for a future where quantum computers could break current encryption Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
22 Oct 2025
Jaguar Land Rover attack to cost UK £1.9bn, say cyber monitors
The UK's Cyber Monitoring Centre calculates the overall cost of the Jaguar Land Rover cyber attack will be almost two billion pounds Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Oct 2025
Building security and trust in AI agents
AI agents require standardised guidelines, clear human responsibility and a shared language between developers and policymakers to be secure and trusted, experts say Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
21 Oct 2025
New cyber resilience centre to help SMEs fend off cyber threats
Spearheaded by the Singapore Business Federation, the cyber resilience centre will equip SMEs in the city-state with cyber security capabilities to mitigate and recover from cyber attacks Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
20 Oct 2025
France’s Atos eyes UK public sector with investment in secure UK infrastructure
French IT services supplier invests in highly secure and accredited UK-based infrastructure Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
16 Oct 2025
Microsoft identifies boardroom cyber awareness as a top priority
Digital security report urges IT leaders to convince company boards that cyber security is a board-level problem Continue Reading
By- Cliff Saran, Managing Editor
-
News
16 Oct 2025
Securing the AI era: Huawei’s cyber security strategy for the GCC
At Gitex 2025, Sultan Mahmood, chief security officer for Huawei Gulf North, outlined how the company supports GCC digital sovereignty, AI security, and enterprise cyber resilience Continue Reading
By- Andrea Benito , Computer Weekly
-
News
15 Oct 2025
ICO fines Capita £14m after ransomware caused major data breach
Outsourcing giant hit with £14m fine over 2023 cyber attack, but costs could rise as legal actions continue Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
15 Oct 2025
Obsession with cyber breach notification fuelling costly mistakes
The race to meet security breach notification deadlines is leading to staff burnout, destroyed evidence and a culture of blame, warns a Trend Micro risk and security strategist Continue Reading
