Top Stories

Dealing with the challenge of beg bounties

The rise of so-called beg bounties is becoming a challenge for security teams, and can be a drain on time and resources. But what is a beg bounty, and how does it differ from a bug bounty?

Williams F1 car launch disrupted by data leak

Williams Formula One team forced to pull augmented reality app it had planned to use to launch its 2021 car at the last minute after an apparent cyber attack

Clarification needed on IT ‘super-deduction’ allowance

Chancellor announces that companies investing in qualifying new plant and machinery assets will be able to claim a ‘super-deduction’ allowance

AI projects yield little business value so far

Artificial intelligence has been red hot in recent years, but it is generating precious little business value so far, although World Remit and Virgin Hyperloop have met with some success

View All Stories

Latest News

View All The Latest News

In Depth

  • Dealing with the challenge of beg bounties

    The rise of so-called beg bounties is becoming a challenge for security teams, and can be a drain on time and resources. But what is a beg bounty, and how does it differ from a bug bounty?

  • AI projects yield little business value so far

    Artificial intelligence has been red hot in recent years, but it is generating precious little business value so far, although World Remit and Virgin Hyperloop have met with some success

  • Five ways that disaster recovery changes in a pandemic

    Covid-19 has changed IT. Previously, working remotely was a business continuity measure, but now it is the norm. That means disaster recovery has to adapt to new risks and new ways to respond

View All In Depth Articles

CW+ Downloads

View All

Blogs

Opinion

View All Opinion Articles

Videos

View all Videos

Search thousands of tech definitions

View All Definitions

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close