Top Stories

Post Office scandal – “cock-up or cook-up”?

Post Office scandal – “cock-up or cook-up”?

The second phase of the Post Office Horizon IT scandal raised more questions over who did what, when and where, with shocking revelations at every turn

Legacy IT magnifies cyber risk for Defra, says NAO

Legacy IT magnifies cyber risk for Defra, says NAO

Some 30% of Defra’s applications are currently unsupported, magnifying cyber risk as the government department struggles to make progress on a digital transformation programme

Don’t become an unwitting tool in Russia’s cyber war

Don’t become an unwitting tool in Russia’s cyber war

Researchers have turned up evidence that enterprise networks are being co-opted by Russian threat actors to launch attacks against targets in Ukraine. How can you avoid becoming an unwitting tool in a state-backed attack?

EU fails to protect human rights in surveillance tech transfers

EU fails to protect human rights in surveillance tech transfers

Transfers of surveillance technology from the European Union to African governments are carried out without due regard for the human rights impacts, the European Ombudsman has found after a year-long investigation into the European Commission’s ...

View All Stories

Latest News

View All The Latest News

In Depth

  • From capex to opex: Storage procurement options bloom

    From capex to opex: Storage procurement options bloom

    We look at the growing list of possibilities when it comes to paying for storage infrastructure, ranging from upfront purchases with upgrades to pure pay-as-you-go options

  • Extended reality can be empathic reality

    Extended reality can be empathic reality

    In the metaverse, eliciting empathy might become an important feature for many applications, including gaming and industrial uses, and there is even the potential that applications that focus on emphatic results will create their own market niche

  • How gamifying cyber training can improve your defences

    How gamifying cyber training can improve your defences

    Security training is the cornerstone of any cyber defence strategy. With ever-escalating online threats, it is now more important than ever that this training is an engaging experience

View All In Depth Articles

CW+ Downloads

View All

Blogs

Opinion

View All Opinion Articles

Videos

View all Videos

Search thousands of tech definitions

View All Definitions
CIO
Security
Networking
Data Center
Data Management
Close