Top Stories

Deliveroo accused of ‘soft union busting’ with GMB deal

Smaller grassroots unions have criticised Deliveroo and GMB for making a “hollow” deal that will ultimately undermine workers’ self-organising efforts

Nature of cyber war evolving in real time, says Microsoft

The past three months have seen the rapid evolution of the very nature warfare to incorporate cyber attacks, Microsoft’s Brad Smith tells the audience at its Envision conference in London

Red teaming to be standard in Dutch governmental organisations

The Dutch government wants to include the testing of the digital security of systems, processes and people – also known as red teaming – in all of its governmental organisations’ test planning and budgeting by 2025 at the latest

OneWeb sets sail with Navarino to extend connectivity to shipping

Growing satellite broadband provider agreement expands availability of low Earth orbit connectivity for commercial shipping in bid to transform operational efficiency and support smarter shipping

View All Stories

Latest News

View All The Latest News

In Depth

  • Evolution of unified comms services

    Post-pandemic ways of working are forcing organisations to rethink their comms – we look at the growth in cloud-based services to support hybrid working

  • The limits and risks of backup as ransomware protection

    Backups can provide a sound means of recovery from ransomware infection, but they are not 100% certain to foil attackers. We look at the limits and risks of depending on backups

  • CPaaS – a technology for the future

    There is a received wisdom that as businesses flock towards the cloud, they are looking for a single platform on which to manage all their communication needs, leading to boom times ahead for communications platform as a service

View All In Depth Articles

CW+ Downloads

View All

Blogs

Opinion

  • Yes, zero trust can help you understand attack pathways

    The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these ...

  • Security Think Tank: To follow a path, you need a good map

    The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these ...

  • Security Think Tank: Your path to understanding attack paths

    The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these ...

View All Opinion Articles

Videos

View all Videos

Search thousands of tech definitions

View All Definitions
SearchCIO
SearchSecurity
SearchNetworking
SearchDataCenter
SearchDataManagement
Close