Top Stories

Why bug bounty schemes have not led to secure software

Why bug bounty schemes have not led to secure software

Computer Weekly speaks to Katie Moussouris, security entrepreneur and bug bounty pioneer, about the life of security researchers, bug bounties and the artificial intelligence revolution

How police live facial recognition subtly reconfigures suspicion

How police live facial recognition subtly reconfigures suspicion

A growing body of research suggests that the use of live facial recognition is reshaping police perceptions of suspicion in ways that undermine supposed human-in-the-loop protections

Fujitsu underestimated Post Office scandal backlash

Fujitsu underestimated Post Office scandal backlash

Troubled IT supplier loses UK government megadeal despite internal confidence, as political pressure mounts

NCSC warns of confusion over true nature of AI prompt injection

UK businesses confused over true nature of AI prompt injection

Malicious prompt injections to manipulate GenAI large language models are being wrongly compared to classical SQL injection attacks. In reality, prompt injection may be a far worse problem, says the UK’s NCSC

View All Stories

Latest News

View All The Latest News

In Depth

  • Ryder Cup takes its best network shot

    Ryder Cup takes its best network shot

    The Ryder Cup sets sporting and organisational bar higher than ever, depending on ‘an AI-driven connected intelligence platform’ to gain required real-time insights and intelligence

  • In an AI-first world, the future of cyber security is its workforce

    In an AI-first world, the future of cyber security is its workforce

    The cyber security industry will experience immense change due to AI by 2030, so both employers and professionals need to grasp the nettle, and quickly, if they are to have the right skills and experience in place to succeed

  • Inserting AI into cyber awareness

    Inserting AI into cyber awareness

    As industry looks to grasp the use of AI and automated features, how are security suppliers facing the challenge of adding these capabilities to their products and services? We talked to one provider to find out

View All In Depth Articles

CW+ Downloads

View All

Blogs

Opinion

View All Opinion Articles

Videos

View all Videos

Search thousands of tech definitions

View All Definitions