IT security
-
News
26 Aug 2025
Three new Citrix NetScaler zero-days under active exploitation
Citrix patches three new vulnerabilities in its NetScaler lines warning of active zero-day exploitation by an undisclosed threat actor. Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Aug 2025
Okta makes AI identity play with Axiom acquisition
Okta says Axiom Security’s technology will reinforce its own offerings in privileged access management, especially when it comes to the growing number of non-human identities Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Sep 2025
Jaguar Land Rover admits data has been compromised in cyber attack
The car maker revealed that data was stolen in the cyber attack that began on 31 August, as its production line continues to be affected Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
10 Sep 2025
UK contactless card payment limits could be unlimited
The UK Financial Conduct Authority says contactless payment technology and fraud protections have advanced enough for firms to adjust the limit Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
10 Sep 2025
Open source security and sustainability remain unsolved problem
While software bills of materials offer some transparency over software components, they don’t solve the imbalance between corporate consumption of open source software and the lack of investment in its security and health Continue Reading
-
News
09 Sep 2025
Splunk.conf: Splunk urges users to eat their ‘cyber veggies’
The dawn of AI-enabled cyber attacks makes it even more important for defenders to bring their A-game, particularly when it comes to getting the basics right Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
09 Sep 2025
What is crisis communication?
Crisis communication is a strategic approach to corresponding with people and organizations during a disruptive event. Continue Reading
By- Paul Kirvan
- Rahul Awati
- Paul Crocetti, Editorial Director
-
News
09 Sep 2025
UK AI sector balloons by 85% to 5,800 companies from 2023 to 2025
A Perspective Economics study commissioned by DSIT sizes the UK AI sector at 5,800 companies, an increase of 85% over two years Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
Opinion
09 Sep 2025
Lessons from Jaguar Land Rover: How can businesses prepare for cyber attacks?
A cyber attack at Jaguar Land Rover has halted production lines and caused widespread disruption. How can businesses protect themselves and mitigate the risks of such an attack? Continue Reading
By- Dominic Holden
-
News
08 Sep 2025
Splunk.conf: Splunk and Cisco showcase unified platform
With 18 months having elapsed since Cisco closed its acquisition of Splunk, joint platform capabilities and developments are being showcased at the annual Splunk.conf fair Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Sep 2025
Northern Ireland police kept inspectors in dark over surveillance of journalists
The Police Service of Northern Ireland failed to inform the Investigatory Powers Commissioner’s Office about surveillance operations against journalists during annual inspections Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
08 Sep 2025
PCI council eyes wider data protection role beyond payments
Hailed as the gold standard for securing credit card information, the Payment Card Industry Data Security Standard (PCI DSS) could be extended to protect other kinds of data following industry feedback Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
08 Sep 2025
AI boom to push Australian IT spending past A$172bn
Australian IT spending is set to grow by 8.9% in 2026, driven by growing investments in artificial intelligence, datacentre systems and cloud, according to Gartner Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
05 Sep 2025
US politicians ponder Wimwig cyber intel sharing law
US cyber data sharing legislation is set to replace an Obama-era law, but time is running out to get it over the line, with global ramifications for the security industry, and intelligence and law enforcement communities Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Sep 2025
Jaguar Land Rover cyber attack keeps workers at home
The recent cyber attack on Jaguar Land Rover is keeping workers out of the plants as possible attack group identity becomes public Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
Opinion
05 Sep 2025
SLA promises, security realities: Navigating the shared responsibility gap
The Computer Weekly Security Think Tank considers how security leaders can help assure access to the new and innovative cloud tech while minimising risk and ensuring they do not fall foul of regulators. Continue Reading
By- Aditya K Sood, Aryaka
-
News
04 Sep 2025
UK sets out plans for AI assurance leadership
Labour wants the UK to become the world leader in artificial intelligence assurance Continue Reading
By- Cliff Saran, Managing Editor
-
Opinion
03 Sep 2025
Bridging the SLA gap: A guide to managing cloud provider risk
The Computer Weekly Security Think Tank considers how security leaders can help assure access to the new and innovative cloud tech while minimising risk and ensuring they do not fall foul of regulators. Continue Reading
By- John Bruce, Quorum Cyber
-
News
03 Sep 2025
European court upholds EU-US Data Privacy Framework data-sharing agreement
EU General Court upholds EU-US Data Privacy Framework, bringing certainty to businesses that exchange data with the US – for now. An appeal may be in the offing Continue Reading
By- Bill Goodwin, Investigations Editor
-
Definition
03 Sep 2025
What is information security (infosec)?
Information security (infosec) is a set of policies, procedures and principles for safeguarding digital data and other kinds of information. Continue Reading
By- Kinza Yasar, Technical Writer
- Gavin Wright
- Taina Teravainen
-
News
03 Sep 2025
IT departments face huge Windows 10 support bill
When Windows 10 reaches end-of-life on October 14th, organisations will need to purchase an Extended Support contract to receive Microsoft patches Continue Reading
By- Cliff Saran, Managing Editor
-
Feature
03 Sep 2025
Ethical challenges of LGBTQ+ data protection
America has rolled back data protection policies for the LGBTQ+ community, but what does that mean for the rest of the world? Continue Reading
-
News
03 Sep 2025
Fastly CEO plots course through AI and security
Chief exec Kip Compton explains how Fastly’s unified platform is solving the web’s biggest challenges, from content scrapping by AI bots to distributed denial-of-service attacks Continue Reading
-
News
02 Sep 2025
OpenAI targets India with datacentre push
The AI firm is planning to open a one-gigawatt datacentre in India, which could reduce latency, ensure regulatory compliance and give it an edge over hyperscalers Continue Reading
By- Mastufa Ahmed
-
News
02 Sep 2025
Cyber attackers damage Jaguar Land Rover production
Jaguar Land Rover reports a cyber attack has ‘severely disrupted’ its vehicle production and retail operations, recalling similar attacks on other prominent British brands this year Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
02 Sep 2025
JFrog extends DevSecOps playbook to AI governance
The software security specialist is leveraging its capabilities in DevSecOps to address security, data provenance and bias in AI models Continue Reading
By- Aaron Tan, Informa TechTarget
-
Opinion
01 Sep 2025
Growing demand for AI-skilled cyber specialists
AI is increasingly at the heart of organisations’ digital transformation journeys – whether that’s to drive up efficiencies, generate powerful insights from data, delight customers, or supercharge internal productivity. Continue Reading
By- Peter Birch and Mo Gaibee, Harvey Nash
-
News
31 Aug 2025
Google Cloud brings on-premise Gemini AI to Singapore
Move allows government agencies and regulated industries to run Google’s most powerful artificial intelligence models in their own datacentres, directly addressing data security and residency requirements to fuel the nation’s AI ambitions Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
29 Aug 2025
ICO publishes summary of police facial recognition audit
The UK data regulator has released a summary of its facial recognition audit of two police forces Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Blog Post
29 Aug 2025
All You Start-Ups (Or Upstarts): It's Your Final Call For The Flight To Tech Trailblazers 25
Yes, it’s that time of year again. No, not the “C” word, though there are only 119 shopping days to Christmas as I type. And yes, it is almost football transfer deadline day but... No – I’m talking ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
News
29 Aug 2025
Home Office ‘backdoor’ seeks worldwide access to Apple iCloud users’ data, court documents confirm
A court filing states that a government order against Apple would give it the capability to access communications and metadata of customers using the iCloud service anywhere in the world Continue Reading
By- Bill Goodwin, Investigations Editor
-
Opinion
29 Aug 2025
How to manage Active Directory security
Understanding prevention and recovery steps is crucial for managing attacks on Active Directory Continue Reading
By- Bob Bobel
-
Feature
28 Aug 2025
AI and backup: How backup products leverage AI
We look at how AI helps with backup, from AI analysis of backup jobs and their integrity through natural language support functionality to ransomware and anomaly detection Continue Reading
-
News
28 Aug 2025
Microsoft refuses to divulge data flows to Police Scotland
Tech giant Microsoft is declining to share key information with Police Scotland about where the sensitive data it uploads to Office 365 will be processed, leaving the force unable to comply with UK-wide data protection laws Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
28 Aug 2025
UK cyber security centre helps expose China-based cyber campaign
GCHQ cyber security centre and its international partners release details of malicious cyber activity linked to Chinese businesses Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Definition
28 Aug 2025
What is network security? Definition and best practices
Network security encompasses all the steps taken to protect the integrity of a computer network and the data within it. Continue Reading
By- Kinza Yasar, Technical Writer
- Nick Barney, Technology Writer
- Ben Lutkevich, Site Editor
-
News
27 Aug 2025
Incident response planning cuts the risk of claiming on cyber security insurance
Proper attention to incident response planning is emerging as a core cyber control when it comes to reducing the risk of having to claim on cyber security insurance, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Aug 2025
Ransomware activity levelled off in July, says NCC
Ransomware levels held steady in the month of July, although the risk remained as persistent as ever Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Aug 2025
Three new Citrix NetScaler zero-days under active exploitation
Citrix patches three new vulnerabilities in its NetScaler lines warning of active zero-day exploitation by an undisclosed threat actor Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Aug 2025
Okta makes AI identity play with Axiom acquisition
Okta says Axiom Security’s technology will reinforce its own offerings in privileged access management, especially when it comes to the growing number of non-human identities Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Aug 2025
How to secure the identity perimeter and prepare for AI agents
Ping Identity CEO Andre Durand explains why identity has become the critical security battleground, how decentralised credentials will reduce data breach risks, and why AI agents will need their own identities to be trusted Continue Reading
-
News
25 Aug 2025
Ransomware attack volumes up nearly three times on 2024
During the first six months of 2025, the number of observed and tracked ransomware attacks far outpaced the volume seen in 2024 Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Aug 2025
Moscow exploiting seven-year-old Cisco flaw, says FBI
US authorities warn of an uptick in state-sponsored exploitation of a seven-year-old vulnerability in Cisco's operating system software Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Aug 2025
Scale of MoD Afghan data breaches widens dramatically
Many more data breaches at the MoD's Arap programme to relocate at-risk Afghan citizens to Britain have emerged following an FoI request by BBC journalists Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Aug 2025
Apple iOS update fixes new iPhone zero-day flaw
Latest Apple zero-day found in the ImageIO framework opens the door for targeted zero-click attacks on iPhone users Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
21 Aug 2025
European digital sovereignty: Storage, surveillance concerns to overcome
As China and the US increase surveillance capabilities, are European companies caught in the middle of a data security storm? Continue Reading
By -
News
21 Aug 2025
UK equality watchdog: Met Police facial recognition unlawful
The UK’s equality watchdog has been granted permission to intervene in a judicial review of the Met Police’s live facial-recognition (LFR) technology use, which it claims is being deployed unlawfully Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
20 Aug 2025
Microsoft starts including PQC algorithms in cyber foundations
Microsoft updates on its post-quantum cyber strategy as it continues integrating quantum-safe algorithms into some of the core foundations underpinning its products and services Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Aug 2025
Commvault users told to patch two RCE exploit chains
Storage firm Commvault fixes four vulnerabilities that, when combined, create a pair of RCE exploit chains that could be used to target on-premise customers with ransomware and other nasties Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Aug 2025
Warlock claims more victims as cyber attacks hit Colt and Orange
Ransomware gang Warlock is adding more victims to its data leak site as the impact of a spreading wave of cyber attacks continues to be felt Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
20 Aug 2025
Jack of all managed security services, or master of none?
Large managed cyber services providers rule the roost when it comes to security buying priorities, but could this be watering down the overall quality of services available on the market? Continue Reading
By- Andy Kays, Socura
-
News
19 Aug 2025
Google spins up agentic SOC to speed up incident management
Google Cloud elaborates on its vision for securing artificial intelligence unveiling new protections and capabilities across its product suite Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Aug 2025
Deepfake AI scammers target the Big Yin
Cyber criminal scammers exploiting GenAI to create deepfake AI tools are targeting one of the UK’s most beloved comics, and one of its strongest accents Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Aug 2025
ISACA launches AI security management certification
ISACA accredited security professionals can now pursue a new AI security management credential Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Aug 2025
US says UK has agreed to drop encryption ‘backdoor’ demands against Apple
US and UK end diplomatic row over UK encryption ‘backdoor’ order against Apple, but it remains unclear whether Apple will restore advanced encryption services to UK users Continue Reading
By- Bill Goodwin, Investigations Editor
-
19 Aug 2025
Preparation and appreciation – the human factor in incident response
Incident response is typically technical, so where do soft skills come in? Dan Raywood looks at a measurement option and the human consideration Continue Reading
-
19 Aug 2025
Met Police to double facial recognition use amid budget cuts
The UK’s largest police force is massively expanding its use of live facial recognition technology, despite ongoing concerns over privacy and bias, as it prepares to lose 1,700 officers and staff Continue Reading
-
News
19 Aug 2025
Singapore board directors to get cyber crisis training
The Singapore Institute of Directors and Ensign InfoSecurity have launched a programme to equip 1,000 board leaders with the skills to navigate high-stakes decisions during a cyber crisis Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
18 Aug 2025
Workday hit in wave of social engineering attacks
A campaign of voice-based social engineering attacks targeting users of Salesforce’s services appears to have struck HR platform Workday Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Aug 2025
Extremist hacker who defaced websites and stole data imprisoned
Hacker Al-Tahery Al-Mashriky pled guilty to attacking multiple websites based on extremist political and religious ideology Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Aug 2025
L’Oréal to promote cyber resilience for Britain’s beauty salons
L’Oréal UK and Ireland will work with law enforcement, cyber educators and students, and other large organisations to help thousands of small salons across the UK improve their cyber resilience practice Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Aug 2025
Okta: AI adoption fuels problems for identity management
Okta research indicates the emergence and growth of novel security problems, connected with the spread of AI agents and non-human identities Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
15 Aug 2025
Warlock claims ransomware attack on network services firm Colt
UK network services firm Colt is attempting to recover various customer-facing systems following a cyber attack that has been claimed by the Warlock ransomware gang and may have arisen via a SharePoint flaw Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
15 Aug 2025
Would you hire a hacker?
At a time when cyber security breaches are on the up and skills remain in short supply, security experts believe we may be missing a trick by overlooking unconventional sources of talent Continue Reading
By -
News
15 Aug 2025
UK cyber leaders feel impact of Trump cutbacks
The ripple effects of US cyber security cutbacks have reached this side of the Atlantic, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Aug 2025
US trade body calls on Washington to cut cyber red tape
The US Information Technology Industry Council has called on the White House’s Office of the National Cyber Director to cut burdensome regulations in areas such as AI and incident reporting, and to do more to build a unified security regime Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Aug 2025
Whitehall IT projects face complex challenges, Nista report finds
The annual report from the National Infrastructure and Service Transformation Authority gives major police IT project ‘red’ rating, while several others are rated ‘amber’, including Gov.uk One Login and Making Tax Digital Continue Reading
By -
Opinion
15 Aug 2025
Teen hackers aren't the problem. They're the wake-up call
If we take the time to build the right pathways into cyber, young people could be our best line of defence. Continue Reading
By- Fergus Hay, The Hacking Games
-
Feature
15 Aug 2025
The UK’s Online Safety Act explained: what you need to know
In this essential guide, Computer Weekly looks at the UK’s implementation of the Online Safety Act, including controversies around age verification measures and the threat it poses to end-to-end encryption Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
15 Aug 2025
Guardian agents: Stopping AI from going rogue
AI systems don't share our values and can easily go rogue. But instead of trying to make AI more human, we need a new class of guardian agents to act as digital sentinels, monitoring our autonomous systems before we lose control completely Continue Reading
By- Daryl Plummer
-
Opinion
14 Aug 2025
Protecting your data in the EU means protecting an independent authority
As the EU faces mounting scrutiny over institutional transparency, ensuring the genuine independence of the European Data Protection Supervisor is key to preserving the rule of law and the credibility of the Union’s digital governance. Continue Reading
By- Aída Ponce Del Castillo, senior researcher at the Foresight Unit, ETUI
-
News
14 Aug 2025
Professional services firms stuck in network security IT doom loop
Survey reveals a widening disconnect in the professional services sector where, despite near-universal adoption of SaaS and cloud strategies, core network and security services are failing to keep up through the likes of SASE Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
13 Aug 2025
BlackSuit ransomware payment recovered in takedown operation
US authorities reveal how over a million dollars’ worth of cryptocurrency assets laundered by the BlackSuit ransomware gang were seized ahead of a July takedown operation Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
13 Aug 2025
What the UK's ransomware crackdown signals for Europe
The UK government is forging a bold path as it aims to ban ransomware payments from certain organisations. Its actions could herald an inflexion point in Europe's broader response to ransomware. Continue Reading
By- Fintan Quinn, Gartner
-
Definition
13 Aug 2025
What is security theater?
Security theater refers to highly visible security measures that create the illusion of increased safety but don't stop threats. Continue Reading
-
Definition
13 Aug 2025
What is governance, risk and compliance (GRC)?
Governance, risk and compliance (GRC) refers to an organization's strategy, or framework, for handling the interdependencies of the following three components: corporate governance policies, enterprise risk management programs, and regulatory and company compliance. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Kinza Yasar, Technical Writer
- Paul Kirvan
-
News
12 Aug 2025
Eight critical RCE flaws make Microsoft’s latest Patch Tuesday list
Microsoft rolls out fixes for over 100 CVEs in its August Patch Tuesday update Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Aug 2025
Researchers firm up ShinyHunters, Scattered Spider link
ReliaQuest researchers present new evidence that firms up a potential link, or outright partnership, between the ShinyHunters and Scattered Spider cyber gangs Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Aug 2025
UK work visa sponsors are target of phishing campaign
Mimecast identifies a phishing campaign targeting UK organisations that sponsor migrant workers and students, opening the door to account compromise and visa fraud Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Aug 2025
Workday research: 75% of employees will work with artificial intelligence, but not for it
Workday research finds 75% of workers like AI as a teammate, but only 30% want it to be the boss. Trust in the technology may grow with use, but human focus, clear roles and governance are key Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
Opinion
12 Aug 2025
What boards should look for in a CISO
The role of the chief information security officer has evolved dramatically over the years – and will continue to do so. What should boards really looking for when hiring a security leader in 2025? Continue Reading
By- Rinki Sethi, Upwind Security
-
News
12 Aug 2025
Norway fixing Big Bang e-health botch with fintech security
Experts call for Europe’s health sector to protect medical APIs with security originated from UK open banking as officials take urgent measures against unprecedented attacks Continue Reading
By- Mark Ballard
-
Feature
11 Aug 2025
ShinyHunters Salesforce cyber attacks explained: What you need to know
Computer Weekly gets under the skin of an ongoing wave of ShinyHunters cyber attacks orchestrated via social engineering against Salesforce users Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
11 Aug 2025
How CISOs can adapt cyber strategies for the age of AI
Traditional security measures may not be able to cope with the AI reality. In order to safeguard enterprise operations, reputation and data integrity in an AI-first world, security leaders need to rethink. Continue Reading
By- Martin Riley, Bridewell Consulting
-
News
11 Aug 2025
McCullough Review into PSNI spying on journalists and lawyers delayed
Angus McCullough KC is to present findings of an independent review of police spying on phone data of lawyers, journalists and NGOs in Northern Ireland in October Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
11 Aug 2025
Watching the watchers: Is the Technical Advisory Panel a match for MI5, MI6 and GCHQ?
Dame Muffy Calder is chair of the Technical Advisory Panel (TAP), a small group of experts that advises the Investigatory Powers Commissioner on surveillance technology. Do they have what it takes to oversee the intelligence community? Continue Reading
By- Bill Goodwin, Investigations Editor
-
Definition
08 Aug 2025
What is the three lines model and what is its purpose?
The three lines model is a risk management approach to help organizations identify and manage risks effectively by creating three distinct lines of defense. Continue Reading
By- Kinza Yasar, Technical Writer
- Amanda Hetler, Senior Editor
-
News
08 Aug 2025
OpenAI closes gap to artificial general intelligence with GPT-5
As OpenAI’s latest large language model delivers smarter AI, experts are wary of the risks GPT-5 poses to human creativity Continue Reading
By- Cliff Saran, Managing Editor
-
Definition
07 Aug 2025
What is integrated risk management (IRM)?
Integrated risk management (IRM) is a set of proactive, businesswide practices that contribute to an organization's security, risk tolerance profile and strategic decisions. Continue Reading
By- Nick Barney, Technology Writer
- Wesley Chai
-
Definition
07 Aug 2025
What is the Mitre ATT&CK framework?
The Mitre ATT&CK -- pronounced miter attack -- framework is a free, globally accessible knowledge base that describes the latest behaviors and tactics of cyberadversaries to help organizations strengthen their cybersecurity strategies. Continue Reading
By- Paul Kirvan
- Kinza Yasar, Technical Writer
- Ben Lutkevich, Site Editor
-
News
06 Aug 2025
Black Hat USA: Startup breaks secrets management tools
Researchers at Cyata, an agentic identity specialist that has just emerged from stealth, found 14 CVEs in the widely used CyberArk Conjur and HashiCorp Vault enterprise secrets management platforms Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Aug 2025
Cyber criminals would prefer businesses don’t use Okta
Okta details a phishing campaign in which the threat actor demonstrated some unusually strong opinions on what authentication methods they would like their targets to use Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Aug 2025
Companies House ID verification to start in November 2025
Companies House plans to start vetting director identities from mid-November, but its reliance on the troubled One Login digital identity service may be cause for concern Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Aug 2025
NCSC updates CNI Cyber Assessment Framework
Updates to the NCSC’s Cyber Assessment Framework are designed to help providers of critical services better manage their risk profiles Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
06 Aug 2025
What is enterprise risk management (ERM)?
Enterprise risk management (ERM) is the process of planning, organizing, directing and controlling the activities of an organization to minimize the harmful effects of risk on its capital and earnings. Continue Reading
By- Kinza Yasar, Technical Writer
- Alexander S. Gillis, Technical Writer and Editor
-
News
06 Aug 2025
Australian scaleup to bring AI-led data protection to the MoD
The UK’s Ministry of Defence is embracing AI-led data protection in the wake of a major privacy breach, enlisting Australian cyber firm Castlepoint Systems to oversee sensitive records Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Aug 2025
Attacker could defeat Dell firmware flaws with a vegetable
Cisco Talos discloses five vulnerabilities in cyber security firmware used on Dell Latitude and Precision devices, including one that could enable an attacker to log on with a spring onion Continue Reading
By- Alex Scroxton, Security Editor
-
Tip
05 Aug 2025
8 ways to enhance data center physical security
Data center physical security is just as important as cybersecurity. Organizations can follow these eight security approaches to enhance facility access monitoring. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
E-Zine
05 Aug 2025
Digitising fan experience
In this issue, discover the latest twist regarding a secret Home Office order requiring Apple to give UK law enforcement access to users’ encrypted data stored on the Apple iCloud. Also discover how the Premier League is using digital means to reach fans, and learn about identity security in SaaS deployments. Read the issue now. Continue Reading
-
Definition
04 Aug 2025
What is the DRY principle?
The DRY (don't repeat yourself) principle, introduced by Andrew Hunt and David Thomas in 'The Pragmatic Programmer,' promotes the idea that every piece of knowledge should have a single, unambiguous, authoritative representation within a system. Continue Reading
-
News
04 Aug 2025
Black Hat USA: Halcyon and Sophos tag-team ransomware fightback
Ransomware experts Halcyon and Sophos are to pool their expertise in ransomware, working together to enhance data- and intelligence-sharing and bringing more comprehensive protection to customers Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Aug 2025
Proliferation of on-premise GenAI platforms is widening security risks
Research finds increased adoption of unsanctioned generative artificial intelligence platforms is magnifying risk and causing a headache for security teams Continue Reading
By- Alex Scroxton, Security Editor