IT security
-
News
25 Sep 2025
Netherlands establishes cyber resilience network to strengthen public-private digital defence
Network will connect organisations in a cyber crime defence initiative that goes way beyond information sharing Continue Reading
-
News
24 Jul 2025
Dutch researchers use heartbeat detection to unmask deepfakes
Dutch method to counter deepfakes analyses blood flow patterns in faces that current deepfake generation tools cannot yet replicate Continue Reading
-
Opinion
07 Oct 2025
Why it takes 11 hours to resolve one ID-related cyber incident
A recent ESG study revealed it takes an average of 11 hours for enterprises to resolve a single identity-related security incident. How did we get here, and what do we need to do differently? Continue Reading
By- Ev Kontsevoy, Teleport
-
News
07 Oct 2025
Alert over Medusa ransomware attacks targeting Fortra MFT
Microsoft warns it is seeing potential mass exploitation of a Fortra GoAnywhere vulnerability by a threat actor linked to the Medusa ransomware-as-a-service operation. Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
07 Oct 2025
Our phones as our castles: can His Majesty’s Government enter?
Ancient laws secure the sanctity of even the most humble of homes from government intrusion. How do they fare in an age of digital technology? Continue Reading
By- Joe Jones, IAPP
-
News
07 Oct 2025
Nato chooses Oracle to secure battlefield communications
Nato has chosen Oracle and Druid to secure private 5G networks for cyber defence, war gaming and research, using Oracle Cloud and edge technology Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
07 Oct 2025
The Security Interviews: David Bradbury, CSO, Okta
Okta’s chief security officer talks security by default and explains why he thinks time is running out for the shared responsibility model Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
07 Oct 2025
Building resilience in the cloud: Bridging SLA gaps and mitigating risk
The Computer Weekly Security Think Tank considers how security leaders can help assure access to the new and innovative cloud tech while minimising risk and ensuring they do not fall foul of regulators. Continue Reading
By- Vaibhav Dutta, Tata Communications
-
07 Oct 2025
How cyber security professionals are leveraging AWS tools
It’s now essential for IT security teams to have oversight of cloud computing, and Amazon Web Services offers a plethora of tools to make managing it easier. Find out how cyber pros are using them in the wild. Continue Reading
-
E-Zine
07 Oct 2025
Is the UK’s digital ID scheme doomed to fail?
In this week’s edition of Computer Weekly, we take a look at the government’s somewhat controversial plan to introduce a national, compulsory digital ID scheme. Ranil Boteju, chief data and analytics officer at Lloyds Banking Group, also runs us through how the financial services giant is planning to use agentic AI to improve the customer experience. In the third part of our buyer’s guide on cloud management and security, details about the plethora of security tools that exist for enterprises looking to manage their Amazon Web Services stacks gets the deep-dive treatment. And, in our final feature in the issue, we look at the evolution in mobile app technology within the retail space. Read the issue now. Continue Reading
-
News
06 Oct 2025
Oracle patches E-Business suite targeted by Cl0p ransomware
Oracle pushes a patch for a dangerous zero-day under active exploitation by one of the most notorious ransomware gangs around Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Oct 2025
Police ordered to give reasons in closed court for seizing phone of UK Hamas lawyer
London court orders police to disclose reasons for seizing and copying the contents of a phone belonging to a UK lawyer who represented Hamas, but refuses an injunction to prevent police from reviewing the phone until after judicial review Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
06 Oct 2025
Police facial recognition trials show little evidence of benefits
In-the-wild testing of police facial recognition systems has failed to generate clear evidence of the technology’s benefits, or to assess the full range of socio-technical impacts Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
06 Oct 2025
Data sovereignty demand pushes Herabit to get S3 storage
Italian service provider gets Cubbit DS3 distributed S3 storage to provide up to 2PB of cloud services to customers demanding data sovereignty, while cutting costs by up to 50% Continue Reading
By- Antony Adshead, Storage Editor
-
News
06 Oct 2025
Gartner: IT leaders need to prepare for GenAI legal issues
GenAI is being embedded into enterprise software. This has implications for governance and regulatory compliance Continue Reading
By- Cliff Saran, Managing Editor
-
News
06 Oct 2025
UK government to consult on police live facial recognition use
The UK’s policing minister has confirmed the government will consult on the use of live facial recognition by law enforcement before expanding its use throughout England, but so far, the technology has been deployed with minimal public debate or consultation Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
05 Oct 2025
Nakivo expands Proxmox backup and DR capabilities in v11.1
Latest version of Backup & Replication adds MSP features, plus Proxmox VM backup functionality, while Nakivo responds to critical vulnerability it was tipped off about in February Continue Reading
By- Antony Adshead, Storage Editor
-
News
02 Oct 2025
PSNI appoints legal counsel to report on police conduct after McCullough surveillance review
The Police Service of Northern Ireland has commissioned a senior lawyer to report back on whether there was any misconduct by police officers following the McCullough Review into the surveillance of journalists, lawyers and NGOs Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
01 Oct 2025
Home Office issues new ‘backdoor’ order over Apple encryption
A second Home Office technical capability notice requires Apple to provide access to encrypted data and messages of British users stored on its iCloud service Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
01 Oct 2025
US government shutdown stalls cyber intel sharing
A key US law covering cyber security intelligence sharing has expired without an extension or replacement amid a total shutdown of the federal government, putting global security collaboration at risk. Continue Reading
By- Alex Scroxton, Security Editor
-
News
01 Oct 2025
EU Chat Control plans pose ‘existential catastrophic risk’ to encryption, says Signal
As EU member states prepare to vote on plans to mandate tech companies to introduce technology to scan messages before they are encrypted, Signal warns that Chat Control will create new security risks Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
01 Oct 2025
Cato extends zero trust access to SASE platform
Capability launched for secure access service edge platform extends zero trust network access to unmanaged devices including personal, contractor and BYOD endpoints Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
30 Sep 2025
MPs press outsourcer TCS over Jaguar cyber attack
The government’s cross-bench Business and Trade Committee has written to Tata Consultancy Services seeking answers over possible links to cyber attacks on Jaguar Land Rover, Marks and Spencer, and Co-op Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Sep 2025
Apple’s first iOS 26 security update fixes memory corruption flaw
Apple issues an update for its brand new iOS 26 mobile operating system, fixing a potentially dangerous vulnerability affecting iPhones, iPads and other Mac devices Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Sep 2025
Cloud provider publishes ‘tech sovereignty’ plan for UK
In the face of mounting data sovereignty concerns across Europe, UK cloud provider Civo lays out high-level plan for how the government can retain control and access of its data should the geopolitical situation sour Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
30 Sep 2025
Harrods hackers start contacting customers
Retailer Harrods has revealed that a number of customers whose data was stolen in a cyber attack have been contacted by the perpetrators Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Sep 2025
Google unveils AI-powered security to trap ransomware attacks
The new security capability, available at no extra cost for most Google Workspace users, detects mass file encryption during ransomware attacks, stops the attacks from spreading and allows for restoration of files Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
29 Sep 2025
UK and US urge Cisco users to ditch end-of-life security appliances
An ongoing campaign of cyber attacks is targeting users of end-of-life Cisco security appliance kit Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Sep 2025
Harrods hit by second cyber attack in six months
Data on approximately 430,000 Harrods shoppers was stolen in a third-party breach, but the cyber attack is not related to an earlier Scattered Spider incident, says the retailer Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Sep 2025
JLR tentatively restarts production, following £1.5bn government backing
Jaguar Land Rover is to resume car production after a £1.5bn government loan guarantee amid its cyber attack fallout. Debate is growing over the bailout and insurance Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
Opinion
29 Sep 2025
Why SLA gaps should not hinder cloud innovation
The Computer Weekly Security Think Tank considers how security leaders can help assure access to the new and innovative cloud tech while minimising risk and ensuring they do not fall foul of regulators. Continue Reading
By- Ashley Barker and Irfan Ahmed, PA Consulting
-
News
26 Sep 2025
Keir Starmer launches digital ID scheme, but does it stand a chance?
Amid an economic crisis, public scepticism and confusing messages, could the government’s digital identity programme fail before it even gets off the ground? Continue Reading
By -
News
26 Sep 2025
Over half of India-based companies suffer security breaches
Business supply chains, which include Indian companies, are at risk of attack as more than half of suppliers were breached last year Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
26 Sep 2025
Microsoft hides key data flow information in plain sight
Microsoft’s own documentation confirms that data hosted in its hyperscale cloud architecture routinely traverses the globe, but the tech giant is actively obfuscating this vital information from its UK law enforcement customers Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
26 Sep 2025
Government to introduce mandatory digital ID
Prime minister Keir Starmer says the scheme, which will be compulsory by the end of this parliament, will help crack down on illegal workers, as well as provide benefits to citizens Continue Reading
By -
News
26 Sep 2025
Okta CEO: AI security and identity security are one and the same
At Oktane 2025 in Las Vegas, Okta CEO Todd McKinnon describes AI security and identity security as inseparable as he tees up a series of agentic security innovations Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Sep 2025
How Mediacorp stops livestreams from freezing at key moments
Singapore’s national broadcaster has achieved a 99.5% crash-free rate for its mobile apps by using observability tools to find and fix issues in real time, ensuring a smoother experience for users Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
25 Sep 2025
Government might support Jaguar Land Rover supply chain to mitigate cyber attack impact
The government is considering buying car parts from JLR’s supply chain to sell them on to the company once it recovers from the August cyber attack Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
25 Sep 2025
Co-op declares cyber attack damage cost £206m
Co-op reveals £206m costs from April cyber attack, with revenues hit, member data stolen and shelves emptied, exposing major retail supply chain vulnerabilities Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
25 Sep 2025
Netherlands establishes cyber resilience network to strengthen public-private digital defence
Network will connect organisations in a cyber crime defence initiative that goes way beyond information sharing Continue Reading
By- Kim Loohuis
-
News
25 Sep 2025
Get HDD temperature right, or risk more drive failures
We talk to Rainer Kaese of Toshiba about the right temperature to run hard disk drives at. Not getting it right risks higher failure rates than what would normally be expected Continue Reading
-
News
24 Sep 2025
Oktane 2025: Okta takes aim at agentic AI governance gap
Identity specialist Okta is laying the groundwork for a number of incoming announcements designed to help its customers get to grips with the challenge of securing non-human, agentic identities. Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
24 Sep 2025
Controversy ahead - the many challenges facing a UK government national digital ID scheme
It seems we are to expect some sort of announcement on digital identity at the forthcoming Labour conference. Briefings to select national newspapers have trailed the likelihood of prime minister ... Continue Reading
By- Bryan Glick, Editor in chief
-
News
24 Sep 2025
NCA arrests man following cyber attack that disrupted air travel
The NCA has arrested a man in West Sussex over the cyber attack on Collins Aerospace that disrupted Heathrow and other EU airports. He has been released on conditional bail Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
24 Sep 2025
McCullough Review finds PSNI failures but no ‘systemic’ surveillance of journalists
A review by Angus McCullough KC reveals that Northern Ireland police failed to comply with the law but that there was no ‘widespread and systemic’ surveillance of journalists, lawyers and NGOs Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
24 Sep 2025
Salesforce shifts focus from AI models to agentic AI
Rather than being preoccupied with large language models, Salesforce is now focused on building AI agents, with an eye on achieving what it calls ‘enterprise general intelligence’ Continue Reading
By- Aaron Tan, Informa TechTarget
-
Definition
23 Sep 2025
What is SOX compliance? A complete guide and checklist
SOX compliance entails adhering to the Sarbanes-Oxley Act of 2002, a U.S. law introduced to enhance investor protection by ensuring greater accuracy, transparency and accountability in public companies' financial reporting. Continue Reading
By- Kinza Yasar, Technical Writer
-
News
23 Sep 2025
SolarWinds warns over dangerous RCE flaw
A newly uncovered RCE flaw in SolarWinds’ helpdesk product bypasses two previously issued fixes, and users should prioritise updates as exploitation is likely to occur Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
23 Sep 2025
Rethinking identity in the age of AI impersonation
Trust in business has long hinged on human instincts but with the advent of deepfakes, it is becoming dangerous to assume too much. Continue Reading
By- Akif Khan, Gartner
-
News
23 Sep 2025
Jaguar Land Rover extends cyber attack-induced shutdown to October
Jaguar Land Rover is extending its production shutdown caused by the 31 August cyber attack into next month, as government ministers drop by and supply chain workers lose wages Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
23 Sep 2025
‘Our worst day’: The untold story of the Electoral Commission cyber attack
As head of digital at The Electoral Commission, Andrew Simpson’s mettle was tested when threat actors gained access to the regulator’s email systems and accessed sensitive voter data. Three years on, he tells his story to Computer Weekly Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
23 Sep 2025
Digital ID risks turning UK into ‘Checkpoint Britain’
Keir Starmer is expected to announce plans for mandatory ID cards at the Labour Party Conference next week. It risks urging in an era of surveillance, digital check points, reliance on online systems, and the risk of data breaches. Continue Reading
By- Rebecca Vincent
-
Opinion
23 Sep 2025
How to fend off identity-based cyber attacks
Attackers are using legitimate credentials to walk through the front door and “live off the land”. True cyber resilience now depends on protecting identity, not just the perimeter Continue Reading
By- Kavitha Mariappan
-
Opinion
23 Sep 2025
Angus McCullough’s review: A reckoning for the PSNI – and for press freedom
The McCullough Review to be published on Wednesday could mark a turning point for press freedom and for policing in Northern Ireland Continue Reading
By- Donal MacIntyre
-
Opinion
22 Sep 2025
From breach to resilience: How the Electoral Commission rebuilt its cyber defences
The UK's Electoral Commission fell victim to a major cyber attack in 2022. Three years on, the organisation is reflecting on its experience and sharing the lessons it learned to help others improve their security resilience. Continue Reading
By- Andrew Simpson, The Electoral Commission
-
News
22 Sep 2025
Teen charged with Las Vegas casino cyber heist
Another arrest of a teenage hacker associated with the Scattered Spider gang has been made, this time in relation to two 2023 cyber attacks on Las Vegas casinos and resorts Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Sep 2025
Cyber attack that downed airport systems confirmed as ransomware
Authorities in Europe say the cyber attack that caused disruption to passenger-facing services at multiple airports, including Heathrow, was the result of ransomware, as investigations continue Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Sep 2025
PSNI chief sorry over failure to delete data unlawfully seized from journalists
Police Service of Northern Ireland apologises for failing to destroy data that was unlawfully seized from journalists, despite a court agreement, and to the Investigatory Powers Tribunal for failing to disclose key information to the court Continue Reading
By- Bill Goodwin, Investigations Editor
-
Definition
22 Sep 2025
What is regulatory compliance?
Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business processes. Continue Reading
By- Scott Robinson, New Era Technology
- Ben Cole, Executive Editor
-
Feature
22 Sep 2025
Balancing IT security with AI and cloud innovation
Cyber security experts offer insights into how to manage service levels, potential lock-in clauses and security gaps in IT supplier contracts Continue Reading
By- Cliff Saran, Managing Editor
-
News
19 Sep 2025
Government meets with car parts suppliers amid JLR cyber crisis
Government officials have met with the Society of Motor Manufacturers and Traders to discuss the challenges they are facing amid disrupted production at Jaguar Land Rover Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Sep 2025
UK cyber action plan lays out path to resilience
A report produced for the government by academics at Imperial College London and the University of Bristol sets out nine recommendations to strengthen the UK’s cyber sector Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Sep 2025
UK needs better defences to protect undersea internet cables from Russian sabotage
A cross-party group of MPs and peers has called for the UK to step up defences to protect undersea cables from Russian sabotage risks Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
19 Sep 2025
French court ruling may lead to legal challenges over state Sky ECC and EncroChat phone hack
A decision by the French supreme court may pave the way for defendants to challenge the lawfulness of France’s hacking of the EncroChat and Sky ECC cryptophone networks used by organised crime groups Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
19 Sep 2025
Pentera expands in APAC, taps AI to outsmart attackers
The penetration testing specialist is expanding its presence in the Asia-Pacific region and deploying AI-driven capabilities as it eyes acquisitions and a potential IPO Continue Reading
By- Aaron Tan, Informa TechTarget
-
Definition
18 Sep 2025
What is hardware security?
Hardware security is vulnerability protection that comes in the form of a physical device rather than software installed on a computer system's hardware. It also refers to the protection of physical systems from harm. Continue Reading
By- Nick Barney, Technology Writer
- Kinza Yasar, Technical Writer
-
Feature
18 Sep 2025
Are AI agents a blessing or a curse for cyber security?
Agentic AI is touted as a helpful tool for managing tasks, and cyber criminals are already taking advantage. Should information security teams look to AI agents to keep up? Continue Reading
By -
Feature
18 Sep 2025
The challenges posed by AI tools in education
Artificial intelligence tools to enhance productivity are being developed for use in multiple sectors, but are they sufficiently reliable for use in education or do they create other problems? Continue Reading
-
News
18 Sep 2025
Teen hackers charged over Scattered Spider attack on TfL
Two men have appeared in court in London in connection with the September 2024 cyber attack that disrupted online services at Transport for London Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Sep 2025
Should you run VMware 7 unsupported?
In just a few weeks, VMware version 7 reaches end of life, which means Broadcom will no longer issue patches Continue Reading
By- Cliff Saran, Managing Editor
-
News
17 Sep 2025
Firms urged to adopt risk-based data sovereignty strategy
Geopolitical uncertainty is forcing organisations to rethink where their data is located, but a full retreat from the public cloud is not the answer Continue Reading
-
Podcast
17 Sep 2025
Podcast: Data sovereignty and what you need to do about it
Patrick Smith, EMEA CTO of Pure Storage, talks about data sovereignty, what’s driving heightened interest in it, and how customers, the tech industry and states are preparing for it Continue Reading
By- Antony Adshead, Storage Editor
-
News
17 Sep 2025
Microsoft scores win against Office 365 credential thieves
Microsoft’s Digital Crimes Unit disrupts a major phishing-as-a-service operation that targeted and stole Office 365 usernames and credentials Continue Reading
By- Alex Scroxton, Security Editor
-
News
17 Sep 2025
Hamas lawyer challenges police after they seized legal files from phone in Schedule 7 stop
A UK solicitor hired by Hamas to challenge its proscription in the UK as a terrorist organisation argues police acted unlawfully by seizing a phone containing confidential legally privileged material about his clients Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
17 Sep 2025
Lufthansa pilots EU Digital Identity Wallet-based travel
Travellers will only be required to tap their phone to pass the various steps of checking in and boarding aircraft Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
17 Sep 2025
NCC: How RaaS team-ups help Scattered Spider enhance its attacks
Scattered Spider’s alliances with ransomware-as-a-service gangs act as a force multiplier for the scope, and number, of its cyber attacks, according to NCC Group analysts Continue Reading
By- Alex Scroxton, Security Editor
-
News
17 Sep 2025
Google Cloud unveils open protocol for agentic payments
Google’s Agent Payments Protocol is an open standard developed with more than 60 global partners to create a secure standard for AI-driven transactions Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
16 Sep 2025
Exabeam: Treat AI agents as the new insider threat
As artificial intelligence agents are given more power inside organisations, Exabeam’s chief AI officer, Steve Wilson, argues they must be monitored for rogue behaviour just like their human counterparts Continue Reading
-
News
16 Sep 2025
Jaguar Land Rover extends production shutdown for another week
Jaguar Land Rover says that vehicle production will remain suspended in the wake of a cyber attack, while the hackers allegedly responsible claim they are retiring from a life of crime Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
16 Sep 2025
Cyber leaders must make better use of risk experts
The Computer Weekly Security Think Tank considers how security leaders can help assure access to the new and innovative cloud tech while minimising risk and ensuring they do not fall foul of regulators. Continue Reading
By- Ellie Hurst, Advent IM
- Mike Gillespie
-
News
16 Sep 2025
Forrester Technology & Innovation Summit preview: Preparing for emerging tech
We speak to Forrester about how IT decision-makers should prepare for emerging technologies that have a short, mid or long-term ROI Continue Reading
By- Cliff Saran, Managing Editor
-
E-Zine
16 Sep 2025
School monitored
In this week’s edition of Computer Weekly, we hear about the toll the Post Office scandal is having on the mental health of those affected by it, and the chief digital and technology officer of jewellery brand Pandora opens up about its ongoing digital transformation. We also delve into the knotty topic of surveillance in schools, as education providers try to balance student safety with their right to privacy. Read the issue now. Continue Reading
-
Definition
15 Sep 2025
What is a forensic image?
A forensic image (forensic copy) is a bit-by-bit, sector-by-sector direct copy of a physical storage device, including all files, folders, and unallocated, free and slack space. Continue Reading
By- Nick Barney, Technology Writer
- Paul Kirvan
-
Definition
15 Sep 2025
What is mobile threat defense (MTD)?
Mobile threat defense (MTD) software protects organizations and individuals from security threats on mobile platforms. Continue Reading
By- Nick Barney, Technology Writer
- Brien Posey
- Alexander S. Gillis, Technical Writer and Editor
-
News
15 Sep 2025
ShinyHunters linked to breach of French luxury goods house
Kering, the parent group of fashion houses including Balenciaga and Gucci, becomes the latest organisation to allegedly fall victim to ShinyHunters Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Sep 2025
Amnesty: AI surveillance risks ‘supercharging’ US deportations
Amnesty International says AI-driven platforms from Palantir and Babel Street are being used by US authorities to track migrants and revoke visas, raising fears of unlawful detentions and mass deportations Continue Reading
By- Tiago Ventura, Computer Weekly
-
News
15 Sep 2025
Arqit to support NCSC’s post-quantum cryptography pilot
Quantum specialist Arqit will provide specialised post-quantum migration planning services to organisations preparing to address the imminent risks to traditional cryptography Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Sep 2025
Forrester Technology & Innovation Summit preview: Digital sovereignty in the public cloud
We look at how IT leaders need to balance data access, data residency and data sovereignty Continue Reading
By- Cliff Saran, Managing Editor
-
News
15 Sep 2025
MI5 unlawfully monitored the phone of BBC journalist Vincent Kearney
The Investigatory Powers Tribunal heard today that the security service has conceded that it unlawfully monitored the phone data of former BBC Spotlight reporter Vincent Kearney Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
12 Sep 2025
EU Data Act comes into force amid fears of regulation fatigue
The EU Data Act will potentially give users control of device data, and boost data sharing, cloud switching and competition while raising compliance demands Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
Definition
12 Sep 2025
What is a stealth virus and how does it work?
A stealth virus is a computer virus that uses various mechanisms to avoid detection by antivirus software. Continue Reading
By- Nick Barney, Technology Writer
- Rahul Awati
-
Feature
12 Sep 2025
Retailers turn to tech as in-store crime soars
Retailers such as H&M, Iceland, Poundland and Tesco are deploying tech in stores as a way of protecting themselves and their employees from rising shop crime Continue Reading
By -
News
11 Sep 2025
M&S parts ways with CTO after cyber attack
M&S chief digital and technology officer Rachel Higham steps back from her role in the wake of the April 2025 cyber attack on the retailer’s systems Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Sep 2025
Students an increasing source of cyber threat in UK schools
Insider threats arising from student activity now appears to be the chief cause of notifiable cyber or data breach incidents in Britain’s schools Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Sep 2025
Chat Control: EU to decide on requirement for tech firms to scan encrypted messages
Law enforcement and police experts meet on Friday to decide on proposals to require technology companies to scan encrypted messages for possible child abuse images amid growing opposition from security experts Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
10 Sep 2025
Splunk.conf: Cisco and Splunk expand agentic SOC vision
The arrival of agentic AI in the security operations centre heralds an era of simplification for security professionals, Splunk claims Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Sep 2025
Jaguar Land Rover admits data has been compromised in cyber attack
The car maker revealed that data was stolen in the cyber attack that began on 31 August, as its production line continues to be affected Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
10 Sep 2025
UK contactless card payment limits could be unlimited
The UK Financial Conduct Authority says contactless payment technology and fraud protections have advanced enough for firms to adjust the limit Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
10 Sep 2025
Open source security and sustainability remain unsolved problem
While software bills of materials offer some transparency over software components, they don’t solve the imbalance between corporate consumption of open source software and the lack of investment in its security and health Continue Reading
-
News
09 Sep 2025
Splunk.conf: Splunk urges users to eat their ‘cyber veggies’
The dawn of AI-enabled cyber attacks makes it even more important for defenders to bring their A-game, particularly when it comes to getting the basics right Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
09 Sep 2025
What is crisis communication?
Crisis communication is a strategic approach to corresponding with people and organizations during a disruptive event. Continue Reading
By- Paul Kirvan
- Rahul Awati
- Paul Crocetti, Editorial Director
-
News
09 Sep 2025
UK AI sector balloons by 85% to 5,800 companies from 2023 to 2025
A Perspective Economics study commissioned by DSIT sizes the UK AI sector at 5,800 companies, an increase of 85% over two years Continue Reading
By- Brian McKenna, Enterprise Applications Editor