IT security
-
News
26 Feb 2026
CrowdStrike touts agentic SOC to tackle security woes
By embedding AI agents across its platform, CrowdStrike is looking to help security teams automate repetitive security tasks, enabling them to focus on complex and stealthier threats that could slip under the radar Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
25 Feb 2026
How AI code generation is pushing DevSecOps to machine speed
Organisations should adopt shared platforms and automated governance to keep pace with the growing use of generative AI tools that are helping developers produce code at unprecedented volumes Continue Reading
-
News
19 Mar 2026
Zenarmor extends distributed SASE architecture to mobile
Secure access service edge architecture now supports mobile endpoints and containerised environments, while enabling sovereign deployments across partner-operated and customer-controlled infrastructure Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
19 Mar 2026
AI makes debut in Bridewell cyber security in CNI report
Regulation has superseded cyber threats as the main driver of cyber security spending, and AI has made its debut for attack and defence, according to a CNI-focused report from Bridewell Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
19 Mar 2026
Gartner: Ditch ‘big transformation’ cyber strategies for continuous improvement
As artificial intelligence reshapes the enterprise, CISOs must abandon risky big bang security transformation initiatives in favour of incremental changes to build cyber resilience Continue Reading
-
Blog Post
19 Mar 2026
A simple online login is key to digital government success
While it’s not perfect, there’s one thing that can be said of Microsoft Azure Active Directory. It basically does what it’s supposed to, providing a relatively straightforward login for enterprise ... Continue Reading
By- Cliff Saran, Managing Editor
-
News
19 Mar 2026
Apple issues first Background patch for WebKit browser flaw
Apple’s first ever Background Security Update fixes a WebKit browser engine bug that could enable threat actors to see and steal important data from their victims Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Mar 2026
US lawmakers quiz Meta over ‘dangerous’ facial recognition plans for smart glasses
Democratic senators warn that Meta’s plans to introduce facial recognition technology into smart glasses could lead to normalisation of mass surveillance and breach citizens’ rights Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
18 Mar 2026
UK MoD awards more than two dozen contracts for AI targeting systems
The UK Ministry of Defence is ramping up its investment into military artificial intelligence in a bid to increase the ‘lethality’ of the British armed forces Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
17 Mar 2026
Digital IDs edge closer to practical reality for UK businesses
Industries and policymakers are strongly aligned on the need for digital company IDs for UK businesses, as progress is made towards the implementation of a practical standard Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
17 Mar 2026
UK Digital Identity Policy - Issues, Choices and Questions in 850 words
How do we ensure that UK ID policy is effective and meaningful? 850 words, with 14 key actions and 12 foundational questions that need to be answered before moving forward on the introduction of a ... Continue Reading
By- Philip Virgo, Winsafe Ltd
-
News
17 Mar 2026
Technology accelerating crime, boosts case for national police service, says NCA chief
NCA director general Graeme Biggar says technology has helped criminals get smarter, faster and more connected, boosting case for National Police Service Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
17 Mar 2026
Contactless payment limit removal will happen overnight, but change won’t
Banks will be able to set their own contactless card payment limits from 19 March, following rule change by Financial Conduct Authority Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Opinion
17 Mar 2026
Beyond integration theatre: Building stronger cyber platforms
The Security Think Tank looks at platformisation, considering questions such as how CISOs can distinguish between a truly integrated platform and 'integration theater, and how to protect unified platforms. Continue Reading
By- Joe Mayhew and Ahmed Tikail, PA Consulting
-
News
17 Mar 2026
Health workers call for Palantir to be booted from NHS contracts
Health justice charity Medact warns that Palantir’s involvement in NHS data systems is a threat to patients and healthcare organisations Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
17 Mar 2026
Interview: D360 Bank redefines cyber security for Saudi Arabia’s cashless future
Muath Alhomoud, director of cyber security at D360 Bank, discusses payment security, cloud resilience and the responsible use of AI in a hyper-connected financial ecosystem Continue Reading
By- Andrea Benito , Computer Weekly
-
E-Zine
17 Mar 2026
How conflict is reshaping technology strategy in the Middle East
In this week’s Computer Weekly, we talk to IT leaders in the Middle East about their challenges in keeping digital infrastructure running in a time of regional conflict. The chief data officer at Colgate-Palmolive explains the importance of getting your data foundations in place. And we find out how to overcome the barriers for underrepresented groups to get into tech. Read the issue now. Continue Reading
-
News
16 Mar 2026
Companies House restarts online services following cyber breach
Companies House was forced to pull its WebFiling service offline at the weekend after it emerged that a flawed update was putting data at risk of exposure Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 Mar 2026
Revealed: How HMRC has been quietly building surveillance capabilities
HMRC has bought phone scanning equipment and analysis software capable of extracting data from mobile devices as it steps up its electronic intelligence gathering capabilities, an investigation by Computer Weekly reveals Continue Reading
-
News
13 Mar 2026
Interpol obliterates cyber criminal infrastructure
A major Interpol operation has resulted in the seizure of thousands of malicious cyber criminal IP addresses and servers, and multiple arrests Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
13 Mar 2026
How CISOs can build a truly unified and resilient security platform
The Security Think Tank looks at platformisation, considering questions such as how CISOs can distinguish between a truly integrated platform and 'integration theater, and how to protect unified platforms. Continue Reading
By- Vaibhav Dutta, Tata Communications
-
News
13 Mar 2026
UK falls behind on supercomputing amid slow investment, NAO warns
While UKRI has improved its oversight of research and innovation, funding remains fragmented and has been too slow to replace supercomputers Continue Reading
By -
Feature
12 Mar 2026
Vulnerability reports: Increase in quantity, decrease in quality?
Bug bounties have become a staple of the cyber security toolkit, offering researchers a way to get paid to find and report bugs and giving businesses a route to fix unknown flaws. However, this model is now facing scrutiny. What is driving these concerns? Continue Reading
By -
News
12 Mar 2026
The UK government’s digital identity scheme: Dystopian nightmare or modernised public services?
Critics and supporters of digital ID are honing their arguments for the government’s consultation – but it’s the public that will decide. How should you choose? Continue Reading
By- Bryan Glick, Editor in chief
-
News
11 Mar 2026
Iran war a melting pot for other cyber threats
State-backed cyber threat actors from non-combatant states are taking advantage of the Israeli-US war on Iran to fulfil their own goals, according to Proofpoint analysts Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Mar 2026
Cyber industry welcomes women, but challenges persist
Three-quarters of women working in security say they feel comfortable in the field, but women are still much more likely to be laid off and face persistent challenges around career advancement, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Mar 2026
Salesforce tracks possible ShinyHunters campaign targeting its users
Salesforce warns users of an uptick in malicious activity targeting Experience Cloud customers with misconfigured user settings via an open source tool Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
11 Mar 2026
Confidence in AI-powered cyber must be earned, not assumed
In security, familiar testing and validation approaches are not enough when it comes to AI. The question is not just whether an AI-powered tool works but how it actually behaves when it is stressed, manipulated, or forced to operate outside already known conditions. Continue Reading
By- Haris Pylarinos, Hack The Box
-
Opinion
11 Mar 2026
Strong security balances consolidation and best-of-breed capabilities
The Security Think Tank looks at platformisation, considering questions such as how CISOs can distinguish between a truly integrated platform and 'integration theater, and how to protect unified platforms. Continue Reading
By- Martin Riley, Bridewell Consulting
-
News
11 Mar 2026
Child rapist could have profiled victims through unaudited access to NHS databases
NHS analyst’s conviction for child sexual abuse offences raises concerns over unaudited access to patient data Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
11 Mar 2026
CISOs on alert: Strengthening cyber resilience amid geopolitical tensions in the Middle East
As regional uncertainty rises, security leaders across the Gulf focus on resilience, faster incident response and deeper threat intelligence to protect critical systems and data Continue Reading
By- Andrea Benito , Computer Weekly
-
News
11 Mar 2026
Welsh government boosts funding for cyber education
The Welsh government’s Tech Valleys programme is providing three-quarters of a million pounds to help reach thousands of primary school children with security education and careers guidance Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Mar 2026
Microsoft patches zero-days in .NET and SQL Server
Zero-days in .NET and SQL Server, and a handful of critical RCE bugs, form the nucleus of Microsoft’s March Patch Tuesday update Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Mar 2026
Whitehall launches digital ID consultation
Eight-week consultation aims to get the public’s view on how the proposed digital ID system would work, and contemplates introducing a universal unique identifier linked to the ID Continue Reading
By -
News
10 Mar 2026
Met Police to ‘trial’ handheld facial recognition tech
London Mayor Sadiq Khan reveals in a scrutiny session with London Assembly members that the Met is set to trial a facial recognition phone app for police officers Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
10 Mar 2026
AI chooses nuclear escalation in 95% of simulated crises
With artificial intelligence increasingly deployed in analysis and decision-making in armed conflict, research shows AI systems will not naturally default to ‘safe’ outcomes in nuclear crises Continue Reading
-
Opinion
10 Mar 2026
Why Asia needs its own model of digital sovereignty
Framing digital sovereignty simply as a “US versus non-US cloud” debate is no longer fit for purpose. Asia must forge its own path through data jurisdiction, technical portability, and operational control Continue Reading
By- Terry Maiolo
-
News
10 Mar 2026
WA auditor general flags weak Microsoft 365 security controls across state entities
Western Australia’s Office of the Auditor General has uncovered weaknesses in M365 configurations across seven government agencies, leading to compromised accounts and data breaches Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
09 Mar 2026
UK to launch cyber fraud squad in April
The UK’s Online Crime Centre, launching next month, will bring together government, police, intelligence agencies, banks, mobile networks and tech firms to take coordinated action against cyber fraud Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Mar 2026
Trump looks to power up post-quantum, AI security
The US has unveiled a six-pillar national cyber security strategy, with developing technological areas such as post-quantum cryptography and artificial intelligence front and centre Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Mar 2026
APT36 unleashes AI-generated ‘vibeware’ to flood targets
The Pakistani threat group has been using AI to rewrite malicious code across multiple programming languages, prioritising scale over sophistication to evade detection, security researchers have found Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
06 Mar 2026
Scattered Spider attack on TfL affected 10 million people
The 2024 Scattered Spider attack on Transport for London affected approximately 10 million people, many of whom remain blissfully unaware their data was compromised Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
06 Mar 2026
Platformisation without illusion: Separating integration from theatre
The Security Think Tank looks at platformisation, considering questions such as how CISOs can distinguish between a truly integrated platform and 'integration theater, and how to protect unified platforms. Continue Reading
By- Aditya K Sood, Aryaka
-
Feature
06 Mar 2026
CIO risk management: Lessons from Southern Glazer's CIO
Steve Bronson, CIO of Southern Glazer's Wine & Spirits, explains how his team tackles AI, talent, operational and vendor risks to keep the business resilient. Continue Reading
By- Tim Murphy, Site editor
-
News
06 Mar 2026
Norway braced for foreign AI cyber attacks on vital petroleum computing
Nordic petrostate is preparing for war and turning the spotlight on vulnerabilities in its critical industries, as adversaries look for ways to damage the most important oil and gas producer to the EU Continue Reading
By -
News
06 Mar 2026
Nordics ally with Baltics to accelerate digital wallet roll-out
Baltic and Nordic countries work together on a common certification system to support digital wallet applications Continue Reading
By- Gerard O'Dwyer
-
News
06 Mar 2026
Enterprises warming to AI PCs amid growing cloud costs
While global memory shortages will pose a threat to the broader PC market, AI PCs are gaining momentum across Asia as companies look to cut cloud costs, boost productivity and secure sensitive information Continue Reading
By- Aaron Tan, Informa TechTarget
-
Feature
05 Mar 2026
Electronic health records are still creating issues for patients
Almost every NHS trust will have moved onto a digital system by this spring. Experts have cautioned many patients are still struggling to access their own health data Continue Reading
By -
News
05 Mar 2026
Spyware suppliers exploit more zero-days than nation states
Exploitation of zero-days by commercial surveillance and spyware developers outpaced exploitation by nation-state actors last year, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Mar 2026
Government wants to build digital ID system in-house
The Home Affairs Committee hearing on digital ID reveals consultation is due next week; there will be no central database; and while government wants to build the system in-house, it will not replace private digital ID providers Continue Reading
By -
Feature
05 Mar 2026
Edge AI: Business cost, risk and control
Right now, rather than asking whether or not to adopt edge artificial intelligence, the crucial question for most companies is how to do so without creating new security, cost and governance issues Continue Reading
-
News
05 Mar 2026
Police do not have to explain to lawyer Fahad Ansari why they seized his phone data, says court
A high court judge has ruled that police do not have to give reasons to lawyer, who acts for Hamas, why they seized his mobile phone data Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
04 Mar 2026
Iranian hacktivists muster their forces but state APTs lay low
Hacktivist activity surrounding the Iran war is sky-high but Iran’s state-backed cyber espionage actors have yet to show their hands, giving security teams a valuable window of time to shore up their defences Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Mar 2026
Zero-day in Android phone chips under active attack
Google and Qualcomm have tag-teamed a serious vulnerability in the chipsets used in Android mobile devices, which has been exploited in the wild as a zero-day Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Mar 2026
Tycoon2FA phishing platform dismantled in major operation
A Europol-led sting against the infamous Tycoon2FA MFA bypass phishing service has been successful, with operations disrupted and ringleaders and cyber criminal users identified Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Mar 2026
Landmark legal challenge against Home Office eVisa system heard
The UK High Court will examine whether the Home Office policy of refusing to issue alternative proof of immigration status outside of its electronic visa system is lawful Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
03 Mar 2026
Open cyber standards key to cross-platform integration
The Security Think Tank looks at platformisation considering questions such as how CISOs can distinguish between a truly integrated platform and 'integration theater, and how to protect unified platforms. Continue Reading
By- Stephen McDermid, Okta
-
News
03 Mar 2026
Resilience under pressure: How regional conflict is reshaping the Middle East tech strategy
From AWS outages in the UAE to stronger focus on data control and cyber security, tech leaders say the Israel-US-Iran conflict is challenging, but not stopping the region’s digital goals Continue Reading
By- Andrea Benito , Computer Weekly
-
News
03 Mar 2026
NCSC: No increase in cyber threat from Iran, but be prepared
While cyber threat levels remain stable following the outbreak of war in the Middle East at the weekend, at-risk organisations in the UK should take steps to ward off potential reprisals from Iran-linked threat actors Continue Reading
By- Alex Scroxton, Security Editor
-
02 Mar 2026
Governments urged to step up enforcement of big tech amid rush to ban social media for under-16s
The Council of Europe’s Commissioner for Human Rights says that European governments should consider better enforcement against big tech companies before banning children from social media. Continue Reading
-
Feature
02 Mar 2026
Weighing up the enterprise risks of neocloud providers
Anything that expands quickly can attract bubble accusations, and the market for cloud services in an AI age doesn’t look to be different Continue Reading
By -
News
26 Feb 2026
Qilin crew continues to dominate ransomware ecosystem
The Qilin ransomware gang remained ‘top dog’ in January 2026, with over 100 observed cyber attacks to its name, amid a rapidly evolving and fragmenting cyber criminal ecosystem Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Feb 2026
Fake UK government website redirect detection time reduced to eight days
It used to take two months, but the UK government has reduced the time it takes to address fake DNS redirects Continue Reading
By- Cliff Saran, Managing Editor
-
News
26 Feb 2026
US artificial intelligence developers accuse Chinese firms of stealing their data
Artificial intelligence developers are accusing Chinese firms of stealing their intellectual property following a spate of ‘distillation attacks’, despite their own alleged theft of training data Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
26 Feb 2026
CrowdStrike touts agentic SOC to tackle security woes
By embedding AI agents across its platform, CrowdStrike is looking to help security teams automate repetitive security tasks, enabling them to focus on complex and stealthier threats that could slip under the radar Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
25 Feb 2026
Cisco Catalyst SD-WAN users targeted in series of cyber attacks
The NCSC, Cisa, and other Five Eyes agencies have warned of mass exploitation of vulnerabilities in Cisco Catalyst SD-WAN, which Cisco is attributing to an unknown threat actor called UAT-8616 Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Feb 2026
The UK’s proposed social media ban explained
The UK government will use new legal powers to lay the groundwork for an under-16 social media ban after its consultation on children’s digital well-being, but opponents warn the measures being considered will only treat the symptoms of the problem if they ignore the structural power of big tech Continue Reading
-
News
25 Feb 2026
Application exploitation back in vogue, says IBM cyber unit
IBM’s X-Force unit observes an uptick in the exploitation of vulnerable public-facing software applications Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Feb 2026
Police created ‘intelligence profile’ of BBC journalist subject to phone surveillance
Police and MI5 conducted seven unlawful operations to obtain phone data relating to former BBC journalist Vincent Kearney, the Investigatory Powers Tribunal heard today Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
25 Feb 2026
How AI code generation is pushing DevSecOps to machine speed
Organisations should adopt shared platforms and automated governance to keep pace with the growing use of generative AI tools that are helping developers produce code at unprecedented volumes Continue Reading
-
News
24 Feb 2026
Cyber association launches code of conduct for security pros
ISC2’s Code of Professional Conduct will supposedly establish a worldwide framework dedicated to principled and ethical practices in the security trade Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
24 Feb 2026
Retirement plans postponed as tech issues delay pension payments
In this week’s Computer Weekly ezine, we dig into the tech issues affecting the Civil Service Pension Scheme, which have left some members in severe financial difficulties. We also sit down with Segro CIO Richard Corbridge to find out how he is bringing to bear his experience of working in both the private and public sector to make digital transformation happen at the property management company. The buyer’s guide this week starts a series of articles about neocloud providers, and how the rising demand for artificial intelligence and sovereign capabilities are reshaping the cloud computing market. And, rounding out the issue, we have a feature looking at the work that is going into creating a viable quantum internet. Read the issue now. Continue Reading
-
News
23 Feb 2026
Innovate UK cyber startup programme gets £10m funding booster
Graduates of DSIT and Innovate UK's CyberASAP scheme to commercialise cutting-edge cyber research projects have raised nearly £50m in the past decade Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Feb 2026
Governments urged to step up enforcement of big tech amid rush to ban social media for under-16s
The Council of Europe’s Commissioner for Human Rights says that European governments should consider better enforcement against big tech companies before banning children from social media Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
23 Feb 2026
Why crypto agility is key to quantum readiness
With quantum computing threatening current encryption standards, experts call for organisations to achieve crypto agility by managing the lifecycle of certificates and cryptographic keys through automation Continue Reading
By- Aaron Tan, Informa TechTarget
-
Feature
20 Feb 2026
How to build an incident response plan, with examples, template
Threats from cyberattacks continue to grow in frequency and severity. Considering the potential disruptions from such events, an organization needs an incident response plan.. Continue Reading
By -
News
20 Feb 2026
UK AI alignment project gets OpenAI and Microsoft boost
Altogether, £27m is now available to fund the AI Security Institute’s work to collaborate on safe, secure artificial intelligence Continue Reading
By- Cliff Saran, Managing Editor
-
News
20 Feb 2026
What it takes to secure agentic commerce
With AI agents increasingly acting as digital concierges for shoppers, verifying bot identities, securing the APIs they rely on and detecting anomalous behaviour will be key to safeguarding automated transactions, according to Akamai Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
19 Feb 2026
ICO wins appeal over data protection obligations in Currys cyber attack
The UK Information Commissioner’s Office has won an important appeal relating to data protection obligations arising from a 2017-18 cyber attack at electronics retailer Currys PC World Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Feb 2026
PromptSpy Android malware may exploit Gemini AI
A newly uncovered malware targeting the Android operating system seems to exploit Google’s Gemini GenAI tool to help it maintain persistence Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Feb 2026
European politicians amplify disinformation about UN rapporteur
Government officials from the US and Europe have condemned UN special rapporteur Francesca Albanese for remarks about Israel she never made, based on a truncated clip circulating online that takes her statements out of context Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
19 Feb 2026
Bank of Ireland UK fined for late security system implementation
The payments regulator has fined the bank nearly £4m after it missed a deadline to implement a system to check payees Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Blog Post
19 Feb 2026
AI? Remember Automation…
With the endless AI buzz dominating every technology headline and press release, it’s easy to forget the origins of “computer intelligence”; namely the likes of expert systems, macros and the “A” ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
Opinion
19 Feb 2026
The year that speed changed cyber security
At a time when threat actors are operating at machine speed, understanding which essential systems are needed to keep the lights on can be the difference between business continuity and existential crisis Continue Reading
By- Niraj Naidu
-
News
18 Feb 2026
Flaws in Google and Microsoft products added to Cisa catalogue
Cisa has added six CVEs to its Kev catalogue this week, including newly disclosed issues in Google Chromium and Dell RecoverPoint for Virtual Machines, and some older flaws as well Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Feb 2026
0APT ransomware crew makes embarrassing splash
A ransomware gang called 0APT has attracted attention, but many of its victims may not even be real, and its operators are being accused of over-egging their criminal pudding Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
18 Feb 2026
Generative and agentic AI in security: What CISOs need to know
AI is introducing new risks that existing evaluation and governance approaches were never designed to manage, creating a widening gap between what AI-backed security tools promise and what can be realistically controlled. Continue Reading
By- Avivah Litan, Gartner
-
News
18 Feb 2026
HP bets on edge AI and regional investment to power Middle East enterprise transformation
Ertug Ayik, managing director for Middle East and Africa at HP Inc, outlines how on-device artificial intelligence, embedded security and a partner-first model are positioning the company at the heart of MENA’s digital transformation Continue Reading
By- Andrea Benito , Computer Weekly
-
News
17 Feb 2026
Western cyber alliances risk fragmenting in new world order
The conduct of powerful nations is causing knock-on effects in the cyber world as long-standing security frameworks appear increasingly precarious Continue Reading
By- Alex Scroxton, Security Editor
-
News
17 Feb 2026
Businesses may be caught by government proposals to restrict VPN use
Labour proposals to restrict social media use to people aged 16 and under could have unintended consequences for businesses using virtual private networks Continue Reading
By- Bill Goodwin, Investigations Editor
-
Feature
17 Feb 2026
The evolution of threat research: Looking beyond best-of-breed
Traditional models of threat research as a service are changing and evolving towards a more bespoke model that puts more control in the hands of end-user cyber teams Continue Reading
-
Feature
17 Feb 2026
The ethical challenges of America’s social media vetting policy
The US government is incorporating social media vetting as part of its border control policy, leading to concerns about what data will be collected and how it will be protected Continue Reading
-
News
17 Feb 2026
Artificial intelligence ‘creeping into’ high-risk stock trading
Growing reliance on artificial intelligence is encroaching into the stock market, finds research Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
17 Feb 2026
Government wages cyber campaign as half the UK’s SMEs are breached
UK government says half of all small businesses have been cyber breached in the recent past as it urges them to ‘lock the door’ Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
17 Feb 2026
British Transport Police start using live facial recognition
British Transport Police will deploy facial recognition for six months despite calls for the government to halt its rapid expansion of the technology Continue Reading
-
News
17 Feb 2026
Italian Navy sets sail with Ericsson 5G
Project sees long-range 5G Standalone data communication at sea successfully demonstrated, with on-board connectivity and naval vessel systems tested in real day and night operations Continue Reading
By- Joe O’Halloran, Computer Weekly
-
E-Zine
17 Feb 2026
Charities turn to tech for greater impact
The fallout from the Post Office scandal is a recurring theme of reporting for Computer Weekly, and in this week’s ezine, we find out how the organisation’s efforts to address the shortcomings of its Horizon software have resulted in it being hit with a multimillion-pound IR35-related tax bill. We also sit down with Checkout.com CTO Mariano Albera to find out how he’s applying his knowledge of e-commerce to the finance sector, and why coding will always have a special place in his heart. In the third and final instalment of the AI security buyer’s guide, we take a look at how the technology can both help and hinder enterprise IT security strategies. And, rounding out the issue, we find out how five different charities are using CRM and digital experience technologies to bolster donations. Read the issue now. Continue Reading
-
Feature
16 Feb 2026
Making sense of AI’s role in cyber security
Cyber security companies have jumped on the AI bandwagon. We look at where artificial intelligence is a useful add-on and where it poses potential risks Continue Reading
By- Cliff Saran, Managing Editor
-
News
12 Feb 2026
Europe’s data protection supervisors warn over plans to ‘narrow’ privacy rights
European data protection supervisors warn the European Commission against narrowing the privacy protections for personal data as it gears up for a swathe of data protection reforms Continue Reading
By- Bill Goodwin, Investigations Editor
-
Tip
12 Feb 2026
How to build an incident response framework
Frameworks provide the structure for an effective incident response program. Here's where to turn for guidance on what to include. Continue Reading
By -
News
12 Feb 2026
European Commission: TikTok’s addictive design breaches EU law
In a preliminary ruling, European Commission says TikTok’s additive design features are in breach of laws designed to create safer digital spaces Continue Reading
-
News
11 Feb 2026
CVE volumes may plausibly reach 100,000 this year
The number of vulnerabilities to be disclosed in 2026 is almost certain to exceed last year's total, and may be heading towards 100,000, according to analysis Continue Reading
By- Alex Scroxton, Security Editor
