IT security
-
News
23 Feb 2026
Why crypto agility is key to quantum readiness
With quantum computing threatening current encryption standards, experts call for organisations to achieve crypto agility by managing the lifecycle of certificates and cryptographic keys through automation Continue Reading
By- Aaron Tan, Informa TechTarget
-
Feature
20 Feb 2026
How to build an incident response plan, with examples, template
Threats from cyberattacks continue to grow in frequency and severity. Considering the potential disruptions from such events, an organization needs an incident response plan.. Continue Reading
By
-
News
20 Feb 2026
UK AI alignment project gets OpenAI and Microsoft boost
Altogether, £27m is now available to fund the AI Security Institute’s work to collaborate on safe, secure artificial intelligence Continue Reading
By- Cliff Saran, Managing Editor
-
News
20 Feb 2026
What it takes to secure agentic commerce
With AI agents increasingly acting as digital concierges for shoppers, verifying bot identities, securing the APIs they rely on and detecting anomalous behaviour will be key to safeguarding automated transactions, according to Akamai Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
19 Feb 2026
ICO wins appeal over data protection obligations in Currys cyber attack
The UK Information Commissioner’s Office has won an important appeal relating to data protection obligations arising from a 2017-18 cyber attack at electronics retailer Currys PC World Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Feb 2026
PromptSpy Android malware may exploit Gemini AI
A newly uncovered malware targeting the Android operating system seems to exploit Google’s Gemini GenAI tool to help it maintain persistence Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Feb 2026
European politicians amplify disinformation about UN rapporteur
Government officials from the US and Europe have condemned UN special rapporteur Francesca Albanese for remarks about Israel she never made, based on a truncated clip circulating online that takes her statements out of context Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
19 Feb 2026
Bank of Ireland UK fined for late security system implementation
The payments regulator has fined the bank nearly £4m after it missed a deadline to implement a system to check payees Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Blog Post
19 Feb 2026
AI? Remember Automation…
With the endless AI buzz dominating every technology headline and press release, it’s easy to forget the origins of “computer intelligence”; namely the likes of expert systems, macros and the “A” ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
Opinion
19 Feb 2026
The year that speed changed cyber security
At a time when threat actors are operating at machine speed, understanding which essential systems are needed to keep the lights on can be the difference between business continuity and existential crisis Continue Reading
By- Niraj Naidu
-
News
18 Feb 2026
Flaws in Google and Microsoft products added to Cisa catalogue
Cisa has added six CVEs to its Kev catalogue this week, including newly disclosed issues in Google Chromium and Dell RecoverPoint for Virtual Machines, and some older flaws as well Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Feb 2026
0APT ransomware crew makes embarrassing splash
A ransomware gang called 0APT has attracted attention, but many of its victims may not even be real, and its operators are being accused of over-egging their criminal pudding Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
18 Feb 2026
Generative and agentic AI in security: What CISOs need to know
AI is introducing new risks that existing evaluation and governance approaches were never designed to manage, creating a widening gap between what AI-backed security tools promise and what can be realistically controlled. Continue Reading
By- Avivah Litan, Gartner
-
News
18 Feb 2026
HP bets on edge AI and regional investment to power Middle East enterprise transformation
Ertug Ayik, managing director for Middle East and Africa at HP Inc, outlines how on-device artificial intelligence, embedded security and a partner-first model are positioning the company at the heart of MENA’s digital transformation Continue Reading
By- Andrea Benito , Computer Weekly
-
News
17 Feb 2026
Western cyber alliances risk fragmenting in new world order
The conduct of powerful nations is causing knock-on effects in the cyber world as long-standing security frameworks appear increasingly precarious Continue Reading
By- Alex Scroxton, Security Editor
-
News
17 Feb 2026
Businesses may be caught by government proposals to restrict VPN use
Labour proposals to restrict social media use to people aged 16 and under could have unintended consequences for businesses using virtual private networks Continue Reading
By- Bill Goodwin, Investigations Editor
-
Feature
17 Feb 2026
The ethical challenges of America’s social media vetting policy
The US government is incorporating social media vetting as part of its border control policy, leading to concerns about what data will be collected and how it will be protected Continue Reading
-
News
17 Feb 2026
Artificial intelligence ‘creeping into’ high-risk stock trading
Growing reliance on artificial intelligence is encroaching into the stock market, finds research Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
17 Feb 2026
Government wages cyber campaign as half the UK’s SMEs are breached
UK government says half of all small businesses have been cyber breached in the recent past as it urges them to ‘lock the door’ Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
17 Feb 2026
British Transport Police start using live facial recognition
British Transport Police will deploy facial recognition for six months despite calls for the government to halt its rapid expansion of the technology Continue Reading
-
News
17 Feb 2026
Italian Navy sets sail with Ericsson 5G
Project sees long-range 5G Standalone data communication at sea successfully demonstrated, with on-board connectivity and naval vessel systems tested in real day and night operations Continue Reading
By- Joe O’Halloran, Computer Weekly
-
E-Zine
17 Feb 2026
Charities turn to tech for greater impact
The fallout from the Post Office scandal is a recurring theme of reporting for Computer Weekly, and in this week’s ezine, we find out how the organisation’s efforts to address the shortcomings of its Horizon software have resulted in it being hit with a multimillion-pound IR35-related tax bill. We also sit down with Checkout.com CTO Mariano Albera to find out how he’s applying his knowledge of e-commerce to the finance sector, and why coding will always have a special place in his heart. In the third and final instalment of the AI security buyer’s guide, we take a look at how the technology can both help and hinder enterprise IT security strategies. And, rounding out the issue, we find out how five different charities are using CRM and digital experience technologies to bolster donations. Read the issue now. Continue Reading
-
Feature
16 Feb 2026
Making sense of AI’s role in cyber security
Cyber security companies have jumped on the AI bandwagon. We look at where artificial intelligence is a useful add-on and where it poses potential risks Continue Reading
By- Cliff Saran, Managing Editor
-
News
12 Feb 2026
Europe’s data protection supervisors warn over plans to ‘narrow’ privacy rights
European data protection supervisors warn the European Commission against narrowing the privacy protections for personal data as it gears up for a swathe of data protection reforms Continue Reading
By- Bill Goodwin, Investigations Editor
-
Tip
12 Feb 2026
How to build an incident response framework
Frameworks provide the structure for an effective incident response program. Here's where to turn for guidance on what to include. Continue Reading
By -
News
12 Feb 2026
European Commission: TikTok’s addictive design breaches EU law
In a preliminary ruling, European Commission says TikTok’s additive design features are in breach of laws designed to create safer digital spaces Continue Reading
-
News
11 Feb 2026
CVE volumes may plausibly reach 100,000 this year
The number of vulnerabilities to be disclosed in 2026 is almost certain to exceed last year's total, and may be heading towards 100,000, according to analysis Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Feb 2026
London Assembly member: Police should halt facial-recognition technology use
In lieu of a full-blown ban on the technology, Green London Assembly member Zoë Garbett has called for a number of new safeguards to be implemented that she feels would protect Londoners from ‘escalating’ biometric surveillance Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
11 Feb 2026
The Security Interviews: Mick Baccio, Splunk
Mick Baccio, global security advisor at Splunk SURGe and Cisco Foundation AI, reveals how the experience of running cyber on a dime for a US presidential campaign has informed how he does security, and why the basics still matter Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Feb 2026
CIOs discuss friction between legacy IT and innovation
While it may not be something IT leaders want to talk about, managing technical debt is critical to moving forward with IT innovation Continue Reading
By- Cliff Saran, Managing Editor
-
Feature
11 Feb 2026
AI enters its ‘grassroots backlash’ era
As artificial intelligence permeates aspects of the economy and society, individuals and civic groups are devising creative ways to rebel - but any impact on AI’s development, adoption and regulation is unclear Continue Reading
By- Kyle Hiebert, Computer Weekly
- Alexander Martin
-
Opinion
11 Feb 2026
The world’s default productivity tool is becoming a national security liability
The rapid exploitation of a bug in Office by Russian cyber attackers shows that the current system of patching - for a software application that is practically ubiquitous in enterprise IT - has become a security risk for everyone Continue Reading
By- Bill McCluggage
-
News
10 Feb 2026
Arctic Wolf targets mid-market security gap in APAC
Following the launch of its full portfolio in Malaysia, the SOC provider discusses the security challenges facing lean IT teams, the value of supplier neutrality, and its roadmap for AI and ransomware protection Continue Reading
-
News
10 Feb 2026
February Patch Tuesday: Microsoft drops six zero-days
Microsoft releases patches for six zero-day flaws in its latest monthly update, many of them related to security feature bypass issues Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Feb 2026
Researchers delve inside new SolarWinds RCE attack chain
Researchers at Huntress and Microsoft have shared findings from their analysis of a new SolarWinds Web Help Desk vulnerability Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
10 Feb 2026
How agentic AI could destroy social media: the need for proactive governance
If organisations using agentic and generative AI don’t codify ethics and oversight now, the future may be filled with AI agents using generative AI to communicate with other agents, destroying trust in social media Continue Reading
By- Raihan Islam, defineXTEND
-
News
10 Feb 2026
Second ever international AI safety report published
More than 100 artificial intelligence experts have produced the second international AI safety report ahead of a summit in India, outlining a high degree of uncertainty about the development and risks of AI Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
10 Feb 2026
Artificial intelligence now finance sector’s ‘connective tissue’
Major study finds debate over AI adoption is over as almost every finance firm in the world is already using the technology Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
10 Feb 2026
Security Think Tank: Stop buying AI, start buying outcomes
Rik Ferguson, vice-president of security intelligence at Forescout, considers what CISOs and buyers need to know to cut through the noise around artificial intelligence and assess the various AI cyber use cases Continue Reading
-
E-Zine
10 Feb 2026
Zooming in on police technology plans
This week’s edition of the Computer Weekly ezine takes a closer look at the technology changes the Home Office is seeking to introduce to the UK policing sector as part of its wide-ranging reform programme. We also hear from the global CIO of PC hardware manufacturer Lenovo about the work he is doing to grow the company’s services business. Rounding out the issue, we have two features digging deep-er into the security side of artificial intelligence, with one looking at how suppliers are adding the technology to their security portfolios and the other guiding buyers on what to look for when selecting AI security products. Read the issue now. Continue Reading
-
Opinion
10 Feb 2026
How GenAI is breaking traditional cyber security awareness tactics
With threat actors exploiting the growing use of generative AI tools and the prevalence of shadow AI, organisations must strengthen their security programmes and culture to manage the rising risk Continue Reading
By- Richard Addiscott
-
News
10 Feb 2026
Singapore mounts largest ever cyber operation to oust APT actor
Operation Cyber Guardian mobilised over 100 defenders to neutralise UNC3886, which infiltrated Singtel, StarHub, M1 and Simba networks, operators issue joint pledge on defence-in-depth Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
09 Feb 2026
Russia’s cyber attacks on Polish utilities draws NCSC alert
A series of Russian cyber attacks targeting Poland’s energy infrastructure has prompted a warning from the UK’s National Cyber Security Centre Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Feb 2026
UAE’s TII challenges big tech dominance with open source Falcon AI models
Through its Falcon models and an open, efficiency-driven research strategy, the Technology Innovation Institute is positioning the UAE as a producer of foundational AI, not merely a consumer of global platforms Continue Reading
By- Andrea Benito , Computer Weekly
-
News
09 Feb 2026
US bid for Dutch ID infrastructure raises sovereignty concerns
Kyndryl’s proposed takeover shows how critical systems become exposed to foreign control without an overarching policy decision Continue Reading
By- Kim Loohuis
-
News
09 Feb 2026
As space gets crowded, cyber threats from jamming to stalker satellites loom large
Experts at the inaugural CYSAT Asia in Singapore warn of the urgency of securing space assets amid growing geopolitical tensions and supply chain vulnerabilities Continue Reading
By- Aaron Tan, Informa TechTarget
-
Feature
05 Feb 2026
10 types of information security threats for IT teams
Know thine enemy -- and the common security threats that can bring an unprepared organization to its knees. Learn what these threats are and how to prevent them. Continue Reading
By- Karen Kent, Trusted Cyber Annex
-
News
04 Feb 2026
SolarWinds RCE bug makes Cisa list as exploitation spreads
Exploitation of CVE-2025-40551, an RCE flaw affecting SolarWinds Web Help Desk, appears to be spreading, with defenders on high alert Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
04 Feb 2026
Smaller, safer AI models may be key to unlocking business value
While AI presents a significant opportunity to further the way we do business, what if it’s time to consider a new direction? What if the safest and most effective path for AI isn’t to go larger, but smaller instead? Continue Reading
By- Joel Carusone, NinjaOne
-
News
04 Feb 2026
UK government must get its hands dirty on security, report says
As the UK government develops its National Cyber Action Plan, a report from the Rusi think tank urges Westminster to take a more interventionist approach Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Feb 2026
Ransomware gangs focus on winning hearts and minds
Ransomware-as-a-service operations are increasingly seeking to forge connections with employees, contractors and trusted partners of their target organisations as an alternative to straight-up hacking, says NCC Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
03 Feb 2026
The European offensive against encrypted phone evidence
Defendants and lawyers are demanding transparency about digital evidence from police hacking operations used in criminal prosecutions across Europe following a series of critical court judgments. Continue Reading
By- Yehudi Moszkowicz
-
News
03 Feb 2026
Infosecurity Europe launches cyber security startups stream
Infosecurity Europe 2026 will feature a cyber security startup exhibition zone and a competition for business support, in conjunction with the UK Cyber Flywheel organisation Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
03 Feb 2026
Banks on the hook for £173m in APP fraud reimbursement
Banks paid 88% losses claimed by customers that fell victim to authorised push payment fraud last year Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Feature
03 Feb 2026
Why the UK needs to rethink the Investigatory Powers Act and allow intercept evidence in court
The UK needs clear and unambiguous laws around the use of digital evidence in court. The law has become tangled following rulings in the country’s EncroChat prosecutions. It’s time to allow intercept data to be used as evidence in legal cases Continue Reading
By- Peter Sommer
-
E-Zine
03 Feb 2026
Datacentre indecision: UK government’s back and forth on planning
This week’s Computer Weekly ezine digs into the latest twist in a long-running datacentre planning saga, concerning a server farm in Iver, Buckinghamshire, that the government has now admitted it was wrong to grant planning permission for. We also hear from the head of advanced analytics at Dutch Bank ING about how its foray into using AI technologies is benefiting both its business and the customers it serves. Sticking with the AI theme, we take a deep dive into how the technology is being used as an enabler for the development of urban digital twins, and find out how it can be used to assist IT security teams. Read the issue now. Continue Reading
-
News
02 Feb 2026
Canva uses 1Password to secure ID during growth phase
As it underwent a growth spurt in the early 2020s, graphic design platform Canva turned to 1Password to manage identity across its expanding organisation Continue Reading
By- Alex Scroxton, Security Editor
-
News
02 Feb 2026
Police intercept evidence from Sky ECC cryptophone network ‘unreliable’, Antwerp court told
Intercepted communications data used to prosecute drug crime gangs is unreliable and does not conform to international standards of evidence, according to an expert report presented to a court in Antwerp Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
02 Feb 2026
Interview: Why identity is the nucleus for cyber security
Amid a wave of market consolidation, Computer Weekly speaks to Keeper Security’s leadership on how identity and access management systems are becoming unified identity platforms capable of securing both human and machine identities Continue Reading
By- Aaron Tan, Informa TechTarget
-
Feature
02 Feb 2026
Answers to key questions about AI in IT security
Forrester examines the key factors security leaders and IT decision-makers need to evaluate when considering AI-enabled IT security Continue Reading
By- Allie Mellon
-
News
30 Jan 2026
Home Office announces sweeping police technology plans
The Home Office plans to ramp up its deployment of artificial intelligence and facial-recognition technologies under wide-ranging reforms to UK policing Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
30 Jan 2026
Ex-directors of firm linked to Satoshi Nakamoto imposter sue over whistleblowing retaliation claims
Two former directors of London tech company nChain, associated with a computer scientist who falsely claimed to be bitcoin inventor Satoshi Nakamoto, have told an employment tribunal they were dismissed in retaliation for whistleblowing Continue Reading
By- Bill Goodwin, Investigations Editor
-
Blog Post
30 Jan 2026
The role of AI in cybersecurity
For years, anti-virus tools have used behavioural analysis and machine learning to identify rogue programs and unusual user activity. And as the tools evolved from simple pattern matching machines ... Continue Reading
By- Cliff Saran, Managing Editor
-
News
29 Jan 2026
RAMP ransomware forum goes dark in probable FBI sting
RAMP, an infamous Russian-speaking cyber crime forum, has gone off the air after an apparent US operation Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Jan 2026
Metropolitan Police needs effective constraints on live facial recognition use, court hears
The Metropolitan Police has defended its use of live facial recognition against a legal challenge that claims there are no effective constraints on where it can deploy the technology Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Feature
29 Jan 2026
8 ERP security best practices for modern ERP environments
As supply chain attacks continue, ERP security requires strong authentication, regular patching, monitoring and incident response practices across cloud and on-premises systems. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
News
29 Jan 2026
Security now one of the UK’s fastest-growing career paths
The number of people working in the cyber security field has almost trebled in the 2020s, with one cyber professional for every 68 businesses in the UK Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Jan 2026
Transfer learning and governance help bridge healthcare AI divide
Singapore researchers show how adapting pre-trained AI models can solve data scarcity issues in countries with limited resources. Separately, they have proposed forming an international consortium to build consensus on AI governance in medicine Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
27 Jan 2026
Wave of ShinyHunters vishing attacks spreading fast
The ShinyHunters hacking collective that caused chaos in 2025 is ramping up a new voice phishing campaign, with several potential victims already identified Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Jan 2026
Saudi Arabia ordered to pay £3m to UK dissident targeted with Pegasus spyware
A court has found that the Kingdom of Saudi Arabia subjected a London-based human rights activist to abuse and physical violence after infecting his phone with Pegasus spyware Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
27 Jan 2026
Broken decryptor leaves Sicarii ransomware victims adrift
A coding error in an emergent strain of ransomware leaves victims unable to recover their data, even if they cooperate with the hackers’ demands Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Jan 2026
Three-quarters of UK IT teams beset by outages due to missing alerts
Splunk finds 75% of UK IT teams had outages from missed alerts in 2025, driven by alert fatigue and tool sprawl. Collaboration between cyber and observability teams can help Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
E-Zine
27 Jan 2026
Tech nationalism: The need to build and protect UK digital sovereignty
This week’s edition of the Computer Weekly ezine has a focus on digital sovereignty, as we delve into why the Open Rights Group thinks it is high time the UK government has a formalised strategy, championing homegrown tech providers. The last in our recent run of buyer’s guides also touches on this topic. Elsewhere, we hear from the CISO of online retailer Zalando about how she’s drawing on her career in tech to reshape the firm’s approach to security. Rounding out the ezine, we find out how the adoption of AI is affecting employee autonomy in the workplace. Read the issue now. Continue Reading
-
News
27 Jan 2026
Landmark legal challenge against police facial recognition begins
The High Court will examine whether the Metropolitan Police is acting lawfully with its deployments of live facial recognition, in the UK’s first judicial review of how the technology is being used Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
26 Jan 2026
AI claims are cheap: The challenge is to work out what's real
The Security Think Tank considers what CISOs and buyers need to know to cut through the noise around AI and figure out which AI cyber use cases are worth a look, and which are just hype. Continue Reading
By- Ellie Hurst, Advent IM
-
Blog Post
25 Jan 2026
What is the objective of the Cyber Security and Resilience Bill?
Organisations need to demonstrate not just how much they are spending to improve their security but that they are spending it effectively. They should report annually to regulators on how their ... Continue Reading
By- Philip Virgo, Winsafe Ltd
-
News
23 Jan 2026
US punts renewal of threat data sharing law to September
US lawmakers have extended the Cybersecurity Information Sharing Act of 2015 for another nine months, buying time to enact a replacement for the legislation. Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Jan 2026
Ransomware, reputation, risk: Black Hat Europe in review, 2026 in view
Black Hat Europe made clear that cyber security can no longer be separated from politics, economics and behaviour, as ransomware, AI and long-standing security failures combine Continue Reading
By -
News
23 Jan 2026
Singapore debuts world’s first governance framework for agentic AI
The Infocomm Media Development Authority has released a guide to help enterprises deploy artificial intelligence agents safely and address specific risks such as unauthorised actions and automation bias Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
22 Jan 2026
JPMorgan CEO urges slowdown of AI roll-out to ‘save society’
The rapid proliferation of artificial intelligence will prompt ‘civil unrest’ if governments and companies fail to protect workers from its displacing effects, says JPMorgan boss Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
E-Zine
22 Jan 2026
CW EMEA: Women in Cyber
In this quarter’s issue of CW EMEA, we look at the decision in Sweden to discontinue the use of a machine learning model to identify benefit fraud. The country’s Data Protection Authority became involved in November 2024, when it was revealed that a machine learning system being used by Försäkringskassan, the Swedish Social Insurance Agency, was disproportionally and wrongly flagging certain groups for further investigation over social benefits fraud. We also explore the impact of Women in Cybersecurity Middle East’s partnership with Black Hat MEA. Read the issue now. Continue Reading
-
News
22 Jan 2026
Sportswear firm Under Armour falls victim to data breach
Details of over 70 million customers of US sportswear giant Under Armour were leaked following a supposed ransomware attack by the Everest gang Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Jan 2026
UK government begins trials of digital driving licence
The digital version of the physical driving licence will be made available through an app-based digital wallet, with testing underway before wider roll-out later this year Continue Reading
By- Bryan Glick, Editor in chief
-
News
21 Jan 2026
UK and China reach out across cyber no-man's land
London and Beijing have supposedly conducted high-level talks seeking to establish a joint security forum to help de-escalate potential cyber flashpoints, according to reports Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Jan 2026
AI slop pushes data governance towards zero-trust models
Organisations are implementing zero-trust models for data governance thanks to the proliferation of poor quality AI-generated data, often known as AI slop Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
20 Jan 2026
Why organisations must block AI browsers – for now
AI browsers can improve employee productivity through autonomous workflows, but their security flaws and data leakage risks can expose enterprises to critical cyber threats Continue Reading
By- Dennis Xu
-
News
20 Jan 2026
UK public sector, CNI in Russian hacktivist crosshairs
Hacktivists aligned to the Russian state are ramping up their targeting of UK organisations with denial of service attacks Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Jan 2026
Met claims success for permanent facial recognition in Croydon
Met Police boasts that its permanent deployment of live facial recognition cameras in Croydon has led to more than 100 arrests and prompted a double-digit reduction in local crime, ahead of an upcoming judicial review assessing the technology’s lawfulness Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
E-Zine
20 Jan 2026
How open banking is evolving to unlock finances
In this week’s edition of the Computer Weekly ezine, we take a look at how – eight years after its introduction – the concept of open banking is expanding and evolving, and giving rise to new use cases within financial services. We also sit down with the CTO of Norsk Global and find out how swapping out its legacy VMware estate for Nutanix’s technology has saved it money and helped it shift away from having a reactive IT strategy. Elsewhere in the issue, we find out how agentic AI is shaking up business processes within the enterprise architecture landscape. And in the second of our three buyer’s guide features on digital sovereignty, we find out why this is a topic IT buyers and IT departments need to get a handle on in 2026. Read the issue now. Continue Reading
-
19 Jan 2026
How one IT chief shifted the needle on a reactive IT strategy
In spite of headlines that suggest every business should be ploughing vast sums of money into tech innovation, the reality remains that IT plays a supporting role for most firms. Continue Reading
-
News
19 Jan 2026
UK copyright law unfit for protecting creative workers from AI
As the UK government considers its approach to artificial intelligence and copyright, Computer Weekly explores the dynamics at play in copyright markets, and what measures can be taken to ensure that creatives are protected Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Feature
16 Jan 2026
How enterprise access decisions are starting to show up earlier
As work consolidates in browsers and quick-entry paths, access decisions are shifting to the front door of enterprise systems, often without clear ownership or centralized control. Continue Reading
By- James Alan Miller, Senior Executive Editor
-
News
16 Jan 2026
NSA urges continuous checks to achieve zero trust
The agency leading the US government’s cryptology and cyber security strategies has published its latest zero-trust guidance Continue Reading
By- Cliff Saran, Managing Editor
-
News
15 Jan 2026
Cyber body ISC2 signs on as UK software security ambassador
Professional cyber association ISC2 pledges support to UK government’s Software Security Ambassador scheme, part of the recently unveiled Cyber Action Plan Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Jan 2026
Zoho opens its first UAE datacentres to boost cloud adoption
New Dubai and Abu Dhabi facilities support data sovereignty, providing CIOs with local access to more than 100 Zoho and ManageEngine cloud services Continue Reading
By- Andrea Benito , Computer Weekly
-
News
14 Jan 2026
Texas judge throws out second lawsuit over CrowdStrike outage
A US judge has dismissed a lawsuit filed by CrowdStrike shareholders over the July 2024 outage that caused widespread disruption around the world Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Jan 2026
Microsoft DCU uses UK courts to hunt down cyber criminals
Microsoft has taken down the RedDVS cyber crime-as-a-service network after obtaining a UK court order, marking its first civil legal action outside of the US Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Jan 2026
Nozomi Networks opens APAC headquarters in Singapore
Industrial cyber security firm Nozomi Networks has opened its Singapore headquarters, doubling its regional headcount, and pledging to remain vendor agnostic while targeting the manufacturing and utility sectors Continue Reading
By- Aaron Tan, Informa TechTarget
-
Blog Post
14 Jan 2026
UK government's U-turn on digital ID was inevitable from the start
The UK government’s plans for a national digital identity scheme were never going to be mandatory. That’s not some sort of scoop – although Computer Weekly predicted as much last year - nor is it ... Continue Reading
By- Bryan Glick, Editor in chief
-
News
14 Jan 2026
UK government backtracks on plans for mandatory digital ID
The proposed national digital identity app will no longer be compulsory for conducting right-to-work checks, removing the most contentious and widely criticised element of the scheme Continue Reading
By- Bryan Glick, Editor in chief
-
News
13 Jan 2026
Microsoft patches 112 CVEs on first Patch Tuesday of 2026
January brings a larger-than-of-late Patch Tuesday update out of Redmond, but an uptick in disclosures is often expected at this time of year Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Jan 2026
‘Dual-channel’ attacks are the new face of BEC in 2026
Business email compromise remains a significant threat as cyber fraudsters deploy a more diverse range of tactics against their potential victims, according to a report Continue Reading
By- Alex Scroxton, Security Editor
