IT for charity organisations
Charities have to operate at the lowest cost possible, and that includes the way they use IT. IT managers in the third sector have learned how to deploy cost-effective technology to support the critical work that charities and voluntary organisations do, and their experiences can offer relevant case studies for IT managers in other sectors.
- 
				News
					29 Oct 2025
					
									
										  Scope of US state-level privacy laws expands rapidly in 2025Nine state-level data protection laws have come into force in the US this year, and three more are slated for January 2026. Navigating this complex landscape is becoming a challenge Continue Reading By- Alex Scroxton, Security Editor
 
- 
				Feature
					28 Oct 2025
					
									
										  Pulling the plug: A way to halt a cyber attacker in your network?Rumours of an organisation taking its systems offline during a cyber attack spurred conversation on the consequences of simply pulling the power, or internet access, to stop intruders. We consider the ethics and practicality Continue Reading By
- 
                Feature
                26 May 2025
                  What are the best practices for securing AWS tech stacks?An AWS tech stack can aid business growth and facilitate efficient operations, but misconfigurations have become all too common and stall this progress Continue Reading 
- 
                News
                22 May 2025
                  Microsoft raises posse to target dangerous Lumma malwareMicrosoft, along with a consortium of partners, has seized and disrupted a significant part of the Lumma malware-as-a-service network used to steal data and funds Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                21 May 2025
                  Ransomware attacks dropped by a third last monthReported ransomware attacks eased off during April following a dramatic spike in the first quarter of 2025 Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                16 May 2025
                  Mid-career professionals must learn to understand and use AI as GenAI tips balanceWhether in the finance, IT or legal sectors, artificial intelligence will change the way businesses operate and how their people work Continue Reading By- Karl Flinders, Chief reporter and senior editor EMEA
 
- 
                News
                13 May 2025
                  May Patch Tuesday brings five exploited zero-days to fixMicrosoft fixes five exploited, and two publicly disclosed, zero-days in the fifth Patch Tuesday update of 2025 Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                07 May 2025
                  Oxford Uni adds cyber resilience module to MBA programmeOxford University’s Saïd Business School is working with cyber response specialist Sygnia to help future business leaders get on top of security Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                07 May 2025
                  UK hands Indian IT suppliers competitive boost in trade dealTrade deal will exempt IT workers from India from paying National Insurance contributions for three years Continue Reading By- Karl Flinders, Chief reporter and senior editor EMEA
 
- 
                Feature
                06 May 2025
                  Beyond the hook: How phishing is evolving in the world of AIPhishing attacks are evolving. Gone are the days of clumsy, error-ridden emails that were easy to spot – today’s campaigns harness advanced techniques to bypass even the latest defences. A new approach is needed Continue Reading By
- 
                Opinion
                02 May 2025
                  Security Think Tank: What CISOs can learn from SignalgateA leak of information on American military operations caused a major political incident in March 2025. The Security Think Tank considers what can CISOs can learn from this potentially fatal error. Continue Reading By- Javvad Malik, KnowBe4
 
- 
                Opinion
                01 May 2025
                  Signalgate: Learnings for CISOs securing enterprise dataA leak of information on American military operations caused a major political incident in March 2025. The Security Think Tank considers what CISOs can learn from this potentially fatal error Continue Reading By- Todd Thiemann, Principal Analyst
 
- 
                News
                30 Apr 2025
                  Current SaaS delivery model a risk management nightmare, says CISOJPMorgan Chase security chief Patrick Opet laments the state of SaaS security in an open letter to the industry and calls on software providers to do more to enhance resilience Continue Reading By- Alex Scroxton, Security Editor
 
- 
                29 Apr 2025
                  Interview: Sarah Hawkins, CEO, National Family MediationThe CEO of the not-for-profit talks to Computer Weekly about how the organisation has finally automated referrals, after years of being told it was impossible, and launching its own mediation app Continue Reading 
- 
                E-Zine
                29 Apr 2025
                  Making divorce digitalIn this week’s Computer Weekly, we talk to the CEO of the National Family Mediation charity about its tech overhaul and how divorce is going digital. The government’s One Login digital identity system is under scrutiny over security problems – we examine the issues. And we explain what’s happening in the UK competition watchdog’s investigation into AWS and Microsoft cloud services. Read the issue now. Continue Reading 
- 
                Opinion
                24 Apr 2025
                  Challenges persist as UK’s Cyber Security and Resilience Bill moves forwardElements of the Cyber Security and Resilience Bill are welcome but questions remain about how best to act in the face of persistent challenges like geopolitical chaos, threats to critical infrastructure, and technological advances Continue Reading By- James Morris, CSBR
 
- 
                News
                24 Apr 2025
                  March ransomware slowdown probably a red herringAn apparent slowdown in ransomware attack volumes is raising eyebrows, but the statistics never tell the full story Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Opinion
                23 Apr 2025
                  Rethink authentication to remove the burden on usersThe rise of AI powered threats and non-human identities will push an already strained identity security model over the edge Continue Reading By- Patrick Wardrop, IBM
 
- 
                Opinion
                22 Apr 2025
                  Beyond baselines - getting real about security and resilienceIn an increasingly contested world, the UK government needs a security certification that goes beyond baseline measures. Continue Reading By- Neil Ashdown and Tash Buckley
 
- 
                News
                17 Apr 2025
                  Tariff turmoil is making supply chain security riskierMany businesses around the world are taking the decision to alter their supplier mix in the face of tariff uncertainty, but in doing so are creating more cyber risks for themselves, according to a report Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                16 Apr 2025
                  Saudi Arabia struggling to reach global leadership in deeptechPetrostate monarchy trying to build surrogate industry made of foreign startups because own ecosystem is too immature Continue Reading By- Mark Ballard
 
- 
                News
                15 Apr 2025
                  Hertz warns UK customers of Cleo-linked data breachCar hire giant Hertz reveals UK customer data was affected in a cyber incident orchestrated via a series of vulnerabilities in Cleo managed file transfer products Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                08 Apr 2025
                  Spoofing vuln threatens security of WhatsApp Windows usersMeta has disclosed and patched a potentially dangerous spoofing flaw in WhatsApp for Windows that could have caused big problems for unwitting users Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Opinion
                08 Apr 2025
                  It’s time to stop the victim-blaming and insist on safer softwareBusinesses spend too much time and money protecting themselves against flaws and vulnerabilities in modern software products, when they ought to raise their expectations and insist on better solutions from providers Continue Reading By- Mandy Andress, Elastic
 
- 
                News
                08 Apr 2025
                  Interview: Sarah Hawkins, CEO, National Family MediationThe CEO of the not-for-profit talks to Computer Weekly about how the organisation has finally automated referrals, after years of being told it was impossible, and launching its own mediation app Continue Reading By
- 
                Opinion
                03 Apr 2025
                  Taking a ‘good enough’ approach with cloud security isn't enoughIn the wake of the January 2025 'Codefinger' attacks against AWS S3 users, Thales Rob Elliss argues that many organisations are dropping the ball when it comes to their understanding of cloud security best practice Continue Reading By- Rob Ellis, Thales
 
- 
                News
                03 Apr 2025
                  Virtual reality enterprise journey a marathon, not a sprintIT supplier is using virtual reality in not-for-profit projects that demonstrate its wider potential Continue Reading By- Karl Flinders, Chief reporter and senior editor EMEA
 
- 
                News
                02 Apr 2025
                  UKtech50 2025 – help us find the most influential people in UK ITComputer Weekly’s annual search for the 50 most influential people in UK IT is on – let us know who you would like to nominate for this year's list Continue Reading By
- 
                Opinion
                02 Apr 2025
                  Bridging Borders: The rise of Ukrainian-British tech collaborationThe IT sectors of the UK and Ukraine have built strong relationships since Russia’s invasion of the latter, and there is more to come, writes the IT Ukraine Association’s ambassador in the UK Continue Reading By- Alexandra Govorukha
 
- 
                News
                01 Apr 2025
                  Gmail ‘bubble’ encryption may be an S/MIME killer, says GoogleMarking the 21st anniversary of Gmail, Google is preparing to roll out an end-to-end encryption standard for its email service in hopes of democratising encryption and leaving old standards in the dust Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Opinion
                28 Mar 2025
                  Countering nation-state cyber espionage: A CISO field guideThe rise of DeepSeek has prompted the usual well-documented concerns around AI, but also raised worries about its potential links to the Chinese state. The Security Think Tank considers the steps security leaders can take to counter threats posed by nation state industrial espionage? Continue Reading By- Andrew Hodges, Quorum Cyber
 
- 
                News
                21 Mar 2025
                  NCSC, DSIT enlist IBM to spearhead cyber diversity agendaIBM signs on to a partnership deal in support of the popular NCSC CyberFirst Girls scheme designed to foster gender diversity in the cyber security profession Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                21 Mar 2025
                  Dutch workforce faces radical transformation as AI adoption acceleratesWhile the Netherlands leads Europe in AI adoption, a deeper analysis of the labour market reveals a more nuanced narrative than the apocalyptic predictions of job losses Continue Reading By- Kim Loohuis
 
- 
                News
                20 Mar 2025
                  NCSC proposes three-step plan to move to quantum-safe encryptionThe NCSC urges service providers, large organisations and critical sectors to start thinking today about how they will migrate to post-quantum cryptography over the next decade Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                19 Mar 2025
                  Clop resurgence drives ransomware attacks in FebruaryThe exploitation of two new vulnerabilities in a popular file transfer service saw the Clop ransomware gang soar in February, according to NCC Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Opinion
                14 Mar 2025
                  How CISOs can counter the threat of nation state espionageThe rise of DeepSeek has prompted the usual well-documented concerns around AI, but also raised worries about its potential links to the Chinese state. The Security Think Tank considers the steps security leaders can take to counter threats posed by nation state industrial espionage? Continue Reading By- Elisabeth Mackay, PA Consulting
 
- 
                News
                13 Mar 2025
                  SuperBlack ransomware may have ties to LockBitForescout researchers report on a new ransomware gang that appears to be keeping the legacy of the notorious LockBit crew alive Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                11 Mar 2025
                  March Patch Tuesday brings 57 fixes, multiple zero-daysThe third Patch Tuesday of 2025 brings fixes for 57 flaws and a hefty number of zero-days Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                11 Mar 2025
                  Perimeter security appliances source of most ransomware hitsPerimeter security appliances and devices, particularly VPNs, prove to be the most popular entry points into victim networks for financially motivated ransomware gangs, according to reports Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Feature
                06 Mar 2025
                  Norway says ‘no way’ to global financial crimeOslo’s startup ecosystem is fighting back against cyber criminals with tech to wipe out attacks rather than just detect them Continue Reading 
- 
                News
                06 Mar 2025
                  CFIT publishes blueprint for digital company business IDsPlan to increase the use of digital identities by businesses could add billions of pounds to UK economy through compliance savings and reduced fraud Continue Reading By- Karl Flinders, Chief reporter and senior editor EMEA
 
- 
                Opinion
                27 Feb 2025
                  Secure software: Third-party suppliers your first-party riskOutgoing CISA chief Jen Easterly called on buyers to demand better security standards from their software suppliers. The Security Think Tank considers what better means, and what best practice for secure software procurement looks like in 2025 Continue Reading By- Ejona Preci, Lindal Group
 
- 
                News
                27 Feb 2025
                  CVE volumes head towards 50,000 in 2025, analysts claimMany trends, notably a big shift to open source tools, are behind an expected boom in the number of disclosed vulnerabilities Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                26 Feb 2025
                  CISOs spending more on insider riskInsider risk management budgets have more than doubled in the past 12 months and look set to grow further still in 2025, according to a report Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                21 Feb 2025
                  A landscape forever altered? The LockBit takedown one year onThe NCA-led takedown of the LockBit ransomware gang in February 2024 heralded a transformative year in the fight against cyber crime. One year on, we look back at Operation Cronos and its impact Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                18 Feb 2025
                  Meta’s planned subsea cable will exceed circumference of Earth and support AI innovationMeta’s planned 50,000 km subsea cable will be the world’s longest and connect the five major continents Continue Reading By- Karl Flinders, Chief reporter and senior editor EMEA
 
- 
                News
                14 Feb 2025
                  Gartner: CISOs struggling to balance security, business objectivesOnly 14% of security leaders can ‘effectively secure organisational data assets while also enabling the use of data to achieve business objectives’, according to Gartner Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                14 Feb 2025
                  Government launches consultation on plan to streamline business through e-invoicingGovernment announces 12-week consultation on electronic invoicing as part of its plan for change Continue Reading By- Karl Flinders, Chief reporter and senior editor EMEA
 
- 
                News
                12 Feb 2025
                  Cisco Live EMEA: Network supplier tightens AI embraceAt its annual EMEA show, Cisco tech leadership unveiled a raft of new products, services and features designed to help customers do more with artificial intelligence Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                07 Feb 2025
                  US lawmakers move to ban DeepSeek AI toolUS politicians have introduced a bill seeking to ban the use of the DeepSeek AI tool on government-owned devices, citing national security concerns due to its alleged links to the Chinese state Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                07 Feb 2025
                  Ransomware payment value fell over 30% in 2024Several factors, including the impact of law enforcement operations disrupting cyber criminal gangs and better preparedness among users, may be behind a significant drop in the total value of ransomware payments Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Feature
                07 Feb 2025
                  Self-healing networks: The next evolution in network managementThe age of AI is highlighting the security risks and pitfalls of traditional network management techniques. Self-healing networks may offer a solution that not only bolsters security, but makes IT and network teams more efficient Continue Reading By
- 
                News
                06 Feb 2025
                  UK’s Cyber Monitoring Centre begins incident classification workThe Cyber Monitoring Centre will work to categorise major incidents against a newly developed scale to help organisations better understand the nature of systemic cyber attacks and learn from their impact Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Opinion
                04 Feb 2025
                  “Unsafe At Any Speed”. Comparing automobiles to code riskOutgoing CISA chief Jen Easterly called on buyers to demand better security standards from their software suppliers. The Security Think Tank considers what better means, and what best practice for secure software procurement looks like in 2025. Continue Reading By- Tyler Shields, Omdia
 
- 
                Opinion
                03 Feb 2025
                  Vigilant buyers are the best recipe for accountable suppliersIn January 2025, outgoing CISA chief Jen Easterly called on IT buyers to demand better security standards from their software suppliers. The Security Think Tank considers what better means, and what does best practice for secure software procurement looks like in 2025. Continue Reading By- Aditya K Sood, Aryaka
 
- 
                News
                29 Jan 2025
                  Vallance rejects latest charge to reform UK hacking lawsScience minister Patrick Vallance rejects proposed amendments to the Computer Misuse Act, arguing that they could create a loophole for cyber criminals to exploit Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Opinion
                28 Jan 2025
                  Your first steps to improve international complianceThe Computer Weekly Security Think Tank considers how security leaders should best navigate the multitude of new national and multinational regulations affecting their work, and ensure their organisations remain compliant and protected Continue Reading By
- 
                News
                27 Jan 2025
                  Cyber incident that closed British Museum was inside jobAn IT incident that disrupted visitor access to the British Museum last week was the work of a disgruntled contractor who had been let go Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                22 Jan 2025
                  Privacy professionals expect budget cuts, lack confidenceOver 50% of privacy professionals in Europe expect to see less money earmarked for data security initiatives in 2025, and many don’t have faith their organisations are taking the issue seriously, according to an ISACA report Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                22 Jan 2025
                  Funksec gang turned up ransomware heat in DecemberThe criminal ransomware fraternity was hard at work over the festive period, with attack volumes rising and a new threat actor emerging on the scene Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Opinion
                17 Jan 2025
                  Cyber innovation to address rising regulatory, threat burdenThe Computer Weekly Security Think Tank considers how security leaders should best navigate the multitude of new national and multinational regulations affecting their work, and ensure their organisations remain compliant and protected Continue Reading By- Nick New, Optalysys
 
- 
                News
                15 Jan 2025
                  Biggest Patch Tuesday in years sees Microsoft address 159 vulnerabilitiesThe largest Patch Tuesday of the 2020s so far brings fixes for more than 150 CVEs ranging widely in their scope and severity – including eight zero-day flaws Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Opinion
                13 Jan 2025
                  Why we need better cyber regulation to protect the UK from disruptionThe Computer Weekly Security Think Tank considers how security leaders should best navigate the multitude of new national and multinational regulations affecting their work, and ensure their organisations remain compliant and protected. Continue Reading By- Adam Stringer, PA Consulting
 
- 
                News
                10 Jan 2025
                  Mandiant: Latest Ivanti vulns exploited by Chinese cyber spooksThreat actors are once again lining up to exploit vulnerabilities in the widely used Ivanti product suite, with an apparent link to Chinese espionage activity Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Opinion
                07 Jan 2025
                  Why CISOs should build stronger bonds with the legal function in 2025The Computer Weekly Security Think Tank considers how security leaders should best navigate the multitude of new national and multinational regulations affecting their work, and ensure their organisations remain compliant and protected. Continue Reading By- Mandy Andress, Elastic
 
- 
                News
                03 Jan 2025
                  US Treasury incident a clear warning on supply chain security in 2025A cyber incident at the US Department of the Treasury – blamed on a Chinese state actor – raises fresh warnings about supply chain risk after it was found to have originated via vulnerabilities in a remote tech support product Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                19 Dec 2024
                  LockBit ransomware gang teases February 2025 returnAn individual associated with the LockBit ransomware gang has broken cover to tease details of a new phase of the cyber criminal operation's activity, which they claim is set to begin in February 2025 Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                19 Dec 2024
                  Latest attempt to override UK’s outdated hacking law stallsAmendments to the Data Bill that would have given the UK cyber industry a boost by updating restrictive elements of the Computer Misuse Act have failed to progress beyond a Lords committee Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Opinion
                19 Dec 2024
                  Innovation, insight and influence: the CISO playbook for 2025 and beyondFrom Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading By- Mandy Andress, Elastic
 
- 
                News
                18 Dec 2024
                  The Security Interviews: Martin Lee, Cisco TalosThreat intel expert and author Martin Lee, EMEA technical lead for security research at Cisco Talos, joins Computer Weekly to mark the 35th anniversary of the first ever ransomware attack Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                18 Dec 2024
                  Top 10 cyber security stories of 2024Data breaches, data privacy and protection, and the thorny issue of open source security were all hot topics this year. Meanwhile, security companies frequently found themselves hitting the headlines, and not always for good reasons. Here are Computer Weekly's top 10 cyber security stories of 2024 Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Opinion
                18 Dec 2024
                  Look to the future: How the threat landscape may evolve nextFrom Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading By- Elliott Wilkes, ACDS
 
- 
                News
                18 Dec 2024
                  Top 10 cyber crime stories of 2024From ransomware targeting the NHS to nation-state-backed intrusions, 2024 was another big year for cyber criminals and cyber spooks alike, but they didn't have it all their own way as the good guys fought back Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Opinion
                17 Dec 2024
                  2025-30: Geopolitical influence on cyber and the convergence of threatFrom Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading By- Rob Dartnall, SecAlliance
 
- 
                Opinion
                17 Dec 2024
                  Using AI to build stronger client relationships in 2025On the Twelfth Day of AI, we explore the key benefits of Copilot, the potential risks, barriers to adoption, and strategies for ensuring successful implementation. Continue Reading By- Josie Rickerd, ANS
 
- 
                News
                16 Dec 2024
                  Top 10 IT leadership interviews of 2024The top technology leaders talk to Computer Weekly to discuss the challenges they face and the strategies, solutions and successes they are delivering Continue Reading By- Computer Weekly staff
 
- 
                Opinion
                13 Dec 2024
                  Decoding the end of the decade: What CISOs should watch out forFrom Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading By- Paul Lewis, Nominet
 
- 
                Opinion
                13 Dec 2024
                  Decking the halls with AI: the evolution of managed servicesOn the Tenth Day of AI, we explore the evolving role of AI in managed services and what to expect in 2025. Continue Reading By- Ben Clarke, ANS
 
- 
                News
                13 Dec 2024
                  Computer Misuse Act reform gains traction in ParliamentAn amendment to the proposed Data (Access and Use) Bill that will right a 35-year-old wrong and protect security professionals from criminalisation is to be debated at Westminster Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                12 Dec 2024
                  Emerging Ymir ransomware heralds more coordinated threats in 2025A newly observed ransomware strain has the community talking about more collaboration, and blurred lines, between threat groups next year, according to NCC’s monthly cyber barometer Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Opinion
                12 Dec 2024
                  Data: The reindeer pulling AI's sleighOn the Ninth Day of AI, we explore the critical role data plays in AI implementation and the key steps business leaders must take to prepare their data for a successful AI future. Continue Reading By- Martin Brierly, ANS
 
- 
                Opinion
                11 Dec 2024
                  Happy New Year: Three steps to maximise AI’s ROI in 2025On the Eighth Day of AI, we explore the key considerations and strategic frameworks essential for extracting maximum value from AI projects. Continue Reading By- Robert Cottrill, ANS
 
- 
                News
                10 Dec 2024
                  Dangerous CLFS and LDAP flaws stand out on Patch TuesdayMicrosoft has fixed over 70 CVEs in its final Patch Tuesday update of the year, and defenders should prioritise a zero-day in the Common Log File System Driver, and another impactful flaw in the Lightweight Directory Access Protocol Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                10 Dec 2024
                  iOS vuln leaves user data dangerously exposedJamf threat researchers detail an exploit chain for a recently patched iOS vulnerability that enables a threat actor to steal sensitive data, warning that many organisations are still neglecting mobile updates Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Opinion
                10 Dec 2024
                  Defending against cyber grinches: AI for enhanced securityOn the Seventh Day of AI, Defending against cyber grinches: AI for enhanced security, we explore the double-edged sword of AI in cybersecurity and how businesses can protect themselves against the cyber grinches. Continue Reading By- Justin Young, ANS
 
- 
                Opinion
                09 Dec 2024
                  In 2025: Identities conquer, and hopefully uniteFrom Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading By- Stephen McDermid, Okta
 
- 
                Opinion
                09 Dec 2024
                  AI and cloud: The perfect pair to scale your business in 2025On the Sixth Day of AI, we explore how leveraging AI and cloud can enhance business performance and shares tips for successful implementation. Continue Reading By- Matt Gallagher, ANS
 
- 
                Opinion
                06 Dec 2024
                  Six trends that will define cyber through to 2030From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading By- Pierre-Martin Tardif, ISACA
 
- 
                Opinion
                06 Dec 2024
                  How AI can help you attract, engage and retain the best talent in 2025On the Fifth Day of AI, we explore how AI is reshaping HR – boosting productivity, addressing concerns, and preparing organisations for the future. Continue Reading By- Toria Walters, ANS
 
- 
                Opinion
                05 Dec 2024
                  Are you on the naughty or nice list for responsible AI adoption?On the Fourth Day of AI, we discuss the value of adopting AI responsibly, and outlines how businesses can build responsible adoption into their plans Continue Reading By- Kyle Hill, ANS
 
- 
                Opinion
                04 Dec 2024
                  The most pressing challenges for CISOs and cyber security teamsFrom Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading By- Elliot Rose, PA Consulting
 
- 
                Opinion
                04 Dec 2024
                  2025: The year of AI for business - top trends to watch out forOn the Third Day of AI, we explore some of the key trends to keep an eye on, and prepare for, in 2025 Continue Reading By- Chris Huntingford, ANS
 
- 
                Opinion
                03 Dec 2024
                  All businesses want for Christmas is a clear definition of AIOn the second of the 12 Days of AI, we look at the importance of truly understanding what AI is to enable true organisational transformation. Continue Reading By- Janet Robb, ANS
 
- 
                News
                02 Dec 2024
                  NCSC boss calls for ‘sustained vigilance’ in an aggressive worldNCSC CEO Richard Horne is to echo wider warnings about the growing number and severity of cyber threats facing the UK as he launches the security body’s eighth annual report Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Opinion
                02 Dec 2024
                  CISOs will face growing challenges in 2025 and beyondFrom Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading By- Mike Gillespie and Ellie Hurst, Advent IM
 
- 
                Opinion
                02 Dec 2024
                  Unwrapping the benefits of AI for marketingIn the first of a new series of articles, the 12 Days of AI, we explore how AI is being used in marketing, the benefits and key use cases, as well as concerns and how marketers can best take advantage of AI Continue Reading By- Sophie Rea, ANS
 
- 
                Feature
                29 Nov 2024
                  Automated patch management: A proactive way to stay ahead of threatsTimely patch management should be crucial in any organisation, but too often it goes by the wayside. Automating the process may offer a path forward for hard-pressed cyber defenders Continue Reading By
- 
                Opinion
                27 Nov 2024
                  In the cloud, effective IAM should align to zero-trust principlesThe Security Think Tank considers best practices in identity and access management and how can they be deployed to enable IT departments to combat cyber-attacks, phishing attacks and ransomware Continue Reading By- Vladimir Jirasek, Foresight Cyber
 
- 
                News
                26 Nov 2024
                  Russian threat actors poised to cripple power grid, UK warnsUK government escalates cyber rhetoric in a speech at a Nato event, saying Russian advanced persistent threats stand ready to conduct cyber attacks that could ‘turn off the lights for millions’ Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                25 Nov 2024
                  Microsoft calls on Trump to ‘push harder’ on cyber threatsMicrosoft’s Brad Smith urges president-elect Donald Trump to keep the faith when it comes to fighting back against hostile cyber actors from China, Iran and Russia Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                25 Nov 2024
                  Geopolitical strife drives increased ransomware activityThe lines between financially motivated cyber criminals and nation state APTs are rapidly blurring, as geopolitical influences weigh heavily on the threat landscape, according to data from NCC Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                21 Nov 2024
                  BianLian cyber gang drops encryption-based ransomwareThe Australian and American cyber authorities have published updated intelligence on the BianLian ransomware gang, which has undergone a rapid evolution in tactics Continue Reading By- Alex Scroxton, Security Editor
 

 
		