IT for manufacturing
Manufacturing is an increasingly IT-intensive industry, as FMCG and consumer goods makers try to understand what consumers want and use information and technology to underpin their business strategies. Analysis of how manufacturers and construction firms use IT to operate cost-effectively and at maximum efficiency holds lessons for IT managers in any sector.
- 
				News
					29 Oct 2025
					
									
										  Scope of US state-level privacy laws expands rapidly in 2025Nine state-level data protection laws have come into force in the US this year, and three more are slated for January 2026. Navigating this complex landscape is becoming a challenge Continue Reading By- Alex Scroxton, Security Editor
 
- 
				Feature
					28 Oct 2025
					
									
										  Pulling the plug: A way to halt a cyber attacker in your network?Rumours of an organisation taking its systems offline during a cyber attack spurred conversation on the consequences of simply pulling the power, or internet access, to stop intruders. We consider the ethics and practicality Continue Reading By
- 
                News
                27 Oct 2025
                  LockBit 5.0 expands targeting amid ransomware escalationThe LockBit RaaS operation is back in action, with technical features and expanded targeting, and is contributing to a steadily growing number of ransomware attacks Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                24 Oct 2025
                  UK ramps up ransomware fightback with supply chain security guideMultinational guidance, developed by the UK and Singapore, is designed to help organisations reinforce their supply chain against ransomware attacks Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Opinion
                23 Oct 2025
                  The US government shutdown is a wake-up call for cyber self-relianceAs the US government shutdown heads towards a second month, could the disruption to cyber security programmes be the impetus end-users need to pull themselves up by their own bootstraps? Continue Reading By- John Paul Cunningham, Silverfort Inc
 
- 
                News
                22 Oct 2025
                  Jaguar Land Rover attack to cost UK £1.9bn, say cyber monitorsThe UK's Cyber Monitoring Centre calculates the overall cost of the Jaguar Land Rover cyber attack will be almost two billion pounds Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                20 Oct 2025
                  The Netherlands faces €12bn R&D investment gap as productivity stagnatesDutch government unveils nine-point plan to meet European 3% GDP target after its competitiveness ranking plummeted Continue Reading By- Kim Loohuis
 
- 
                News
                15 Oct 2025
                  India’s biggest IT firm to create 5,000 UK jobsIndian IT giant will increase its UK-based workforce by thousands over the next three years Continue Reading By- Karl Flinders, Chief reporter and senior editor EMEA
 
- 
                News
                15 Oct 2025
                  AI will create a better world, says Oracle’s EllisonOracle ramped up its plans to lead in all things AI on the opening day of its renamed customer event, AI World, with founder Larry Ellison emphasising AI’s transformative potential Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Opinion
                10 Oct 2025
                  Beyond the refresh: Your cyber strategy must include AI PCsViewing a PC refresh as part of security strategy helps build a more resilient and productive enterprise and is an opportunity to move beyond tactical upgrades to adopt a security-first hardware strategy for the AI era. Continue Reading By- Louise Quennell, Dell Technologies
 
- 
                News
                09 Oct 2025
                  Warlock ransomware may be linked to Chinese stateThe operators of Warlock ransomware who exploited a set of SharePoint Server vulnerabilities earlier this year likely have some kind of link to the Chinese government, researchers claim Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                08 Oct 2025
                  Qilin gang claims cyber attack on Japanese brewing giantThe Qilin ransomware gang has claimed responsibility for a cyber attack that has halted brewing at Asahi Group Holdings, causing Japanese retailers to run low on beer Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                08 Oct 2025
                  Interview: Fausto Fleites, vice-president of data intelligence, ScottsMiracle-GroThe data leader’s hands-on experience with machine learning has helped to build a three-part strategy to maximise the benefits of AI at the gardening specialist Continue Reading By
- 
                Opinion
                07 Oct 2025
                  Why it takes 11 hours to resolve one ID-related cyber incidentA recent ESG study revealed it takes an average of 11 hours for enterprises to resolve a single identity-related security incident. How did we get here, and what do we need to do differently? Continue Reading By- Ev Kontsevoy, Teleport
 
- 
                News
                07 Oct 2025
                  Alert over Medusa ransomware attacks targeting Fortra MFTMicrosoft warns it is seeing potential mass exploitation of a Fortra GoAnywhere vulnerability by a threat actor linked to the Medusa ransomware-as-a-service operation. Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                07 Oct 2025
                  The Security Interviews: David Bradbury, CSO, OktaOkta’s chief security officer talks security by default and explains why he thinks time is running out for the shared responsibility model Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Opinion
                07 Oct 2025
                  Building resilience in the cloud: Bridging SLA gaps and mitigating riskThe Computer Weekly Security Think Tank considers how security leaders can help assure access to the new and innovative cloud tech while minimising risk and ensuring they do not fall foul of regulators. Continue Reading By- Vaibhav Dutta, Tata Communications
 
- 
                News
                03 Oct 2025
                  Interview: Sacha Vaughan, chief supply chain officer, Joseph JosephAs the houseware maker’s supply chain is being transformed for the digital age, its leader explains why technology knowledge is critical to her job Continue Reading By
- 
                News
                01 Oct 2025
                  US government shutdown stalls cyber intel sharingA key US law covering cyber security intelligence sharing has expired without an extension or replacement amid a total shutdown of the federal government, putting global security collaboration at risk. Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                30 Sep 2025
                  MPs press outsourcer TCS over Jaguar cyber attackThe government’s cross-bench Business and Trade Committee has written to Tata Consultancy Services seeking answers over possible links to cyber attacks on Jaguar Land Rover, Marks and Spencer, and Co-op Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                30 Sep 2025
                  Apple’s first iOS 26 security update fixes memory corruption flawApple issues an update for its brand new iOS 26 mobile operating system, fixing a potentially dangerous vulnerability affecting iPhones, iPads and other Mac devices Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                29 Sep 2025
                  UK and US urge Cisco users to ditch end-of-life security appliancesAn ongoing campaign of cyber attacks is targeting users of end-of-life Cisco security appliance kit Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                29 Sep 2025
                  JLR tentatively restarts production, following £1.5bn government backingJaguar Land Rover is to resume car production after a £1.5bn government loan guarantee amid its cyber attack fallout. Debate is growing over the bailout and insurance Continue Reading By- Brian McKenna, Enterprise Applications Editor
 
- 
                Opinion
                29 Sep 2025
                  Why SLA gaps should not hinder cloud innovationThe Computer Weekly Security Think Tank considers how security leaders can help assure access to the new and innovative cloud tech while minimising risk and ensuring they do not fall foul of regulators. Continue Reading By- Ashley Barker and Irfan Ahmed, PA Consulting
 
- 
                News
                26 Sep 2025
                  Over half of India-based companies suffer security breachesBusiness supply chains, which include Indian companies, are at risk of attack as more than half of suppliers were breached last year Continue Reading By- Karl Flinders, Chief reporter and senior editor EMEA
 
- 
                News
                26 Sep 2025
                  Okta CEO: AI security and identity security are one and the sameAt Oktane 2025 in Las Vegas, Okta CEO Todd McKinnon describes AI security and identity security as inseparable as he tees up a series of agentic security innovations Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                25 Sep 2025
                  Government might support Jaguar Land Rover supply chain to mitigate cyber attack impactThe government is considering buying car parts from JLR’s supply chain to sell them on to the company once it recovers from the August cyber attack Continue Reading By- Brian McKenna, Enterprise Applications Editor
 
- 
                News
                25 Sep 2025
                  Netherlands establishes cyber resilience network to strengthen public-private digital defenceNetwork will connect organisations in a cyber crime defence initiative that goes way beyond information sharing Continue Reading By- Kim Loohuis
 
- 
                News
                24 Sep 2025
                  Oktane 2025: Okta takes aim at agentic AI governance gapIdentity specialist Okta is laying the groundwork for a number of incoming announcements designed to help its customers get to grips with the challenge of securing non-human, agentic identities. Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Opinion
                23 Sep 2025
                  Rethinking identity in the age of AI impersonationTrust in business has long hinged on human instincts but with the advent of deepfakes, it is becoming dangerous to assume too much. Continue Reading By- Akif Khan, Gartner
 
- 
                News
                23 Sep 2025
                  Jaguar Land Rover extends cyber attack-induced shutdown to OctoberJaguar Land Rover is extending its production shutdown caused by the 31 August cyber attack into next month, as government ministers drop by and supply chain workers lose wages Continue Reading By- Brian McKenna, Enterprise Applications Editor
 
- 
                News
                19 Sep 2025
                  Government meets with car parts suppliers amid JLR cyber crisisGovernment officials have met with the Society of Motor Manufacturers and Traders to discuss the challenges they are facing amid disrupted production at Jaguar Land Rover Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                19 Sep 2025
                  UK cyber action plan lays out path to resilienceA report produced for the government by academics at Imperial College London and the University of Bristol sets out nine recommendations to strengthen the UK’s cyber sector Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Feature
                18 Sep 2025
                  Are AI agents a blessing or a curse for cyber security?Agentic AI is touted as a helpful tool for managing tasks, and cyber criminals are already taking advantage. Should information security teams look to AI agents to keep up? Continue Reading By
- 
                News
                17 Sep 2025
                  Microsoft scores win against Office 365 credential thievesMicrosoft’s Digital Crimes Unit disrupts a major phishing-as-a-service operation that targeted and stole Office 365 usernames and credentials Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                17 Sep 2025
                  NCC: How RaaS team-ups help Scattered Spider enhance its attacksScattered Spider’s alliances with ransomware-as-a-service gangs act as a force multiplier for the scope, and number, of its cyber attacks, according to NCC Group analysts Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                16 Sep 2025
                  Jaguar Land Rover extends production shutdown for another weekJaguar Land Rover says that vehicle production will remain suspended in the wake of a cyber attack, while the hackers allegedly responsible claim they are retiring from a life of crime Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Opinion
                16 Sep 2025
                  Cyber leaders must make better use of risk expertsThe Computer Weekly Security Think Tank considers how security leaders can help assure access to the new and innovative cloud tech while minimising risk and ensuring they do not fall foul of regulators. Continue Reading By- Ellie Hurst, Advent IM
- Mike Gillespie
 
- 
                News
                16 Sep 2025
                  Turkish state tightens grip on commsTurkish subscriptions to fixed broadband were the lowest in Europe in 2024 and half as common as those in more developed countries Continue Reading By- Mark Ballard
 
- 
                News
                10 Sep 2025
                  Splunk.conf: Cisco and Splunk expand agentic SOC visionThe arrival of agentic AI in the security operations centre heralds an era of simplification for security professionals, Splunk claims Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                10 Sep 2025
                  Jaguar Land Rover admits data has been compromised in cyber attackThe car maker revealed that data was stolen in the cyber attack that began on 31 August, as its production line continues to be affected Continue Reading By- Brian McKenna, Enterprise Applications Editor
 
- 
                Feature
                10 Sep 2025
                  Quantum startups fear EU too slow to leadEurope’s bid to win the race to build viable quantum computers wants details, money and confidence of the industry it is intended to serve Continue Reading By- Mark Ballard
 
- 
                News
                09 Sep 2025
                  Splunk.conf: Splunk urges users to eat their ‘cyber veggies’The dawn of AI-enabled cyber attacks makes it even more important for defenders to bring their A-game, particularly when it comes to getting the basics right Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Opinion
                09 Sep 2025
                  Lessons from Jaguar Land Rover: How can businesses prepare for cyber attacks?A cyber attack at Jaguar Land Rover has halted production lines and caused widespread disruption. How can businesses protect themselves and mitigate the risks of such an attack? Continue Reading By- Dominic Holden
 
- 
                News
                05 Sep 2025
                  US politicians ponder Wimwig cyber intel sharing lawUS cyber data sharing legislation is set to replace an Obama-era law, but time is running out to get it over the line, with global ramifications for the security industry, and intelligence and law enforcement communities Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                05 Sep 2025
                  Jaguar Land Rover cyber attack keeps workers at homeThe recent cyber attack on Jaguar Land Rover is keeping workers out of the plants as possible attack group identity becomes public Continue Reading By- Brian McKenna, Enterprise Applications Editor
 
- 
                Opinion
                05 Sep 2025
                  SLA promises, security realities: Navigating the shared responsibility gapThe Computer Weekly Security Think Tank considers how security leaders can help assure access to the new and innovative cloud tech while minimising risk and ensuring they do not fall foul of regulators. Continue Reading By- Aditya K Sood, Aryaka
 
- 
                Opinion
                03 Sep 2025
                  Bridging the SLA gap: A guide to managing cloud provider riskThe Computer Weekly Security Think Tank considers how security leaders can help assure access to the new and innovative cloud tech while minimising risk and ensuring they do not fall foul of regulators. Continue Reading By- John Bruce, Quorum Cyber
 
- 
                News
                02 Sep 2025
                  Cyber attackers damage Jaguar Land Rover productionJaguar Land Rover reports a cyber attack has ‘severely disrupted’ its vehicle production and retail operations, recalling similar attacks on other prominent British brands this year Continue Reading By- Brian McKenna, Enterprise Applications Editor
 
- 
                News
                28 Aug 2025
                  UK cyber security centre helps expose China-based cyber campaignGCHQ cyber security centre and its international partners release details of malicious cyber activity linked to Chinese businesses Continue Reading By- Karl Flinders, Chief reporter and senior editor EMEA
 
- 
                News
                27 Aug 2025
                  Incident response planning cuts the risk of claiming on cyber security insuranceProper attention to incident response planning is emerging as a core cyber control when it comes to reducing the risk of having to claim on cyber security insurance, according to a report Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                27 Aug 2025
                  Ransomware activity levelled off in July, says NCCRansomware levels held steady in the month of July, although the risk remained as persistent as ever Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                26 Aug 2025
                  Three new Citrix NetScaler zero-days under active exploitationCitrix patches three new vulnerabilities in its NetScaler lines warning of active zero-day exploitation by an undisclosed threat actor Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                26 Aug 2025
                  Okta makes AI identity play with Axiom acquisitionOkta says Axiom Security’s technology will reinforce its own offerings in privileged access management, especially when it comes to the growing number of non-human identities Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                25 Aug 2025
                  Ransomware attack volumes up nearly three times on 2024During the first six months of 2025, the number of observed and tracked ransomware attacks far outpaced the volume seen in 2024 Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                21 Aug 2025
                  Moscow exploiting seven-year-old Cisco flaw, says FBIUS authorities warn of an uptick in state-sponsored exploitation of a seven-year-old vulnerability in Cisco's operating system software Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                21 Aug 2025
                  Apple iOS update fixes new iPhone zero-day flawLatest Apple zero-day found in the ImageIO framework opens the door for targeted zero-click attacks on iPhone users Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                20 Aug 2025
                  Microsoft starts including PQC algorithms in cyber foundationsMicrosoft updates on its post-quantum cyber strategy as it continues integrating quantum-safe algorithms into some of the core foundations underpinning its products and services Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                20 Aug 2025
                  Commvault users told to patch two RCE exploit chainsStorage firm Commvault fixes four vulnerabilities that, when combined, create a pair of RCE exploit chains that could be used to target on-premise customers with ransomware and other nasties Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                19 Aug 2025
                  Google spins up agentic SOC to speed up incident managementGoogle Cloud elaborates on its vision for securing artificial intelligence unveiling new protections and capabilities across its product suite Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                19 Aug 2025
                  Interview: Differentiating with AI in pet careWe speak to Mars Pet Nutrition’s head of digital innovation about making artificial intelligence relevant across its brands to support pet health Continue Reading By- Cliff Saran, Managing Editor
 
- 
                News
                18 Aug 2025
                  Workday hit in wave of social engineering attacksA campaign of voice-based social engineering attacks targeting users of Salesforce’s services appears to have struck HR platform Workday Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Feature
                15 Aug 2025
                  Would you hire a hacker?At a time when cyber security breaches are on the up and skills remain in short supply, security experts believe we may be missing a trick by overlooking unconventional sources of talent Continue Reading By
- 
                News
                15 Aug 2025
                  UK cyber leaders feel impact of Trump cutbacksThe ripple effects of US cyber security cutbacks have reached this side of the Atlantic, according to a report Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Opinion
                15 Aug 2025
                  Teen hackers aren't the problem. They're the wake-up callIf we take the time to build the right pathways into cyber, young people could be our best line of defence. Continue Reading By- Fergus Hay, The Hacking Games
 
- 
                Podcast
                13 Aug 2025
                  AI in pet health: A Computer Weekly Downtime Upload podcastWe speak to Mars Pet Nutrition’s head of digital innovation, Kate Balingit, about using computer vision with smartphone photos to assess pet health Continue Reading By- Cliff Saran, Managing Editor
 
- 
                News
                12 Aug 2025
                  Eight critical RCE flaws make Microsoft’s latest Patch Tuesday listMicrosoft rolls out fixes for over 100 CVEs in its August Patch Tuesday update Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                12 Aug 2025
                  Researchers firm up ShinyHunters, Scattered Spider linkReliaQuest researchers present new evidence that firms up a potential link, or outright partnership, between the ShinyHunters and Scattered Spider cyber gangs Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                12 Aug 2025
                  UK work visa sponsors are target of phishing campaignMimecast identifies a phishing campaign targeting UK organisations that sponsor migrant workers and students, opening the door to account compromise and visa fraud Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Opinion
                12 Aug 2025
                  What boards should look for in a CISOThe role of the chief information security officer has evolved dramatically over the years – and will continue to do so. What should boards really looking for when hiring a security leader in 2025? Continue Reading By- Rinki Sethi, Upwind Security
 
- 
                Feature
                11 Aug 2025
                  ShinyHunters Salesforce cyber attacks explained: What you need to knowComputer Weekly gets under the skin of an ongoing wave of ShinyHunters cyber attacks orchestrated via social engineering against Salesforce users Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Opinion
                11 Aug 2025
                  How CISOs can adapt cyber strategies for the age of AITraditional security measures may not be able to cope with the AI reality. In order to safeguard enterprise operations, reputation and data integrity in an AI-first world, security leaders need to rethink. Continue Reading By- Martin Riley, Bridewell Consulting
 
- 
                News
                06 Aug 2025
                  Black Hat USA: Startup breaks secrets management toolsResearchers at Cyata, an agentic identity specialist that has just emerged from stealth, found 14 CVEs in the widely used CyberArk Conjur and HashiCorp Vault enterprise secrets management platforms Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                06 Aug 2025
                  Cyber criminals would prefer businesses don’t use OktaOkta details a phishing campaign in which the threat actor demonstrated some unusually strong opinions on what authentication methods they would like their targets to use Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                05 Aug 2025
                  Attacker could defeat Dell firmware flaws with a vegetableCisco Talos discloses five vulnerabilities in cyber security firmware used on Dell Latitude and Precision devices, including one that could enable an attacker to log on with a spring onion Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                04 Aug 2025
                  Black Hat USA: Halcyon and Sophos tag-team ransomware fightbackRansomware experts Halcyon and Sophos are to pool their expertise in ransomware, working together to enhance data- and intelligence-sharing and bringing more comprehensive protection to customers Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                30 Jul 2025
                  Scattered Spider tactics continue to evolve, warn cyber copsCISA, the FBI, NCSC and others have clubbed together to update previous guidance on Scattered Spider's playbook, warning of new social engineering tactics and exploitation of legitimate tools, among other things Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                30 Jul 2025
                  MS Authenticator users face passkey crunch timeThe deadline for moving to passkeys in Microsoft Authenticator is rapidly approaching, and users are advised to take action now Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                30 Jul 2025
                  AI-enabled security pushes down breach costs for UK organisationsOrganisations that are incorporating AI and automation into their cyber security practice are seeing improved outcomes when incidents occur, according to an IBM study Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                29 Jul 2025
                  Global cyber spend will top $200bn this year, says GartnerWorldwide spending on cyber security will hit another record high in 2025, and will go higher still next year Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                28 Jul 2025
                  European digital market figurehead pleads to WestminsterBig EU industry joins with Europhile MP to persuade obstinate government officials to join the dataspaces intended to become the bedrock of Europe’s digital single market Continue Reading By- Mark Ballard
 
- 
                News
                24 Jul 2025
                  SharePoint users hit by Warlock ransomware, says MicrosoftMicrosoft’s security analysts confirm a number of cyber attacks on on-premise SharePoint Server users involve ransomware Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                24 Jul 2025
                  Scattered Spider victim Clorox sues helpdesk providerCleaning products manufacturer Clorox fell victim to a Scattered Spider social engineering attack two years ago – it blames its IT helpdesk provider, Cognizant Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                24 Jul 2025
                  Dutch researchers use heartbeat detection to unmask deepfakesDutch method to counter deepfakes analyses blood flow patterns in faces that current deepfake generation tools cannot yet replicate Continue Reading By- Kim Loohuis
 
- 
                News
                22 Jul 2025
                  Microsoft confirms China link to SharePoint hacksMicrosoft confirms two known China-nexus threat actors, and one other suspected state-backed hacking group, are exploiting vulnerabilities in SharePoint Server Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                22 Jul 2025
                  Chinese cyber spies among those linked to SharePoint attacksExploitation of the ToolShell RCE zero-day in Microsoft SharePoint continues to gather pace, with evidence emerging of exploitation by nation state-backed threat actors Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                21 Jul 2025
                  Patch ToolShell SharePoint zero-day immediately, says MicrosoftThe active exploitation of a dangerous zero-day vulnerability chain in Microsoft SharePoint – which was disclosed over the weekend – is underway. Immediate action is advised Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                21 Jul 2025
                  The Security Interviews: Jason Nurse, University of KentJason Nurse, reader in cyber security at the University of Kent, discusses the psychological side of cyber and online safety, why placing blame on users as ‘the weakest link’ is wrong – and why security pros should think about user needs more Continue Reading By
- 
                Feature
                21 Jul 2025
                  Meet the deepfake fraudster who applied to work at a deepfake specialistA recruiter at voice fraud specialist Pindrop had a shock when they came face-to-face with the same deepfake job candidate not once, but twice. Hear their story and learn how to start to protect your hiring process Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                16 Jul 2025
                  Scattered Spider playbook evolving fast, says MicrosoftMicrosoft warns users over notable evolutions in Scattered Spider’s attack playbook, and beefs up some of the defensive capabilities it offers to customers in response Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                15 Jul 2025
                  UKtech50 2025: The most influential people in UK technologyComputer Weekly has announced the 15th annual UKtech50 – our definitive list of the movers and shakers in the UK tech sector Continue Reading By
- 
                News
                15 Jul 2025
                  Current approaches to patching unsustainable, report saysOrganisations are struggling to prioritise vulnerability patching appropriately, leading to situations where everything is a crisis, which helps nobody, according to a report Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                14 Jul 2025
                  Brits clinging to Windows 10 face heightened risk, says NCSCBusinesses and consumers alike may not feel the need to upgrade to Windows 11 as its predecessor approaches end-of-life, but they are putting their own security at risk, says the NCSC Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                10 Jul 2025
                  Government funding to help SMEs protect their IPScheme will see SMEs and innovative startups working in sensitive sectors receive advice on enhancing cyber and physical security measures to protect their valuable intellectual property Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                08 Jul 2025
                  July Patch Tuesday brings over 130 new flaws to addressMicrosoft patched well over 100 new common vulnerabilities and exposures on the second Tuesday of the month, but its latest update is mercifully light on zero-days Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                08 Jul 2025
                  Interview: Vivek Bharadwaj, CIO, Happy SocksThe clothing manufacturer’s IT chief has a foot in every aspect of the tech stack – and is placing data and AI at the centre of future digital strategy Continue Reading By
- 
                News
                07 Jul 2025
                  Tech firms complicit in ‘economy of genocide’, says UN rapporteurA UN special rapporteur has called for technology firms operating in Israel and the Occupied Palestinian Territories to immediately halt their activities, in wider report about the role corporate entities have played in the Israeli state’s ongoing ‘crimes of apartheid and genocide’ Continue Reading By- Sebastian Klovig Skelton, Data & ethics editor
 
- 
                News
                02 Jul 2025
                  Google fixes type confusion flaw in Chrome browserAn actively exploited type confusion vulnerability in the Google Chrome web browser needs immediate attention from users Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                02 Jul 2025
                  Dutch study uncovers cognitive biases undermining cyber security board decisionsDutch research reveals how cognitive biases can lead to catastrophic security decisions Continue Reading By- Kim Loohuis
 
- 
                Feature
                30 Jun 2025
                  Precision-bred veg from Phytoform Labs: Meet the AI startup looking to boost the UK’s food securityPhytoform Labs is on a mission to shore up the nation’s food supplies using artificial intelligence-backed biotechnology – and the humble tomato Continue Reading By- Caroline Donnelly, Senior Editor, UK
 
- 
                Opinion
                30 Jun 2025
                  Better governance is required for AI agentsThe Security Think Tank considers how CISOs can best plan to facilitate the secure running of AI and Gen AI-based initiatives and ensure employees do not inadvertently leak data or make bad decisions Continue Reading By- Mandy Andress, Elastic
 
- 
                News
                24 Jun 2025
                  UK ransomware costs significantly outpace other countriesUK organisations hit by ransomware attacks paid much higher ransoms than in other countries over the past 12 months, according to study Continue Reading By- Alex Scroxton, Security Editor
 

 
		