IT management
-
News
18 Sep 2024
Dreamforce 24: Salesforce taps Nvidia to power Agentforce
At Dreamforce in San Francisco, Salesforce and Nvidia detail some of the tech that will power the software giant's newly launched Agentforce service Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Sep 2024
NCSC exposes Chinese company running malicious Mirai botnet
The NCSC and its Five Eyes allies have published details of the activities of a China-based cyber security company that is operating a Mirai IoT botnet in the service of government-backed intrusions Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Sep 2022
IHG attackers phished employee to deploy destructive wiper
A couple from Vietnam who claim to be behind a destructive wiper cyber attack on hotel operator IHG told the BBC how they orchestrated their operation Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Sep 2022
Reports Uber and Rockstar incidents work of same attacker
Rockstar Games was hit over the weekend by an attacker who claimed to have accessed its Slack channel to steal data on an upcoming release, and may be the same person who compromised Uber Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Sep 2022
NHS Scotland to transform population health through digital technologies
A collaboration between NHS Scotland, industry partners and academia aims to launch large-scale programmes to improve population health in the country through digital technologies and new patient pathways Continue Reading
By -
News
20 Sep 2022
Dutch student team aims to enable uninterrupted drone cargo delivery
Dutch student team aims to make the world of flying more sustainable by creating a global network of autonomously flying cargo drones that can have their batteries swapped mid-air Continue Reading
By- Kim Loohuis
-
E-Zine
20 Sep 2022
A gold medal performance for networking
In this week’s Computer Weekly, we find out how the IT team behind the 2022 Commonwealth Games in Birmingham delivered a winning performance. We also look at how the centuries-old London insurance market is going digital, thanks to Lloyd’s of London. And we find out how low-cost high street stores succumbed to the inevitable and are going online. Read the issue now. Continue Reading
-
News
20 Sep 2022
India ramps up on AI amid talent and scalability challenges
Indian organisations are speeding up deployments of AI across multiple sectors, but legacy systems, siloed data and a shortage of AI-specific talent will stand in the way of greater adoption Continue Reading
By- Harigunani P
-
News
19 Sep 2022
How Mondelez is driving change with tech
From empowering citizen developers to deploying drones to monitor the health of cocoa trees, Mondelez has been firing on all cylinders to disrupt the old ways of doing things Continue Reading
By- Aaron Tan, TechTarget
-
News
16 Sep 2022
Barnet Council awards Capita contract extension
Barnet Council has awarded Capita a contract extension as part of its transition away from a large contract with the supplier Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
16 Sep 2022
Six new vulnerabilities added to CISA catalogue
CISA adds six new vulnerabilities to its most-wanted list, including one that dates back to 2010 Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 Sep 2022
Uber suffers major cyber attack
Details are trickling out of an apparent ‘near total’ compromise of ride-sharing service Uber by an alleged teenage hacktivist Continue Reading
By- Alex Scroxton, Security Editor
-
Podcast
16 Sep 2022
Energy crisis IT impact: Computer Weekly Downtime Upload podcast
In this special edition of the Computer Weekly Downtime Upload podcast, Gartner analyst Tiny Haynes discusses datacentre energy management. Continue Reading
By- Cliff Saran, Managing Editor
-
Definition
16 Sep 2022
fist to five (fist of five)
Fist to five, or fist of five, is a consensus-building technique used by Agile software development teams to poll team members and come to an agreement. Continue Reading
By -
News
15 Sep 2022
EU Cyber Resilience Act sets global standard for connected products
European Commission lays out proposed security regulations on device and software security to better protect consumers and drive global standards Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
15 Sep 2022
Has Putin started a server revolution?
The European Commission wants Member States to reduce consumption. “Demand reduction is fundamental: it lowers energy bills, ends Putin's ability to weaponise his energy resources, reduces ... Continue Reading
By- Cliff Saran, Managing Editor
-
News
15 Sep 2022
SAP maintenance fee increase: What you need to know
SAP has written to its customers informing them of a price increase on annual maintenance fees. What are your options? Continue Reading
By- Cliff Saran, Managing Editor
-
News
15 Sep 2022
Nominations closing soon for annual cyber awards
Nominations for the annual Security Serious Unsung Heroes Awards closes 16 September Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Sep 2022
New player pioneers ‘active cyber insurance’ for UK market
Arrival of US-based insurer Coalition in London will supposedly offer SMEs more options when it comes to cyber security insurance Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Sep 2022
Organisations failing to account for digital trust
The vast majority of businesses are well aware of the importance of digital trust, yet very few have a dedicated staff role responsible for it, report finds Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Sep 2022
Full-stack observability top priority for IT teams
Annual forecast reveals observability – the ability to see everything in the tech stack that could affect customer experience – has become a board-level imperative, but only a quarter of organisations have achieved it Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
15 Sep 2022
US charges three Iranians over CNI cyber attacks
Three Iranian nationals have been indicted over a spate of ransomware attacks against organisations in the US, UK, Israel and Iran Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Sep 2022
Airtel to deploy edge computing platform
Bharti Airtel will deploy its multi-access edge compute platform across India to support edge computing applications in manufacturing and other industries, as India gears up for 5G Continue Reading
By- Aaron Tan, TechTarget
-
Definition
15 Sep 2022
Pomodoro Technique
The Pomodoro Technique is a time management method based on 25-minute stretches of focused work broken by five-minute breaks. Continue Reading
-
News
14 Sep 2022
FormBook knocks Emotet off top of malware chart
FormBook emerged as the most widely seen malware in August, according to Check Point’s latest data Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Sep 2022
Ex-CISA head Krebs: Disrupt ransomware support networks to win the war
Speaking at an event hosted by data protection specialist Rubrik, former CISA director Chris Krebs calls for the security community to work collectively to kick out the supports from under ransomware gangs Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Sep 2022
Microsoft patches 64 vulnerabilities on September Patch Tuesday
Microsoft drops fixes for five critical vulnerabilities and one zero-day in its latest monthly update Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Sep 2022
VMware Cloud on AWS debuts in Hong Kong
VMware has expanded its VMware Cloud on AWS to Hong Kong, following the launch of the Alibaba Cloud VMware service in Greater China Continue Reading
By- Aaron Tan, TechTarget
-
Definition
14 Sep 2022
von Neumann bottleneck
The von Neumann bottleneck is a limitation on throughput caused by the standard personal computer architecture. Continue Reading
-
News
13 Sep 2022
Cloud compromise a doddle for threat actors as victims attest
Two separate studies into the state of public cloud security reveal insight into the ease with which threat actors can compromise vast numbers of targets, and some of the challenges security teams are facing in the cloud Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
13 Sep 2022
AI Sweden connects the dots to keep the country competitive
How and why a centre dedicated to accelerating the adoption of artificial intelligence technology has been created in Sweden Continue Reading
By- Pat Brans, Pat Brans Associates/Grenoble Ecole de Management
-
News
13 Sep 2022
Users warned over Azure Active Directory authentication flaw
Secureworks researchers found what they say is a serious vulnerability in an Azure Active Directory authentication method, but Microsoft says it should not pose a serious risk to users Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Sep 2022
Cisco confirms leaked data was stolen in Yanluowang ransomware hit
Cisco has confirmed that data leaked last week by the Yanluowang ransomware gang was that stolen during a May 2022 cyber attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Sep 2022
JP Morgan acquires fintech for payments modernisation
JP Morgan acquires cloud-native payments technology as it modernises its IT infrastructure Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
13 Sep 2022
Blancco works with charity to provide IT for African schools
Blancco is providing data sanitisation and erasure software to The Turing Trust so that old IT equipment can be securely reused by school children in Sub-Saharan Africa, instead of adding to world’s growing e-waste problem Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
13 Sep 2022
Multi-persona impersonation adds new dimension to phishing
Iranian APT used multiple personas on a single email thread to convince targets of the legitimacy of its phishing lures Continue Reading
By- Alex Scroxton, Security Editor
-
13 Sep 2022
Tech sector efforts to root out forced labour are failing
Digitally mapping supply chains to identify forced labour and slavery is no longer a technology problem for the IT sector, but a lack of government enforcement and corporate inaction are major barriers to effective change. Continue Reading
-
E-Zine
13 Sep 2022
Source responsibly: Tech sector efforts to root out forced labour are failing
In this week’s Computer Weekly, we analyse the technology industry’s failure to extirpate forced labour and slavery from its supply chains. We find out how cyber security firm Okta is rebuilding customer trust after a major security incident. And we discover how Caterpillar is modernising its data management to offer better customer service. Read the issue now. Continue Reading
-
News
12 Sep 2022
Mandiant floats off into Google Cloud
As planned, the acquisition of Mandiant will see the threat intel and incident response giant become a part of Google’s Cloud business Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Sep 2022
Contractors lack confidence in prime minister to follow through with promised IR35 review
Contractor poll suggests lack of faith among freelancers about new prime minister Liz Truss honouring her pledge to review the IR35 rules Continue Reading
By- Caroline Donnelly, Datacentre Editor
-
News
12 Sep 2022
Mistakenly transferred $504m to be returned to Citigroup
Judge rules that creditors should return $504m that was accidentally transferred to them by Citigroup Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
12 Sep 2022
CISOs should spend on critical apps, cloud, zero-trust, in 2023
Faced with a global recession next year, security buyers should try to direct investment towards technology that protects customer-facing and revenue-generating workloads, say analysts Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Sep 2022
Lloyd’s of London is digitally transforming through the front door
Centuries-old financial services organisation is transforming its complex IT infrastructure through digital data Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Feature
12 Sep 2022
RPA’s day has come – the intelligent evolution of a productivity bot
By trying to emulate humans for tasks such as data entry, robotic process automation has found a niche home in many an enterprise back office Continue Reading
-
News
09 Sep 2022
Third of IT decision-makers rely on gut feel when choosing network operator
Study from customer experience technology provider shows lack of transparency is cited as the most consistent quality failure of network providers Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
09 Sep 2022
Interview: Keeping an IT business going during the Russian invasion
After heading home and discovering that his country had been invaded, Konstantin Klyagin was forced to make life-changing family and business decisions Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Blog Post
09 Sep 2022
Apple iPhone 14: Time to put our desire for shiny new things into perspective
Can the launch of the iPhone 14 have come at a worse time? The standard of living of people is falling, inflation is rising rapidly, the pound is crashing and fuel bills are sky high and set to ... Continue Reading
By- Cliff Saran, Managing Editor
-
E-Zine
09 Sep 2022
CW Europe: Why Russia could become the world’s biggest market for illegal IT
Faced with international sanctions and the departure of many global IT suppliers from Russia, companies there are seeking alternative, and sometimes illegal, routes to access IT products. Also read how new requirements are driving scientists and engineers in Europe back to the lab to start developing 6G technology. Continue Reading
-
Opinion
09 Sep 2022
Security Think Tank: Adding trust to AppSec and DevSecOps
When building in trust and assurance into app development through standards, it is critically important not to stifle innovation Continue Reading
By- Rowland Johnson
-
News
08 Sep 2022
NCSC CyberUK event heads to Belfast in 2023
National Cyber Security Centre’s annual CyberUK roadshow is crossing the Irish Sea to Belfast in April 2023 Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Sep 2022
CGI gets ESA order to develop predictive routing tool for satellite constellations
Tool will support increased need to equip satellite networks with software-defined networking to deliver simplified management, better end-to-end network automation support and streamlined delivery of network services Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
08 Sep 2022
Chinese APT using PlugX malware on espionage targets
China’s Bronze President APT is once again targeting government officials of interest to its paymasters, this time using forged diplomatic correspondence, according to the Secureworks Counter Threat Unit Continue Reading
By- Alex Scroxton, Security Editor
-
Podcast
08 Sep 2022
Does quantum matter? A Computer Weekly Downtime Upload podcast
In this special edition of the Computer Weekly Downtime Upload podcast, Ilyas Khan, CEO of Quantinuum, discusses the quantum computing revolution Continue Reading
By- Cliff Saran, Managing Editor
-
News
08 Sep 2022
The changing role of CIO in Sweden
New technologies and evolving business models are changing the missions of IT leaders around the world – and in most cases, the result is slightly different from one country to another Continue Reading
By- Pat Brans, Pat Brans Associates/Grenoble Ecole de Management
-
Opinion
08 Sep 2022
Security Think Tank: Creating a DevSecOps-friendly cyber strategy
When slowing down is not an option, you need to find a security strategy that is DevSecOps friendly, says Airbus Protect’s Olivier Allaire Continue Reading
By- Olivier Allaire, Airbus Protect
-
News
07 Sep 2022
Albania cuts diplomatic ties with Iran after cyber attack
In a global geopolitical first, the Albanian government has severed diplomatic ties with Iran and expelled its ambassador after it was targeted by an APT backed by Tehran Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
07 Sep 2022
empiricism
Empiricism is a philosophical theory applicable in many disciplines, including science and software development, that human knowledge comes predominantly from experiences gathered through the five senses. Continue Reading
By -
News
07 Sep 2022
August ’22 a bumper month for high-impact vulnerabilities
Bugs in products from Apple, Google, Microsoft and VMware dominated the threat landscape in August, says Recorded Future Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Sep 2022
Prince’s Trust teams with threat management specialist in skills push
Prince’s Trust hopes to address shortfall in cyber professionals and improve diversity in the industry Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Sep 2022
Hotel group IHG confirms cyber attack after two-day outage
IHG, the operator of hotel chains Crowne Plaza, Holiday Inn, Intercontinental and Kimpton, says it has been targeted by an unknown threat actor Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
07 Sep 2022
How Sweden goes about innovating
A country of only 10 million people, Sweden is holding its own in the international community when it comes to innovation – and it’s no accident Continue Reading
By- Pat Brans, Pat Brans Associates/Grenoble Ecole de Management
-
News
07 Sep 2022
Cyber threats to Europe’s grid: Utilities rethink strategy
The separation of operational and information technology at utilities across Europe is opening doors for cyber criminals Continue Reading
By- Gordon Feller
-
Opinion
07 Sep 2022
Security Think Tank: The many dimensions of DevSecOps
It is imperative to make our colleagues and customers know that when we talk DevSecOps, we are facing a multiphase challenge that starts at the very beginning of DevOps, and one that never ends Continue Reading
By- Alejandro Bernal
-
News
06 Sep 2022
ScottishPower charges up connectivity with BT
Leading UK telecoms provider enters into strategic partnership with Glasgow-based integrated energy company in to help connect renewable growth and provide integrated and bespoke telecommunications services to approximately 100 locations across the UK, France, and Germany Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
06 Sep 2022
Campaigners call on Truss to change UK’s archaic hacking laws
The CyberUp coalition, a campaign to reform the Computer Misuse Act, has called on Liz Truss to push ahead with needed changes to protect cyber pros from potential prosecution Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Sep 2022
Bus company Go-Ahead fighting off cyber attack
Go-Ahead Group, which operates bus companies around the UK, says it is in the process of dealing with a cyber attack that may cause disruption to services Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Sep 2022
New prime minister Liz Truss urged to press on with IR35 and loan charge policy reviews
Contracting stakeholders are calling on Liz Truss to make good on her pledge to undertake a review of the IR35 rules when she became prime minister Continue Reading
By- Caroline Donnelly, Datacentre Editor
-
News
06 Sep 2022
Saudi Arabian organisations choose to outsource to improve cyber security posture
Overwhelmed by rising threats and a growing number of government mandates, many organisations in Saudi Arabia are looking for outside help to take care of cyber security Continue Reading
By- Pat Brans, Pat Brans Associates/Grenoble Ecole de Management
-
E-Zine
06 Sep 2022
Out with the old at Asda
In this week’s Computer Weekly, we talk to Asda’s CIO, Carl Dawson, about the supermarket’s cloud-oriented renovation of its technology stack. We narrate the security woes at Twitter. And we examine best practices for data backup. Read the issue now. Continue Reading
-
05 Sep 2022
Industrial opportunities for quantum computing are already being explored
Mainstream quantum computing may be years away, but some companies are finding ways to pilot the technology now, to see if it can deliver tangible business benefits. Continue Reading
-
News
05 Sep 2022
UK payments upgrade to add more than £3bn to GDP, but much more on offer
UK GDP will increase when its ageing payments infrastructure is replaced with the latest technology to enable real-time payments Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
05 Sep 2022
Huge leap to contactless payments in past three years
Covid-19 pushes the use of contactless payments for face-to-face transactions to 90% of total Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Feature
05 Sep 2022
How water conservation and management floats on cloud
From the cloud comes our water supply – an essential building block and life support system increasingly underpinned by IT infrastructure Continue Reading
By -
News
05 Sep 2022
How Okta is regaining customer trust after a cyber attack
In early 2022, cyber firm Okta was among several tech companies hit by the Lapsus$ gang. Vice-president of customer trust Ben King talks about how he has been working behind the scenes to rebuild confidence after the incident Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
05 Sep 2022
Security Think Tank: Good procurement practices pave the way to app security
Application security is as much a question of good procurement practice as it is good development practice, says Petra Wenham of the BCS Continue Reading
By -
Feature
05 Sep 2022
New connectivity options driven by low Earth orbit satellites
Huge reductions in the cost of building and launching satellites has led to an explosion of interest in space-borne projects and services Continue Reading
By- Bill Ray
-
Feature
02 Sep 2022
Cloud bursting: What it is and what it’s good for
We look at cloud bursting, which allows organisations to meet demand by bursting compute and storage to the cloud Continue Reading
-
News
02 Sep 2022
Ericsson claims sustainability gains with tri-sector 5G radio
Swedish comms tech provider makes further inroads into more sustainable networks with the introduction of a new triple-band, tri-sector radio that is said to be able to do the job of nine radios Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
02 Sep 2022
Dutch government finally allowed to use public cloud
Public cloud is finally within reach for Dutch public services. Previously, the Dutch government was only allowed to use private clouds due to risks concerning privacy and security Continue Reading
By- Kim Loohuis
-
Feature
02 Sep 2022
Unstructured vs semi-structured data: Order from chaos
We look at alternatives to relational databases that have emerged to help bring some structure to unstructured data and gain valuable insight by making it semi-structured Continue Reading
By- Antony Adshead, Storage Editor
-
News
02 Sep 2022
HMRC to review how IR35 works in practice following PAC criticism
Several months have passed since the Public Accounts Committee issued its damning report on the fallout from the introduction of the IR35 reforms in the public sector, and HMRC has shared its feedback on its contents Continue Reading
By- Caroline Donnelly, Datacentre Editor
-
Opinion
02 Sep 2022
Security Think Tank: Shift left, shift right. What about shift everywhere?
The concepts of shift left and shift right are highly effective in securing the development process, but for those who want to take things that step further there is shift everywhere Continue Reading
By- Paul Holland, Information Security Forum
-
News
01 Sep 2022
Police interview Horizon scandal victim in investigation into potential perjury by Fujitsu staff
The Met Police have interviewed a former subpostmaster as part of an investigation into potential perjury by former Fujitsu staff Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
01 Sep 2022
Vote now: Who should be the 2022 Most Influential Woman in UK Tech?
Each year, we ask our audience who should be named the most influential woman in UK technology. Tell us what you think - the deadline for voting is 21 September... Continue Reading
By- Clare McDonald, Business Editor
-
News
01 Sep 2022
Space nerds beware: James Webb images used to spread malware
Astronomy and space aficionados are being targeted by cyber criminals exploiting some of the now-famous images captured by Nasa’s James Webb Space Telescope to distribute malware Continue Reading
By- Alex Scroxton, Security Editor
-
News
01 Sep 2022
Local authorities experience 10,000 attempted cyber attacks every day
Local authorities across the UK face a daily deluge of cyber incidents, with phishing and DDoS attacks the most prevalent, according to an insurance broker Continue Reading
By- Alex Scroxton, Security Editor
-
News
01 Sep 2022
Swedish Electronics Protection Act coincides with major cyber spend
Swedish cyber security law comes at a time of heavy government investment Continue Reading
By- Gerard O'Dwyer
-
News
01 Sep 2022
New (ISC)² cyber careers schemes go live
(ISC)² has opened up two new global cyber careers schemes to applicants to try to help organisations fill 2.7 million vacant roles worldwide Continue Reading
By- Alex Scroxton, Security Editor
-
News
01 Sep 2022
Arm sues Qualcomm over Nuvia tie-up
Qualcomm hopes to integrate Nuvia’s technology into its system-on-a-chip products based on Arm cores – but Arm says this infringes its IP Continue Reading
By- Cliff Saran, Managing Editor
-
Opinion
01 Sep 2022
Security Think Tank: Effective DevSecOps requires collaboration
Application security and effective DevSecOps can only be achieved through collaboration with the business – the ultimate goal is to make it safer to do business, which requires considering integrated risk management and identity and access management alongside cyber security and application security Continue Reading
By- Andrew Morris, Turnkey Consulting
-
Definition
01 Sep 2022
permittivity of free space
The permittivity of free space is a physical constant that reflects the ability of electrical fields to pass through a classical vacuum. Continue Reading
-
News
31 Aug 2022
Singapore to expand 5G coverage to seaport
The maritime hub will be testing the use of 5G in a range of maritime operations, including remote pilotage of vessels and drone delivery of components to ships Continue Reading
By- Aaron Tan, TechTarget
-
Definition
31 Aug 2022
apparent power
Apparent power is a measure of alternating current (AC) power that is computed by multiplying the root-mean-square (rms) current by the root-mean-square voltage. Continue Reading
By -
News
31 Aug 2022
Google debuts open source bug bounty programme
Google is calling on hackers to take pot-shots at its open source projects for the first time through a new vulnerability research programme Continue Reading
By- Alex Scroxton, Security Editor
-
News
31 Aug 2022
Norway has NOK200m plan to bolster cyber defences
Norway is investing heavily in its cyber defences amid heightened threat from Russia Continue Reading
By- Gerard O'Dwyer
-
News
31 Aug 2022
NHS staff fall further behind amid ransomware attack
While some NHS bodies are now recovering their services after the ransomware attack on a crucial software supplier, others are still being forced to rely on pen and paper, and some will be waiting months to recover Continue Reading
By- Alex Scroxton, Security Editor
-
News
31 Aug 2022
Four years into GDPR, Norway hopes for safer data transfer to US
Much of the data on the internet ends up on US servers at some point, and that is not always compatible with the General Data Protection Regulation, says Norwegian data protection authority Continue Reading
By- Pat Brans, Pat Brans Associates/Grenoble Ecole de Management
-
News
31 Aug 2022
Quantum computing: Industrial opportunities
Mainstream quantum computing may be years away, but some companies are finding ways to pilot the technology now, to see if it can deliver tangible business benefits Continue Reading
By- Cliff Saran, Managing Editor
-
News
31 Aug 2022
VMware CEO: Broadcom acquisition is on track
Raghu Raghuram claims VMware customers are getting more comfortable with the Broadcom acquisition while employees are ‘more or less focused’ on the job at hand Continue Reading
By- Aaron Tan, TechTarget
-
News
31 Aug 2022
HPE supply chain issues drive up server prices
HPE’s latest quarterly results show the company is trying to combat its order backlog by encouraging customers to buy next-gen servers Continue Reading
By- Cliff Saran, Managing Editor
-
News
30 Aug 2022
IAM house Okta confirms 0ktapus/Scatter Swine attack
Following last week’s disclosureby Group-IB researchers of a major phishing campaign, Okta has warned its customers to be on their guard Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Aug 2022
UK government presses on with new cyber rules for telcos
Government has finalised new security rules for telecoms companies and will move to make them binding in the near future Continue Reading
By- Alex Scroxton, Security Editor