IT operations management and IT support
-
News
30 Apr 2025
Co-op shuts off IT systems to contain cyber attack
A developing cyber incident at Co-op has forced the retailer to pull the plug on some of its IT systems as it works to contain the attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Apr 2025
How AI can attack corporate decision-making
As AI gets embedded in corporate systems, experts warn of emerging security risks caused by influencing retrieval augmentation systems Continue Reading
By- Cliff Saran, Managing Editor
-
News
23 Feb 2024
ConnectWise users see cyber attacks surge, including ransomware
ConnectWise ScreenConnect users who have yet to patch against a critical vulnerability are now being targeted by a barrage of cyber attacks, including ransomware Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Feb 2024
Cyber experts alarmed by ‘trivial’ ConnectWise vulns
The disclosure of two dangerous vulnerabilities in the popular ConnectWise ScreenConnect product is drawing comparisons with major cyber incidents, including the 2021 Kaseya attack Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
22 Feb 2024
How can we adapt work practices to protect CISO mental health?
Cyber leaders are finding it harder to keep up with security requirements than just two years ago, risking a domino effect of dissatisfaction, burnout and eventually, resignation Continue Reading
By- Mick Baccio
-
Definition
21 Feb 2024
revenue cycle management (RCM)
Revenue cycle management (RCM) is the financial process, utilizing medical billing software, that healthcare facilities use to track patient care episodes from registration and appointment scheduling to the final payment of a balance to ensure proper identification, collection and management of revenues from patient services. Continue Reading
By- Rahul Awati
- Alex DelVecchio, Content Development Strategist
-
News
21 Feb 2024
CVE volumes set to increase 25% this year
The number of reported Common Vulnerabilities and Exposures is likely to grow significantly in 2024, hitting a new high of almost 35,000, according to Coalition, a cyber insurance specialist Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
21 Feb 2024
Birmingham: There is a lesson for every CIO
A few years ago, Oracle announced a big win, when it was selected by Birmingham City Council to replace a heavily customised SAP system, which was originally implemented in 1999.Socitm advisory was ... Continue Reading
By- Cliff Saran, Managing Editor
-
News
21 Feb 2024
Co-op signs TCS deal for cloud-first push
The Co-operative Group has contracted IT service provider Tata Consultancy Services to support its move to a cloud-first IT environment Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
21 Feb 2024
IT leaders are finding the right balance between on-premise and cloud
Survey shows that fewer IT leaders are prioritising workload migration, which suggests they are happy with their deployment plans Continue Reading
By- Cliff Saran, Managing Editor
-
News
20 Feb 2024
LockBit locked out: Cyber community reacts
Reaction to the takedown of the LockBit ransomware gang is enthusiastic, but tempered with the knowledge that cyber criminals are often remarkably resilient Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Feb 2024
Microsoft: Nation-state hackers are exploiting ChatGPT
Threat actors from China, Iran, North Korea and Russia have all been probing use cases for generative AI service ChatGPT, but have yet to use such tools in a full-blown cyber attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Feb 2024
Microsoft patches two zero-days for Valentine’s Day
Two security feature bypasses impacting Microsoft SmartScreen are on the February Patch Tuesday docket, among more than 70 issues Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Feb 2024
Post Office CEO refused to meet government minister without her lawyer after 2015 Horizon report
Post Office statements on the Horizon system, whether to journalists or the government, were routinely carefully crafted by lawyers Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
13 Feb 2024
New variants of Qakbot malware under development
Despite its infrastructure having been taken down by the FBI last year, someone appears to be actively working on a new and improved version of the infamous Qakbot malware Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
13 Feb 2024
RMM software (remote monitoring and management software)
RMM software (remote monitoring and management software) is a type of application that information technology (IT) service providers and departments use to maintain their clients' and business organizations' IT assets, infrastructure and systems. Continue Reading
By- Paul Kirvan
- John Moore, Industry Editor
- Spencer Smith, Site Editor
-
News
13 Feb 2024
Hunter-killer malware volumes seen surging
Latest Picus Security report on malware tactics, techniques and procedures reveals an increasing focus on disabling security defences Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
12 Feb 2024
Executives must face down state-sponsored hacking groups targeting firmware
State-backed groups have ratcheted up the pressure for cyber security professionals and executives. But that’s not an excuse to cede them the territory. Continue Reading
By- Michael Marcotte
-
Feature
09 Feb 2024
The rising prominence of hybrid cloud in the Nordics
Many Nordic organisations have opted for hybrid cloud environments, subscribing to the newest services without giving up what they already have. Best practices are beginning to emerge for managing the heterogenous environment Continue Reading
By- Pat Brans, Pat Brans Associates/Grenoble Ecole de Management
-
News
08 Feb 2024
Swedish CIO contributes best practices for ethical use of artificial intelligence
IT leaders are scrambling to keep up with AI technology, but many are losing sight of its ethical impact – and what CIOs need to do to ensure responsible use Continue Reading
By- Pat Brans, Pat Brans Associates/Grenoble Ecole de Management
-
Blog Post
02 Feb 2024
It’s Time to Raise the Bar on Observability
Observability has come a long way in the last 30 years – from early service monitoring tools to today’s advanced platforms like Splunk, DataDog, Dynatrace, New Relic and others that ingest massive ... Continue Reading
By- Tony Lock, Freeform Dynamics
-
News
01 Feb 2024
Government ‘dragging it out’ by refusing to share knowledge of Post Office trial ‘delaying tactic’
Subpostmasters will have to wait to find out if the government knew of the Post Office’s plan to derail group litigation order, by trying to push managing judge out Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
31 Jan 2024
Aviva signs 15-year contract with Indian IT giant
Tata Consultancy Services continues to make large gains in the UK life insurance and pensions sector Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
30 Jan 2024
We need backup! Pennsylvania police data loss shows why
Police evidence systems data was lost during ‘routine maintenance’, with human error blamed – the case clearly illustrates why data protection can’t be left to chance Continue Reading
By- Antony Adshead, Storage Editor
-
News
30 Jan 2024
Pre-Horizon users contacting lawyers as more Post Office IT horror stories emerge
Lawyer says there is no reason to believe the Post Office treated unexplained shortfalls on systems prior to Horizon any differently to the way it dealt with unexplained Horizon shortfalls Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
29 Jan 2024
Russian IT sector still under serious pressure
Russian IT sector faces challenges on multiple fronts as Western sanctions widen Continue Reading
By- Computer Weekly correspondent
-
Opinion
26 Jan 2024
Security Think Tank: Expect more from GenAI in 2024
But 2024 also feels slightly different; the past 12 months have seen generative AI burst on to the scene, and this year its impact will continue to be felt, says Turnkey Consulting's Harshini Carey. Continue Reading
By- Harshini Carey, Turnkey Consulting
-
News
26 Jan 2024
Akira ransomware gang claims Lush cyber attack
The Akira ransomware gang claims to have stolen over 100GB of data from cosmetics manufacturer and retailer Lush Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
26 Jan 2024
Security Think Tank: What to expect in cyber this year
Risk arising from insecure generative AI, an explosion in mainstream acceptance of zero-trust, and increasingly tight cyber insurance policies will all be high on the agenda in 2024, writes Forrester senior analyst Alla Valente Continue Reading
By- Alla Valente
-
News
25 Jan 2024
Cisco updates AppDynamics with Smart Agents to tackle sprawl
As application architectures becomes more distributed, monitoring becomes increasingly complex – Cisco has a plan for simplification Continue Reading
By- Cliff Saran, Managing Editor
-
News
25 Jan 2024
Bugcrowd sees surge in vulnerability submissions, led by public sector
Crowdsourced vulnerability disclosure and bug bounty platform Bugcrowd says it saw a 151% uptick in submissions related to government and public sector organisations in 2023 Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
25 Jan 2024
Security Think Tank: 2024 is the year we bridge the cyber divide
ISACA's Steven Sim Kok Leong shares his thoughts on the coming year in cyber security, considering the impact of regulatory change, the evolving role of the CISO, and advances in innovative cyber tech Continue Reading
By- Steven Sim Kok Leong
-
News
24 Jan 2024
Southern Water confirms cyber attack after Black Basta claims
Southern Water, which supplies millions of customers in southeast England, has confirmed it has fallen victim to a cyber attack, although its services appear to be running normally Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Jan 2024
Critical vulnerability exposes Fortra GoAnywhere users
Fortra GoAnywhere MFT users must take steps to address a newly disclosed zero-day vulnerability without delay Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Jan 2024
AI will heighten global ransomware threat, says NCSC
The benefits of artificial intelligence to cyber criminals being well-known, the NCSC now assesses it’s likely AI will soon be widely used to enhance ransomware attacks Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Jan 2024
Salesforce’s bug bounty programme paid out $3m in 2023
Ethical hackers disclosed more than 4,000 vulnerabilities to Salesforce last year through its bug bounty programme, and received over $3m in rewards Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Jan 2024
Treat cyber risk like financial or legal issue, says UK government
UK government and NCSC launch proposed code of practice on cyber security governance to help directors and business leaders toughen their defences Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
23 Jan 2024
infrastructure as code (IaC)
Infrastructure as code, also referred to as IaC, is an IT practice that codifies and manages underlying IT infrastructure as software. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
News
22 Jan 2024
SolarWinds hackers attack Microsoft in apparent recon mission
Russian-backed threat actor behind infamous 2020 SolarWinds Sunburst intrusion hacked into Microsoft’s systems, apparently in an attempt to get hold of intel on themselves Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Jan 2024
Neighbouring Kent councils hit by simultaneous cyber attacks
Canterbury, Dover and Thanet Councils in Kent have all been struck by simultaneous cyber attacks knocking systems offline, with indications of a link between all three Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Jan 2024
Anger sparked by TV drama forces Fujitsu to put public sector contract bidding on hold
It is not just the UK government that has been forced to act quickly amid public anger, as a wounded Fujitsu stalls government contract bidding Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Opinion
18 Jan 2024
Powering up cyber security defences with AI
AI holds great promise when it comes to securing valuable, and vulnerable, data, but security teams face some challenges if they are to get the best out of it, writes IBM’s Christopher Meenan Continue Reading
By- Christopher Meenan
-
News
18 Jan 2024
Cyber non-profit enlists ex-NCSC head as technical chair
Founding NCSC chief exec Ciaran Martin is to join the newly launched Cyber Monitoring Centre non-profit as chair of its technical committee Continue Reading
By- Alex Scroxton, Security Editor
-
News
17 Jan 2024
NCSC invites security pros to join the big leagues
The NCSC is inviting security pros from across the UK to sign up to work with its experts on an intelligence-sharing initiative Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
17 Jan 2024
Biometric revolution in IAM: The future of authentication
The IAM landscape is experiencing profound change thanks to the advent of biometrics. Learn about the latest advantages and key benefits of biometrics in identity Continue Reading
By -
News
17 Jan 2024
The Security Interviews: Rebecca Taylor, SecureWorks Counter Threat Unit
In October 2023, Rebecca Taylor of the SecureWorks Counter Threat Unit was recognised at the annual Security Serious Unsung Heroes Awards for her work. Computer Weekly caught up with her to talk mentoring, cyber career development and diversity Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 Jan 2024
Fujitsu ‘morally obliged’ to contribute to subpostmaster financial redress amid ‘insane’ delays
Fujitsu has apologised for its role on the Post Office scandal and said it is ‘morally obliged’ to contribute to the financial redress of victims Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Opinion
16 Jan 2024
The human toll of ransomware: how IT pros suffer during incidents
Any ransomware attack causes significant challenges for a business or organisation going through such incident. But ransomware attacks also have tremendous impact on the staff – especially IT teams – working on mitigating the attack’s effect Continue Reading
By- Pia Hüsch, Jamie MacColl and Gareth Mott
-
News
15 Jan 2024
British Library catalogues back online after ransomware attack
The British Library has restored online access to its main catalogue of nearly 40 million items on a limited basis as it continues the long and arduous process of recovering from a ransomware attack Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
15 Jan 2024
British Library cyber attack explained: What you need to know
In this essential guide, Computer Weekly investigates the cyber attack on the British Library that has rendered IT systems inoperable and caused service disruption to thousands of users Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Jan 2024
Cisco fixes high-impact flaw in unified comms platform
Cisco unified comms customers are urged to patch a critical vulnerability in Unity Connection, a messaging and voicemail product Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Jan 2024
Poor tech kills hybrid work productivity
People who work from home say the IT they use is failing or performs poorly, which reduces their productivity, leading to hours of work lost Continue Reading
By- Cliff Saran, Managing Editor
-
News
10 Jan 2024
Windows Kerberos, Hyper-V vulns among January Patch Tuesday bugs
Microsoft starts 2024 right with another slimline Patch Tuesday drop, but there are some critical vulns to be alert to, including a number of man-in-the-middle attack vectors Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Jan 2024
Babuk Tortilla ransomware decryptor made available
A joint effort between Cisco Talos, Avast and the Dutch police will bring relief to many victims of a variant of the Babuk ransomware known as Tortilla Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
09 Jan 2024
Inadequate cloud logs are proving a headache for CISOs
The mass adoption of cloud environments is pushing strained CISOs to the brink and a lack of attention to logging isn't helping. Vectra's Mark Wojtasiak calls for organisations to do more to improve visibility in their clouds in 2024 Continue Reading
By- Mark Wojtasiak
-
News
09 Jan 2024
‘Hero’ subpostmaster accuses government of diversion tactics through ‘weaselly’ statistics
Campaigning subpostmaster calls out government’s use of ‘weaselly’ statistics to hide its slow progress Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
09 Jan 2024
Fujitsu gets stay of execution as MPs support exoneration of wrongfully convicted subpostmasters
Fujitsu will have to wait until the end of the Post Office Horizon scandal public inquiry to hear how MPs will punish it Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Opinion
09 Jan 2024
Trauma and fear means victims of the Post Office scandal are suffering in silence
Just like victims of child abuse, it is likely that issues of trauma, fear, feelings of shame and a complete loss of trust in authority are some of the powerful inhibitors preventing victims of the Post Office scandal from coming forward Continue Reading
By- David Enright
-
Definition
08 Jan 2024
cost price
Cost price is the total amount of money that it costs a manufacturer to produce a given product or provide a given service. Continue Reading
-
News
08 Jan 2024
British Library ransomware attack could cost up to £7m
The cost of recovering the British Library’s ransomware-stricken IT systems could be up to £7m, it has emerged Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Jan 2024
Post Office scandal furore is moment to change digital evidence rules
The current rules around digital evidence are partly to blame for the widest miscarriage of justice in UK history Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
07 Jan 2024
Metropolitan Police launches second criminal investigation in Post Office scandal
New investigation will examine potential crimes by the Post Office in its recovery of money from subpostmasters accused of theft and false accounting Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
02 Jan 2024
China’s UNC4841 pivots to new Barracuda ESG zero-day
The Chinese state threat actor behind a series of cyber attacks on Barracuda Networks customers embarked on a campaign targeting the supplier’s email security products in the run-up to Christmas Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
27 Dec 2023
hyperautomation
Hyperautomation is a framework and a set of advanced technologies for scaling automation in the enterprise. The ultimate goal of hyperautomation is to develop a process for automating enterprise automation. Continue Reading
By- Cameron Hashemi-Pour, Former Site Editor
- George Lawton
- Corinne Bernstein
-
Definition
26 Dec 2023
pilot program (pilot study)
A pilot program, also called a feasibility study or experimental trial, is a small-scale, short-term experiment that helps an organization learn how a large-scale project might work in practice. Continue Reading
-
Definition
21 Dec 2023
globalization
Globalization is the process by which ideas, knowledge, information, goods and services spread around the world. Continue Reading
By- Cameron Hashemi-Pour, Former Site Editor
- Ben Lutkevich, Site Editor
-
News
21 Dec 2023
Top 10 cyber crime stories of 2023
Ransomware gangs dominated the cyber criminal underworld in 2023, a year that will prove notable for significant evolutionary trends in their tactics Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Dec 2023
Post Office gets government handout as Horizon replacement costs increase ‘significantly’
The increasing costs associated with replacing the Post Office’s controversial IT system have forced the government to hand it over £100m extra Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Opinion
20 Dec 2023
Beyond the office walls: Safeguarding remote workers from attack
Remote working has enabled people to work from almost anywhere but has piled pressure on cyber pros. Three years after Covid, how are best practices evolving and what can we expect going forward? Continue Reading
By- Paul Lewis, Nominet
-
Opinion
20 Dec 2023
Zero-trust principles: Your gateway to securing remote workers
Remote working has enabled people to work from almost anywhere but has piled pressure on cyber pros. Three years after Covid, how are best practices evolving and what can we expect going forward? Continue Reading
By- Michael Healey, Turnkey Consulting
-
Opinion
20 Dec 2023
What we learned in cyber in 2023, and what to look out for
PA Consulting's Rasika Somasiri looks back at a busy 12 months in the cyber security world, and highlights some key learnings from 2023 Continue Reading
By- Rasika Somasiri
-
Opinion
20 Dec 2023
Evolving best practice: What next for securing remote work?
Remote working has enabled people to work from almost anywhere but has piled pressure on cyber pros. Three years after Covid, how are best practices evolving and what can we expect going forward? Continue Reading
By- Scott Burman
-
News
20 Dec 2023
'No hiding place' for those responsible for Post Office Horizon scandal
MPs want individuals to be held to account for their roles in causing the Post Office Horizon scandal, which destroyed thousands of lives Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Definition
19 Dec 2023
localization
Localization is the process of adapting and customizing a product to meet the needs of a specific market, as identified by its language, culture, expectations, local standards and legal requirements. Continue Reading
-
News
19 Dec 2023
Government reveals its own slow progress in compensating Post Office scandal victims
Few of the subpostmasters who unearthed the widest miscarriage of justice in UK history have been compensated so far, four years after their court victory Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Opinion
19 Dec 2023
Security Think Tank: Testing to improve remote worker security
Remote working has enabled people to work from almost anywhere but has piled pressure on cyber pros. Three years after Covid, how are best practices evolving and what can we expect going forward? Continue Reading
By- Rowland Johnson
-
News
19 Dec 2023
Top 10 cyber security stories of 2023
The past 12 months have seen the security agenda dominated by the usual round of vulnerabilities, concerns over supply chain security and more besides, but it was the chaotic state of global geopolitics that really made an impact Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
19 Dec 2023
Security Think Tank: Anytime, anywhere access is achievable
Remote working has enabled people to work from almost anywhere but has piled pressure on cyber pros. Three years after Covid, how are best practices evolving and what can we expect going forward? Continue Reading
By- Tim Holman, 2-sec
-
News
19 Dec 2023
Top 10 Nordic stories of 2023
Known for its advances in digital technology, the Nordic region continues to pioneer the startup sector while making serious waves in Quantum computing and artificial intelligence Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Definition
15 Dec 2023
business process management software (BPMS)
Business process management software (BPMS) helps companies design, model, execute, automate and improve a set of activities and tasks that, when completed, achieve an organizational goal. Continue Reading
By- Cameron Hashemi-Pour, Former Site Editor
- George Lawton
- Linda Tucci, Industry Editor -- CIO/IT Strategy
-
News
14 Dec 2023
Current Post Office executive in denial of Horizon cover-up
Executives at the Post Office today are still in denial of the part they played in destroying the lives of thousands of people Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Definition
14 Dec 2023
business process automation (BPA)
Business process automation (BPA) is the use of advanced technology to complete business processes with minimal human intervention. Continue Reading
By- Cameron Hashemi-Pour, Former Site Editor
- George Lawton
- Linda Tucci, Industry Editor -- CIO/IT Strategy
-
News
13 Dec 2023
How ransomware gangs use the tech media against their victims
Ransomware gangs are increasingly media-savvy operators, and this means incident response plans now need to account for communications and PR strategies too Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Dec 2023
Microsoft’s Christmas present for cyber teams: no zero-days
Barely 30 vulnerabilities, and no zero-days, have been fixed in the final Patch Tuesday drop of 2023 Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Dec 2023
Critical UK infrastructure a ‘hostage of fortune’ to ransomware
A lack of ransomware planning and preparedness at the highest levels of government is leaving UK operators or critical national infrastructure dangerously exposed, according to a Joint Committee report Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Dec 2023
Outdated data protection practice key factor in PSNI data breach
The August 2023 data breach at the Police Service of Northern Ireland arose chiefly from an outdated approach to data protection and compliance at the force, according to an independent review Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
11 Dec 2023
IT cost structure
IT cost structure refers to the relationship between different types of expenditures within a larger IT budget. Continue Reading
By -
Opinion
07 Dec 2023
Considerations for the security of evolving workspaces
Remote working has enabled people to work from almost anywhere but has piled pressure on cyber pros. Three years after Covid, how are best practices evolving and what can we expect going forward? Continue Reading
By- Simon Backwell
-
News
07 Dec 2023
Finnish IT industry talent fears amid government restrictions
Finnish businesses concerned over the immigration plans of the country’s right-wing government Continue Reading
By- Gerard O'Dwyer
-
Feature
05 Dec 2023
How to recover systems in the event of a cyber attack
Recovering compromised systems after a cyber attack isn’t easy, but understanding industry best practice offers a template for the key processes to follow Continue Reading
-
News
05 Dec 2023
Undisclosed document could reveal pressure on Fujitsu expert witness in Post Office prosecution
Details of Post Office prosecutor’s meeting with Fujitsu IT expert witness, used in subpostmaster prosecution, not yet disclosed to public inquiry Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
04 Dec 2023
Atos selected for UEFA Euro 2024 IT contract
IT services company Atos will deliver on-site and remote IT services for next year’s international football event in Germany Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Opinion
04 Dec 2023
Cyber and remote working: How Covid moved the cursor
Remote working has enabled people to work from almost anywhere but has piled pressure on cyber pros. Three years after Covid, how are best practices evolving and what can we expect going forward? Continue Reading
By- Lionel Garacotche
-
News
01 Dec 2023
Report reveals sorry state of cyber security at UK football clubs
Football clubs up and down the country are putting staff, players and fans alike at risk through outdated attitudes to cyber security, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
News
01 Dec 2023
The Security Interviews: Mark McClain, SailPoint Technologies
SailPoint founder and CEO Mark McClain reflects on how the concept of identity has evolved over the past 20 years, and points to rapid evolution still to come Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
01 Dec 2023
Security Think Tank: Four steps to secure remote workers
Remote working has enabled people to work from almost anywhere but has piled pressure on cyber pros. Three years after Covid, how are best practices evolving and what can we expect going forward? Continue Reading
By- Olivia Rofe
-
News
01 Dec 2023
Post Office lawyer with his fingerprints all over IT scandal spreads blame
Senior Post Office criminal lawyer was just following orders and claims his only mistake was believing those that told him the Horizon system was robust Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Opinion
30 Nov 2023
Prepare for your worst day: How to create a cyber incident response plan
What goes into a good incident response plan, and what steps should security professionals take to ensure they are appropriately prepared for the almost inevitable attack, and secure buy-in from organisational leadership? Continue Reading
By- James Allman-Talbot
-
News
30 Nov 2023
AWS debuts model evaluation tool in Bedrock
The Model Evaluation tool in Bedrock will help organisations evaluate and test large language models that are best suited to their needs based on criteria like accuracy, toxicity and cost Continue Reading
By- Aaron Tan, TechTarget
-
News
30 Nov 2023
Rhysida gang stole hundreds of gigabytes of British Library data
The Rhysida ransomware gang behind the cyber attack on the British Library has published almost 600GB of stolen data to its dark web leak site Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Nov 2023
Slow government response to Post Office scandal compensation forces new legislation
Subpostmasters who exposed widest miscarriage of justice in UK history still waiting for compensation after decades of fighting Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
29 Nov 2023
Scope of Okta helpdesk breach widens to impact all users
Okta has widened the scope of the October breach of its systems to include every customer that has used its helpdesk service, after new information came to light Continue Reading
By- Alex Scroxton, Security Editor