IT security
-
News
17 Jul 2025
European cyber cops target NoName057(16) DDoS network
A Europol operation has succeeded in disrupting a pro-Russian hacktivist network accused of conducting DDoS cyber attacks on targets in Ukraine and Europe. Continue Reading
By- Alex Scroxton, Security Editor
-
News
17 Jul 2025
Estimated 96% of EMEA financial services sector not ready for DORA
Research from data backup provider Veeam indicates that vast majority of European financial services firms do not feel ready to meet the resiliency requirements of the EU’s DORA act Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
17 Jul 2025
Dutch university’s rapid response saved it from ransomware devastation
Eindhoven University of Technology knew its credentials were compromised, planned multi-factor authentication, and regularly practised cyber crisis drills – yet it still fell victim to attackers Continue Reading
-
E-Zine
17 Jul 2025
Vive la AI
In this quarter’s CW EMEA, we look at how one of the Netherlands’ leading technology education centres, Eindhoven University of Technology, fell victim to sophisticated cyber attacks. What unfolded in the university’s reaction is evidence that the hard work and preparation for such an event pays off. Continue Reading
-
News
17 Jul 2025
Terrorist potential of generative AI ‘purely theoretical’
UK terror legislation advisor takes stock of the potential for generative artificial intelligence systems to be adopted by terrorists, particularly for propaganda and attack planning purposes, but acknowledges the impact may be limited Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
16 Jul 2025
Hackbots biggest cloud security risk, slashing attack times to minutes
With cyber criminals using automated tools to steal data in minutes, organisations must focus on runtime protection and automated responses to combat the rising threat from AI and misconfigured cloud assets Continue Reading
-
News
16 Jul 2025
Co-op chief ‘incredibly sorry’ for theft of 6.5m members’ data
Co-op chief executive Shirine Khoury-Haq has revealed that all the personal data of all 6.5 million of its members was compromised in the April 2025 cyber attack on its systems Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 Jul 2025
Scattered Spider playbook evolving fast, says Microsoft
Microsoft warns users over notable evolutions in Scattered Spider’s attack playbook, and beefs up some of the defensive capabilities it offers to customers in response Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 Jul 2025
Forrester urges IT leaders to dump technical debt
IT needs to invest in innovative technologies and outsource legacy IT management to tackle volatile global markets, says Forrester Continue Reading
By- Cliff Saran, Managing Editor
-
News
16 Jul 2025
Securonix tackles security data deluge with AI-driven platform
As security data volumes grow and security budgets tighten, Securonix is betting on its AI-driven platform to help businesses manage threats cost-effectively, says its CEO Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
15 Jul 2025
UKtech50 2025: The most influential people in UK technology
Computer Weekly has announced the 15th annual UKtech50 – our definitive list of the movers and shakers in the UK tech sector Continue Reading
By -
News
15 Jul 2025
Current approaches to patching unsustainable, report says
Organisations are struggling to prioritise vulnerability patching appropriately, leading to situations where everything is a crisis, which helps nobody, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Jul 2025
MoD cyber breach put thousands of Afghan lives at risk
More than 18,000 Afghan citizens eligible to relocate to the UK under a government programme to protect them from the Taliban were put at risk in a heretofore unreportable data breach Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Jul 2025
NCSC sets up Vulnerability Research Initiative
The NCSC is expanding its vulnerability research project to draw in external expertise Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
15 Jul 2025
What is supply chain risk management (SCRM)?
Supply chain risk management (SCRM) is the coordinated efforts of an organization to help identify, monitor, detect and mitigate threats to supply chain continuity and profitability. Continue Reading
By- Kinza Yasar, Technical Writer
-
Definition
15 Jul 2025
What is cybersecurity?
Cybersecurity is the practice of protecting systems, networks and data from digital threats. Continue Reading
By- Kinza Yasar, Technical Writer
- Sharon Shea, Executive Editor
- Alexander S. Gillis, Technical Writer and Editor
-
News
15 Jul 2025
Ada Lovelace: using market forces to professionalise AI assurance
The Ada Lovelace Institute examines how ‘market forces’ can be used to drive the professionalisation of artificial intelligence assurance in the context of a wider political shift towards deregulation Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
15 Jul 2025
Data (Use and Access) Act: Reflections on an eight-month statute
It took a long time, but the government's new data legislation finally made it into the statute book - it holds a lot of promise, but also leaves a lot of unanswered questions Continue Reading
By- Lord Chris Holmes, House of Lords
-
News
15 Jul 2025
Datadog doubles down on APAC, targets faster growth
The observability tools supplier is executing a multi-year growth plan for Asia-Pacific and Japan, focusing on data residency, localisation and AI-driven observability to grow its market share Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
14 Jul 2025
Brits clinging to Windows 10 face heightened risk, says NCSC
Businesses and consumers alike may not feel the need to upgrade to Windows 11 as its predecessor approaches end-of-life, but they are putting their own security at risk, says the NCSC Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Jul 2025
Luxury retailer LVMH says UK customer data was stolen in cyber attack
French luxury goods retailer LVMH has disclosed multiple cyber attacks in 2025 so far, and their impact is now spreading to the UK as a new incident affecting Louis Vuitton comes to light Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
14 Jul 2025
Assessing the risk of AI in enterprise IT
We speak to security experts about how IT departments and security leaders can ensure they run artificial intelligence systems safely and securely Continue Reading
By- Cliff Saran, Managing Editor
-
News
14 Jul 2025
AI adoption grows amid falling trust in AI outputs
As organisations move from AI hype to reality, a decline in trust for AI outputs is not a sign of failure, but a signal of market maturity, according to Bhavya Kapoor, Avanade's Asia-Pacific president Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
11 Jul 2025
MoD supply chain cyber scheme gets up and running
The Ministry of Defence and IASME have launched a certification scheme for organisations working in the UK defence supply chain, with construction firm Morgan Sindall the first business to achieve compliance Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Jul 2025
Pobl Group builds on managed SD-WAN for housing development
Three-year contract for managed software-defined wide area network service follows merger creating Wales’s largest housing association Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
11 Jul 2025
UK to create ‘governance framework’ for police facial recognition
Home secretary Yvette Cooper has confirmed UK will regulate police facial recognition, citing police reticence to deploy systems without proper governance, but declined to say if any new framework will be statutory Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
11 Jul 2025
European Commission accused of rigging data watchdog appointment
The European Commission has been accused of rigging the selection process for the next European Data Protection supervisor Continue Reading
By- Bill Goodwin, Investigations Editor
- Sebastian Klovig Skelton, Data & ethics editor
-
News
11 Jul 2025
AWS bolsters security tools to help customers manage AI risks
Amazon Web Services has unveiled new and updated security services, including container-level threat detection and a unified command centre, to help organisations build and secure artificial intelligence applications Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
10 Jul 2025
Government funding to help SMEs protect their IP
Scheme will see SMEs and innovative startups working in sensitive sectors receive advice on enhancing cyber and physical security measures to protect their valuable intellectual property Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Jul 2025
UK and France forge closer cyber, tech research ties
The navigation and timing systems used by power suppliers and emergency services to run their operations will fall in scope of an Anglo-French research pact that will also foster development in AI and supercomputing Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Jul 2025
Four arrested in M&S cyber attack investigation
Police have made four arrests in connection with a trio of cyber attacks on UK retailers Marks & Spencer, Co-op and Harrods Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
09 Jul 2025
Enterprise IT risks of AI and agentic AI
Everyone involved in IT needs to be focused on the implications of artificial intelligence (AI) on enterprise cybersecurity. Yet precious little energy is being expended on making sure AI is ... Continue Reading
By- Cliff Saran, Managing Editor
-
News
09 Jul 2025
NAO says government should employ data analytics to tackle fraud
The National Audit Office recommends public bodies share and manage data in a way that prevents fraud and saves taxpayers’ money Continue Reading
By- Cliff Saran, Managing Editor
-
News
09 Jul 2025
Qantas details impact of data breach on 5.7 million customers
Australian flag carrier begins notifying millions of individuals after a cyber attack on a call centre, confirming that while financial and passport details are safe, a significant volume of other personal information was compromised Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
08 Jul 2025
July Patch Tuesday brings over 130 new flaws to address
Microsoft patched well over 100 new common vulnerabilities and exposures on the second Tuesday of the month, but its latest update is mercifully light on zero-days Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Jul 2025
M&S calls for mandatory ransomware reporting
The government should extend ransomware reporting mandates to businesses to help gather more intelligence and better support victims, says M&S chairman Archie Norman Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Jul 2025
AI for Good: Signal president warns of agentic AI security flaw
Secure by design is a mantra of the tech sector, but not if it’s agentic AI, which wants ‘root’ access to everything Continue Reading
By- Cliff Saran, Managing Editor
-
News
08 Jul 2025
SEC and SolarWinds to settle lawsuit over 2020 breach
The US SEC and SolarWinds have reached a settlement in principle to resolve litigation over alleged security failings that led to the 2020 compromise of the supplier’s Orion platform by Russian cyber spies Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
08 Jul 2025
What is the domain name system (DNS)?
The domain name system (DNS) is a naming database in which internet domain names are located and translated into Internet Protocol (IP) addresses. Continue Reading
By- Mary E. Shacklett, Transworld Data
- Ben Lutkevich, Site Editor
- John Burke, Nemertes Research
-
News
08 Jul 2025
NHS trust accused of ‘at best cavalier, at worst deceitful’ behaviour after deleting emails
A London hospital trust faces allegations it withheld key evidence from a tribunal hearing after one of its directors attempted to destroy more than 90,000 emails Continue Reading
By -
E-Zine
08 Jul 2025
Do tech executives in US Army present conflict of interest?
In this week’s Computer Weekly, we take a deep dive into the controversial news that four technology executives have been sworn into the US military to make the armed forces ‘more lethal’. In other US-centric news, we look at how President Trump’s downgrading of diversity and inclusion initiatives could be potentially rippling across the Atlantic and affecting tech hiring trends in the UK. We also hear about a UK startup that is using AI to pinpoint the genetic code that needs tweaking to increase tomato and potato yields, as part of a broader push to increase the nation’s food security in the face of climate change. Read the issue now. Continue Reading
-
News
08 Jul 2025
Proofpoint bets on APAC growth amid spike in AI-driven threats
With cyber attacks spiking in non-English-speaking markets such as Japan, the security firm is boosting its regional presence to combat a wave of AI-generated threats Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
07 Jul 2025
Tech firms complicit in ‘economy of genocide’, says UN rapporteur
A UN special rapporteur has called for technology firms operating in Israel and the Occupied Palestinian Territories to immediately halt their activities, in wider report about the role corporate entities have played in the Israeli state’s ongoing ‘crimes of apartheid and genocide’ Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Podcast
07 Jul 2025
Gartner’s view on AI security: A Computer Weekly Downtime Upload podcast
We speaker to Gartner's Nader Heinen about why access control should be built into enterprise AI Continue Reading
By- Cliff Saran, Managing Editor
-
News
07 Jul 2025
Digital warfare is blurring civilian front lines
Singapore’s defence cyber chief warns that the traditional lines between military conflict and civilian life are blurring, with adversaries now targeting civilian systems and using AI to put the threat landscape on steroids Continue Reading
By- Aaron Tan, Informa TechTarget
-
Opinion
04 Jul 2025
From the FBI to F&A: lessons learnt in safeguarding systems and data
One chief information security officer shares her experience of marshalling what she learned at the FBI for business security, with a particular focus on finance and accounting Continue Reading
By- Jill Knesek
-
News
04 Jul 2025
Medow Health AI debuts AI scribe tool in Singapore
The Australian health technology company has launched its AI-powered scribe platform in Singapore to help healthcare professionals automatically capture and structure clinical notes, reports and referral letters Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
03 Jul 2025
Fine-tuning to deliver business AI value
Foundation AI models offer knowledge that spans the internet, but they generally lack an understanding of proprietary business data and processes Continue Reading
By- Cliff Saran, Managing Editor
-
Tip
02 Jul 2025
Implement a business continuity plan for remote workers
Business continuity efforts don't stop when employees go remote. Learn how to create and manage a reliable business continuity plan for remote workers. Continue Reading
By -
News
02 Jul 2025
US CISA agency extends Iran cyber alert, warns of CNI threat
The US Cybersecurity and Infrastructure Security Agency reiterates guidance for operators of critical national infrastructure as it eyes the possibility of cyber attacks from Iran Continue Reading
By- Alex Scroxton, Security Editor
-
News
02 Jul 2025
Google fixes type confusion flaw in Chrome browser
An actively exploited type confusion vulnerability in the Google Chrome web browser needs immediate attention from users Continue Reading
By- Alex Scroxton, Security Editor
-
News
02 Jul 2025
Scattered Spider link to Qantas hack is likely, say experts
A developing cyber attack at Australian airline Qantas that started at a third-party call centre is already being tentatively attributed to Scattered Spider. Find out more and learn about the next steps for those affected Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
02 Jul 2025
Why the Gov.uk App could (maybe, possibly...) be a turning point for digital government
Twelve years ago, the Government Digital Service (GDS) told us that it was “not ‘appy at all”. The March 2013 blog post that announced GDS would not develop a government mobile app and would ... Continue Reading
By- Bryan Glick, Editor in chief
-
Definition
02 Jul 2025
What is a threat actor?
A threat actor, also called a malicious actor, is an entity that poses a security risk and seeks to cause harm to individuals, devices, networks or digital systems, often by exploiting vulnerabilities. Continue Reading
By- Kinza Yasar, Technical Writer
- Rahul Awati
- Ivy Wigmore
-
Definition
02 Jul 2025
What is business continuity software?
Business continuity software is an application or suite designed to make business continuity planning/business continuity management (BCP/BCM) processes, metrics and compliance more efficient and accurate. Continue Reading
-
Definition
02 Jul 2025
What is quantum key distribution (QKD)?
Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties. Continue Reading
By- Nick Barney, Technology Writer
- Alexander S. Gillis, Technical Writer and Editor
-
Definition
02 Jul 2025
What is the principle of least privilege (POLP)?
The principle of least privilege (POLP) is a concept in computer security that limits users' access rights to only what is strictly required to do their jobs. Continue Reading
By- Kinza Yasar, Technical Writer
- Alexander S. Gillis, Technical Writer and Editor
-
News
02 Jul 2025
Dutch study uncovers cognitive biases undermining cyber security board decisions
Dutch research reveals how cognitive biases can lead to catastrophic security decisions Continue Reading
By- Kim Loohuis
-
News
02 Jul 2025
Qantas customer data exposed in contact centre breach
Australian flag carrier is investigating significant data theft of personal information for up to six million customers after a third-party platform used by its call centre was compromised Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
01 Jul 2025
Cloudflare to let customers block AI web crawlers
Publishers and other providers of creative content now have the option to block AI crawlers from accessing and scraping their intellectual property with new tools from Cloudflare. Continue Reading
By- Alex Scroxton, Security Editor
-
Podcast
01 Jul 2025
Podcast: AIOps in storage management, security and sustainability
Dell’s Stewart Hunwick explains why AIOps – artificial intelligence for IT operations – is key to gaining efficiencies in storage management and sustainability, and discusses reactive and proactive data security Continue Reading
By- Antony Adshead, Storage Editor
-
Definition
30 Jun 2025
What is the ISO 31000 Risk Management standard?
The ISO 31000 Risk Management framework is an international standard that provides organizations with guidelines and principles for risk management. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Brien Posey
-
Opinion
30 Jun 2025
Better governance is required for AI agents
The Security Think Tank considers how CISOs can best plan to facilitate the secure running of AI and Gen AI-based initiatives and ensure employees do not inadvertently leak data or make bad decisions Continue Reading
By- Mandy Andress, Elastic
-
Opinion
30 Jun 2025
Why AI reliability is the next frontier for technical industries
AI is no longer a futuristic idea — it’s embedded in the core operations of many of today’s industries. But can we trust its outputs? Continue Reading
By- Chris Bennett
-
Feature
30 Jun 2025
Enterprise cybersecurity: A strategic guide for CISOs
CISOs and others responsible for safeguarding an organization's systems, networks and data need to manage day-to-day threats while also planning strategically for what's ahead. Continue Reading
By- Phil Sweeney, Industry Editor
- Craig Stedman, Industry Editor
-
Definition
27 Jun 2025
What is phishing? Understanding enterprise phishing threats
Phishing is a fraudulent practice in which an attacker masquerades as a reputable entity or person to trick users into revealing sensitive information. Continue Reading
By- Kinza Yasar, Technical Writer
- Alexander S. Gillis, Technical Writer and Editor
-
News
27 Jun 2025
Citrix Bleed 2 under active attack, reports suggest
Days after news emerged of a Citrix NetScaler flaw comparable in its scope and severity to 2023’s infamous Citrix Bleed, there are already clear indicators that threat actors are taking advantage of the critical vulnerability Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Jun 2025
Scattered Spider cyber gang turns fire on aviation sector
Multiple reports are emerging of cyber attacks on airlines – Google Cloud’s Mandiant believes them to be linked Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Jun 2025
Over 2 million affected by US supermarket breach
Belgian-Dutch supermarket operator Ahold Delhaize reveals that more than two million people, including employees, had their data compromised following a November 2024 ransomware attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Jun 2025
Ciaran Martin: AI might disturb attacker-defender security balance
The founder of the National Cyber Security Centre spoke with Computer Weekly at Infosecurity Europe 2025 about how artificial intelligence might disturb the attacker-defender security equilibrium Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
27 Jun 2025
MPs propose ban on predictive policing
MPs are attempting to amend the UK government’s forthcoming Crime and Policing Bill so that it prohibits the use of controversial predictive policing systems Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
26 Jun 2025
Sky ECC distributor released from French custody pending trial
Canadian businessman accused of distributing Sky ECC encrypted phones has been released on bail after over four years in custody without a trial Continue Reading
By- Rebecca Tidy
- Bill Goodwin, Investigations Editor
-
News
26 Jun 2025
British hacker IntelBroker faces years in a US prison cell
US authorities have unsealed charges against 25-year-old hacker Kai West, aka IntelBroker, accusing him of being behind multiple cyber attacks Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Jun 2025
Glasgow Council services remain offline a week after cyber attack
Disruption continues a week after core services at Glasgow City Council were forced offline following a cyber attack on a third-party IT services provider Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Jun 2025
Swisscom claims world first with sovereign SASE connectivity service
SASE applied at heart of leading Swiss telco’s converged networking and cyber security offering to deliver customised, advanced networking and security services directly from its own infrastructure Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
25 Jun 2025
Latest Citrix vulnerability could be every bit as bad as Citrix Bleed
A Citrix NetScaler flaw that was quietly patched earlier in June is gathering widespread attention after experts noted strong similarities to the Citrix Bleed vulnerability that caused chaos in late 2023 Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
25 Jun 2025
What is CCTV (closed-circuit television)?
CCTV (closed-circuit television) is a video surveillance system in which signals are transmitted to a specific set of monitors and are not publicly broadcast. It is primarily used for security and monitoring. Continue Reading
By- Katie Terrell Hanna
- Tayla Holman, Site Editor
- Kristen Lee, News Writer
-
Definition
25 Jun 2025
What is single sign-on (SSO)?
Single sign-on (SSO) is a session and user authentication service that lets users access multiple applications or systems with a single set of login credentials. Continue Reading
By- Kinza Yasar, Technical Writer
- Taina Teravainen
-
News
24 Jun 2025
UK ransomware costs significantly outpace other countries
UK organisations hit by ransomware attacks paid much higher ransoms than in other countries over the past 12 months, according to study Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
24 Jun 2025
What is risk avoidance?
Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization and its assets. Continue Reading
-
News
24 Jun 2025
One year since being freed, Julian Assange still a victim of state secrecy
If the State Department’s arguments prevail in FOIA litigation, the truth about US action against Julian Assange and WikiLeaks journalists will never be known Continue Reading
By- Stefania Maurizi
-
E-Zine
24 Jun 2025
Digital ID: cool or contentious?
In this week’s Computer Weekly, we dig into the discourse surrounding the proposal to roll out a national digital identity scheme across the UK, and hear from HPE’s CIO on what he’s learned from his time previously working as an IT chief in the retail sector. We round out the buyer’s guide to cloud repatriation with a look at what’s driving the trend, before concluding the issue with a look at the controversy surrounding quantum computing. Read the issue now. Continue Reading
-
Blog Post
23 Jun 2025
Cyber Skills Today for Economic Growth Tomorrow
Cyber security is a critical enabler of economic growth, fostering a stable environment for innovation and investment, according to the Cyber Security and Resilience Bill: policy statement that ... Continue Reading
By- Philip Virgo, Winsafe Ltd
-
News
23 Jun 2025
Widening Middle Eastern war increases cyber risk
With the entry of the US into the widening Middle Eastern conflict, cyber risk is likely to increase across the board Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
23 Jun 2025
What is pure risk?
Pure risk refers to risks that are beyond human control and result in a loss or no loss, with no possibility of financial gain. Continue Reading
By- Linda Tucci, Industry Editor -- CIO/IT Strategy
- Ben Cole, Executive Editor
-
Definition
23 Jun 2025
What is residual risk? How is it different from inherent risk?
Residual risk is the risk that remains after efforts to identify and eliminate some or all types of risk have been made. Continue Reading
By- Dave Shackleford, Voodoo Security
- Francesca Sales
-
Blog Post
23 Jun 2025
Let's Chat About AI In Networking And Security By The Fireside
One thing we can’t get away from right now – even if we wanted to – is AI. While there are specialist AI tech vendors, the reality is that it impacts on all aspects of IT, not least two of my key ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
Definition
23 Jun 2025
What is a SYN flood DoS attack?
A SYN flood attack is a type of denial-of-service (DoS) attack on a computer server. This exploit is also known as a 'half-open attack.' Continue Reading
By- Scott Robinson, New Era Technology
- Ben Lutkevich, Site Editor
-
News
23 Jun 2025
Police to gain powers to grab online data when they seize phones and laptops
Academics and civil liberties experts say that proposed ‘authoritarian’ powers to allow police to trawl online and cloud services used by owners of seized devices should require approval from a judge Continue Reading
By- Bill Goodwin, Investigations Editor
-
Feature
23 Jun 2025
Clouded judgement: Resilience, risk and the rise of repatriation
Geopolitics, data sovereignty and rising costs are driving a change in cloud thinking, but it’s slow progress Continue Reading
-
News
20 Jun 2025
Cyber Essentials certifications rising slowly but steadily
The number of businesses attaining the NCSC Cyber Essentials certification continues to increase, but much more can be done to raise awareness of the scheme Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Jun 2025
M&S, Co-op attacks a ‘Category 2 cyber hurricane’, say UK experts
The UK’s Cyber Monitoring Centre has published its first in-depth assessment of a major incident, reflecting on the impact of and lessons learned from Scattered Spider attacks on M&S and Co-op Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Jun 2025
Election workers’ data stolen in cyber breach of Oxford City Council
Oxford City Council election workers had personal information stolen by cyber attackers in an attack over the weekend of 7-8 June. The council has stated that most disrupted systems are back online Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
20 Jun 2025
UK data reforms become law
UK passes wide-ranging data protection reforms to ‘simplify’ organisations’ sharing and processing of data, but questions remain whether changes will be accepted by European Commission when renewing UK data adequacy Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
20 Jun 2025
Beyond the AI hype: How data laws quietly handed power to government and Big Tech
The UK is at risk of becoming an ‘algorithm state’ as the government hands more power to Big Tech and reduces the rights of individuals Continue Reading
By- James Baker, Platform Power Programme Manager at Open Rights Group
-
Definition
20 Jun 2025
What is risk assessment?
Risk assessment is the process of identifying hazards that could negatively affect an organization's ability to conduct business. Continue Reading
By- Kinza Yasar, Technical Writer
- Alexander S. Gillis, Technical Writer and Editor
-
News
19 Jun 2025
UBS employee data leaked after cyber attack on supplier
UBS and fellow Swiss bank Pictet have been affected by a cyber attack on a procurement service provider Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
18 Jun 2025
Traditional fake news detection fails against AI-generated content
As generative AI produces increasingly convincing text, Dutch researchers are exploring how linguistic cues, model bias, and transparency tools can help detect fake news. Continue Reading
By- Kim Loohuis
-
Definition
18 Jun 2025
What is an advanced persistent threat (APT)?
An advanced persistent threat (APT) is a prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Kinza Yasar, Technical Writer
- Linda Rosencrance
-
News
17 Jun 2025
Cyber action plan kicks off to ‘supercharge’ UK security sector
UK government says its cyber growth action plan will provide a large boost to Britain’s security industry as it sets out to create a roadmap for future growth Continue Reading
By- Alex Scroxton, Security Editor
-
News
17 Jun 2025
Scattered Spider widens web to target insurance sector
Following a series of high-profile attacks on prominent retailers and consumer brands, the Scattered Spider cyber crime collective appears to be expanding its targeting to the insurance sector Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
17 Jun 2025
What is confidential computing?
Confidential computing is a concept in which encrypted data can be processed in memory to limit access to protect data in use. It is especially suitable for public clouds. Continue Reading
By- Scott Robinson, New Era Technology
- Alexander S. Gillis, Technical Writer and Editor