IT security
-
News
27 Jun 2025
Citrix Bleed 2 under active attack, reports suggest
Days after news emerged of a new Citrix NetScaler flaw comparable in its scope and severity to 2023's infamous Citrix Bleed, there are already clear indicators that threat actors are taking advantage of the critical vulnerability. Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Jun 2025
Scattered Spider cyber gang turns fire on aviation sector
Multiple reports are emerging of cyber attacks on airlines – Google Cloud’s Mandiant believes them to be linked. Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Jun 2025
Scattered Spider cyber gang turns fire on aviation sector
Multiple reports are emerging of cyber attacks on airlines – Google Cloud’s Mandiant believes them to be linked. Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Jun 2025
Over 2 million affected by US supermarket breach
Belgian-Dutch supermarket operator Ahold Delhaize reveals that over two million people, including employees, had their data compromised following a November 2024 ransomware attack. Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Jun 2025
Ciaran Martin: AI might disturb attacker-defender security balance
The founder of the National Cyber Security Centre spoke with Computer Weekly at Infosecurity Europe 2025 about how artificial intelligence might disturb the attacker-defender security equilibrium Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
27 Jun 2025
MPs propose ban on predictive policing
MPs are attempting to amend the UK government’s forthcoming Crime and Policing Bill so that it prohibits the use of controversial predictive policing systems Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
26 Jun 2025
Sky ECC distributor released from French custody pending trial
Canadian businessman accused of distributing Sky ECC encrypted phones has been released on bail after over four years in custody without a trial Continue Reading
By- Rebecca Tidy
- Bill Goodwin, Computer Weekly
-
News
26 Jun 2025
British hacker IntelBroker faces years in a US prison cell
US authorities have unsealed charges against 25-year-old hacker Kai West, aka IntelBroker, accusing him of being behind multiple cyber attacks Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Jun 2025
Glasgow Council services remain offline a week after cyber attack
Disruption continues a week after core services at Glasgow City Council were forced offline following a cyber attack on a third-party IT services provider Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Jun 2025
Swisscom claims world first with sovereign SASE connectivity service
SASE applied at heart of leading Swiss telco’s converged networking and cyber security offering to deliver customised, advanced networking and security services directly from its own infrastructure Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
25 Jun 2025
Latest Citrix vulnerability could be every bit as bad as Citrix Bleed
A Citrix NetScaler flaw that was quietly patched earlier in June is gathering widespread attention after experts noted strong similarities to the Citrix Bleed vulnerability that caused chaos in late 2023 Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
25 Jun 2025
What is CCTV (closed-circuit television)?
CCTV (closed-circuit television) is a video surveillance system in which signals are transmitted to a specific set of monitors and are not publicly broadcast. It is primarily used for security and monitoring. Continue Reading
By- Katie Terrell Hanna
- Tayla Holman, Site Editor
- Kristen Lee, News Writer
-
Definition
25 Jun 2025
What is single sign-on (SSO)?
Single sign-on (SSO) is a session and user authentication service that lets users access multiple applications or systems with a single set of login credentials. Continue Reading
By- Kinza Yasar, Technical Writer
- Taina Teravainen
-
News
24 Jun 2025
UK ransomware costs significantly outpace other countries
UK organisations hit by ransomware attacks paid much higher ransoms than in other countries over the past 12 months, according to study Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
24 Jun 2025
What is risk avoidance?
Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization and its assets. Continue Reading
-
News
24 Jun 2025
One year since being freed, Julian Assange still a victim of state secrecy
If the State Department’s arguments prevail in FOIA litigation, the truth about US action against Julian Assange and WikiLeaks journalists will never be known Continue Reading
By- Stefania Maurizi
-
E-Zine
24 Jun 2025
Digital ID: cool or contentious?
In this week’s Computer Weekly, we dig into the discourse surrounding the proposal to roll out a national digital identity scheme across the UK, and hear from HPE’s CIO on what he’s learned from his time previously working as an IT chief in the retail sector. We round out the buyer’s guide to cloud repatriation with a look at what’s driving the trend, before concluding the issue with a look at the controversy surrounding quantum computing. Read the issue now. Continue Reading
-
Blog Post
23 Jun 2025
Cyber Skills Today for Economic Growth Tomorrow
Cyber security is a critical enabler of economic growth, fostering a stable environment for innovation and investment, according to the Cyber Security and Resilience Bill: policy statement that ... Continue Reading
By- Philip Virgo, Winsafe Ltd
-
News
23 Jun 2025
Widening Middle Eastern war increases cyber risk
With the entry of the US into the widening Middle Eastern conflict, cyber risk is likely to increase across the board Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
23 Jun 2025
What is pure risk?
Pure risk refers to risks that are beyond human control and result in a loss or no loss, with no possibility of financial gain. Continue Reading
By- Linda Tucci, Industry Editor -- CIO/IT Strategy
- Ben Cole, Executive Editor
-
Definition
23 Jun 2025
What is residual risk? How is it different from inherent risk?
Residual risk is the risk that remains after efforts to identify and eliminate some or all types of risk have been made. Continue Reading
By- Dave Shackleford, Voodoo Security
- Francesca Sales
-
Blog Post
23 Jun 2025
Let's Chat About AI In Networking And Security By The Fireside
One thing we can’t get away from right now – even if we wanted to – is AI. While there are specialist AI tech vendors, the reality is that it impacts on all aspects of IT, not least two of my key ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
Definition
23 Jun 2025
What is a SYN flood DoS attack?
A SYN flood attack is a type of denial-of-service (DoS) attack on a computer server. This exploit is also known as a 'half-open attack.' Continue Reading
By- Scott Robinson, New Era Technology
- Ben Lutkevich, Site Editor
-
News
23 Jun 2025
Police to gain powers to grab online data when they seize phones and laptops
Academics and civil liberties experts say that proposed ‘authoritarian’ powers to allow police to trawl online and cloud services used by owners of seized devices should require approval from a judge Continue Reading
By- Bill Goodwin, Computer Weekly
-
Feature
23 Jun 2025
Clouded judgement: Resilience, risk and the rise of repatriation
Geopolitics, data sovereignty and rising costs are driving a change in cloud thinking, but it’s slow progress Continue Reading
-
News
20 Jun 2025
Cyber Essentials certifications rising slowly but steadily
The number of businesses attaining the NCSC Cyber Essentials certification continues to increase, but much more can be done to raise awareness of the scheme Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Jun 2025
M&S, Co-op attacks a ‘Category 2 cyber hurricane’, say UK experts
The UK’s Cyber Monitoring Centre has published its first in-depth assessment of a major incident, reflecting on the impact of and lessons learned from Scattered Spider attacks on M&S and Co-op Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Jun 2025
Election workers’ data stolen in cyber breach of Oxford City Council
Oxford City Council election workers had personal information stolen by cyber attackers in an attack over the weekend of 7-8 June. The council has stated that most disrupted systems are back online Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
20 Jun 2025
UK data reforms become law
UK passes wide-ranging data protection reforms to ‘simplify’ organisations’ sharing and processing of data, but questions remain whether changes will be accepted by European Commission when renewing UK data adequacy Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
20 Jun 2025
Beyond the AI hype: How data laws quietly handed power to government and Big Tech
The UK is at risk of becoming an ‘algorithm state’ as the government hands more power to Big Tech and reduces the rights of individuals Continue Reading
By- James Baker, Platform Power Programme Manager at Open Rights Group
-
Definition
20 Jun 2025
What is risk assessment?
Risk assessment is the process of identifying hazards that could negatively affect an organization's ability to conduct business. Continue Reading
By- Kinza Yasar, Technical Writer
- Alexander S. Gillis, Technical Writer and Editor
-
News
19 Jun 2025
UBS employee data leaked after cyber attack on supplier
UBS and fellow Swiss bank Pictet have been affected by a cyber attack on a procurement service provider Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
18 Jun 2025
Traditional fake news detection fails against AI-generated content
As generative AI produces increasingly convincing text, Dutch researchers are exploring how linguistic cues, model bias, and transparency tools can help detect fake news. Continue Reading
By- Kim Loohuis
-
Definition
18 Jun 2025
What is an advanced persistent threat (APT)?
An advanced persistent threat (APT) is a prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Kinza Yasar, Technical Writer
- Linda Rosencrance
-
News
17 Jun 2025
Cyber action plan kicks off to ‘supercharge’ UK security sector
UK government says its cyber growth action plan will provide a large boost to Britain’s security industry as it sets out to create a roadmap for future growth Continue Reading
By- Alex Scroxton, Security Editor
-
News
17 Jun 2025
Scattered Spider widens web to target insurance sector
Following a series of high-profile attacks on prominent retailers and consumer brands, the Scattered Spider cyber crime collective appears to be expanding its targeting to the insurance sector Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
17 Jun 2025
What is confidential computing?
Confidential computing is a concept in which encrypted data can be processed in memory to limit access to protect data in use. It is especially suitable for public clouds. Continue Reading
By- Scott Robinson, New Era Technology
- Alexander S. Gillis, Technical Writer and Editor
-
Definition
17 Jun 2025
What is market concentration?
Market concentration refers to how a market is distributed among competing companies. Continue Reading
-
News
17 Jun 2025
UKtech50: Vote for the most influential person in UK technology
Our judges have selected the top 50 leaders from a shortlist of nearly 500 people – now it’s your chance to tell us who you think is the most influential person in UK technology Continue Reading
By -
Definition
16 Jun 2025
What is ESG reporting? Importance and how to get started
ESG reporting is a type of corporate disclosure that details an organization's environmental, social and governance (ESG) promises, efforts and progress. Continue Reading
By- Scott Robinson, New Era Technology
- Cameron Hashemi-Pour, Former Site Editor
- Sean Michael Kerner
-
News
16 Jun 2025
Intelligence sharing key to cyber security in Europe, says EU Commission cyber expert
Cyber criminals choose not to attack Europe due to its resilience and preparedness, says the EU Commission’s principal advisor for cyber security coordination, Despina Spanou Continue Reading
By -
Definition
16 Jun 2025
What is HMAC (Hash-Based Message Authentication Code)?
Hash-based message authentication code (HMAC) is a message encryption method that uses a cryptographic key with a hash function. Continue Reading
By- Scott Robinson, New Era Technology
- Rahul Awati
-
Tip
16 Jun 2025
What is a compliance audit? (with an example checklist)
A compliance audit is critical for finding any potential compliance gaps in an organization's operations. Here's what companies can do to prepare for them. Continue Reading
By -
Definition
16 Jun 2025
What is operational risk?
Operational risk is the risk of losses caused by flawed or failed processes, policies, systems, people or events that disrupt business operations. Continue Reading
By- Kinza Yasar, Technical Writer
- Lisa Morgan
-
Opinion
13 Jun 2025
Fortifying retail: how UK brands can defend against cyber breaches
The recent spate of cyber attacks on UK retailers has to be a wake-up call to build more cyber resilience into digital supply chains and fortify against social engineering attacks Continue Reading
By- Jadee Hanson
-
News
12 Jun 2025
UKtech50 2025: the longlist of the UK’s influential tech leaders
Each year, Computer Weekly launches a search for the most influential people in UK IT, asking the tech community who it thinks should be in the top 50 – here is the longlist of everyone nominated for 2025 Continue Reading
By -
News
12 Jun 2025
Apple encryption row: Does law enforcement need to use Technical Capability Notices?
History shows that law enforcement can bring successful prosecutions without the need for the Home Office to introduce ‘backdoors’ into end-to-end encryption Continue Reading
By- Professor Peter Sommer, digital evidence expert witness
-
News
12 Jun 2025
MPs to investigate potential for government digital identity scheme
Amid growing calls for a national digital ID scheme, Home Affairs Committee launches inquiry into likely benefits and risks Continue Reading
By- Bryan Glick, Editor in chief
-
News
11 Jun 2025
NHS IT the big winner in Reeves’ Spending Review
The chancellor of the exchequer has significantly upped spending on digital and technology initiatives in the current Spending Review period, with the NHS receiving a 50% tech funding increase Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Jun 2025
WhatsApp seeks to join Apple in legal challenge against Home Office encryption orders
WhatsApp today applied to intervene in an Investigatory Powers Tribunal case that is considering the UK’s ability to issue a technical capability notice on Apple to ‘weaken encryption’ Continue Reading
By- Bill Goodwin, Computer Weekly
-
Opinion
11 Jun 2025
Cyber security beyond compliance: Why resilience is the new boardroom imperative
Cyber security has been everything from a tick-box exercise to a compliance headache for organisations - but the pressing threats we face mean cyber resilience must become a boardroom issue Continue Reading
By -
Opinion
11 Jun 2025
Human vs digital therapy: AI falls short when IT pros need help
Stressed IT and cyber professionals are turning to AI chatbots for support, but is handing people's mental wellbeing over to algorithms really such a bright idea? Continue Reading
By- Malcolm Hanson, PTSD Revolution
-
Opinion
11 Jun 2025
Investor behaviour in the wake of cyber's 'black swan' moment
So-called Black Swan events expose the blind spots in even the most sophisticated forecasting models, signaling a need to rethink how businesses, and those investing in them, quantify and prepare for cyber risk. Continue Reading
By- Ed Bartlett, Hicomply
-
News
11 Jun 2025
Government using national security as ‘smokescreen’ in Apple encryption row
Senior conservative MP David Davis says the Home Office should disclose how many secret orders it has issued against telecoms and internet companies to Parliament Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
11 Jun 2025
How breaking things builds resilient systems
To prevent and recover from outages in today’s complex, cloud-native world, enterprises must proactively and deliberately inject failure into their systems though chaos engineering practices Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
11 Jun 2025
June Patch Tuesday brings a lighter load for defenders
Barely 70 vulnerabilities make the cut for Microsoft’s monthly security update, but an RCE flaw in WEBDAV and an EoP issue in Windows SMB Client still warrant close attention Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Jun 2025
Cyber Bill at risk of becoming a missed opportunity, say MPs
An APPG report warns that the government’s flagship cyber security legislation is too narrow in its scope and risks missing opportunities to embed resilience at the heart of the British economy Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
11 Jun 2025
What is ransomware as a service (RaaS)?
Ransomware as a service (RaaS) is a subscription-based business model that enables threat actors, also called affiliates, to launch ransomware attacks by accessing and using predeveloped ransomware tools. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Kinza Yasar, Technical Writer
- Sean Michael Kerner
-
Answer
10 Jun 2025
How to choose coding standards: Development best practices
Learn how coding standards enhance quality and efficiency in software projects. Follow coding conventions and standards to achieve the five pillars of code quality. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
News
10 Jun 2025
UK defence scheme invests in future cyber tech Cheri
Cambridge-based SCI Semiconductors is awarded DTEP funding to work on the application of defensive Cheri technology Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Jun 2025
Third-party security weaknesses threaten Europe’s big banks
Security breaches via third parties increased by 25% at Europe’s largest finance firms Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Feature
09 Jun 2025
Are we normalising surveillance in schools?
Children and teenagers are subjected to a vast array of surveillance technologies in schools. These are intended to keep them safe, but are we normalising surveillance for young people? Continue Reading
-
News
09 Jun 2025
US lawmakers say UK has ‘gone too far’ by attacking Apple’s encryption
US politicians are calling for Congress to rewrite the US Cloud Act to prevent the UK issuing orders to require US tech companies to introduce ‘backdoors’ in end-to-end encrypted messaging and storage Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
06 Jun 2025
UK ICO publishes AI and biometrics strategy
The UK data regulator has outlined how it will approach the regulation of artificial intelligence and biometric technologies, which will focus in particular on automated decision-making systems and police facial recognition Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
06 Jun 2025
CISOs must translate cyber threats into business risk
To manage risk effectively and secure board-level buy-in, CISOs must stop talking about technology and start speaking the language of business, according to a senior Check Point executive Continue Reading
-
News
05 Jun 2025
HMRC phishing breach wholly avoidable, but hard to stop
A breach at HMRC saw innocent taxpayers tricked into letting scammers impersonate them through simple phishing attacks leading to account takeover. Such attacks are avoidable, but hard to stop Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
05 Jun 2025
CISOs: Don't block AI, but adopt it with eyes wide open
The Security Think Tank considers how CISOs can best plan to facilitate the secure running of AI and Gen AI-based initiatives and ensure employees do not inadvertently leak data or make bad decisions. Continue Reading
By- Mike Gillespie and Ellie Hurst, Advent IM
-
Tip
05 Jun 2025
Compliance stakeholders and how to work with them
Stakeholders' involvement can strengthen an organization's compliance program. Learn best practices for engaging key stakeholders in compliance initiatives. Continue Reading
By -
News
05 Jun 2025
UK’s error-prone eVisa system is ‘anxiety-inducing’
People experiencing technical errors with the Home Office’s electronic visa system explain the psychological toll of not being able to reliably prove their immigration status in the face of a hostile and unresponsive bureaucracy Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
05 Jun 2025
Building the foundations: A national roadmap for digital identity and sovereign data
Now the UK government has offered some clarity on the future of private and public sector digital identity services, it's time to work together to put the essential foundations in place to make digital ID work for everyone Continue Reading
By- David Crack, Association of Digital Verification Professionals
-
News
05 Jun 2025
How GitLab is tapping AI in DevSecOps
GitLab CISO Josh Lemos explains how the company is weaving AI, through its Duo tool, into the entire software development lifecycle to enhance efficiency and automate incident response Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
04 Jun 2025
Put ROCs before SOCs, Qualys tells public sector
Putting risk operations before security operations may help government agencies and other public sector bodies better manage the myriad threats they face, and make better decisions for the security of all Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Jun 2025
NCSC sets out how to build cyber safe cultures
The UK’s National Cyber Security Centre has published guidance for security teams and leaders on how to foster accessible and appropriate cyber security cultures in their organisations Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Jun 2025
Investigatory powers: Guidelines for police and spies could also help businesses with AI
Computer Weekly talks to Muffy Calder, technology advisor to the UK’s investigatory powers commissioner, about privacy, intrusion and artificial intelligence Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
04 Jun 2025
Microsoft outlines three-pronged European cyber strategy
Microsoft chair Brad Smith outlines an expansive cyber programme targeting governments across Europe with enhanced threat intelligence and support Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Jun 2025
European Commission should rescind UK data adequacy
Civil society organisations have urged the European Commissioner to not renew the UK’s data adequacy, given the country’s growing divergence from European data protection standards Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
04 Jun 2025
Fortifying the future: The pivotal role of CISOs in AI operations
The Security Think Tank considers how CISOs can best plan to facilitate the secure running of AI and Gen AI-based initiatives and ensure employees do not inadvertently leak data or make bad decisions. Continue Reading
By- Aditya K Sood, Aryaka
-
Feature
04 Jun 2025
Dutch university’s rapid response saved it from ransomware devastation
Eindhoven University of Technology has planned multi-factor authentication and regularly practised cyber crisis drills – yet it still fell victim to attackers who exploited gaps in its defences Continue Reading
By- Kim Loohuis
-
News
04 Jun 2025
Infosecurity 2025: SMEs feel on their own in the face of cyber attacks
Project findings to be presented at Infosecurity Europe 2025 highlight vulnerability of SMEs to cyber attack Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
Opinion
03 Jun 2025
Preparing for AI: The CISO’s role in security, ethics and compliance
The Security Think Tank considers how CISOs can best plan to facilitate the secure running of AI and Gen AI-based initiatives and ensure employees do not inadvertently leak data or make bad decisions. Continue Reading
By- Elliott Wilkes, ACDS
-
News
03 Jun 2025
SailPoint charts course for AI-driven identity security
SailPoint is driving the use of agentic AI in identity security with its Harbor Pilot offering while preparing to help enterprises govern and secure AI agents Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
02 Jun 2025
US cyber agency CISA faces stiff budget cuts
CISA is one of several US agencies facing drastic budget cuts under the Trump administration Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
02 Jun 2025
The hidden security risks of open source AI
The Security Think Tank considers how CISOs can best plan to facilitate the secure running of AI and Gen AI-based initiatives and ensure employees do not inadvertently leak data or make bad decisions. Continue Reading
By- Brian Fox, Sonatype
-
News
02 Jun 2025
Cyber and digital get over £1bn to enhance UK’s national security
The government has set out plans to spend over a billion pounds on digital and cyber warfare capabilities to enhance the UK’s ability to defend itself and fight offensive wars Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
02 Jun 2025
What is a next-generation firewall (NGFW)?
A next-generation firewall (NGFW) is a network security device that combines traditional firewall capabilities with advanced features to detect and block sophisticated cyberattacks. Continue Reading
By- Casey Clark, TechTarget
- Sharon Shea, Executive Editor
-
Opinion
02 Jun 2025
AI security: Balancing innovation with protection
The Security Think Tank considers how CISOs can best plan to facilitate the secure running of AI and Gen AI-based initiatives and ensure employees do not inadvertently leak data or make bad decisions. Continue Reading
By- Javvad Malik, KnowBe4
-
News
02 Jun 2025
Infosecurity 2025: NCA cyber intelligence head spells out trends
Will Lyne, head of cyber intelligence at the National Crime Agency, sketches out cyber criminal trends as ransomware and other attack varieties become democratised beyond Russophone, skilled software developers Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
Feature
02 Jun 2025
Risk maturity model: How it works and how to use one
Explore risk maturity models and assessment tools for enhancing enterprise risk management. Improve ERM programs to mitigate risk and gain a competitive edge. Continue Reading
By- Ben Lutkevich, Site Editor
-
Definition
30 May 2025
What is security?
Security for information technology (IT) refers to the methods, tools and personnel used to defend an organization's digital assets. Continue Reading
By- Nick Barney, Technology Writer
- Madelyn Bacon, TechTarget
-
Opinion
30 May 2025
Rethinking secure comms: Are encrypted platforms still enough?
A leak of information on American military operations caused a major political incident in March 2025. The Security Think Tank considers what CISOs can learn from this potentially fatal error Continue Reading
By- Russell Auld, PAC
-
Video
30 May 2025
An explanation of ransomware
Ransomware locks an organization out of its data or digital services until it pays up. To minimize attacks, businesses can enhance security, train employees and back up data. Continue Reading
By- Tommy Everson, Assistant Editor
- TechTarget Contributor
-
News
30 May 2025
Dutch businesses lag behind in cyber resilience as threats escalate
While non-IT business professionals in the middle of their careers face the most disruption from AI, professionals in the IT services sector and their employers must prepare for change Continue Reading
By- Kim Loohuis
-
Feature
30 May 2025
How cyber security professionals are leveraging AWS tools
It’s now essential for IT security teams to have oversight of cloud computing, and AWS offers a plethora of tools to make managing it easier. Find out how cyber pros are using them in the wild Continue Reading
-
Opinion
30 May 2025
What VMware’s licensing crackdown reveals about control and risk
An assessments of the risks VMware customers on perpetual licences now need to consider Continue Reading
By- Iain Saunderson, CTO, Spinnaker Support
-
News
30 May 2025
Noisy quantum hardware could crack RSA-2048 in seven days
Research highlights the need for quantum safe cryptography given the speed with which quantum computing is evolving Continue Reading
By- Cliff Saran, Managing Editor
-
News
30 May 2025
Cloud migration demands contractual safeguards and clear strategy
Cyber security experts urge organisations to define clear objectives, understand shared security models and implement strong data governance when migrating workloads to the cloud Continue Reading
By- Aaron Tan, Informa TechTarget
-
Opinion
29 May 2025
Signalgate is a signal to revisit security onboarding and training
A leak of information on American military operations caused a major political incident in March 2025. The Security Think Tank considers what can CISOs can learn from this potentially fatal error. Continue Reading
By- Mike Gillespie and Ellie Hurst, Advent IM
-
Opinion
29 May 2025
Zero-trust is redefining cyber security in 2025
The future of zero-trust is about embedding resilience into every facet of an organisation. To achieve this, SRM leaders must reimagine their strategies to address emerging challenges and prioritise key areas. Continue Reading
By- Dale Koeppen, Gartner
-
Opinion
29 May 2025
RSAC rewind: Agentic AI, governance gaps and insider threats
AI was naturally a major theme of this year's RSAC conference, but we maybe failed to anticipate how it is coming to dominate every conversation. Continue Reading
By- James Robinson, Netskope
-
Feature
29 May 2025
AI and compliance: Staying on the right side of law and regulation
Without careful planning, AI projects risk blundering into a legal and regulatory minefield. We look at the risks from hallucinations, basic errors and coming regulation Continue Reading
-
Podcast
29 May 2025
AI compliance: Dealing with data change and proliferation
Podcast: We talk with Vigitrust CEO Mathieu Gorge about staying on top of compliance and artificial intelligence, where the danger is data that changes during AI processing and can also proliferate Continue Reading
By- Antony Adshead, Storage Editor
-
News
29 May 2025
Gov.uk Wallet open to public sector bodies
Government departments can soon begin to add documents to Gov.uk Wallet, as the Government Digital Service publishes guidance for public sector bodies on how to use the smartphone app Continue Reading
By