IT security
- 
				News
					25 Sep 2025
					
									
										  Netherlands establishes cyber resilience network to strengthen public-private digital defenceNetwork will connect organisations in a cyber crime defence initiative that goes way beyond information sharing Continue Reading 
- 
				News
					24 Jul 2025
					
									
										  Dutch researchers use heartbeat detection to unmask deepfakesDutch method to counter deepfakes analyses blood flow patterns in faces that current deepfake generation tools cannot yet replicate Continue Reading 
- 
                Blog Post
                05 Jan 2025
                  Relaunch of the Norwood Community Safety PartnershipNeighbours by chance, working together by choice: the relaunch of Neighbourhood Watch in Lambeth. Approximately 6% of the 20 million households in England and Wales are signed up to Neighbourhood ... Continue Reading By- Philip Virgo, Winsafe Ltd
 
- 
                Definition
                03 Jan 2025
                  What is the Gramm-Leach-Bliley Act (GLBA)?The Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways financial institutions deal with the private information of individuals. Continue Reading 
- 
                News
                03 Jan 2025
                  US Treasury incident a clear warning on supply chain security in 2025A cyber incident at the US Department of the Treasury – blamed on a Chinese state actor – raises fresh warnings about supply chain risk after it was found to have originated via vulnerabilities in a remote tech support product Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                03 Jan 2025
                  Corporate cover-up behind world-beating cyber security record in Middle EastReport ranking Gulf corporations ahead of US and EU counterparts for cyber security has sparked debate about the region’s tendency for secrecy and state control Continue Reading By
- 
                News
                31 Dec 2024
                  Top 10 surveillance, journalism and encryption stories of 2024Revelations of covert and unlawful monitoring of journalists and their confidential sources by the Police Service of Northern Ireland and the Metropolitan Police attracted a huge amount of attention this year Continue Reading By- Bill Goodwin, Investigations Editor
 
- 
                News
                27 Dec 2024
                  Top 10 ANZ stories of 2024The 2024 tech landscape in Australia and New Zealand was dotted with developments spanning cloud migrations and AI adoption to heightened data security and real-time data streaming Continue Reading By- Aaron Tan, Informa TechTarget
 
- 
                News
                24 Dec 2024
                  Top 10 police technology stories of 2024Here are Computer Weekly’s top 10 police technology stories of 2024 Continue Reading By- Sebastian Klovig Skelton, Data & ethics editor
 
- 
                Definition
                23 Dec 2024
                  What is a proxy firewall?A proxy firewall is a network security system that protects network resources by filtering messages at the application layer. Continue Reading By
- 
                Definition
                23 Dec 2024
                  What is a public key and how does it work?In cryptography, a public key is a large numerical value that is used to encrypt data. Continue Reading By
- 
                Feature
                23 Dec 2024
                  6 must-read blockchain books for 2025Numerous sources provide comprehensive information on blockchain fundamentals and applications. We narrowed the field to six of the most popular and diverse books available. Continue Reading By- Kinza Yasar, Technical Writer
 
- 
                News
                20 Dec 2024
                  Top 10 data and ethics stories of 2024Here are Computer Weekly’s top 10 data and ethics stories of 2024 Continue Reading By- Sebastian Klovig Skelton, Data & ethics editor
 
- 
                News
                19 Dec 2024
                  Top 10 ASEAN stories of 2024Southeast Asia’s 2024 tech landscape saw major companies embracing AI, shifts in open source and the emergence of local large language models to address the needs of a diverse region Continue Reading By- Aaron Tan, Informa TechTarget
 
- 
                News
                19 Dec 2024
                  LockBit ransomware gang teases February 2025 returnAn individual associated with the LockBit ransomware gang has broken cover to tease details of a new phase of the cyber criminal operation's activity, which they claim is set to begin in February 2025 Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                19 Dec 2024
                  Latest attempt to override UK’s outdated hacking law stallsAmendments to the Data Bill that would have given the UK cyber industry a boost by updating restrictive elements of the Computer Misuse Act have failed to progress beyond a Lords committee Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Opinion
                19 Dec 2024
                  The Data Bill: It’s time to cyber upThe Computer Misuse Act is outdated and needs reform - so it's disappointing to see the government decline an opportunity to update the legislation, says the peer who proposed amendments Continue Reading By- Lord Chris Holmes, House of Lords
 
- 
                Opinion
                19 Dec 2024
                  Innovation, insight and influence: the CISO playbook for 2025 and beyondFrom Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading By- Mandy Andress, Elastic
 
- 
                Definition
                19 Dec 2024
                  What is a public key certificate?A public key certificate is a digitally signed document that serves to validate the sender's authorization and name. Continue Reading By
- 
                News
                19 Dec 2024
                  French court refuses to expedite trial of Sky ECC cryptophone distributor Thomas HerdmanCanadian businessman Thomas Herdman, who was arrested by French police despite agreeing a deal to cooperate with US investigators, has been denied bail after 42 months in pre-trial detention Continue Reading By- Bill Goodwin, Investigations Editor
 
- 
                News
                18 Dec 2024
                  The Security Interviews: Martin Lee, Cisco TalosThreat intel expert and author Martin Lee, EMEA technical lead for security research at Cisco Talos, joins Computer Weekly to mark the 35th anniversary of the first ever ransomware attack Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                18 Dec 2024
                  Top 10 cyber security stories of 2024Data breaches, data privacy and protection, and the thorny issue of open source security were all hot topics this year. Meanwhile, security companies frequently found themselves hitting the headlines, and not always for good reasons. Here are Computer Weekly's top 10 cyber security stories of 2024 Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Opinion
                18 Dec 2024
                  Look to the future: How the threat landscape may evolve nextFrom Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading By- Elliott Wilkes, ACDS
 
- 
                News
                18 Dec 2024
                  Top 10 cyber crime stories of 2024From ransomware targeting the NHS to nation-state-backed intrusions, 2024 was another big year for cyber criminals and cyber spooks alike, but they didn't have it all their own way as the good guys fought back Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                18 Dec 2024
                  Axon still in possession of Police Scotland encryption keysSupplier’s possession of encryption keys for Police Scotland data sharing system opens potential for access and transfer of sensitive data without the knowledge or consent of the force Continue Reading By- Sebastian Klovig Skelton, Data & ethics editor
 
- 
                Opinion
                17 Dec 2024
                  2025-30: Geopolitical influence on cyber and the convergence of threatFrom Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading By- Rob Dartnall, SecAlliance
 
- 
                Opinion
                17 Dec 2024
                  Using AI to build stronger client relationships in 2025On the Twelfth Day of AI, we explore the key benefits of Copilot, the potential risks, barriers to adoption, and strategies for ensuring successful implementation. Continue Reading By- Josie Rickerd, ANS
 
- 
                News
                17 Dec 2024
                  Conservative MP adds to calls for public inquiry over PSNI police spyingConservative MP David Davis calls for a public inquiry following a court ruling that the PSNI and Metropolitan Police unlawfully placed journalists under electronic surveillance Continue Reading By- Bill Goodwin, Investigations Editor
- Cormac Kehoe
 
- 
                Definition
                17 Dec 2024
                  What is passwordless authentication?Passwordless authentication allows a user to sign into a service without using a password. This is often done using certificates, security tokens, one-time passwords (OTPs) or biometrics. Continue Reading By- Kinza Yasar, Technical Writer
- Gavin Wright
- Alexander S. Gillis, Technical Writer and Editor
 
- 
                Definition
                17 Dec 2024
                  What is PKI (public key infrastructure)?PKI (public key infrastructure) is the underlying framework that enables the secure exchange of information over the internet using digital certificates and public key encryption. Continue Reading By
- 
                News
                17 Dec 2024
                  Top 10 end user computing stories of 2024Here are Computer Weekly’s top 10 end user stories of the year, overlooking the growth of new PC form factors and devices equipped with neural processing units for AI acceleration Continue Reading By- Cliff Saran, Managing Editor
 
- 
                News
                17 Dec 2024
                  Digital Ethics Summit 2024: recognising AI’s socio-technical natureAt trade association TechUK’s eighth annual Digital Ethics Summit, public officials and industry figures and civil society groups met to discuss the ethical challenges associated with the proliferation of artificial intelligence tools globally and the direction of travel set for 2025 Continue Reading By- Sebastian Klovig Skelton, Data & ethics editor
 
- 
                News
                17 Dec 2024
                  Tribunal criticises PSNI and Met Police for spying operation to identify journalists’ sourcesThe Investigatory Powers Tribunal has criticised the Police Service of Northern Ireland and the Metropolitan Police for unlawfully spying on journalists Continue Reading By- Bill Goodwin, Investigations Editor
 
- 
                E-Zine
                17 Dec 2024
                  Technology on the beatIn this week’s Computer Weekly, we examine the future of technology in policing as the Home Office announces plans for a new IT organisation. We look at the security risks from employees using publicly available generative AI tools in the workplace. And we hear how Hyatt Hotels is creating a data culture across the organisation. Read the issue now. Continue Reading 
- 
                News
                17 Dec 2024
                  How NCS is tackling the enterprise IT marketThe technology service provider is counting on its government experience, global expert network and cyber security capabilities to penetrate the enterprise IT market Continue Reading By- Aaron Tan, Informa TechTarget
 
- 
                Opinion
                16 Dec 2024
                  Private vs public AI: Which should your business use in 2025?On the Eleventh Day of AI, we explore the differences between private and public AI, the key benefits and downsides of private AI, future trends, and how to get started with a hybrid AI approach. Continue Reading By- Chris Folkerd, ANS
 
- 
                16 Dec 2024
                  What are the security risks of bring your own AI?The rise of generative AI has led to a plethora of publicly accessible artificial intelligence tools, but what are the risks when external AI tools are used with corporate data? Continue Reading 
- 
                Definition
                16 Dec 2024
                  What is a business continuity plan audit and how do you create one?A business continuity plan audit is a formalized method for evaluating how business continuity processes are being managed. Continue Reading By- Scott Robinson, New Era Technology
- Erin Sullivan, Senior Site Editor
- Andrew Burton
 
- 
                News
                16 Dec 2024
                  The Security Interviews: Stephen McDermid, OktaOkta regional chief security officer for EMEA sits down with Dan Raywood to talk about how Okta is pivoting to a secure-by-design champion Continue Reading By
- 
                Opinion
                13 Dec 2024
                  Decoding the end of the decade: What CISOs should watch out forFrom Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading By- Paul Lewis, Nominet
 
- 
                News
                13 Dec 2024
                  Computer Misuse Act reform gains traction in ParliamentAn amendment to the proposed Data (Access and Use) Bill that will right a 35-year-old wrong and protect security professionals from criminalisation is to be debated at Westminster Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                13 Dec 2024
                  How AWS is protecting customers from cyber threatsAmazon Web Services reveals how its threat intelligence capabilities work under the hood to thwart cyber attacks and keep its customers’ data safe Continue Reading By- Aaron Tan, Informa TechTarget
 
- 
                Opinion
                12 Dec 2024
                  CISOs: Don’t rely solely on technical defences in 2025From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading By- Deepti Gopal, Gartner
 
- 
                News
                12 Dec 2024
                  Emerging Ymir ransomware heralds more coordinated threats in 2025A newly observed ransomware strain has the community talking about more collaboration, and blurred lines, between threat groups next year, according to NCC’s monthly cyber barometer Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                11 Dec 2024
                  Russia focuses cyber attacks on Ukraine rather than West despite rising tensionComputer Weekly talks to GCHQ’s National Cyber Security Centre operations director Paul Chichester and former NCSC chief executive Ciaran Martin on Russia, China and Salt Typhoon Continue Reading By- Bill Goodwin, Investigations Editor
 
- 
                News
                10 Dec 2024
                  Dangerous CLFS and LDAP flaws stand out on Patch TuesdayMicrosoft has fixed over 70 CVEs in its final Patch Tuesday update of the year, and defenders should prioritise a zero-day in the Common Log File System Driver, and another impactful flaw in the Lightweight Directory Access Protocol Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                10 Dec 2024
                  iOS vuln leaves user data dangerously exposedJamf threat researchers detail an exploit chain for a recently patched iOS vulnerability that enables a threat actor to steal sensitive data, warning that many organisations are still neglecting mobile updates Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Opinion
                10 Dec 2024
                  Defending against cyber grinches: AI for enhanced securityOn the Seventh Day of AI, Defending against cyber grinches: AI for enhanced security, we explore the double-edged sword of AI in cybersecurity and how businesses can protect themselves against the cyber grinches. Continue Reading By- Justin Young, ANS
 
- 
                Definition
                10 Dec 2024
                  What is a block cipher?A block cipher is a method of encrypting data in blocks to produce ciphertext using a cryptographic key and algorithm. Continue Reading By
- 
                Definition
                10 Dec 2024
                  What is a stream cipher?A stream cipher is an encryption method in which data is encrypted one byte at a time. Continue Reading By
- 
                News
                10 Dec 2024
                  UK police continue to hold millions of custody images unlawfullyAnnual report from the biometrics and surveillance camera commissioner of England and Wales highlights the ongoing and unlawful retention millions of custody images of innocent people never charged with a crime by police Continue Reading By- Sebastian Klovig Skelton, Data & ethics editor
 
- 
                News
                10 Dec 2024
                  DWP ‘fairness analysis’ reveals bias in AI fraud detection systemInformation about people’s age, disability, marital status and nationality influences decisions to investigate benefit claims for fraud, but the Department for Work and Pensions says there are ‘no immediate concerns of unfair treatment’ Continue Reading By- Sebastian Klovig Skelton, Data & ethics editor
 
- 
                News
                10 Dec 2024
                  Top IT predictions in APAC in 2025Enterprises across the Asia-Pacific region are expected to focus on securing their AI workloads, invest in energy efficient infrastructure and rethink their platform strategy, among other tech trends in the new year Continue Reading By- Aaron Tan, Informa TechTarget
 
- 
                10 Dec 2024
                  NCSC boss calls for ‘sustained vigilance’ in an aggressive worldRichard Horne, the CEO of NCSC, echoed wider warnings about the growing number and severity of cyber threats facing the UK as he launched the security body’s eighth annual report. Continue Reading 
- 
                E-Zine
                10 Dec 2024
                  On the road to change at Aston MartinIn this week’s Computer Weekly, we talk to the CIO at luxury car maker Aston Martin to find out how technology is helping tackle the huge challenges facing the automotive sector. The new National Cyber Security boss explains why organisations need to be extra vigilant against the growing online threats. And we examine the future of secure remote connectivity in the cloud era. Read the issue now. Continue Reading 
- 
                Opinion
                09 Dec 2024
                  In 2025: Identities conquer, and hopefully uniteFrom Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading By- Stephen McDermid, Okta
 
- 
                Opinion
                09 Dec 2024
                  AI and cloud: The perfect pair to scale your business in 2025On the Sixth Day of AI, we explore how leveraging AI and cloud can enhance business performance and shares tips for successful implementation. Continue Reading By- Matt Gallagher, ANS
 
- 
                Definition
                09 Dec 2024
                  What is user authentication?User authentication refers to the process of verifying the identity of a user attempting to gain access to a computer network, system or device. This process runs in the background and can be done through different means, such as asking the user to enter a password, provide a PIN or provide a fingerprint. Continue Reading By
- 
                Definition
                09 Dec 2024
                  What is a session key?A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session between a user and another computer or between two computers. Continue Reading By
- 
                Definition
                09 Dec 2024
                  What is cipher block chaining (CBC)?Cipher block chaining (CBC) is a mode of operation for a block cipher -- one in which a sequence of bits are encrypted as a single unit, or block, with a cipher key applied to the entire block. Continue Reading By
- 
                News
                09 Dec 2024
                  Bahrain faces legal action after planting Pegasus spyware on UK bloggerA court has given the go-ahead to UK-based blogger Yusuf Al-Jamri to seek damages from the Kingdom of Bahrain after it deployed spyware from Israel’s NSO Group to hack his phone Continue Reading By- Bill Goodwin, Investigations Editor
 
- 
                Opinion
                06 Dec 2024
                  Six trends that will define cyber through to 2030From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading By- Pierre-Martin Tardif, ISACA
 
- 
                News
                06 Dec 2024
                  US TikTok ban imminent after appeal failsTikTok’s appeal against a US government ban has failed, with a judge dismissing its arguments that its First Amendment free speech rights are being restricted Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Opinion
                06 Dec 2024
                  How AI can help you attract, engage and retain the best talent in 2025On the Fifth Day of AI, we explore how AI is reshaping HR – boosting productivity, addressing concerns, and preparing organisations for the future. Continue Reading By- Toria Walters, ANS
 
- 
                News
                06 Dec 2024
                  TfL cyber attack cost over £30m to dateTfL provides more detail on the financial impact of the September 2024 cyber attack that crippled several of its online systems Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Definition
                05 Dec 2024
                  What are Common Criteria (CC) for Information Technology Security Evaluation?Common Criteria (CC) is an international standard (ISO/IEC 15408) for evaluating information technology security products. Continue Reading 
- 
                News
                05 Dec 2024
                  Government agencies urged to use encrypted messaging after Chinese Salt Typhoon hackChinese hacking of US telecom networks raises questions about the exploitation by hostile hacking groups of government backdoors to provide lawful access to telecoms services Continue Reading By- Bill Goodwin, Investigations Editor
 
- 
                News
                05 Dec 2024
                  Met Police challenged on claim LFR supported by ‘majority of Lewisham residents’A community impact assessment for the Met Police’s deployment of live facial-recognition tech in Lewisham brings into question the force’s previous claims to Computer Weekly that its use of the technology is supported by ‘the majority of residents’ Continue Reading By- Sebastian Klovig Skelton, Data & ethics editor
 
- 
                Opinion
                05 Dec 2024
                  Are you on the naughty or nice list for responsible AI adoption?On the Fourth Day of AI, we discuss the value of adopting AI responsibly, and outlines how businesses can build responsible adoption into their plans Continue Reading By- Kyle Hill, ANS
 
- 
                News
                04 Dec 2024
                  Shared digital gateway was source of three NHS ransomware attacksAlder Hey children’s hospital confirms ransomware operators accessed its systems through a shared digital gateway, but is standing firm in the face of the gang’s demands Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                04 Dec 2024
                  NCA takes out network that laundered ransomware paymentsNCA-led Operation Destabilise disrupts Russian crime networks that funded the drugs and firearms trade in the UK, helped Russian oligarchs duck sanctions, and laundered money stolen from the NHS and others by ransomware gangs Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Opinion
                04 Dec 2024
                  The most pressing challenges for CISOs and cyber security teamsFrom Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading By- Elliot Rose, PA Consulting
 
- 
                News
                04 Dec 2024
                  Nordics move to deepen cyber security cooperationNordic countries are increasing collaboration on cyber security amid more sophisticated and aggressive attacks Continue Reading By- Gerard O'Dwyer
 
- 
                Blog Post
                04 Dec 2024
                  Headline: Major SI Commits To A Properly Good, Modern Technology... As Tested!In recent blogs – and in many recent conversations with folks from various echelons and shades of IT – I’ve talked about the need for some bravery among the SI and MSP communities to run with some ... Continue Reading By- Steve Broadhead, Broadband Testing
 
- 
                News
                03 Dec 2024
                  US updates telco security guidance after mass Chinese hackFollowing the widespread Salt Typhoon hacks of US telecoms operators including AT&T and Verizon, CISA and partner agencies have launched refreshed security guidance for network engineers and defenders alike Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                03 Dec 2024
                  F1 heightens fan experiences with the power of SalesforceLearn how the technical teams behind Formula One are using Salesforce’s tools to enhance fan activation and engagement at 24 races across the world, and how they are bringing AI into play with Agentforce capabilities Continue Reading By- Alex Scroxton, Security Editor
 
- 
                E-Zine
                03 Dec 2024
                  Curing cancer with computersIn this week’s Computer Weekly, we go behind the scenes at the Francis Crick Institute to find out how data science and AI support its groundbreaking medical research. As courts on both sides of the Atlantic target Google, we analyse the legal threats for Big Tech. And our latest buyer’s guide examines cloud and object storage. Read the issue now. Continue Reading 
- 
                News
                02 Dec 2024
                  APAC businesses face cyber onslaughtThe Asia-Pacific region is a cyber security hotspot, enduring significantly more cyber attacks than the global average, with AI-powered threats and skills shortages exacerbating the problem Continue Reading 
- 
                News
                02 Dec 2024
                  NCSC boss calls for ‘sustained vigilance’ in an aggressive worldNCSC CEO Richard Horne is to echo wider warnings about the growing number and severity of cyber threats facing the UK as he launches the security body’s eighth annual report Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Opinion
                02 Dec 2024
                  CISOs will face growing challenges in 2025 and beyondFrom Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading By- Mike Gillespie and Ellie Hurst, Advent IM
 
- 
                Opinion
                02 Dec 2024
                  Unwrapping the benefits of AI for marketingIn the first of a new series of articles, the 12 Days of AI, we explore how AI is being used in marketing, the benefits and key use cases, as well as concerns and how marketers can best take advantage of AI Continue Reading By- Sophie Rea, ANS
 
- 
                News
                02 Dec 2024
                  UK economy could see £600m boost through digital IDs for businessesGovernment-backed organisation kicks off initiative to widen use of digital identities, in an effort to streamline financial services and cut hundreds of millions of pounds of economic crime Continue Reading By- Karl Flinders, Chief reporter and senior editor EMEA
 
- 
                Feature
                29 Nov 2024
                  Automated patch management: A proactive way to stay ahead of threatsTimely patch management should be crucial in any organisation, but too often it goes by the wayside. Automating the process may offer a path forward for hard-pressed cyber defenders Continue Reading By
- 
                News
                29 Nov 2024
                  Second Merseyside hospital hit by cyber attackHot on the heels of a major cyber attack at a nearby NHS trust, one of Europe’s biggest and busiest children’s hospitals is reportedly scrambling to deal with ransomware gang Continue Reading By- Joe O’Halloran, Computer Weekly
 
- 
                News
                29 Nov 2024
                  Swedish authorities urged to discontinue AI welfare systemAmnesty International is calling on Sweden’s social insurance agency to immediately discontinue its machine learning-based welfare system, following an investigation by Lighthouse Reports and Svenska Dagbladet that found it to be discriminatory Continue Reading By- Sebastian Klovig Skelton, Data & ethics editor
 
- 
                News
                28 Nov 2024
                  Energy sector’s digital shift opens door to cyber threatsThe transition to renewable energy and the increasing integration of IT and OT systems in the energy sector are creating new cyber security challenges Continue Reading 
- 
                Definition
                27 Nov 2024
                  What is obfuscation and how does it work?Obfuscation means to make something difficult to understand. Programming code is often obfuscated to protect intellectual property or trade secrets, and to prevent an attacker from reverse engineering a proprietary software program. Continue Reading By- Rahul Awati
- Ben Lutkevich, Site Editor
 
- 
                News
                27 Nov 2024
                  Scientists demonstrate Pixelator deepfake image verification toolWith the age of deepfake imagery upon us, a team led by York St John University researchers has created a tool to help people ‘navigate the fine line between reality and fabrication’ Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                27 Nov 2024
                  Further disruption expected after latest NHS cyber attackIT and security teams at Wirral University Teaching Hospitals NHS Trust continue to work around the clock following a major cyber incident, with services disrupted and no timeline for resolution Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Opinion
                27 Nov 2024
                  In the cloud, effective IAM should align to zero-trust principlesThe Security Think Tank considers best practices in identity and access management and how can they be deployed to enable IT departments to combat cyber-attacks, phishing attacks and ransomware Continue Reading By- Vladimir Jirasek, Foresight Cyber
 
- 
                News
                26 Nov 2024
                  Sellafield operator opens dedicated cyber centreThe UK’s Nuclear Decommissioning Authority has opened a cyber security centre spanning its activities across the nuclear sector Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                26 Nov 2024
                  Blue Yonder ransomware attack breaks systems at UK retailersUK supermarkets continue to deal with the impact of a ransomware attack on the systems of supply chain software supplier Blue Yonder, which is disrupting multiple aspects of their businesses including deliveries and staff management Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Definition
                26 Nov 2024
                  What is managed detection and response (MDR)?Managed detection and response (MDR) services are a collection of network-, host- and endpoint-based cybersecurity technologies that a third-party provider manages for a client organization. Continue Reading By- Nick Barney, Technology Writer
- Kinza Yasar, Technical Writer
- Ben Lutkevich, Site Editor
 
- 
                E-Zine
                26 Nov 2024
                  The Most Influential Women in UK Technology 2024In this week’s Computer Weekly, we reveal the 50 most influential women in UK technology for 2024. Read an interview with the winner, co-CEO of Tech She Can, Sheridan Ash. And meet this year’s rising stars – six women with a bright future in IT leadership. Read the issue now. Continue Reading 
- 
                News
                26 Nov 2024
                  Russian threat actors poised to cripple power grid, UK warnsUK government escalates cyber rhetoric in a speech at a Nato event, saying Russian advanced persistent threats stand ready to conduct cyber attacks that could ‘turn off the lights for millions’ Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                25 Nov 2024
                  BT unveils managed SASE serviceTelecoms provider expands managed software-defined wide area network solution with new security service edge capabilities to help businesses transition to a secure access service edge model Continue Reading By- Joe O’Halloran, Computer Weekly
 
- 
                News
                25 Nov 2024
                  Metropolitan Police officer dismissed for unlawfully accessing Sarah Everard filesOver 100 Met Police officers and staff have been investigated for accessing sensitive data related to the Sarah Everard case, leading to the dismissal of a Roads and Transport officer who accessed the information while off-duty Continue Reading By- Sebastian Klovig Skelton, Data & ethics editor
 
- 
                Definition
                25 Nov 2024
                  What is Extensible Authentication Protocol (EAP)?Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by Point-to-Point Protocol (PPP), a protocol often used when connecting a computer to the internet. Continue Reading 
- 
                Definition
                25 Nov 2024
                  What is IPsec (Internet Protocol Security)?IPsec (Internet Protocol Security) is a suite of protocols and algorithms for securing data transmitted over the internet or any public network. Continue Reading By- Katie Terrell Hanna
- Peter Loshin, Former Senior Technology Editor
 
- 
                News
                25 Nov 2024
                  Microsoft calls on Trump to ‘push harder’ on cyber threatsMicrosoft’s Brad Smith urges president-elect Donald Trump to keep the faith when it comes to fighting back against hostile cyber actors from China, Iran and Russia Continue Reading By- Alex Scroxton, Security Editor
 
- 
                News
                25 Nov 2024
                  Geopolitical strife drives increased ransomware activityThe lines between financially motivated cyber criminals and nation state APTs are rapidly blurring, as geopolitical influences weigh heavily on the threat landscape, according to data from NCC Continue Reading By- Alex Scroxton, Security Editor
 
- 
                Feature
                25 Nov 2024
                  IAM within the framework of defence in depthIf it is deployed correctly, identity and access management is among the plethora of techniques that can help to secure enterprise IT Continue Reading By- Cliff Saran, Managing Editor
 

 
		