IT security
-
News
21 May 2025
M&S cyber attack disruption likely to last until July
M&S says it has moved into recovery mode after a ransomware attack, but expects some disruption to persist throughout the coming weeks. Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 May 2025
NCSC: Russia’s Fancy Bear targeting logistics, tech organisations
The NCSC and its partner agencies have blown the whistle on an extensive campaign of malicious cyber attacks orchestrated by the Russian state Fancy Bear operation. Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
21 Apr 2025
What is a brute-force attack?
A brute-force attack is a trial-and-error hacking method cybercriminals use to decode login information and encryption keys to gain unauthorized access to systems. Continue Reading
By- Mary E. Shacklett, Transworld Data
- Katie Terrell Hanna
-
News
21 Apr 2025
Top APAC firms recognised at innovation awards
Citic Telecom, CapitaLand Investment and DBS Bank were among the region’s top industry innovators recognised for their digital transformation efforts at the Computer Weekly Innovation Awards APAC 2025 Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
21 Apr 2025
CW Innovation Awards: Transforming cyber security with AI
Facing rising cyber threats and a shortage of experts, Citic Telecom International CPC developed an AI-powered penetration testing tool to automate security audits and reduce costs Continue Reading
By -
Feature
18 Apr 2025
How do cybercriminals steal credit card information?
Cybercriminals have various methods at their disposal to hack and exploit credit card information. Learn what they are, how to prevent them and what to do when hacked. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
17 Apr 2025
Norway says ‘no way’ to global financial crime
Oslo’s startup ecosystem is fighting back against cyber criminals with tech to wipe out attacks rather than just detect them. Continue Reading
-
E-Zine
17 Apr 2025
CW EMEA: Shutting down cyber crime
In the Netherlands, the average ransomware attack costs firms about €514,000, and these huge sums mean it makes sense that the police invest their time and resources into combating it. One PhD student spent four years embedded in Dutch police cyber teams to conduct research on their efficacy. Continue Reading
-
17 Apr 2025
Dutch police disrupt half of ransomware operations, finds embedded PHD student
Dutch PhD study reveals the impact of centralised intelligence and strategic interventions in the fight against ransomware. Continue Reading
-
News
17 Apr 2025
Tariff turmoil is making supply chain security riskier
Many businesses around the world are taking the decision to alter their supplier mix in the face of tariff uncertainty, but in doing so are creating more cyber risks for themselves, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
17 Apr 2025
Collaboration is the best defence against nation-state threats
The rise of DeepSeek has prompted the usual well-documented concerns around AI, but also raised worries about its potential links to the Chinese state. The Security Think Tank considers the steps security leaders can take to counter threats posed by nation state industrial espionage? Continue Reading
By- Stephen McDermid, Okta
-
News
17 Apr 2025
Standard Chartered grounds AI ambitions in data governance
The bank’s group chief data officer, Mohammed Rahim, outlines how the bank is modernising its data infrastructure and governance practices to support its AI initiatives Continue Reading
By- Aaron Tan, Informa TechTarget
-
Definition
16 Apr 2025
What is Pretty Good Privacy and how does it work?
Pretty Good Privacy, or PGP, was a popular program used to encrypt and decrypt email over the internet, as well as authenticate messages with digital signatures and encrypted stored files. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Peter Loshin, Former Senior Technology Editor
- Rob Wright, Senior News Director
-
News
16 Apr 2025
Footballers object to processing of performance data
Football players are seeking to gain more control of their performance data through ‘stop processing’ requests, in an attempt to strike a better balance between firms’ commercial interests and the data rights of footballers Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
16 Apr 2025
CISA extends Mitre CVE contract at last moment
The US Cybersecurity and Infrastructure Security Agency has ridden to the rescue of the under-threat Mitre CVE Programme, approving a last-minute, 11-month contract extension to preserve the project’s vital security vulnerability work Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 Apr 2025
CVE Foundation pledges continuity after Mitre funding cut
With news that Mitre’s contract to run the world-renowned CVE Programme is abruptly terminating, a breakaway group is setting up a non-profit foundation to try to ensure the project’s continuity Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
16 Apr 2025
UK digital identity turns to drama (or farce?) over industry fears and security doubts
Government at loggerheads with industry. Warnings of serious security and data protection problems undermining a vital public service. A burgeoning political campaign seeking greater influence. You ... Continue Reading
By- Bryan Glick, Editor in chief
-
News
16 Apr 2025
Security leaders grapple with AI-driven threats
Experts warn of AI’s dual role in both empowering and challenging cyber defences, and called for intelligence sharing and the need to strike a balance between AI-driven innovation and existing security practices Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
15 Apr 2025
Mitre warns over lapse in CVE coverage
Mitre, the operator of the world-renowned CVE repository, has warned of significant impacts to global cyber security standards, and increased risk from threat actors, as it emerges its US government contract will lapse imminently Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Apr 2025
Hertz warns UK customers of Cleo-linked data breach
Car hire giant Hertz reveals UK customer data was affected in a cyber incident orchestrated via a series of vulnerabilities in Cleo managed file transfer products Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Apr 2025
The Investigatory Powers Tribunal explained
The Investigatory Powers Tribunal is a semi-secret judicial body that has made significant legal rulings on privacy, surveillance and the use of investigatory powers. What does it do and why is it important? Continue Reading
By- Bernard Keenan, UCL
-
News
14 Apr 2025
Meta settles lawsuit over surveillance business model
Meta settles lawsuit over use of personal data in targeted advertising, opening up the possibility of other UK users raising legal objections to its processing Continue Reading
-
Definition
14 Apr 2025
What is cloud security?
Cloud security, or cloud computing security, is a set of policies, practices and controls deployed to protect cloud-based data, applications and infrastructure from cyberattacks and cyberthreats. Continue Reading
By- Mary E. Shacklett, Transworld Data
- Kinza Yasar, Technical Writer
- Andrew Froehlich, West Gate Networks
-
Definition
14 Apr 2025
What is corporate governance?
Corporate governance is the combination of rules, processes and laws by which businesses are operated, regulated and controlled. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
- Ben Lutkevich, Site Editor
- Sarah Lewis
-
News
14 Apr 2025
Government faces claims of serious security and data protection problems in One Login digital ID
The Government Digital Service was warned about serious cyber security and data protection problems in its flagship digital identity system, with insider claims that the data of three million users may still be at risk Continue Reading
By- Bryan Glick, Editor in chief
-
Feature
14 Apr 2025
The role of small language models in enterprise AI
Small language models do not require vast amounts of expensive computational resources and can be trained on business data Continue Reading
By- Cliff Saran, Managing Editor
- Adrian Bridgwater
-
Opinion
14 Apr 2025
What’s the government up to with digital verification services? ‘ID’ like to know
Is the government really looking to compete with the private sector for provision of digital identity? Such a move risks fundamentally undermining public trust in critical digital verification services Continue Reading
By- Lord Chris Holmes, House of Lords
-
Opinion
14 Apr 2025
Defending the grid with secure connectivity
Connectivity providers, device manufacturers and the energy companies they support must prioritise cyber security as the use of IoT grows in Singapore's energy sector Continue Reading
By- Simon Trend
-
News
11 Apr 2025
AI surveillance towers place migrants in ‘even greater jeopardy’
The use of autonomous surveillance towers throughout the English coast forces migrants into increasingly dangerous routes and contributes to their criminalisation Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
11 Apr 2025
Comms consortium calls for greater vigilance on subsea cable security
Open letter from European telecommunications operators and subsea cable stakeholders calls on cables ecosystem to align security objectives with operational feasibility as well create viable business model based on risk-based best practices Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Blog Post
11 Apr 2025
No Complaints About Automating Compliance
I was recently in London recording some podcasts for a Data Centre client, Asanti, and two of the areas we discussed were – surely not – AI and… compliance. It seems to that Asanti’s Co-Lo ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
News
11 Apr 2025
Met Police to deploy permanent facial recognition tech in Croydon
The Met Police is set deploy permanent live facial recognition cameras on street furniture in Croydon from summer 2025, but local councillors say the decision – which has taken place with no community input – will further contribute the over-policing of Black communities Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
11 Apr 2025
Warranty fraud fuels hidden army of hardware hackers
Widespread warranty fraud is not only costing companies billions but also creating a breeding ground for advanced hardware exploits, warns hardware hacker and researcher Bunnie Huang at Black Hat Asia 2025 Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
10 Apr 2025
Google bets on unifying security tools to ease CISO pain
At Google Cloud Next in Las Vegas, Google launches its Unified Security platform with the goal of bringing together disparate security solutions to help cyber leaders and practitioners address their most keenly felt pain points Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
10 Apr 2025
GCHQ historian Dave Abrutat’s mission to preserve the UK’s forgotten signals intelligence history
Dave Abrutat, GCHQ’s official historian, is on a mission to preserve the UK’s historic signals intelligence sites and capture their stories before they disappear from folk memory. A new charity, NSIST, will raise funds and recruit volunteers Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
10 Apr 2025
Companies House goes live with One Login ID verification
People can verify their identity with Companies House using Gov.uk One Login as the central government body becomes the 36th service to start using the digital identity system Continue Reading
By -
News
10 Apr 2025
Spirit of openness helps banks get serious about stopping scams
Recent announcements show that banks, financial services firms and IT companies are increasing efforts to curb online scams Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
10 Apr 2025
Investigative reporter files legal action over police surveillance and social media monitoring
Journalist complains to Investigatory Powers Tribunal after Northern Irish police placed him under surveillance as he investigated their handling of a high-profile death Continue Reading
By -
News
09 Apr 2025
Microsoft’s April 2025 bumper Patch Tuesday corrects 124 bugs
Microsoft is correcting 124 vulnerabilities in its March Patch Tuesday, one of which is being actively exploited in the wild, and 11 of which are ‘critical’ Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
09 Apr 2025
Nokia, Telia, Finnish Defence Forces claim 5G standalone slice first
Companies showcase potential of 5G technology in enhancing critical communications for defence units operating in coalition environments to ensure seamless experience when crossing country borders Continue Reading
-
News
08 Apr 2025
NCSC issues warning over Chinese Moonshine and BadBazaar spyware
Two spyware variants are being used to target the mobile devices of persons of interest to Chinese intelligence, including individuals in the Taiwanese, Tibetan and Uyghur communities Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
08 Apr 2025
DeepSeek will help evolve the conversation around privacy
The rise of DeepSeek has prompted the usual well-documented concerns around AI, but also raised worries about its potential links to the Chinese state. The Security Think Tank considers the steps security leaders can take to counter threats posed by nation state industrial espionage? Continue Reading
By- Nick New, Optalysys
-
Definition
08 Apr 2025
What is sustainability risk management (SRM)?
Sustainability risk management (SRM) is a business strategy that aligns profit goals with a company's environmental, social and governance (ESG) policies. Continue Reading
-
News
08 Apr 2025
Labour MPs launch digital ID campaign
A large group of Labour MPs have called for the introduction of a digital ID system to crack down on illegal migration and benefits fraud Continue Reading
By -
News
08 Apr 2025
Spoofing vuln threatens security of WhatsApp Windows users
Meta has disclosed and patched a potentially dangerous spoofing flaw in WhatsApp for Windows that could have caused big problems for unwitting users Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Apr 2025
IBM boosts AI mainframe capabilities with Z17
IBM continues to try to break out of the mindset that mainframes are just for transaction processing. The latest server offers greater AI capabilities Continue Reading
By- Cliff Saran, Managing Editor
-
Opinion
08 Apr 2025
It’s time to stop the victim-blaming and insist on safer software
Businesses spend too much time and money protecting themselves against flaws and vulnerabilities in modern software products, when they ought to raise their expectations and insist on better solutions from providers Continue Reading
By- Mandy Andress, Elastic
-
News
08 Apr 2025
Government punts cyber governance code of practice for UK businesses
The Department for Science, Innovation and Technology’s cyber security minister Feryal Clark announces a cyber security code of governance for UK businesses to follow Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
08 Apr 2025
Over £18m stolen from Santander UK customers in first three months of year
Bank’s latest quarterly report on scams said over £18m was stolen from its UK customers by scammers Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
08 Apr 2025
UK authority’s search for answers over deleted Julian Assange emails comes too late to retrieve data
The Crown Prosecution Service has finally searched for information about the destruction of emails from the WikiLeaks founder’s lawyer – but too late to retrieve data about the deleted documents Continue Reading
By- Stefania Maurizi
-
Video
07 Apr 2025
An explanation of cybercrime
Cybercrime refers to criminal activity that uses a computer, networked device or network. Its many forms, from extortion to identity theft, can cause real damage to organizations. Continue Reading
By- Tommy Everson, Assistant Editor
-
News
07 Apr 2025
UK SMEs losing over £3bn a year to cyber incidents
A lack of access to technology, little to no staff training, and competing priorities are losing UK SMEs up to £3.4bn to cyber incidents every year Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Apr 2025
NIST calls time on older vulnerabilities amid surging disclosures
The National Institute of Standards and Technology is deferring future updates to thousands of cyber vulnerabilities discovered prior to 2018 amid surging volumes of new submissions Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Apr 2025
Court rejects Home Office bid for blanket secrecy in hearings over Apple encryption case
Investigatory Powers Tribunal rejects Home Office arguments that identifying the ‘bare details’ of legal action by Apple would damage national security, leaving open possibility of future open court hearings Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
07 Apr 2025
Fintech body calls on government for national anti-fraud centre
Industry body says a national anti-fraud centre could be the vehicle required to effectively fight fraud through data sharing Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
04 Apr 2025
Norway and Nordic financial sector ramps up cyber security
Finans Norge sets up cyber security unit CTSU to support the finance sector in Norway amid increasing threats Continue Reading
By- Gerard O'Dwyer
-
News
04 Apr 2025
Banks to share fraud data with tech firms in cross-sector collaboration
UK banks join tech firms in fraud data-sharing initiative to enable collaboration on action to stop online scams Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Opinion
03 Apr 2025
Taking a ‘good enough’ approach with cloud security isn't enough
In the wake of the January 2025 'Codefinger' attacks against AWS S3 users, Thales Rob Elliss argues that many organisations are dropping the ball when it comes to their understanding of cloud security best practice Continue Reading
By- Rob Ellis, Thales
-
News
03 Apr 2025
Are LLM firewalls the future of AI security?
As large language models permeate industries, experts at Black Hat Asia 2025 debate the need for LLM firewalls and explore their role in fending off emerging AI threats Continue Reading
By- Aaron Tan, Informa TechTarget
-
Opinion
02 Apr 2025
Apple’s appeal to the Investigatory Powers Tribunal over the UK’s encryption ‘backdoor’ explained
Apple has appealed to the Investigatory Powers Tribunal over an order by home secretary Yvette Cooper to give the UK access to customers’ data protected by Advanced Data Protection encryption. What happens next? Continue Reading
By- Bernard Keenan, UCL
-
News
02 Apr 2025
UKtech50 2025 – help us find the most influential people in UK IT
Computer Weekly’s annual search for the 50 most influential people in UK IT is on – let us know who you would like to nominate for this year's list Continue Reading
By -
Definition
02 Apr 2025
What is a uniform resource identifier (URI)?
A uniform resource identifier (URI) is a character sequence that identifies a logical (abstract) or physical resource -- usually, but not always, connected to the internet. Continue Reading
By- Rahul Awati
- Fred Churchville, TechTarget
-
Definition
02 Apr 2025
What is an initialization vector?
An initialization vector (IV) is an arbitrary number that can be used with a secret key for data encryption to foil cyber attacks. Continue Reading
By -
News
01 Apr 2025
Southern Linc enhances management, security of its private cellular network
Wireless subsidiary of Southern Company selects private LTE/5G OT management and zero-trust security provider’s Bridge platform to enhance management and security of its LTE network Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
01 Apr 2025
Gmail ‘bubble’ encryption may be an S/MIME killer, says Google
Marking the 21st anniversary of Gmail, Google is preparing to roll out an end-to-end encryption standard for its email service in hopes of democratising encryption and leaving old standards in the dust Continue Reading
By- Alex Scroxton, Security Editor
-
News
01 Apr 2025
Apple devices are at ‘most risk’ in UK following government ‘backdoor’ order
Home Office refuses to answer questions from Lords over technical capability notice issued against Apple’s iCloud Advanced Data Protection encryption services Continue Reading
By- Bill Goodwin, Computer Weekly
-
Blog Post
01 Apr 2025
Distrust builds between digital ID sector and government amid speculation over 'ID cards by stealth'
Wednesday 2 April sees the latest meeting of the All-Party Parliamentary Group (APPG) on digital identity. It’s more exciting than it sounds – honest! APPGs have no power or governmental role – ... Continue Reading
By- Bryan Glick, Editor in chief
-
News
31 Mar 2025
Top 1,000 IT service providers in scope of UK cyber bill
The government’s proposed Cyber Security and Resilience Bill is set to include regulatory provisions covering both datacentre operators and larger IT service providers Continue Reading
By- Alex Scroxton, Security Editor
-
News
31 Mar 2025
Reassessing UK law enforcement data adequacy
Computer Weekly takes stock of proposed changes to the UK’s law enforcement data protection rules and how it could affect data adequacy with the European Union Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
31 Mar 2025
UK law enforcement data adequacy at risk
The UK government says reforms to police data protection rules will help to simplify law enforcement data processing, but critics argue the changes will lower protection to the point where the UK risks losing its European data adequacy Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Definition
31 Mar 2025
What is a hacker?
A hacker is an individual who uses computer, networking or other skills to overcome a technical problem. Continue Reading
-
Feature
31 Mar 2025
Meeting the UK’s compute capacity needs: Alternatives to hyperscale datacentre builds
Since coming to power, the Labour government has set out plans to accelerate new datacentre builds. We look at how this is evolving Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
Opinion
28 Mar 2025
Countering nation-state cyber espionage: A CISO field guide
The rise of DeepSeek has prompted the usual well-documented concerns around AI, but also raised worries about its potential links to the Chinese state. The Security Think Tank considers the steps security leaders can take to counter threats posed by nation state industrial espionage? Continue Reading
By- Andrew Hodges, Quorum Cyber
-
News
27 Mar 2025
Surging cyber threats drive IT directors to decentralised networks
As directors increasingly recognise the threats posed by increasingly sophisticated, AI-driven cyber attacks, risks are being mitigated by changes in physical infrastructure networks, research finds Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
27 Mar 2025
Research team demonstrates certified quantum randomness
A 56-qubit trapped ion quantum computer from Quantinuum has demonstrated quantum supremacy as a random number generator Continue Reading
By- Cliff Saran, Managing Editor
-
News
26 Mar 2025
Advanced Software fined £3m over LockBit attack
The ICO has issued a £3m fine to software provider Advanced in the wake of security failings that led to significant disruption to NHS customers in a ransomware attack Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
26 Mar 2025
How to respond to digital regulation in 2025
A wave of UK and EU regulation to promote competition and consumer protection in digital markets and services has been introduced that requires a strategic response from companies in the year ahead Continue Reading
By- Suchitra Nair and Robert MacDougall, Deloitte
-
Definition
26 Mar 2025
What is a web application firewall (WAF)? WAF explained
A web application firewall (WAF) is a firewall that is meant to protect web applications against common web-based threats. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Kinza Yasar, Technical Writer
-
News
26 Mar 2025
Military AI caught in tension between speed and control
The use of artificial intelligence in military contexts can unlock a range of benefits for defence organisations, but also highlights a clear tension between speed and control baked into the technology Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Podcast
26 Mar 2025
Gartner on agentic AI: A Computer Weekly Downtime Upload podcast
We speak to Gartner’s Anushree Verma about the route from robotic process automation to agentic AI in corporate IT Continue Reading
By- Cliff Saran, Managing Editor
-
News
25 Mar 2025
Public Accounts Committee calls out legacy IT
Unsupported and out-of-date software and hardware are hindering the government’s artificial intelligence plans for the public sector Continue Reading
By- Cliff Saran, Managing Editor
-
News
25 Mar 2025
Nokia, Numana, Honeywell Aerospace team to advance quantum-safe networks
Collaboration designed to drive innovation and enable a global post-quantum security economy for enterprises using quantum key distribution and advanced cryptographic network technologies to safeguard digital infrastructure Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
25 Mar 2025
ETSI launches first post-quantum encryption standard
European telco standards body launches its first post-quantum cryptography cyber standard, covering the security of critical data and communications Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Mar 2025
Scottish police hold almost no data on facial recognition use
It is currently impossible to assess Police Scotland’s use of retrospective facial recognition for efficacy and fairness because the force does not collect meaningful information that would enable a proper evaluation Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
25 Mar 2025
Tech specialist files legal claim after being refused security clearance for MI6 role
An IT specialist has asked the Investigatory Powers Tribunal to investigate a series of hacking incidents after disclosing their social media accounts to MI6 vetting staff Continue Reading
By- Bill Goodwin, Computer Weekly
-
Opinion
24 Mar 2025
Why I am challenging Yvette Cooper’s ‘secret backdoor’ order against Apple’s encryption
I took steps to lock down all personal data after I was named as an opponent of Russia. Now I am again worried about my family's safety after the home secretary issued a secret order against Apple Continue Reading
By- Gus Hosein
-
Opinion
24 Mar 2025
Will DeepSeek force us to take application security seriously?
The rise of DeepSeek has prompted the usual well-documented concerns around AI, but also raised worries about its potential links to the Chinese state. The Security Think Tank considers the steps security leaders can take to counter threats posed by nation state industrial espionage? Continue Reading
By- Mike Gillespie and Ellie Hurst
-
Feature
24 Mar 2025
Ethical qualms prompt challenging social media migrations
Changing content moderation and artificial intelligence training practices means social media has undergone a fundamental shift in the past six months, presenting organisations and people migrating away from these platforms for ethical reasons with a number of practical challenges Continue Reading
-
News
21 Mar 2025
NCSC, DSIT enlist IBM to spearhead cyber diversity agenda
IBM signs on to a partnership deal in support of the popular NCSC CyberFirst Girls scheme designed to foster gender diversity in the cyber security profession Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Mar 2025
NCSC proposes three-step plan to move to quantum-safe encryption
The NCSC urges service providers, large organisations and critical sectors to start thinking today about how they will migrate to post-quantum cryptography over the next decade Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Mar 2025
Clop resurgence drives ransomware attacks in February
The exploitation of two new vulnerabilities in a popular file transfer service saw the Clop ransomware gang soar in February, according to NCC Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Mar 2025
DeepMind founder warns of compounding AI agent errors
Artificial general intelligence may be years away, but in the meantime, organisations are being urged to adopt agent technology Continue Reading
By- Cliff Saran, Managing Editor
-
News
19 Mar 2025
How Telefónica avoided VMware price hike
While some some organisations look for alternatives to VMware, Telefónica Germany has taken a different approach based on third-party support Continue Reading
By- Cliff Saran, Managing Editor
-
News
18 Mar 2025
Largest ever cyber deal reflects Google’s CNAPP ambitions
In a signal of its future ambitions, Google lays down $32bn to acquire cloud-native application protection platform Wiz, reflecting the increasing need to secure multicloud environments Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Mar 2025
Novel encryption technology tests add value to Finland’s quantum computer project
Tests carried out at Telia will support the building of a secure quantum network Continue Reading
By- Gerard O'Dwyer
-
E-Zine
18 Mar 2025
UK under-prepared for catastrophic cyber attack
In this week’s Computer Weekly, MPs have been told the UK is under-prepared to cope with a catastrophic cyber attack – we find out where the problems lie. Our new buyer’s guide assesses the challenges of datacentre capacity planning. And one of the UK’s most successful businessmen, Sir Martin Sorrell, gives his view on the risks and opportunities of AI. Read the issue now. Continue Reading
-
News
18 Mar 2025
Seaco charts course for unified security strategy
Shipping container leasing giant consolidates security tools onto a single platform, leveraging AI and extended detection and response to improve security operations Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
17 Mar 2025
PSNI’s ‘ridiculous’ withholding of evidence in spying operation delayed court hearings
Landmark ruling by the Investigatory Powers Tribunal will decide whether the surveillance court can award costs against government bodies accused of unreasonable behaviour Continue Reading
By- Bill Goodwin, Computer Weekly
- Cormac Kehoe
-
Opinion
17 Mar 2025
Data protection and AI: what to know about new UK cyber standard
A strategic governmental steer on AI, putting guidance above rigid legislation offers the adaptability needed to innovate responsibly, contends Kiteworks executive John Lynch Continue Reading
By- John Lynch
-
News
17 Mar 2025
Online Safety Act measures come into effect
Regulator Ofcom is now able to take enforcement action against platforms under the Online Safety Act if they fail to proactively safeguard against content such as terrorist or child sexual abuse material Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Definition
17 Mar 2025
What is a buffer overflow? How do these types of attacks work?
A buffer overflow occurs when a program or process attempts to write more data to a fixed-length block of memory, or buffer, than the buffer is allocated to hold. Continue Reading
-
News
17 Mar 2025
How Oracle is using AI to combat financial crime
The tech giant is leveraging artificial intelligence to surface fraudulent financial transactions and improve the efficiency of financial crime investigations, offering relief to banks battling high costs and alert fatigue Continue Reading
By- Aaron Tan, Informa TechTarget