IT security
- 
				Feature
					04 Nov 2025
					
									
										
									
								Is Digital ID worth the risk?
The UK government’s recently announced Digital ID aims to curb the prospect of work for illegal migrants, along with claiming several benefits for UK citizens and legal residents. However, are the threats to our personal data worth the risk? Continue Reading
 - 
				News
					04 Nov 2025
					
									
										
									
								UAE Sovereign Launchpad begins nationwide roll-out with support from e& and AWS
The cloud infrastructure platform aims to strengthen digital resilience and regulatory compliance across government and regulated sectors in the United Arab Emirates Continue Reading
By- Andrea Benito , Computer Weekly
 
 
- 
                News
                25 Sep 2025
                
                                    
                                Netherlands establishes cyber resilience network to strengthen public-private digital defence
Network will connect organisations in a cyber crime defence initiative that goes way beyond information sharing Continue Reading
By- Kim Loohuis
 
 - 
                News
                25 Sep 2025
                
                                    
                                Get HDD temperature right, or risk more drive failures
We talk to Rainer Kaese of Toshiba about the right temperature to run hard disk drives at. Not getting it right risks higher failure rates than what would normally be expected Continue Reading
 - 
                News
                24 Sep 2025
                
                                    
                                Oktane 2025: Okta takes aim at agentic AI governance gap
Identity specialist Okta is laying the groundwork for a number of incoming announcements designed to help its customers get to grips with the challenge of securing non-human, agentic identities. Continue Reading
By- Alex Scroxton, Security Editor
 
 - 
                Blog Post
                24 Sep 2025
                
                            
                            Controversy ahead - the many challenges facing a UK government national digital ID scheme
It seems we are to expect some sort of announcement on digital identity at the forthcoming Labour conference. Briefings to select national newspapers have trailed the likelihood of prime minister ... Continue Reading
By- Bryan Glick, Editor in chief
 
 - 
                News
                24 Sep 2025
                
                                    
                                NCA arrests man following cyber attack that disrupted air travel
The NCA has arrested a man in West Sussex over the cyber attack on Collins Aerospace that disrupted Heathrow and other EU airports. He has been released on conditional bail Continue Reading
By- Brian McKenna, Enterprise Applications Editor
 
 - 
                News
                24 Sep 2025
                
                                    
                                McCullough Review finds PSNI failures but no ‘systemic’ surveillance of journalists
A review by Angus McCullough KC reveals that Northern Ireland police failed to comply with the law but that there was no ‘widespread and systemic’ surveillance of journalists, lawyers and NGOs Continue Reading
By- Bill Goodwin, Investigations Editor
 
 - 
                News
                24 Sep 2025
                
                                    
                                Salesforce shifts focus from AI models to agentic AI
Rather than being preoccupied with large language models, Salesforce is now focused on building AI agents, with an eye on achieving what it calls ‘enterprise general intelligence’ Continue Reading
By- Aaron Tan, Informa TechTarget
 
 - 
                Definition
                23 Sep 2025
                
                            
                            What is SOX compliance? A complete guide and checklist
SOX compliance entails adhering to the Sarbanes-Oxley Act of 2002, a U.S. law introduced to enhance investor protection by ensuring greater accuracy, transparency and accountability in public companies' financial reporting. Continue Reading
By- Kinza Yasar, Technical Writer
 
 - 
                News
                23 Sep 2025
                
                                    
                                SolarWinds warns over dangerous RCE flaw
A newly uncovered RCE flaw in SolarWinds’ helpdesk product bypasses two previously issued fixes, and users should prioritise updates as exploitation is likely to occur Continue Reading
By- Alex Scroxton, Security Editor
 
 - 
                Opinion
                23 Sep 2025
                
                                    
                                Rethinking identity in the age of AI impersonation
Trust in business has long hinged on human instincts but with the advent of deepfakes, it is becoming dangerous to assume too much. Continue Reading
By- Akif Khan, Gartner
 
 - 
                News
                23 Sep 2025
                
                                    
                                Jaguar Land Rover extends cyber attack-induced shutdown to October
Jaguar Land Rover is extending its production shutdown caused by the 31 August cyber attack into next month, as government ministers drop by and supply chain workers lose wages Continue Reading
By- Brian McKenna, Enterprise Applications Editor
 
 - 
                News
                23 Sep 2025
                
                                    
                                ‘Our worst day’: The untold story of the Electoral Commission cyber attack
As head of digital at The Electoral Commission, Andrew Simpson’s mettle was tested when threat actors gained access to the regulator’s email systems and accessed sensitive voter data. Three years on, he tells his story to Computer Weekly Continue Reading
By- Alex Scroxton, Security Editor
 
 - 
                Opinion
                23 Sep 2025
                
                                    
                                Digital ID risks turning UK into ‘Checkpoint Britain’
Keir Starmer is expected to announce plans for mandatory ID cards at the Labour Party Conference next week. It risks urging in an era of surveillance, digital check points, reliance on online systems, and the risk of data breaches. Continue Reading
By- Rebecca Vincent
 
 - 
                Opinion
                23 Sep 2025
                
                                    
                                How to fend off identity-based cyber attacks
Attackers are using legitimate credentials to walk through the front door and “live off the land”. True cyber resilience now depends on protecting identity, not just the perimeter Continue Reading
By- Kavitha Mariappan
 
 - 
                Opinion
                23 Sep 2025
                
                                    
                                Angus McCullough’s review: A reckoning for the PSNI – and for press freedom
The McCullough Review to be published on Wednesday could mark a turning point for press freedom and for policing in Northern Ireland Continue Reading
By- Donal MacIntyre
 
 - 
                Opinion
                22 Sep 2025
                
                                    
                                From breach to resilience: How the Electoral Commission rebuilt its cyber defences
The UK's Electoral Commission fell victim to a major cyber attack in 2022. Three years on, the organisation is reflecting on its experience and sharing the lessons it learned to help others improve their security resilience. Continue Reading
By- Andrew Simpson, The Electoral Commission
 
 - 
                News
                22 Sep 2025
                
                                    
                                Teen charged with Las Vegas casino cyber heist
Another arrest of a teenage hacker associated with the Scattered Spider gang has been made, this time in relation to two 2023 cyber attacks on Las Vegas casinos and resorts Continue Reading
By- Alex Scroxton, Security Editor
 
 - 
                News
                22 Sep 2025
                
                                    
                                Cyber attack that downed airport systems confirmed as ransomware
Authorities in Europe say the cyber attack that caused disruption to passenger-facing services at multiple airports, including Heathrow, was the result of ransomware, as investigations continue Continue Reading
By- Alex Scroxton, Security Editor
 
 - 
                News
                22 Sep 2025
                
                                    
                                PSNI chief sorry over failure to delete data unlawfully seized from journalists
Police Service of Northern Ireland apologises for failing to destroy data that was unlawfully seized from journalists, despite a court agreement, and to the Investigatory Powers Tribunal for failing to disclose key information to the court Continue Reading
By- Bill Goodwin, Investigations Editor
 
 - 
                Definition
                22 Sep 2025
                
                            
                            What is regulatory compliance?
Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business processes. Continue Reading
By- Scott Robinson, New Era Technology
 - Ben Cole, Executive Editor
 
 - 
                Feature
                22 Sep 2025
                
                                    
                                Balancing IT security with AI and cloud innovation
Cyber security experts offer insights into how to manage service levels, potential lock-in clauses and security gaps in IT supplier contracts Continue Reading
By- Cliff Saran, Managing Editor
 
 - 
                News
                19 Sep 2025
                
                                    
                                Government meets with car parts suppliers amid JLR cyber crisis
Government officials have met with the Society of Motor Manufacturers and Traders to discuss the challenges they are facing amid disrupted production at Jaguar Land Rover Continue Reading
By- Alex Scroxton, Security Editor
 
 - 
                News
                19 Sep 2025
                
                                    
                                UK cyber action plan lays out path to resilience
A report produced for the government by academics at Imperial College London and the University of Bristol sets out nine recommendations to strengthen the UK’s cyber sector Continue Reading
By- Alex Scroxton, Security Editor
 
 - 
                News
                19 Sep 2025
                
                                    
                                UK needs better defences to protect undersea internet cables from Russian sabotage
A cross-party group of MPs and peers has called for the UK to step up defences to protect undersea cables from Russian sabotage risks Continue Reading
By- Bill Goodwin, Investigations Editor
 
 - 
                News
                19 Sep 2025
                
                                    
                                French court ruling may lead to legal challenges over state Sky ECC and EncroChat phone hack
A decision by the French supreme court may pave the way for defendants to challenge the lawfulness of France’s hacking of the EncroChat and Sky ECC cryptophone networks used by organised crime groups Continue Reading
By- Bill Goodwin, Investigations Editor
 
 - 
                News
                19 Sep 2025
                
                                    
                                Pentera expands in APAC, taps AI to outsmart attackers
The penetration testing specialist is expanding its presence in the Asia-Pacific region and deploying AI-driven capabilities as it eyes acquisitions and a potential IPO Continue Reading
By- Aaron Tan, Informa TechTarget
 
 - 
                Definition
                18 Sep 2025
                
                            
                            What is hardware security?
Hardware security is vulnerability protection that comes in the form of a physical device rather than software installed on a computer system's hardware. It also refers to the protection of physical systems from harm. Continue Reading
By- Nick Barney, Technology Writer
 - Kinza Yasar, Technical Writer
 
 - 
                Feature
                18 Sep 2025
                
                                    
                                Are AI agents a blessing or a curse for cyber security?
Agentic AI is touted as a helpful tool for managing tasks, and cyber criminals are already taking advantage. Should information security teams look to AI agents to keep up? Continue Reading
By - 
                Feature
                18 Sep 2025
                
                                    
                                The challenges posed by AI tools in education
Artificial intelligence tools to enhance productivity are being developed for use in multiple sectors, but are they sufficiently reliable for use in education or do they create other problems? Continue Reading
 - 
                News
                18 Sep 2025
                
                                    
                                Teen hackers charged over Scattered Spider attack on TfL
Two men have appeared in court in London in connection with the September 2024 cyber attack that disrupted online services at Transport for London Continue Reading
By- Alex Scroxton, Security Editor
 
 - 
                News
                18 Sep 2025
                
                                    
                                Should you run VMware 7 unsupported?
In just a few weeks, VMware version 7 reaches end of life, which means Broadcom will no longer issue patches Continue Reading
By- Cliff Saran, Managing Editor
 
 - 
                News
                17 Sep 2025
                
                                    
                                Firms urged to adopt risk-based data sovereignty strategy
Geopolitical uncertainty is forcing organisations to rethink where their data is located, but a full retreat from the public cloud is not the answer Continue Reading
 - 
                Podcast
                17 Sep 2025
                
                                    
                                Podcast: Data sovereignty and what you need to do about it
Patrick Smith, EMEA CTO of Pure Storage, talks about data sovereignty, what’s driving heightened interest in it, and how customers, the tech industry and states are preparing for it Continue Reading
By- Antony Adshead, Computer Weekly
 
 - 
                News
                17 Sep 2025
                
                                    
                                Microsoft scores win against Office 365 credential thieves
Microsoft’s Digital Crimes Unit disrupts a major phishing-as-a-service operation that targeted and stole Office 365 usernames and credentials Continue Reading
By- Alex Scroxton, Security Editor
 
 - 
                News
                17 Sep 2025
                
                                    
                                Hamas lawyer challenges police after they seized legal files from phone in Schedule 7 stop
A UK solicitor hired by Hamas to challenge its proscription in the UK as a terrorist organisation argues police acted unlawfully by seizing a phone containing confidential legally privileged material about his clients Continue Reading
By- Bill Goodwin, Investigations Editor
 
 - 
                News
                17 Sep 2025
                
                                    
                                Lufthansa pilots EU Digital Identity Wallet-based travel
Travellers will only be required to tap their phone to pass the various steps of checking in and boarding aircraft Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
 
 - 
                News
                17 Sep 2025
                
                                    
                                NCC: How RaaS team-ups help Scattered Spider enhance its attacks
Scattered Spider’s alliances with ransomware-as-a-service gangs act as a force multiplier for the scope, and number, of its cyber attacks, according to NCC Group analysts Continue Reading
By- Alex Scroxton, Security Editor
 
 - 
                News
                17 Sep 2025
                
                                    
                                Google Cloud unveils open protocol for agentic payments
Google’s Agent Payments Protocol is an open standard developed with more than 60 global partners to create a secure standard for AI-driven transactions Continue Reading
By- Aaron Tan, Informa TechTarget
 
 - 
                News
                16 Sep 2025
                
                                    
                                Exabeam: Treat AI agents as the new insider threat
As artificial intelligence agents are given more power inside organisations, Exabeam’s chief AI officer, Steve Wilson, argues they must be monitored for rogue behaviour just like their human counterparts Continue Reading
 - 
                News
                16 Sep 2025
                
                                    
                                Jaguar Land Rover extends production shutdown for another week
Jaguar Land Rover says that vehicle production will remain suspended in the wake of a cyber attack, while the hackers allegedly responsible claim they are retiring from a life of crime Continue Reading
By- Alex Scroxton, Security Editor
 
 - 
                Opinion
                16 Sep 2025
                
                                    
                                Cyber leaders must make better use of risk experts
The Computer Weekly Security Think Tank considers how security leaders can help assure access to the new and innovative cloud tech while minimising risk and ensuring they do not fall foul of regulators. Continue Reading
By- Ellie Hurst, Advent IM
 - Mike Gillespie
 
 - 
                News
                16 Sep 2025
                
                                    
                                Forrester Technology & Innovation Summit preview: Preparing for emerging tech
We speak to Forrester about how IT decision-makers should prepare for emerging technologies that have a short, mid or long-term ROI Continue Reading
By- Cliff Saran, Managing Editor
 
 - 
                E-Zine
                16 Sep 2025
                
                            
                            School monitored
In this week’s edition of Computer Weekly, we hear about the toll the Post Office scandal is having on the mental health of those affected by it, and the chief digital and technology officer of jewellery brand Pandora opens up about its ongoing digital transformation. We also delve into the knotty topic of surveillance in schools, as education providers try to balance student safety with their right to privacy. Read the issue now. Continue Reading
 - 
                Definition
                15 Sep 2025
                
                            
                            What is a forensic image?
A forensic image (forensic copy) is a bit-by-bit, sector-by-sector direct copy of a physical storage device, including all files, folders, and unallocated, free and slack space. Continue Reading
By- Nick Barney, Technology Writer
 - Paul Kirvan
 
 - 
                Definition
                15 Sep 2025
                
                            
                            What is mobile threat defense (MTD)?
Mobile threat defense (MTD) software protects organizations and individuals from security threats on mobile platforms. Continue Reading
By- Nick Barney, Technology Writer
 - Brien Posey
 - Alexander S. Gillis, Technical Writer and Editor
 
 - 
                News
                15 Sep 2025
                
                                    
                                ShinyHunters linked to breach of French luxury goods house
Kering, the parent group of fashion houses including Balenciaga and Gucci, becomes the latest organisation to allegedly fall victim to ShinyHunters Continue Reading
By- Alex Scroxton, Security Editor
 
 - 
                News
                15 Sep 2025
                
                                    
                                Amnesty: AI surveillance risks ‘supercharging’ US deportations
Amnesty International says AI-driven platforms from Palantir and Babel Street are being used by US authorities to track migrants and revoke visas, raising fears of unlawful detentions and mass deportations Continue Reading
By- Tiago Ventura, Computer Weekly
 
 - 
                News
                15 Sep 2025
                
                                    
                                Arqit to support NCSC’s post-quantum cryptography pilot
Quantum specialist Arqit will provide specialised post-quantum migration planning services to organisations preparing to address the imminent risks to traditional cryptography Continue Reading
By- Alex Scroxton, Security Editor
 
 - 
                News
                15 Sep 2025
                
                                    
                                Forrester Technology & Innovation Summit preview: Digital sovereignty in the public cloud
We look at how IT leaders need to balance data access, data residency and data sovereignty Continue Reading
By- Cliff Saran, Managing Editor
 
 - 
                News
                15 Sep 2025
                
                                    
                                MI5 unlawfully monitored the phone of BBC journalist Vincent Kearney
The Investigatory Powers Tribunal heard today that the security service has conceded that it unlawfully monitored the phone data of former BBC Spotlight reporter Vincent Kearney Continue Reading
By- Bill Goodwin, Investigations Editor
 
 - 
                News
                12 Sep 2025
                
                                    
                                EU Data Act comes into force amid fears of regulation fatigue
The EU Data Act will potentially give users control of device data, and boost data sharing, cloud switching and competition while raising compliance demands Continue Reading
By- Brian McKenna, Enterprise Applications Editor
 
 - 
                Definition
                12 Sep 2025
                
                            
                            What is a stealth virus and how does it work?
A stealth virus is a computer virus that uses various mechanisms to avoid detection by antivirus software. Continue Reading
By- Nick Barney, Technology Writer
 - Rahul Awati
 
 - 
                Feature
                12 Sep 2025
                
                                    
                                Retailers turn to tech as in-store crime soars
Retailers such as H&M, Iceland, Poundland and Tesco are deploying tech in stores as a way of protecting themselves and their employees from rising shop crime Continue Reading
By - 
                News
                11 Sep 2025
                
                                    
                                M&S parts ways with CTO after cyber attack
M&S chief digital and technology officer Rachel Higham steps back from her role in the wake of the April 2025 cyber attack on the retailer’s systems Continue Reading
By- Alex Scroxton, Security Editor
 
 - 
                News
                11 Sep 2025
                
                                    
                                Students an increasing source of cyber threat in UK schools
Insider threats arising from student activity now appears to be the chief cause of notifiable cyber or data breach incidents in Britain’s schools Continue Reading
By- Alex Scroxton, Security Editor
 
 - 
                News
                11 Sep 2025
                
                                    
                                Chat Control: EU to decide on requirement for tech firms to scan encrypted messages
Law enforcement and police experts meet on Friday to decide on proposals to require technology companies to scan encrypted messages for possible child abuse images amid growing opposition from security experts Continue Reading
By- Bill Goodwin, Investigations Editor
 
 - 
                News
                10 Sep 2025
                
                                    
                                Splunk.conf: Cisco and Splunk expand agentic SOC vision
The arrival of agentic AI in the security operations centre heralds an era of simplification for security professionals, Splunk claims Continue Reading
By- Alex Scroxton, Security Editor
 
 - 
                News
                10 Sep 2025
                
                                    
                                Jaguar Land Rover admits data has been compromised in cyber attack
The car maker revealed that data was stolen in the cyber attack that began on 31 August, as its production line continues to be affected Continue Reading
By- Brian McKenna, Enterprise Applications Editor
 
 - 
                News
                10 Sep 2025
                
                                    
                                UK contactless card payment limits could be unlimited
The UK Financial Conduct Authority says contactless payment technology and fraud protections have advanced enough for firms to adjust the limit Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
 
 - 
                News
                10 Sep 2025
                
                                    
                                Open source security and sustainability remain unsolved problem
While software bills of materials offer some transparency over software components, they don’t solve the imbalance between corporate consumption of open source software and the lack of investment in its security and health Continue Reading
 - 
                News
                09 Sep 2025
                
                                    
                                Splunk.conf: Splunk urges users to eat their ‘cyber veggies’
The dawn of AI-enabled cyber attacks makes it even more important for defenders to bring their A-game, particularly when it comes to getting the basics right Continue Reading
By- Alex Scroxton, Security Editor
 
 - 
                Definition
                09 Sep 2025
                
                            
                            What is crisis communication?
Crisis communication is a strategic approach to corresponding with people and organizations during a disruptive event. Continue Reading
By- Paul Kirvan
 - Rahul Awati
 - Paul Crocetti, Editorial Director
 
 - 
                News
                09 Sep 2025
                
                                    
                                UK AI sector balloons by 85% to 5,800 companies from 2023 to 2025
A Perspective Economics study commissioned by DSIT sizes the UK AI sector at 5,800 companies, an increase of 85% over two years Continue Reading
By- Brian McKenna, Enterprise Applications Editor
 
 - 
                Opinion
                09 Sep 2025
                
                                    
                                Lessons from Jaguar Land Rover: How can businesses prepare for cyber attacks?
A cyber attack at Jaguar Land Rover has halted production lines and caused widespread disruption. How can businesses protect themselves and mitigate the risks of such an attack? Continue Reading
By- Dominic Holden
 
 - 
                News
                08 Sep 2025
                
                                    
                                Splunk.conf: Splunk and Cisco showcase unified platform
With 18 months having elapsed since Cisco closed its acquisition of Splunk, joint platform capabilities and developments are being showcased at the annual Splunk.conf fair Continue Reading
By- Alex Scroxton, Security Editor
 
 - 
                News
                08 Sep 2025
                
                                    
                                Northern Ireland police kept inspectors in dark over surveillance of journalists
The Police Service of Northern Ireland failed to inform the Investigatory Powers Commissioner’s Office about surveillance operations against journalists during annual inspections Continue Reading
By- Bill Goodwin, Investigations Editor
 
 - 
                News
                08 Sep 2025
                
                                    
                                AI boom to push Australian IT spending past A$172bn
Australian IT spending is set to grow by 8.9% in 2026, driven by growing investments in artificial intelligence, datacentre systems and cloud, according to Gartner Continue Reading
By- Aaron Tan, Informa TechTarget
 
 - 
                News
                05 Sep 2025
                
                                    
                                US politicians ponder Wimwig cyber intel sharing law
US cyber data sharing legislation is set to replace an Obama-era law, but time is running out to get it over the line, with global ramifications for the security industry, and intelligence and law enforcement communities Continue Reading
By- Alex Scroxton, Security Editor
 
 - 
                News
                05 Sep 2025
                
                                    
                                Jaguar Land Rover cyber attack keeps workers at home
The recent cyber attack on Jaguar Land Rover is keeping workers out of the plants as possible attack group identity becomes public Continue Reading
By- Brian McKenna, Enterprise Applications Editor
 
 - 
                Opinion
                05 Sep 2025
                
                                    
                                SLA promises, security realities: Navigating the shared responsibility gap
The Computer Weekly Security Think Tank considers how security leaders can help assure access to the new and innovative cloud tech while minimising risk and ensuring they do not fall foul of regulators. Continue Reading
By- Aditya K Sood, Aryaka
 
 - 
                News
                04 Sep 2025
                
                                    
                                UK sets out plans for AI assurance leadership
Labour wants the UK to become the world leader in artificial intelligence assurance Continue Reading
By- Cliff Saran, Managing Editor
 
 - 
                Opinion
                03 Sep 2025
                
                                    
                                Bridging the SLA gap: A guide to managing cloud provider risk
The Computer Weekly Security Think Tank considers how security leaders can help assure access to the new and innovative cloud tech while minimising risk and ensuring they do not fall foul of regulators. Continue Reading
By- John Bruce, Quorum Cyber
 
 - 
                News
                03 Sep 2025
                
                                    
                                European court upholds EU-US Data Privacy Framework data-sharing agreement
EU General Court upholds EU-US Data Privacy Framework, bringing certainty to businesses that exchange data with the US – for now. An appeal may be in the offing Continue Reading
By- Bill Goodwin, Investigations Editor
 
 - 
                Definition
                03 Sep 2025
                
                            
                            What is information security (infosec)?
Information security (infosec) is a set of policies, procedures and principles for safeguarding digital data and other kinds of information. Continue Reading
By- Kinza Yasar, Technical Writer
 - Gavin Wright
 - Taina Teravainen
 
 - 
                News
                03 Sep 2025
                
                                    
                                IT departments face huge Windows 10 support bill
When Windows 10 reaches end-of-life on October 14th, organisations will need to purchase an Extended Support contract to receive Microsoft patches Continue Reading
By- Cliff Saran, Managing Editor
 
 - 
                Feature
                03 Sep 2025
                
                                    
                                Ethical challenges of LGBTQ+ data protection
America has rolled back data protection policies for the LGBTQ+ community, but what does that mean for the rest of the world? Continue Reading
 - 
                News
                03 Sep 2025
                
                                    
                                Fastly CEO plots course through AI and security
Chief exec Kip Compton explains how Fastly’s unified platform is solving the web’s biggest challenges, from content scrapping by AI bots to distributed denial-of-service attacks Continue Reading
 - 
                News
                02 Sep 2025
                
                                    
                                OpenAI targets India with datacentre push
The AI firm is planning to open a one-gigawatt datacentre in India, which could reduce latency, ensure regulatory compliance and give it an edge over hyperscalers Continue Reading
By- Mastufa Ahmed
 
 - 
                News
                02 Sep 2025
                
                                    
                                Cyber attackers damage Jaguar Land Rover production
Jaguar Land Rover reports a cyber attack has ‘severely disrupted’ its vehicle production and retail operations, recalling similar attacks on other prominent British brands this year Continue Reading
By- Brian McKenna, Enterprise Applications Editor
 
 - 
                News
                02 Sep 2025
                
                                    
                                JFrog extends DevSecOps playbook to AI governance
The software security specialist is leveraging its capabilities in DevSecOps to address security, data provenance and bias in AI models Continue Reading
By- Aaron Tan, Informa TechTarget
 
 - 
                Opinion
                01 Sep 2025
                
                                    
                                Growing demand for AI-skilled cyber specialists
AI is increasingly at the heart of organisations’ digital transformation journeys – whether that’s to drive up efficiencies, generate powerful insights from data, delight customers, or supercharge internal productivity. Continue Reading
By- Peter Birch and Mo Gaibee, Harvey Nash
 
 - 
                News
                31 Aug 2025
                
                                    
                                Google Cloud brings on-premise Gemini AI to Singapore
Move allows government agencies and regulated industries to run Google’s most powerful artificial intelligence models in their own datacentres, directly addressing data security and residency requirements to fuel the nation’s AI ambitions Continue Reading
By- Aaron Tan, Informa TechTarget
 
 - 
                News
                29 Aug 2025
                
                                    
                                ICO publishes summary of police facial recognition audit
The UK data regulator has released a summary of its facial recognition audit of two police forces Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
 
 - 
                Blog Post
                29 Aug 2025
                
                            
                            All You Start-Ups (Or Upstarts): It's Your Final Call For The Flight To Tech Trailblazers 25
Yes, it’s that time of year again. No, not the “C” word, though there are only 119 shopping days to Christmas as I type. And yes, it is almost football transfer deadline day but... No – I’m talking ... Continue Reading
By- Steve Broadhead, Broadband Testing
 
 - 
                News
                29 Aug 2025
                
                                    
                                Home Office ‘backdoor’ seeks worldwide access to Apple iCloud users’ data, court documents confirm
A court filing states that a government order against Apple would give it the capability to access communications and metadata of customers using the iCloud service anywhere in the world Continue Reading
By- Bill Goodwin, Investigations Editor
 
 - 
                Opinion
                29 Aug 2025
                
                                    
                                How to manage Active Directory security
Understanding prevention and recovery steps is crucial for managing attacks on Active Directory Continue Reading
By- Bob Bobel
 
 - 
                Feature
                28 Aug 2025
                
                                    
                                AI and backup: How backup products leverage AI
We look at how AI helps with backup, from AI analysis of backup jobs and their integrity through natural language support functionality to ransomware and anomaly detection Continue Reading
 - 
                News
                28 Aug 2025
                
                                    
                                Microsoft refuses to divulge data flows to Police Scotland
Tech giant Microsoft is declining to share key information with Police Scotland about where the sensitive data it uploads to Office 365 will be processed, leaving the force unable to comply with UK-wide data protection laws Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
 
 - 
                News
                28 Aug 2025
                
                                    
                                UK cyber security centre helps expose China-based cyber campaign
GCHQ cyber security centre and its international partners release details of malicious cyber activity linked to Chinese businesses Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
 
 - 
                Definition
                28 Aug 2025
                
                            
                            What is network security? Definition and best practices
Network security encompasses all the steps taken to protect the integrity of a computer network and the data within it. Continue Reading
By- Kinza Yasar, Technical Writer
 - Nick Barney, Technology Writer
 - Ben Lutkevich, Site Editor
 
 - 
                News
                27 Aug 2025
                
                                    
                                Incident response planning cuts the risk of claiming on cyber security insurance
Proper attention to incident response planning is emerging as a core cyber control when it comes to reducing the risk of having to claim on cyber security insurance, according to a report Continue Reading
By- Alex Scroxton, Security Editor
 
 - 
                News
                27 Aug 2025
                
                                    
                                Ransomware activity levelled off in July, says NCC
Ransomware levels held steady in the month of July, although the risk remained as persistent as ever Continue Reading
By- Alex Scroxton, Security Editor
 
 - 
                News
                26 Aug 2025
                
                                    
                                Three new Citrix NetScaler zero-days under active exploitation
Citrix patches three new vulnerabilities in its NetScaler lines warning of active zero-day exploitation by an undisclosed threat actor Continue Reading
By- Alex Scroxton, Security Editor
 
 - 
                News
                26 Aug 2025
                
                                    
                                Okta makes AI identity play with Axiom acquisition
Okta says Axiom Security’s technology will reinforce its own offerings in privileged access management, especially when it comes to the growing number of non-human identities Continue Reading
By- Alex Scroxton, Security Editor
 
 - 
                News
                25 Aug 2025
                
                                    
                                How to secure the identity perimeter and prepare for AI agents
Ping Identity CEO Andre Durand explains why identity has become the critical security battleground, how decentralised credentials will reduce data breach risks, and why AI agents will need their own identities to be trusted Continue Reading
 - 
                News
                25 Aug 2025
                
                                    
                                Ransomware attack volumes up nearly three times on 2024
During the first six months of 2025, the number of observed and tracked ransomware attacks far outpaced the volume seen in 2024 Continue Reading
By- Alex Scroxton, Security Editor
 
 - 
                News
                21 Aug 2025
                
                                    
                                Moscow exploiting seven-year-old Cisco flaw, says FBI
US authorities warn of an uptick in state-sponsored exploitation of a seven-year-old vulnerability in Cisco's operating system software Continue Reading
By- Alex Scroxton, Security Editor
 
 - 
                News
                21 Aug 2025
                
                                    
                                Scale of MoD Afghan data breaches widens dramatically
Many more data breaches at the MoD's Arap programme to relocate at-risk Afghan citizens to Britain have emerged following an FoI request by BBC journalists Continue Reading
By- Alex Scroxton, Security Editor
 
 - 
                News
                21 Aug 2025
                
                                    
                                Apple iOS update fixes new iPhone zero-day flaw
Latest Apple zero-day found in the ImageIO framework opens the door for targeted zero-click attacks on iPhone users Continue Reading
By- Alex Scroxton, Security Editor
 
 - 
                Feature
                21 Aug 2025
                
                                    
                                European digital sovereignty: Storage, surveillance concerns to overcome
As China and the US increase surveillance capabilities, are European companies caught in the middle of a data security storm? Continue Reading
By 
