IT security
-
News
21 Apr 2025
Top APAC firms recognised at innovation awards
Citic Telecom, CapitaLand Investment and DBS Bank were among the region’s top industry innovators recognised for their digital transformation efforts at the Computer Weekly Innovation Awards APAC 2025 Continue Reading
By- Aaron Tan, TechTarget
-
News
21 Apr 2025
CW Innovation Awards: Transforming cyber security with AI
Facing rising cyber threats and a shortage of experts, Citic Telecom International CPC developed an AI-powered penetration testing tool to automate security audits and reduce costs Continue Reading
By
-
Definition
11 Feb 2025
What is Blowfish?
Blowfish is a variable-length, symmetric, 64-bit block cipher. Continue Reading
By -
Definition
11 Feb 2025
What is a honeypot? How it protects against cyberattacks
A honeypot is a network-attached system set up as a decoy to lure cyberattackers and to help organizations detect, deflect and study hacking attempts to gain unauthorized access to IT. Continue Reading
By- Scott Robinson, New Era Technology
- Ben Lutkevich, Site Editor
- Casey Clark, TechTarget
-
News
11 Feb 2025
F1’s Red Bull charges 1Password to protect its 2025 season
For the upcoming 2025 Formula 1 season, Oracle Red Bull Racing adds cyber security partner 1Password to its roster of team suppliers and sponsors Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Feb 2025
Apple: British techies to advise on ‘devastating’ UK global crypto power grab
A hitherto unknown British organisation – which even the government may have forgotten about – is about to be drawn into a global technical and financial battle, facing threats from Apple to pull out of the UK Continue Reading
By- Duncan Campbell , 2QQ Ltd, Sussex University
- Bill Goodwin, Computer Weekly
-
Blog Post
10 Feb 2025
Your three point plan for Safer Internet Day
The world of your childs smart phone combines the thrills and spills of the circus, fairground, playground, wild west and forest sauvage . It can be a very scary place without you to hold their hand. Continue Reading
By- Philip Virgo, Winsafe Ltd
-
Blog Post
10 Feb 2025
"Just throw more bandwidth at it" - Yeah right... Some people never learn!
One of my classic mantras of the past, ooh er, 30+ years has been “throwing bandwidth at a problem doesn’t solve the problem”. So, you would think all those decades later that the penny had dropped ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
Definition
10 Feb 2025
What is ISO 27001?
ISO 27001, formally known as ISO/IEC 27001:2022, is an information security standard jointly created by the International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC). Continue Reading
-
News
07 Feb 2025
Tech companies brace after UK demands back door access to Apple cloud
The UK has served a notice on Apple demanding back door access to encrypted data stored by users anywhere in the world on Apple’s cloud service Continue Reading
By- Bill Goodwin, Computer Weekly
-
Tip
07 Feb 2025
RFI vs. RFP vs. RFQ: How they differ and which is best for you
RFIs, RFPs and RFQs all help software buying teams gather different information, and teams usually only send out one or two. Learn more about when to send out each document. Continue Reading
By -
Opinion
07 Feb 2025
Secure software procurement in 2025: A call for accountability
Outgoing CISA chief Jen Easterly called on buyers to demand better security standards from their software suppliers. The Security Think Tank considers what better means, and what best practice for secure software procurement looks like in 2025. Continue Reading
By- Robert Campbell, PA Consulting
-
News
07 Feb 2025
US lawmakers move to ban DeepSeek AI tool
US politicians have introduced a bill seeking to ban the use of the DeepSeek AI tool on government-owned devices, citing national security concerns due to its alleged links to the Chinese state Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Feb 2025
Ransomware payment value fell over 30% in 2024
Several factors, including the impact of law enforcement operations disrupting cyber criminal gangs and better preparedness among users, may be behind a significant drop in the total value of ransomware payments Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
07 Feb 2025
Self-healing networks: The next evolution in network management
The age of AI is highlighting the security risks and pitfalls of traditional network management techniques. Self-healing networks may offer a solution that not only bolsters security, but makes IT and network teams more efficient Continue Reading
By -
Blog Post
07 Feb 2025
Sharp Europe's Bold Ambitions in the IT Services Sector
Building on a 113-year legacy, Sharp Europe is transforming itself into a leading European IT services provider. Strategic acquisitions are playing a key role in this growth which has enabled the ... Continue Reading
By- Louella Fernandes, Quocirca
-
Definition
07 Feb 2025
What is cyber insurance, and why is it important?
Cyber insurance, also called cyber liability insurance or cybersecurity insurance, is a contract a business or other organization can purchase to reduce the financial risks associated with doing business online. Continue Reading
By- Cameron Hashemi-Pour, Former Site Editor
- Kinza Yasar, Technical Writer
-
News
06 Feb 2025
UK’s Cyber Monitoring Centre begins incident classification work
The Cyber Monitoring Centre will work to categorise major incidents against a newly developed scale to help organisations better understand the nature of systemic cyber attacks and learn from their impact Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Feb 2025
Kyndryl expands SASE services with Palo Alto Networks
IT infrastructure services provider enhances end-to-end secure access service edge services to help customers accelerate adoption of cloud-first, zero-trust offering for network security Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
05 Feb 2025
Met Police spied on BBC journalists’ phone data for PSNI, MPs told
The Metropolitan Police monitored the phones of 16 BBC journalists on behalf of police in Northern Ireland, a cross-party group of MPs heard Continue Reading
By- Bill Goodwin, Computer Weekly
- Cormac Kehoe
-
News
05 Feb 2025
Youth activists protest Meta over mental health impacts
Protest outside Meta’s London offices marks launch of Mad Youth Campaign, an effort by activists to challenge the ways in which corporate power negatively shapes the conditions young people live under Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
05 Feb 2025
MoD set to develop £50m data analytics platform with Kainos
The Ministry of Defence has chosen IT services provider Kainos to develop its £50m data analytics platform across all armed services, over a three-year programme Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
Definition
04 Feb 2025
What is Internet Key Exchange (IKE)?
Internet Key Exchange (IKE) is a standard protocol used to set up a secure and authenticated communication channel between two parties via a virtual private network (VPN). Continue Reading
By- Gavin Wright
- Andrew Zola
- Alexander S. Gillis, Technical Writer and Editor
-
Opinion
04 Feb 2025
“Unsafe At Any Speed”. Comparing automobiles to code risk
Outgoing CISA chief Jen Easterly called on buyers to demand better security standards from their software suppliers. The Security Think Tank considers what better means, and what best practice for secure software procurement looks like in 2025. Continue Reading
-
Blog Post
04 Feb 2025
A driving licence in an app is a boost for digital identity - but not for angry suppliers
It’s rare that a digital government development attracts interest from mainstream media, but last month’s announcement of a digital driving licence brought widespread national coverage and a mass ... Continue Reading
By- Bryan Glick, Editor in chief
-
News
03 Feb 2025
New Relic extends observability to DeepSeek
The observability tools supplier now offers enhanced monitoring for DeepSeek models to help businesses reduce the costs and risks of generative AI development Continue Reading
By- Aaron Tan, TechTarget
-
News
03 Feb 2025
Government sets out cyber security practice code to stoke AI growth
The government has set out a cyber security code of practice for developers to follow when building AI products Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
Opinion
03 Feb 2025
Vigilant buyers are the best recipe for accountable suppliers
In January 2025, outgoing CISA chief Jen Easterly called on IT buyers to demand better security standards from their software suppliers. The Security Think Tank considers what better means, and what does best practice for secure software procurement looks like in 2025. Continue Reading
By- Aditya K Sood, Aryaka
-
News
03 Feb 2025
DeepSeek-R1 more readily generates dangerous content than other large language models
Research scientists at cyber firm Enkrypt AI publish concerning findings from a red team exercise conducted against DeepSeek, the hot new generative AI tool Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Feb 2025
Australian government doubles down on AWS
Federal government signs three-year whole-of-government agreement with Amazon Web Services, expanding access to cloud services for all levels of government Continue Reading
By- Aaron Tan, TechTarget
-
Definition
31 Jan 2025
What is a certificate revocation list (CRL) and how is it used?
A certificate revocation list (CRL) is a list of digital certificates that have been revoked by the issuing certificate authority (CA) before their actual or assigned expiration date. Continue Reading
-
News
31 Jan 2025
Police swoop on Sky ECC cryptophone distributors in Spain and Holland
Dutch and Spanish police have arrested four people accused of making millions of euros by distributing Sky ECC encrypted phones to criminal organisations Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
31 Jan 2025
Barclays hit by major IT outage on HMRC deadline day
Customers of Barclays Bank are left unable to access web app and online banking following a significant IT outage that seems to have come at the worst possible time Continue Reading
By- Alex Scroxton, Security Editor
-
News
31 Jan 2025
AI jailbreaking techniques prove highly effective against DeepSeek
Researchers at Palo Alto have shown how novel jailbreaking techniques were able to fool breakout GenAI model DeepSeek into helping to create keylogging tools, steal data, and make a Molotov cocktail Continue Reading
By- Alex Scroxton, Security Editor
-
News
31 Jan 2025
DeepSeek API, chat log exposure a ‘rookie’ cyber error
Security researchers at Wiz find a trove of DeepSeek data including API secrets and chat logs publicly exposed via an open source database management tool, raising questions about the fast-growing service’s approach to security Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
31 Jan 2025
What is cryptology?
Cryptology is the mathematics, such as number theory and the application of formulas and algorithms, that underpin cryptography and cryptanalysis. Continue Reading
By -
Definition
31 Jan 2025
What is biometric verification?
Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing biological traits. Continue Reading
By- Michael Cobb
- Alexander S. Gillis, Technical Writer and Editor
- Rahul Awati
-
Opinion
31 Jan 2025
Can security operations ever be fully autonomous?
Focusing on targeted improvements, not full automation, is key to scaling security operations with AI Continue Reading
By- Pete Shoard
-
Definition
31 Jan 2025
What is biometrics?
Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics. Continue Reading
By- Cameron Hashemi-Pour, Former Site Editor
- Alexander S. Gillis, Technical Writer and Editor
- Peter Loshin, Former Senior Technology Editor
-
News
30 Jan 2025
First international AI safety report published
A global cohort of nearly 100 artificial intelligence experts publish first international AI safety report ahead of the third AI summit, outlining an array of challenges posed by the technology that will be used to inform upcoming discussions Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Definition
30 Jan 2025
What is a password?
A password is a string of characters used to verify the identity of a user during the authentication process. Continue Reading
By- Rahul Awati
- Madelyn Bacon, TechTarget
-
News
29 Jan 2025
How government hackers are trying to exploit Google Gemini AI
Google’s threat intel squad has shared information on how nation state threat actors are attempting to exploit its Gemini AI tool for nefarious ends Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
29 Jan 2025
Data protection and consumer trust are the key to unlocking AI
The government is pushing a light touch to regulating AI training but the public have real concerns about data privacy Continue Reading
By- Miriam Everett, partner Herbert Smith Freehills
-
News
29 Jan 2025
Vallance rejects latest charge to reform UK hacking laws
Science minister Patrick Vallance rejects proposed amendments to the Computer Misuse Act, arguing that they could create a loophole for cyber criminals to exploit Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Jan 2025
NAO: UK government cyber resilience weak in face of mounting threats
The National Audit Office has found UK government cyber resilience wanting, weakened by legacy IT and skills shortages, and facing mounting threats Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
28 Jan 2025
Over 40 journalists and lawyers submit evidence to PSNI surveillance inquiry
Angus McCullough, who is leading a review into the police surveillance of journalists and lawyers in Northern Ireland, says victims will be informed if they were unlawfully spied on – subject to ‘legal constraints’ Continue Reading
By- Bill Goodwin, Computer Weekly
-
Feature
28 Jan 2025
EU law could usher in transformative change to digital ecosystems
The EU’s Digital Fairness Act aims to end exploitative practices online and enhance consumer protection, but civil society groups say it must address the power and information asymmetries between users and tech firms Continue Reading
-
Opinion
28 Jan 2025
Your first steps to improve international compliance
The Computer Weekly Security Think Tank considers how security leaders should best navigate the multitude of new national and multinational regulations affecting their work, and ensure their organisations remain compliant and protected Continue Reading
By -
Definition
28 Jan 2025
What is a hardware security module?
A hardware security module (HSM) is a physical device that provides extra security for sensitive data. Continue Reading
By- Rahul Awati
- Elizabeth Davies
- Cameron McKenzie, TechTarget
-
Definition
28 Jan 2025
What is spyware?
Spyware is a type of malicious software (malware) that is installed on a computing device without the end user's knowledge. Continue Reading
By- Katie Terrell Hanna
- Alexander S. Gillis, Technical Writer and Editor
- Kate Brush
-
E-Zine
28 Jan 2025
Turbulent times ahead for tech
In this week’s Computer Weekly, the World Economic Forum in Davos highlighted growing risks to digital supply chains – we examine the turbulence ahead. Data sovereignty is becoming a growing issue as companies move to the cloud – we look at the regulatory challenges. And we analyse the best practices in automated patch management. Read the issue now. Continue Reading
-
News
27 Jan 2025
Three sentenced over OTP.Agency MFA fraud service
Three men have been sentenced over their role in a cyber criminal subscription service that offered access to online accounts using illicitly obtained one-time passcodes Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Jan 2025
Cyber incident that closed British Museum was inside job
An IT incident that disrupted visitor access to the British Museum last week was the work of a disgruntled contractor who had been let go Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
27 Jan 2025
VMware backup: Key decision points if you migrate away from VMware
VMware’s pricing changes have spurred some organisations to move to new virtualisation environments, but they’ll need backing up. We look at the key points to consider Continue Reading
-
News
27 Jan 2025
Inside CyberArk’s security strategy
CyberArk CIO Omer Grossman talks up the company’s security-first ethos, the importance of an assumed breach mentality and how the company is addressing threats from the growing use of AI Continue Reading
By- Aaron Tan, TechTarget
-
Feature
27 Jan 2025
Public cloud: Data sovereignty and data security in the UK
We assess the impact of new regulations and government policy on the ability to use public cloud services Continue Reading
-
News
24 Jan 2025
MPs and peers start inquiry into Russian and Chinese sabotage threats to subsea internet cables
MPs and Lords on the Joint Committee on the National Security Strategy have begun an inquiry into the resilience of UK internet cables, following heightened threats of Russian and Chinese sabotage Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
24 Jan 2025
US indicts five in fake North Korean IT contractor scandal
The US authorities have accused five men, including two American citizens, of involvement in a scheme which saw companies duped into hiring fake North Korean IT contractors Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Jan 2025
High Court: Sky Betting ‘parasitic’ in targeting problem gambler
UK High Court rules that Sky Betting acted unlawfully after breaching a customer’s data protection rights when it obtained his personal data through cookies and used it to profile him for the purposes of direct marketing, despite his ‘impaired’ ability to provide meaningful consent Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
24 Jan 2025
CISOs boost board presence by 77% over two years
A global research study, from Splunk and Oxford Economics, into how chief information security officers interact with boards finds greater participation but enduring gaps Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
Definition
24 Jan 2025
What is SAML (Security Assertion Markup Language)?
Security Assertion Markup Language (SAML) is an open standard for sharing security information about identity, authentication and authorization across different systems. Continue Reading
By- Kinza Yasar, Technical Writer
- Peter Loshin, Former Senior Technology Editor
-
Definition
23 Jan 2025
What is threat modeling?
Threat modeling is the systematic process of identifying threats to and vulnerabilities in software applications, and then defining countermeasures to mitigate those threats and vulnerabilities to better protect business processes, networks, systems and data. Continue Reading
-
News
23 Jan 2025
ICO launches major review of cookies on UK websites
ICO sets out 2025 goals, including a review of cookie compliance across the UK’s top 1,000 websites, as it seeks to achieve its ultimate goal of giving the public meaningful control over how their data is used Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
23 Jan 2025
What is SSL (Secure Sockets Layer)?
SSL (Secure Sockets Layer) is a networking protocol that secures connections between web clients and web servers over internal networks or the internet by encrypting the data sent between those clients and servers. Continue Reading
By- Rahul Awati
- Michael Cobb
- Peter Loshin, Former Senior Technology Editor
-
News
23 Jan 2025
UK eVisa system problems persist despite repeated warnings
Travellers are already having issues boarding UK-bound flights, while refugees have been left with no way to prove their immigration status in the UK, just two weeks after the Home Office transitioned to electronic visas Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Feature
23 Jan 2025
Why run AI on-premise?
Much of artificial intelligence’s rapid growth has come from cloud-based tools. But there are very good reasons to host AI workloads on-premise Continue Reading
-
News
22 Jan 2025
Privacy professionals expect budget cuts, lack confidence
Over 50% of privacy professionals in Europe expect to see less money earmarked for data security initiatives in 2025, and many don’t have faith their organisations are taking the issue seriously, according to an ISACA report Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Jan 2025
Funksec gang turned up ransomware heat in December
The criminal ransomware fraternity was hard at work over the festive period, with attack volumes rising and a new threat actor emerging on the scene Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
22 Jan 2025
What is hacktivism?
Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason. Continue Reading
By- Katie Terrell Hanna
- Ben Lutkevich, Site Editor
- Madelyn Bacon, TechTarget
-
News
22 Jan 2025
Europol seeks evidence of encryption on crime enforcement as it steps-up pressure on Big Tech
Europol wants examples of police investigations hampered by end-to-end encryption as it pressures tech companies to provide law enforcement access to encrypted messages Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
22 Jan 2025
APAC businesses face surge in email attacks
Sophisticated phishing and business email compromise campaigns are increasingly targeting organisations across the Asia-Pacific region, research reveals Continue Reading
By- Aaron Tan, TechTarget
-
Definition
21 Jan 2025
What is a private key?
A private key, also known as a secret key, is a variable in cryptography used with an algorithm to encrypt or decrypt data. Continue Reading
By- Rahul Awati
- Peter Loshin, Former Senior Technology Editor
- Michael Cobb
-
E-Zine
21 Jan 2025
Will the UK become an AI powerhouse?
In this week’s Computer Weekly, we analyse the UK government’s new AI strategy and ask if the ambitious plans are achievable. The latest EU regulation affecting cyber security, called DORA, will affect digital resilience plans for many businesses – we examine the implications. We also look at the benefits and technologies behind cloud data lakes. Read the issue now. Continue Reading
-
News
20 Jan 2025
Singtel’s 5G network slicing to boost Singapore’s defence and security
Singapore’s defence and security technology agencies will leverage Singtel’s 5G network slicing technology nationwide to combat evolving security threats and enhance national security Continue Reading
By- Aaron Tan, TechTarget
-
News
17 Jan 2025
US Supreme Court upholds TikTok ban
The US Supreme Court has upheld a legal ban on TikTok, meaning that the video-sharing application will be shut down from midnight on Sunday 19 January Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
17 Jan 2025
Cyber innovation to address rising regulatory, threat burden
The Computer Weekly Security Think Tank considers how security leaders should best navigate the multitude of new national and multinational regulations affecting their work, and ensure their organisations remain compliant and protected Continue Reading
By- Nick New, Optalysys
-
Feature
17 Jan 2025
A guide to DORA compliance
We look at the new EU regulation for cyber resiliency, the role of IT asset management in auditing and third-party risks Continue Reading
By- Cliff Saran, Managing Editor
-
News
16 Jan 2025
Biden signs new cyber order days before Trump inauguration
With days left in the White House, outgoing US president Joe Biden has signed a wide-ranging cyber security executive order with far-reaching implications Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 Jan 2025
Russia’s Star Blizzard pivots to WhatsApp in spear-phishing campaign
The Russian cyber spy operation known as Star Blizzard changed tactics after a takedown operation by Microsoft and the US authorities, turning to widely used messaging platform WhatsApp to try to ensnare its targets Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 Jan 2025
Almost half of UK banks set to miss DORA deadline
A significant minority of financial services organisations in the UK will not be fully compliant with the EU’s DORA cyber and risk management regulation when it comes into force on 17 January Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 Jan 2025
Davos 2025: Digital supply chains at risk as world faces two years of turbulence
World Economic Forum urges digital business leaders to build the resilience of supply chains, improve cyber defences and develop contingency plans Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
15 Jan 2025
Cyber security dovetails with AI to lead 2025 corporate IT investment
Cyber security and GenAI top enterprise IT investment plans for 2025, whether singly or together, according to research from Enterprise Strategy Group Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
15 Jan 2025
Users protest, flee TikTok as clock ticks on US ban
As the US Supreme Court prepares to rule on the future of TikTok, rumours of a sale are swirling around Washington DC while panicked users make plans for an exodus Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Jan 2025
Biggest Patch Tuesday in years sees Microsoft address 159 vulnerabilities
The largest Patch Tuesday of the 2020s so far brings fixes for more than 150 CVEs ranging widely in their scope and severity – including eight zero-day flaws Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
15 Jan 2025
What is password cracking?
Password cracking is the process of using an application program to identify an unknown or forgotten password that allows access to a computer or network resource. Continue Reading
By- Rahul Awati
- Alexander S. Gillis, Technical Writer and Editor
-
Opinion
15 Jan 2025
What they don’t tell you about cyber attacks – the emotional impact on staff
CIO Sean Green writes about his experience of the emotional impact of a cyber attack on IT staff Continue Reading
By- Sean Green
-
News
15 Jan 2025
Davos 2025: Misinformation and disinformation are most pressing risks, says World Economic Forum
World leaders, business chiefs and civil society organisations will discuss the risks posed by misinformation, disinformation and artificial intelligence at the World Economic Forum Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
15 Jan 2025
Cohesity CEO on Veritas integration and IPO plans
Cohesity CEO Sanjay Poonen shares his vision for integrating Veritas’ enterprise data protection business, uniting 12,000 customers, driving AI-powered innovation and building a public-ready company Continue Reading
By- Aaron Tan, TechTarget
-
News
14 Jan 2025
Barings Law enleagues 15,000 claimants against Google and Microsoft
Barings Law has signed up 15,000 claimants in a data breach suit against Microsoft and Google. The firm says the tech giants use personal data without proper consent to train AI models Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
14 Jan 2025
Preparing for AI regulation: The EU AI Act
The EU AI Act builds on existing cyber security, privacy and data governance regulations such as GDPR Continue Reading
-
E-Zine
14 Jan 2025
Generating customer experience at NatWest Bank
In this week’s Computer Weekly, we find out how NatWest Bank is using generative AI to enhance its customer experience. Our latest buyer’s guide examines the emerging regulatory compliance environment affecting IT leaders. And we learn how Toyota is turning to automation to improve its helpdesk support service for employees. Read the issue now. Continue Reading
-
News
13 Jan 2025
UK government plans to extend ransomware payment ban
A ban on ransomware payments by UK government departments will be extended to cover organisations such as local councils, schools and the NHS should new government proposals move forward Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
13 Jan 2025
Why we need better cyber regulation to protect the UK from disruption
The Computer Weekly Security Think Tank considers how security leaders should best navigate the multitude of new national and multinational regulations affecting their work, and ensure their organisations remain compliant and protected. Continue Reading
By- Adam Stringer, PA Consulting
-
News
13 Jan 2025
CNI operators should ask these 12 questions of their OT suppliers
The NCSC, CISA and others have set out 12 cyber security considerations CNI organisations and other users of operational technology should incorporate into their buying processes to force their suppliers to do better Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Jan 2025
Can UK government achieve ambition to become AI powerhouse?
The artificial intelligence opportunities action plan has been largely well received, but there are plenty of questions about how it will be achieved Continue Reading
By- Cliff Saran, Managing Editor
-
News
13 Jan 2025
UK government unveils AI-fuelled industrial strategy
Labour plans to implement the 50 recommendations set out by entrepreneur Matt Clifford to boost the use of AI in the UK Continue Reading
By- Cliff Saran, Managing Editor
-
Feature
13 Jan 2025
Preparing for AI regulation: The EU AI Act
The EU AI Act builds on existing cyber security, privacy and data governance regulations such as GDPR Continue Reading
By- Cliff Saran, Managing Editor
-
News
10 Jan 2025
US bank FNBO uses Pindrop to tackle voice fraud, deepfakes
Learn how First National Bank of Omaha in the US is enhancing customer authentication and verification in its contact centres, eliminating friction points and making life easier for its customer service teams, with Pindrop voice security technology Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Jan 2025
Mandiant: Latest Ivanti vulns exploited by Chinese cyber spooks
Threat actors are once again lining up to exploit vulnerabilities in the widely used Ivanti product suite, with an apparent link to Chinese espionage activity Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Jan 2025
German court finds hacked EncroChat phone evidence inadmissible
The Berlin Regional Court has found that evidence obtained by a joint French and Dutch operation to hack the EncroChat encrypted mobile phone network is legally inadmissible, raising questions about its use in other European countries Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
07 Jan 2025
Regional skills plan to boost UK cyber defences
Over 30 projects in England and Northern Ireland will receive a share of a £1.9m fund designed to enhance cyber security skills and protect small businesses Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
07 Jan 2025
Why CISOs should build stronger bonds with the legal function in 2025
The Computer Weekly Security Think Tank considers how security leaders should best navigate the multitude of new national and multinational regulations affecting their work, and ensure their organisations remain compliant and protected. Continue Reading
By- Mandy Andress, Elastic