IT security
-
News
11 Jun 2025
NHS IT the big winner in Reeves’ Spending Review
The chancellor of the exchequer has significantly upped spending on digital and technology initiatives in the current Spending Review period, with the NHS receiving a 50% tech funding increase. Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Jun 2025
WhatsApp seeks to join Apple in legal challenge against Home Office encryption orders
WhatsApp today applied to intervene in an Investigatory Powers Tribunal case that is considering the UK’s ability to issue a technical capability notice on Apple to ‘weaken encryption’ Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
11 Mar 2025
Post Office scandal data leak interim compensation offers made
Some subpostmasters affected by Post Office data breach offered interim compensation payments Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
11 Mar 2025
Singapore IT leaders boost AI security defences
Study reveals a surge in perceived importance of artificial intelligence for cyber security in Singapore, but declining investment in traditional measures raises concerns as sophisticated cyber attacks intensify Continue Reading
By- Aaron Tan, Informa TechTarget
-
E-Zine
11 Mar 2025
Digitally mapping the world
In this week’s Computer Weekly, we find out how digital twins are mapping our planet to guide strategic decisions such as environmental policies. Liverpool City Council explains how a digital overhaul will transform customer experience. And we find out what it takes to become a cyber security entrepreneur. Read the issue now. Continue Reading
-
News
10 Mar 2025
Peter Kyle sets stage for making tech work
During his speech at the Tech Policy conference, Kyle announced a number of initiatives to support AI and other new technologies Continue Reading
By- Cliff Saran, Managing Editor
-
Opinion
10 Mar 2025
2024: the year misconfigurations exposed digital vulnerabilities
Small configuration errors cascaded into major outages during 2024. Mike Hicks, from Cisco ThousandEyes, propounds techniques to defend digital resilience against tales of the unexpected Continue Reading
By- Mike Hicks
-
Definition
10 Mar 2025
What is Kerberos and how does it work?
Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the internet. Continue Reading
By- Rahul Awati
- Peter Loshin, Former Senior Technology Editor
- Michael Cobb
-
News
10 Mar 2025
How CISOs are tackling cyber security challenges
Security chiefs at the recent Gartner Security and Risk Management Summit in Sydney share insights on navigating board communication, organisational resilience and the importance of understanding business needs Continue Reading
-
Definition
07 Mar 2025
What is a certificate authority (CA)?
A certificate authority (CA) is a trusted entity that issues digital certificates to authenticate content sent from web servers. Continue Reading
By- Rahul Awati
- Peter Loshin, Former Senior Technology Editor
-
News
07 Mar 2025
Interview: Madoc Batters, head of cloud and IT security, Warner Leisure Hotels
The hotel chain has embarked on a major cloud migration programme to improve innovation and enhance the security of its network and applications Continue Reading
By -
News
07 Mar 2025
Managing security in the AI age
Gartner experts offer guidance on harnessing AI’s power while mitigating its risks, from managing shadow AI to implementing security controls and policies Continue Reading
-
News
06 Mar 2025
UK cyber security damaged by ‘clumsy Home Office political censorship’
Britain’s National Cyber Security Centre secretly censors computer security guidance and drops references to encryption Continue Reading
By- Duncan Campbell , 2QQ Ltd, Sussex University
-
Definition
06 Mar 2025
What is promiscuous mode in networking?
In computer networking, promiscuous mode is a mode of operation in which a network device, such as a network interface card (NIC) or an adapter on a host system, can intercept and read in its entirety each network packet that arrives instead of just the packets addressed to the host. Continue Reading
By -
Definition
06 Mar 2025
What is the Twofish encryption algorithm?
Twofish is a symmetric-key block cipher with a block size of 128 bits and variable-length key of size 128, 192 or 256 bits. Continue Reading
By -
Feature
06 Mar 2025
Norway says ‘no way’ to global financial crime
Oslo’s startup ecosystem is fighting back against cyber criminals with tech to wipe out attacks rather than just detect them Continue Reading
-
News
06 Mar 2025
Going beyond search: Elastic’s observability and security play
Elastic’s chief product officer Ken Exner talks up the company’s expansion into observability and security and how it balances innovation with community contributions and monetisation Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
06 Mar 2025
CFIT publishes blueprint for digital company business IDs
Plan to increase the use of digital identities by businesses could add billions of pounds to UK economy through compliance savings and reduced fraud Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
05 Mar 2025
Apple IPT appeal against backdoor encryption order is test case for bigger targets
The Home Office decision to target Apple with an order requiring access to users’ encrypted data is widely seen as a ‘stalking horse’ for attacks against encrypted messaging services WhatsApp, Telegram and Signal Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
05 Mar 2025
NHS investigating how API flaw exposed patient data
NHS patient data was left vulnerable by a flaw in an application programming interface used at online healthcare provider Medefer Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Blog Post
04 Mar 2025
Relaunching Neighbourhood Watch for the Internet Age
Neighbourhood Watch became became by far the UK's largest community support movement during Covid - albeit cover is patchy. Across England and Wales it embraces 9% of household but that ranges from ... Continue Reading
By- Philip Virgo, Winsafe Ltd
-
News
04 Mar 2025
Aussie businesses ramp up security spending
Australian organisations are set to spend A$6.2bn on security and risk management in 2025, a 14.4% jump from the previous year, driven by the rise of AI and a growing threat landscape Continue Reading
By- Aaron Tan, Informa TechTarget
-
Definition
03 Mar 2025
What is cyberstalking and how to prevent it?
Cyberstalking is a crime in which someone harasses or stalks a victim using electronic or digital means, such as social media, email, instant messaging (IM) or messages posted to a discussion group or forum. Continue Reading
-
News
03 Mar 2025
Singapore’s HomeTeamNS hit by ransomware attack
The non-profit organisation suffered a ransomware attack that affected some servers containing employee and member data, prompting an investigation and enhanced security measures Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
01 Mar 2025
Ransomware: from REvil to Black Basta, what do we know about Tramp?
This key member of the Black Basta ransomware gang is wanted by the US justice system. He narrowly escaped extradition at the end of June 2024 - with the help of highly-placed contacts in Moscow, according to him Continue Reading
By- Valéry Rieß-Marchive, Rédacteur en chef
-
News
28 Feb 2025
France pushes for law enforcement access to Signal, WhatsApp and encrypted email
Proposals to be discussed in the French Parliament will require tech companies to hand over decrypted messages and email or face huge fines Continue Reading
By- Bill Goodwin, Computer Weekly
-
Definition
28 Feb 2025
What is multifactor authentication?
Multifactor authentication (MFA) is an IT security technology that requires multiple sources of unique information from independent categories of credentials to verify a user's identity for a login or other transaction. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
- Kinza Yasar, Technical Writer
- Mary E. Shacklett, Transworld Data
-
Definition
28 Feb 2025
What is FCAPS (fault, configuration, accounting, performance and security)?
FCAPS (fault, configuration, accounting, performance and security) is a network management framework and model created by the International Organization for Standardization (ISO). Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Andrew Zola
-
News
28 Feb 2025
NHS staff lack confidence in health service cyber measures
NHS staff understand their role in protecting the health service from cyber threats and the public backs them in this aim, but legacy tech and a lack of training are hindering efforts, according to BT Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
27 Feb 2025
Secure software: Third-party suppliers your first-party risk
Outgoing CISA chief Jen Easterly called on buyers to demand better security standards from their software suppliers. The Security Think Tank considers what better means, and what best practice for secure software procurement looks like in 2025 Continue Reading
By- Ejona Preci, Lindal Group
-
News
27 Feb 2025
CVE volumes head towards 50,000 in 2025, analysts claim
Many trends, notably a big shift to open source tools, are behind an expected boom in the number of disclosed vulnerabilities Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
27 Feb 2025
What is a domain controller?
A domain controller is a server that processes requests for authentication from users and computers within a computer domain. Continue Reading
By- Gavin Wright
- Peter Loshin, Former Senior Technology Editor
-
Definition
27 Feb 2025
What is domain generation algorithm (DGA)?
A domain generation algorithm (DGA) is a program that generates a large list of domain names. DGAs provide malware with new domains to evade security countermeasures. Continue Reading
By- Nick Barney, Technology Writer
- Alexander S. Gillis, Technical Writer and Editor
- Sharon Shea, Executive Editor
-
News
26 Feb 2025
US intelligence chief Tulsi Gabbard probes UK demand for Apple’s encrypted data
A secret order issued by the UK against Apple would be a ‘clear and egregious violation’ if it provides back door access to Americans’ encrypted data, says US director of national intelligence Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
26 Feb 2025
CISOs spending more on insider risk
Insider risk management budgets have more than doubled in the past 12 months and look set to grow further still in 2025, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
26 Feb 2025
Everything, everywhere, all at once: automated decision-making in public services
Despite the UK government's fervent embrace of artificial intelligence, there is still little meaningful transparency around the scope of the technology's deployment throughout public services Continue Reading
By- Jasleen Chaggar, Big Brother Watch
-
News
26 Feb 2025
UK law firm embarks on SD-WAN and SASE infrastructure upgrade
Network services provider collaborates with commercial law firm Hill Dickinson to enhance network connectivity and security by introducing SD-WAN and SASE frameworks to help safeguard corporate assets Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
26 Feb 2025
Scottish police fail to record ethnicity in DNA database
Scottish policing bodies are failing to properly record and publish data on the ethnicity of arrested people, making it impossible to determine whether they are discriminating against certain sections of the population Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
25 Feb 2025
Singapore rolls out guidelines to bolster cloud and datacentre resilience
New advisory guidelines to enhance resilience and security of cloud services and datacentres in Singapore amid potential service disruptions and growing cyber threats Continue Reading
By- Aaron Tan, Informa TechTarget
-
Opinion
25 Feb 2025
Reflecting on three years of cyber warfare in Ukraine
With the third anniversary of Russia's illegal invasion of Ukraine passing this week, Charl Van Der Walt reflects on how the cyber threat landscape in Europe has changed since 2022 Continue Reading
By- Charl Van Der Walt, Orange Cyberdefense
-
E-Zine
25 Feb 2025
Rethinking the route to net zero
In this week’s Computer Weekly, our latest buyer’s guide looks at the need to apply innovative and long-term thinking to reducing carbon emissions in IT. We find out how retailer Dunelm is benefiting from a programme to attract, retain and support women in tech. And Volvo Cars explains why the future for its vehicles is software-defined. Read the issue now. Continue Reading
-
News
25 Feb 2025
Ransomware: on the murky trail of one of the leaders of Black Basta
The internal exchanges within the Black Basta group revealed last week offer a new opportunity to investigate one of its leaders: Tramp. He may have been arrested in Armenia in June 2024, before being released Continue Reading
By- Valéry Rieß-Marchive, Rédacteur en chef
-
News
24 Feb 2025
European Union calls for more cyber data-sharing with Nato
Updates to the EU’s Cyber Blueprint, establishing best practice for multilateral security incident response in Europe, include calls for more collaboration with Nato member states, as the geopolitical environment becomes ever more fractious Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Feb 2025
Versa claims to redefine SASE for enterprises
Universal secure access service edge company announces general commercial availability of what it says is unique proposition allowing enterprises, governments and service providers to deploy customised networking and security services Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Opinion
24 Feb 2025
UK businesses should look to Ireland amid EU cyber security overhaul
With a flourishing technology sector and a direct line to Brussels, investing in Ireland may be a sound bet for UK organisations looking to navigate Europe's transforming cyber landscape. Continue Reading
By- Anne-Marie Tierney-Le Roux, IDA Ireland
-
Opinion
24 Feb 2025
The need for secure data sharing: Lessons learned from public health
Privacy-enhancing technologies can help healthcare organisations build resilience against cyber threats while maintaining patient privacy, security and regulatory compliance. Continue Reading
By- Ronen Cohen, Duality Technologies
-
News
23 Feb 2025
Check Point co-founder on AI, quantum and independence
Gil Shwed, Check Point’s co-founder and executive chairman, discusses the company’s focus on artificial intelligence-driven security and his commitment to remaining an independent force in the cyber security market Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
21 Feb 2025
Apple withdraws encrypted iCloud storage from UK after government demands ‘backdoor’ access
After the Home Office issued a secret order for Apple to open up a backdoor in its encrypted storage, the tech company has instead chosen to withdraw the service from the UK Continue Reading
By- Bill Goodwin, Computer Weekly
-
Definition
21 Feb 2025
What is application allowlisting?
Application allowlisting, previously known as 'application whitelisting,' is the practice of specifying an index of approved software applications or executable files that are permitted to be present and active on a computer system. Continue Reading
By- Mary E. Shacklett, Transworld Data
- Brien Posey
- Peter Loshin, Former Senior Technology Editor
-
News
21 Feb 2025
UK police forces ‘supercharging racism’ with predictive policing
Amnesty International says predictive policing systems are ‘supercharging racism’ in the UK by taking historically biased data to further target poor and racialised communities Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
21 Feb 2025
A landscape forever altered? The LockBit takedown one year on
The NCA-led takedown of the LockBit ransomware gang in February 2024 heralded a transformative year in the fight against cyber crime. One year on, we look back at Operation Cronos and its impact Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
20 Feb 2025
What is network visibility?
Network visibility is an awareness of the components and data within an enterprise computer network. Continue Reading
By- Cameron Hashemi-Pour, Former Site Editor
- Ben Lutkevich, Site Editor
-
News
20 Feb 2025
Watchdog approves Sellafield physical security, but warns about cyber
The Office for Nuclear Regulation has taken Sellafield out of special measures for physical security, but harbours cyber security concerns Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
E-Zine
20 Feb 2025
CW APAC – Trend Watch: CIO trends 2025
It will be no surprise to see artificial intelligence high on the agenda for 2025. In this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly looks at how banks are navigating technology, the continued importance of cyber security, and how enterprises can cement their AI future. Continue Reading
-
Opinion
20 Feb 2025
Privacy at a crossroads in the age of AI and quantum
The confluence of artificial intelligence and quantum computing magnifies the risk to privacy, data security and trust, says Gartner's Bart Willemsen Continue Reading
By- Bart Willemsen, Gartner
-
Feature
19 Feb 2025
Quantum computing in cyber security: A double-edged sword
Scepticism still abounds, but quantum computing stocks have boomed this year. In the world of cyber, however, quantum brings both unprecedented capabilities and significant threats, demanding careful attention Continue Reading
By -
News
19 Feb 2025
Warning over privacy of encrypted messages as Russia targets Signal Messenger
Russia is using phishing attacks to compromise encrypted Signal Messenger services used by targets in the Ukraine. Experts warn that other encrypted app users are at risk Continue Reading
By- Bill Goodwin, Computer Weekly
-
Definition
19 Feb 2025
What is challenge-response authentication?
In computer security, challenge-response authentication is a set of protocols used to protect digital assets and services from unauthorized users, programs and activities. Continue Reading
By- Cameron Hashemi-Pour, Former Site Editor
- Linda Rosencrance
-
News
18 Feb 2025
EY: Industrial companies worldwide stunted in emerging technology use
Businesses globally are spending more on emerging technologies year-on-year, but struggle to expand experimental use cases, finds EY’s sixth annual Reimagining Industry Futures study Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
Definition
18 Feb 2025
What are social engineering attacks?
Social engineering is an attack vector that relies heavily on human interaction and often involves psychological manipulation of people into breaking normal security procedures and best practices to gain unauthorized access. Continue Reading
By- Paul Kirvan
- Madelyn Bacon, TechTarget
-
Definition
18 Feb 2025
What is the Nessus vulnerability scanning platform?
Nessus is a platform developed by Tenable that scans for security vulnerabilities in devices, applications, operating systems, cloud services and other network resources. Continue Reading
By -
News
18 Feb 2025
Cyber Monitoring Centre develops hurricane scale to count cost of cyber attacks
A non-profit company aims to measure the impact of cyber events on the economy using a 1 to 5 scale borrowed from hurricane classification Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
18 Feb 2025
MSP cuts costs with Scality pay-as-you-go anti-ransomware storage
Autodata gets Scality as-a-service for on-site immutable storage via Artesca, to allow customers to rapidly recover from ransomware and at the same cost per terabyte no matter the volume Continue Reading
By- Antony Adshead, Storage Editor
-
News
18 Feb 2025
CPX 2025: Check Point CEO talks up hybrid mesh security
At CPX 2025 in Bangkok, Check Point CEO Nadav Zafrir outlined a vision for network security centred on hybrid mesh architecture and AI-powered capabilities Continue Reading
By- Aaron Tan, Informa TechTarget
-
E-Zine
18 Feb 2025
AI Action Summit calls for a rethink of regulation
In this week’s Computer Weekly, we report from the AI Action Summit in Paris on how easing red tape is overtaking safety as a priority. We examine the AI regulations that IT leaders need to understand. And we talk to the UK government’s AI minister about the country’s artificial intelligence opportunities. Read the issue now. Continue Reading
-
News
17 Feb 2025
The Security Interviews: Yevgeny Dibrov, Armis
Armis CEO Yevgeny Dibrov talks about how his military service and intelligence work opened the door into the world of cyber security entrepreneurship Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
17 Feb 2025
AI models explained: The benefits of open source AI models
In this guide, we explore how to get started with open source AI models and go over how they support your enterprise IT strategy Continue Reading
By- Cliff Saran, Managing Editor
-
Opinion
16 Feb 2025
How to get employees to take cyber risk more seriously
To combat risky cyber security behaviour, organisations must move beyond awareness training and cultivate a culture where security violations are personally felt and socially unacceptable, leveraging existing values, real-world impacts, and even humour Continue Reading
By- Leigh McMullen
-
News
14 Feb 2025
Gartner: CISOs struggling to balance security, business objectives
Only 14% of security leaders can ‘effectively secure organisational data assets while also enabling the use of data to achieve business objectives’, according to Gartner Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Feb 2025
Lenovo CSO: AI adoption fuels security paranoia
Doug Fisher, Lenovo’s chief security officer, outlines the company’s approach to security and AI governance, and the importance of having a strong security culture to combat cyber threats amplified by the use of AI Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
14 Feb 2025
Government renames AI Safety Institute and teams up with Anthropic
Addressing the Munich Security Conference, UK government technology secretary Peter Kyle announces a change to the name of the AI Safety Institute and a tie-up with AI company Anthropic Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
14 Feb 2025
Top cryptography experts join calls for UK to drop plans to snoop on Apple’s encrypted data
Some of the world’s leading computer science experts have signed an open letter calling for home secretary Yvette Cooper to drop a controversial secret order to require Apple to provide access to people’s encrypted data Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
13 Feb 2025
UK accused of political ‘foreign cyber attack’ on US after serving secret snooping order on Apple
US administration asked to kick UK out of 65-year-old UK-US Five Eyes intelligence sharing agreement after secret order to access encrypted data of Apple users Continue Reading
By- Duncan Campbell , 2QQ Ltd, Sussex University
-
Definition
13 Feb 2025
What is a denial-of-service attack?
A denial-of-service (DoS) attack is a security threat that occurs when an attacker makes it impossible for legitimate users to access computer systems, networks, services or other IT resources. Continue Reading
By- Scott Robinson, New Era Technology
- Kevin Ferguson
- Peter Loshin, Former Senior Technology Editor
-
News
13 Feb 2025
UK government sanctions target Russian cyber crime network Zservers
The UK government has imposed sanctions on a Russian cyber crime syndicate responsible for aiding ransomware attacks, targeting the group and individual members Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
12 Feb 2025
Microsoft’s February 2025 Patch Tuesday corrects 57 bugs, three critical
Microsoft is correcting 57 vulnerabilities in its February Patch Tuesday, two of which are being actively exploited in the wild, and three of which are ‘critical’ Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
12 Feb 2025
Forrester: AI and cyber security drive up IT spending
Despite artificial intelligence and cyber security increasing investment, technical debt remains a significant drain on IT budgets Continue Reading
By- Cliff Saran, Managing Editor
-
Definition
12 Feb 2025
What are agreed-upon procedures (AUPs)?
Agreed-upon procedures are a standard a company or client outlines in an engagement letter or other written agreement when it hires an external party to perform an audit on a specific test or business process. Continue Reading
By- Scott Robinson, New Era Technology
- Ben Cole, Executive Editor
-
Definition
12 Feb 2025
What is cyber hijacking?
Cyber hijacking, or computer hijacking, is a type of network security attack in which the threat actor takes control of computer systems, software programs and network communications. Continue Reading
By- Scott Robinson, New Era Technology
-
Definition
12 Feb 2025
What is antimalware?
Antimalware is a software program created to protect IT systems and individual computers from malicious software, or malware. Continue Reading
By- Scott Robinson, New Era Technology
- Linda Rosencrance
-
News
12 Feb 2025
Cisco Live EMEA: Network supplier tightens AI embrace
At its annual EMEA show, Cisco tech leadership unveiled a raft of new products, services and features designed to help customers do more with artificial intelligence Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Feb 2025
Google: Cyber crime meshes with cyber warfare as states enlist gangs
A report from the Google Threat Intelligence Group depicts China, Russia, Iran and North Korea as a bloc using cyber criminal gangs to attack the national security of western countries Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
Definition
11 Feb 2025
What is information security management system (ISMS)?
An information security management system (ISMS) is a set of policies and procedures for systematically managing an organization's sensitive data. Continue Reading
By- Paul Kirvan
- Kinza Yasar, Technical Writer
-
Definition
11 Feb 2025
What is Blowfish?
Blowfish is a variable-length, symmetric, 64-bit block cipher. Continue Reading
By -
Definition
11 Feb 2025
What is a honeypot? How it protects against cyberattacks
A honeypot is a network-attached system set up as a decoy to lure cyberattackers and to help organizations detect, deflect and study hacking attempts to gain unauthorized access to IT. Continue Reading
By- Scott Robinson, New Era Technology
- Ben Lutkevich, Site Editor
- Casey Clark, TechTarget
-
News
11 Feb 2025
F1’s Red Bull charges 1Password to protect its 2025 season
For the upcoming 2025 Formula 1 season, Oracle Red Bull Racing adds cyber security partner 1Password to its roster of team suppliers and sponsors Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Feb 2025
Apple: British techies to advise on ‘devastating’ UK global crypto power grab
A hitherto unknown British organisation – which even the government may have forgotten about – is about to be drawn into a global technical and financial battle, facing threats from Apple to pull out of the UK Continue Reading
By- Duncan Campbell , 2QQ Ltd, Sussex University
- Bill Goodwin, Computer Weekly
-
Blog Post
10 Feb 2025
Your three point plan for Safer Internet Day
The world of your childs smart phone combines the thrills and spills of the circus, fairground, playground, wild west and forest sauvage . It can be a very scary place without you to hold their hand. Continue Reading
By- Philip Virgo, Winsafe Ltd
-
Blog Post
10 Feb 2025
"Just throw more bandwidth at it" - Yeah right... Some people never learn!
One of my classic mantras of the past, ooh er, 30+ years has been “throwing bandwidth at a problem doesn’t solve the problem”. So, you would think all those decades later that the penny had dropped ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
Definition
10 Feb 2025
What is ISO 27001?
ISO 27001, formally known as ISO/IEC 27001:2022, is an information security standard jointly created by the International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC). Continue Reading
-
News
07 Feb 2025
Tech companies brace after UK demands backdoor access to Apple cloud
The UK has served a notice on Apple demanding backdoor access to encrypted data stored by users anywhere in the world on Apple’s cloud service Continue Reading
By- Bill Goodwin, Computer Weekly
-
Tip
07 Feb 2025
RFI vs. RFP vs. RFQ: How they differ and which is best for you
RFIs, RFPs and RFQs all help software buying teams gather different information, and teams usually only send out one or two. Learn more about when to send out each document. Continue Reading
By -
Opinion
07 Feb 2025
Secure software procurement in 2025: A call for accountability
Outgoing CISA chief Jen Easterly called on buyers to demand better security standards from their software suppliers. The Security Think Tank considers what better means, and what best practice for secure software procurement looks like in 2025. Continue Reading
By- Robert Campbell, PA Consulting
-
News
07 Feb 2025
US lawmakers move to ban DeepSeek AI tool
US politicians have introduced a bill seeking to ban the use of the DeepSeek AI tool on government-owned devices, citing national security concerns due to its alleged links to the Chinese state Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Feb 2025
Ransomware payment value fell over 30% in 2024
Several factors, including the impact of law enforcement operations disrupting cyber criminal gangs and better preparedness among users, may be behind a significant drop in the total value of ransomware payments Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
07 Feb 2025
Self-healing networks: The next evolution in network management
The age of AI is highlighting the security risks and pitfalls of traditional network management techniques. Self-healing networks may offer a solution that not only bolsters security, but makes IT and network teams more efficient Continue Reading
By -
Blog Post
07 Feb 2025
Sharp Europe's Bold Ambitions in the IT Services Sector
Building on a 113-year legacy, Sharp Europe is transforming itself into a leading European IT services provider. Strategic acquisitions are playing a key role in this growth which has enabled the ... Continue Reading
By- Louella Fernandes, Quocirca
-
Definition
07 Feb 2025
What is cyber insurance, and why is it important?
Cyber insurance, also called cyber liability insurance or cybersecurity insurance, is a contract a business or other organization can purchase to reduce the financial risks associated with doing business online. Continue Reading
By- Cameron Hashemi-Pour, Former Site Editor
- Kinza Yasar, Technical Writer
-
News
06 Feb 2025
UK’s Cyber Monitoring Centre begins incident classification work
The Cyber Monitoring Centre will work to categorise major incidents against a newly developed scale to help organisations better understand the nature of systemic cyber attacks and learn from their impact Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Feb 2025
Kyndryl expands SASE services with Palo Alto Networks
IT infrastructure services provider enhances end-to-end secure access service edge services to help customers accelerate adoption of cloud-first, zero-trust offering for network security Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
05 Feb 2025
Met Police spied on BBC journalists’ phone data for PSNI, MPs told
The Metropolitan Police monitored the phones of 16 BBC journalists on behalf of police in Northern Ireland, a cross-party group of MPs heard Continue Reading
By- Bill Goodwin, Computer Weekly
- Cormac Kehoe
-
News
05 Feb 2025
Youth activists protest Meta over mental health impacts
Protest outside Meta’s London offices marks launch of Mad Youth Campaign, an effort by activists to challenge the ways in which corporate power negatively shapes the conditions young people live under Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor