IT security
-
News
30 Apr 2025
Current SaaS delivery model a risk management nightmare, says CISO
JPMorgan Chase security chief Patrick Opet laments the state of SaaS security in an open letter to the industry and calls on software providers to do more to enhance resilience Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Apr 2025
Co-op shuts off IT systems to contain cyber attack
A developing cyber incident at Co-op has forced the retailer to pull the plug on some of its IT systems as it works to contain the attack Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
02 Jul 2024
Whatever you do, don't press the big red button...
I’m not sure if anyone has figures to hand (or the desire to find out) exactly how many cyber security vendors there are out there, but some rough stats suggest that there are verging on 6,000 in ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
Opinion
02 Jul 2024
Security Think Tank: Securing today's ubiquitous cloud environment
The Computer Weekly Security Think Tank considers how CISOs and security practitioners should ensure that the business can make use of public cloud services safely and securely and avoid accidental or deliberate data leakage Continue Reading
By- Kashil JagmohanSingh
-
Blog Post
02 Jul 2024
IT's a vulnerable world out there...
It was a pleasure to catch up t’other day with Rik “rock star” Ferguson, the former Trend Micro legend who is these days hanging out with Forescout as the company’s VP of Security Intelligence, ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
E-Zine
02 Jul 2024
UKtech50 2024: The most influential people in UK technology
In this week’s Computer Weekly, we reveal the 50 most influential people in UK technology for 2024, in our annual UKtech50 list. We talk to Post Office scandal campaigner Alan Bates, voted the most influential person in tech this year. Plus, we find out why a bunch of mobile app startups jumped into a freezing lake near the Arctic Circle. Read the issue now. Continue Reading
-
Opinion
01 Jul 2024
How Broadcom cemented its European cloud sovereignty credentials
The owner of VMware targets flexible deployment options for European public cloud sovereignty Continue Reading
By- Bola Rotibi
-
Feature
01 Jul 2024
Security in the public cloud explained: A guide for IT and security admins
In this guide, IT security and industry experts share their top recommendations for protecting public cloud deployments Continue Reading
By- Cliff Saran, Managing Editor
-
News
28 Jun 2024
How FWD is driving its digital strategy
FWD’s group chief technology and operations officer talks up how the pan-Asian insurer is driving change faster and putting technology at the heart of its services Continue Reading
By- Aaron Tan, TechTarget
-
News
28 Jun 2024
How Recorded Future is operationalising threat intelligence
Recorded Future is investing in APIs to enable automated security workflows, among other measures, to help organisations overcome the hurdles of operationalising threat intelligence Continue Reading
By- Aaron Tan, TechTarget
-
Podcast
28 Jun 2024
No cyber barriers: A Computer Weekly Downtime Upload podcast
We speak to Sharp Europe’s data protection and information security officer about how to balance cybersecurity with the needs of the business Continue Reading
By- Cliff Saran, Managing Editor
-
News
27 Jun 2024
Gulf Edge to operate Google Distributed Cloud in Thailand
The Gulf Energy subsidiary will offer Google’s sovereign cloud service in Thailand with a focus on air-gapped configurations Continue Reading
By- Aaron Tan, TechTarget
-
News
26 Jun 2024
Scottish Courts and Tribunal Service replaces legacy SD-WAN
Contract awarded for the deployment of cross-Scotland software-defined wide area network designed to ensure efficient, secure and reliable administrative services to the judiciaries of Scotland Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
26 Jun 2024
Israel’s cyber chief calls for international front against Iranian hackers
Israel’s cyber chief has called for international action against Iran over state-backed hacking Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
26 Jun 2024
Police Scotland did not consult ICO about high-risk cloud system
Police Scotland chose not to formally consult with the data regulator about the risks identified with a cloud-based digital evidence sharing system, while the regulator itself did not follow up for nearly three months Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Definition
25 Jun 2024
digital signature
A digital signature is a mathematical technique used to validate the authenticity and integrity of a digital document, message or software. Continue Reading
By- Cameron Hashemi-Pour, Former Site Editor
- Alexander S. Gillis, Technical Writer and Editor
- Ben Lutkevich, Site Editor
-
News
25 Jun 2024
WikiLeaks founder Julian Assange freed from prison
A deal reached with US authorities will end the WikiLeaks founder’s years-long legal saga, setting him free if he pleads guilty to a criminal conspiracy charge Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
25 Jun 2024
NHS experts raise warning over patient data breach risk in registries project
Clinicians warn that the NHS England Outcome Registries Platform has poor security and is vulnerable to cyber attack, putting critical patient data at risk of being exposed Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
25 Jun 2024
A revolution in space
In this week’s Computer Weekly, we talk to astronaut Tim Peake about the imminent revolution in space tech and what it means for IT leaders. AI is set to transform the movie industry – we hear from the producers of the latest Mad Max film about how it’s already changed the process for them. And we find out about plans for Neom, the Saudi Arabian smart city in the desert. Read the issue now. Continue Reading
-
News
24 Jun 2024
Sellafield pleads guilty to criminal charges over cyber security
Nuclear Decommissioning Authority-backed organisation Sellafield Ltd pleads guilty to criminal charges brought over significant cyber security failings that could have compromised sensitive nuclear information Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
24 Jun 2024
Tata Communications hosted SASE claims to redefine networking, security
Tata Communications claims world-first implementation of unified SASE solution to deliver unified visibility and control of network traffic with context-led insights and enhanced user experience Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
24 Jun 2024
Hybrid work prompts spike in network security threats
Survey shows more than two-thirds of organisations have seen an increase in network security threats over the past 18 months, with remote and hybrid working the biggest contributor to heightened threat levels Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
21 Jun 2024
Sellafield whistleblower ordered to pay costs after email tampering claims
A former consultant at Sellafield has been ordered to pay costs for having ‘acted unreasonably’ in claiming the nuclear facility tampered with metadata in letters used against her in court Continue Reading
By -
News
21 Jun 2024
Qilin ransomware gang publishes stolen NHS data online
The ransomware gang behind a major cyber attack on NHS supplier Synnovis has published a 400GB trove of private healthcare data online Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
21 Jun 2024
Executive interview: Open models pros and cons
We speak to Meta’s vice-president of AI research about recent publicly released research and models, and the role of closed AI models Continue Reading
By- Cliff Saran, Managing Editor
-
Definition
21 Jun 2024
personally identifiable information (PII)
Personally identifiable information (PII) is any data that could potentially identify a specific individual. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Corinne Bernstein
-
Definition
21 Jun 2024
OpenID (OpenID Connect)
OpenID Connect is an open specification for authentication and single sign-on (SSO). Continue Reading
By -
News
21 Jun 2024
Kaspersky says it can continue to sell cyber threat intelligence in spite of US ban
The US government is stopping Kaspersky Lab from offering its antivirus software and cyber security tools to US firms and citizens Continue Reading
By- Cliff Saran, Managing Editor
-
News
21 Jun 2024
ICO police cloud guidance released under FOI
Long-awaited guidance from the UK data regulator on police cloud deployments highlights some potential data transfer mechanisms it thinks can clear up ongoing legal issues, but tells forces it’s up to them to decide if the measures would work Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Definition
20 Jun 2024
software patch
A software patch or fix is a quick-repair job for a piece of programming designed to resolve functionality issues, improve security or add new features. Continue Reading
By- Cameron Hashemi-Pour, Former Site Editor
- Brien Posey
-
News
20 Jun 2024
Sir Alan Bates hits out at Post Office ‘incompetence’ after data breach
Victims of the scandal react with anger at news the Post Office published a document containing their names and addresses on its website Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
- Bryan Glick, Editor in chief
-
Blog Post
19 Jun 2024
How To Avoid Global RAGged AI Delivery Woes....
If Q1 of this year for me was the season of “newbies” – speaking to, and working with, new vendor clients, then Q2 has definitely been the season of “catch-ups”. The essence of “catch-ups” is the ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
Blog Post
19 Jun 2024
An industry-wide agreement is needed to identify AI-generated content
With the UK general election coming on July 4th, there is very real concern that this election and others around the world are being influenced by artificial intelligence-powered (AI) content ... Continue Reading
By- Cliff Saran, Managing Editor
-
Opinion
19 Jun 2024
Why AI is talking politics this year
AI is already playing a part in this year’s General Election - for good and bad Continue Reading
By- Resham Kotecha
-
News
19 Jun 2024
Microsoft admits no guarantee of sovereignty for UK policing data
Documents show Microsoft’s lawyers admitted to Scottish policing bodies that the company cannot guarantee sensitive law enforcement data will remain in the UK, despite long-standing public claims to the contrary Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Definition
18 Jun 2024
DNS attack
A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system. Continue Reading
By -
Opinion
18 Jun 2024
We need a judge-led inquiry into police spying on journalists and lawyers
When journalists Barry McCaffrey and Trevor Birney were wrongly arrested in 2018, their case led to the discovery of a widespread police surveillance operation targeting journalists and lawyers in Northern Ireland. Barry McCaffrey tells the story Continue Reading
By- Barry McCaffrey
-
E-Zine
18 Jun 2024
General election 2024 – the digital policies examined
In this week’s Computer Weekly, we examine the digital policies revealed in the three main political parties’ general election manifestos. Our new buyer’s guide looks at the latest trends in cloud security. And we find out about the EU’s plans for a digital single market that could span the globe. Read the issue now. Continue Reading
-
Opinion
17 Jun 2024
Cloud security: Finding the right provider to protect your data
This month, the Computer Weekly Security Think Tank considers how CISOs and security practitioners should ensure that the business can make use of public cloud services safely and securely and avoid accidental or deliberate data leakage. Continue Reading
By- Stephen McDermid
-
Feature
17 Jun 2024
Autonomous weapons systems defy rigid attempts at arms control
In an ever more dangerous world, the technology is outpacing diplomacy and holds clear strategic value. Retaining human control over its use will require embracing imperfect solutions Continue Reading
By- Kyle Hiebert, Computer Weekly
-
Opinion
17 Jun 2024
Gartner: Navigating incident response in the cloud
In the rapidly evolving landscape of cloud security, incident response strategies must be as dynamic and flexible as the environments they protect Continue Reading
By- Carlos De Sola Caraballo
-
16 Jun 2024
Securing the edge: A new battleground in mobile network security
Edge computing is changing approaches to mobile network infrastructure, but failure to secure it can expose networks and data to cyber threats. We look at the dangers and potential solutions. Continue Reading
-
Definition
14 Jun 2024
chief trust officer
A chief trust officer (CTrO) in the IT industry is an executive job title given to the person responsible for building confidence around the use of customer information. Continue Reading
By- Scott Robinson, New Era Technology
- Francesca Sales
-
Tip
13 Jun 2024
5 cybersecurity risks and challenges in supply chain
Supply chains have a range of connection points -- and vulnerabilities. Learn which vulnerabilities hackers look for first and how leaders can fend them off. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
News
13 Jun 2024
Black Basta ransomware crew may be exploiting Microsoft zero-day
A Microsoft vulnerability that was addressed without fanfare in March may in fact have been exploited as a zero-day by the notorious Black Basta ransomware gang, threat hunters warn Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
13 Jun 2024
Data leakage in the cloud – can data truly be safe in the cloud?
This month, the Computer Weekly Security Think Tank considers how CISOs and security practitioners should ensure that the business can make use of public cloud services safely and securely and avoid accidental or deliberate data leakage. Continue Reading
By- Scott Swalling
-
Definition
13 Jun 2024
secure access service edge (SASE)
Secure access service edge (SASE), pronounced sassy, is a cloud architecture model that bundles together network and cloud-native security technologies and delivers them as a single cloud service. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Kinza Yasar, Technical Writer
-
Feature
13 Jun 2024
Best practices to beat container misconfiguration
How can organisations ensure containerised environments are configured correctly and adequately defended, without getting lost in the complexity? Continue Reading
By -
Definition
12 Jun 2024
privacy impact assessment (PIA)
A privacy impact assessment (PIA) is a method for identifying and assessing privacy risks throughout the development lifecycle of a program or system. Continue Reading
By- Cameron Hashemi-Pour, Former Site Editor
- Paul Kirvan
- Ben Cole, Executive Editor
-
Opinion
12 Jun 2024
How to ensure public cloud services are used safely and securely
This month, the Computer Weekly Security Think Tank considers how CISOs and security practitioners should ensure that the business can make use of public cloud services safely and securely and avoid accidental or deliberate data leakage. Continue Reading
By- Beji Jacob
-
News
12 Jun 2024
RCE flaw and DNS zero-day top list of Patch Tuesday bugs
An RCE vulnerability in a Microsoft messaging feature and a third-party flaw in a DNS authentication protocol are the most pressing issues to address in Microsoft’s latest Patch Tuesday Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Jun 2024
PSNI ran secret unit to monitor journalists’ and lawyers’ phones, claims former senior officer
The Police Service of Northern Ireland denies claims that its anti-corruption unit used a standalone computer to ‘avoid scrutiny and control’ Continue Reading
By- Bill Goodwin, Computer Weekly
-
Opinion
11 Jun 2024
True cloud security requires in-depth understanding
This month, the Computer Weekly Security Think Tank considers how CISOs and security practitioners should ensure that the business can make use of public cloud services safely and securely and avoid accidental or deliberate data leakage. Continue Reading
By- Elliott Wilkes
-
News
11 Jun 2024
Pure Storage hit by Snowflake credential hackers
Pure Storage emerges as the latest victim of a fast-spreading breach of Snowflake customers targeting users with lax credential security measures in place Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Jun 2024
More than 160 Snowflake customers hit in targeted data theft spree
Mandiant reports that more than 160 Snowflake customers have been hit in a broad data theft and extortion campaign targeting organisations that have failed to pay proper attention to securing valuable credentials Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
10 Jun 2024
communications intelligence (COMINT)
Communications intelligence (COMINT) is information gathered from the communications between individuals or groups of individuals, including telephone conversations, text messages, email conversations, radio calls and online interactions. Continue Reading
By -
News
10 Jun 2024
General election 2024: Liberal Democrats thread digital commitments throughout manifesto
The Lib Dems have promised a new industrial strategy and emphasised the importance of the digital sector, skills and regulating AI, as they lay out plans for the UK general election Continue Reading
By- Bryan Glick, Editor in chief
-
News
10 Jun 2024
NHS blood stocks running low after ransomware attack
The NHS is appealing for people with O Positive and O Negative blood types to come forward to donate as hospitals in London struggle to keep critical services running after ransomware attack Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
08 Jun 2024
The future of identity in print infrastructure management
The use of identity-centric infrastructure access management is set to play a critical role in fortifying the printing environment. Continue Reading
By- Louella Fernandes, Quocirca
-
Blog Post
08 Jun 2024
The future of identity in print infrastructure management
Identity-centric infrastructure access management is set to play a critical role in fortifying the printing environment. Continue Reading
By- Louella Fernandes, Quocirca
-
Definition
07 Jun 2024
electronic intelligence (ELINT)
Electronic intelligence (ELINT) is intelligence gathered using electronic sensors, usually used in military applications. Continue Reading
By -
News
07 Jun 2024
Northern Irish police used covert powers to monitor over 300 journalists
PSNI publishes report on police surveillance of journalists and lawyers, but Northern Ireland’s Policing Board says it does not give the assurances needed Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
07 Jun 2024
Juniper Networks claims first with AIOps to WAN routing
Juniper Networks announces industry leadership with enhancements to cloud-native Mist AI engine for all network domains, claiming to deliver insight for exceptional experiences Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
07 Jun 2024
DDoS gang threatens to disrupt European elections
Russian hacktivists are threatening to disrupt the European Parliament elections, while the BBC reports on new deepfake threats to the UK’s electoral process Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Jun 2024
Bitdefender makes MDR services free to NHS bodies hit by Qilin
Bitdefender offers NHS bodies affected by a major cyber incident free access to its product suite, as the health service continues to deal with the impact of the Qilin ransomware attack on partner Synnovis Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
07 Jun 2024
proof of concept (PoC) exploit
A proof of concept (PoC) exploit is a nonharmful attack against a computer or network. PoC exploits are not meant to cause harm, but to show security weaknesses within software. Continue Reading
By- Kinza Yasar, Technical Writer
-
News
07 Jun 2024
Sophos uncovers Chinese state-sponsored campaign in Southeast Asia
Sophos found three distinct clusters of activity targeted at a high-level government organisation that appeared to be tied to Chinese interests in the South China Sea Continue Reading
By- Aaron Tan, TechTarget
-
Feature
06 Jun 2024
Storage technology explained: Key questions about tape storage
We look at the benefits of tape storage – low cost, inherent security, excellent energy efficiency – the workloads it is best for, and how tape fits a wider storage strategy Continue Reading
By- Stephen Pritchard
- Antony Adshead, Storage Editor
-
News
06 Jun 2024
FBI finds 7,000 LockBit decryption keys in blow to criminal gang
The US authorities say they now have more than 7,000 LockBit decryption keys in their possession and are urging victims of the prolific ransomware gang to come forward Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Jun 2024
Qilin ransomware gang likely behind crippling NHS attack
Security experts investigating a major cyber attack on an NHS partner that has caused frontline services across South London to grind to a halt say the Qilin ransomware gang appears to be the culprit Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Jun 2024
OAIC files civil penalty action against Medibank
The OAIC alleges that Medibank failed to take reasonable steps to protect the personal information of 9.7 million Australians in the October 2022 data breach Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
04 Jun 2024
Security Think Tank: The cloud just got more complicated
This month, the Computer Weekly Security Think Tank considers how CISOs and security practitioners should ensure that the business can make use of public cloud services safely and securely and avoid accidental or deliberate data leakage. Continue Reading
By- Rob Dartnall, SecAlliance
-
News
04 Jun 2024
Invasive tracking ‘endemic’ on sensitive support websites
Websites set up by police, charities and universities to help people get support for sensitive issues like addiction and sexual harassment are deploying tracking technologies that harvest information without proper consent Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
04 Jun 2024
Building a more secure, and sustainable, open source ecosystem
In April 2024, the discovery of an intentionally-placed backdoor in the open source XZ Utils data compression caused concern. Sentry's Chad Whitacre says a more thoughtful approach is needed to balance the individual freedom and creativity of open source, with more rigorous security practice. Continue Reading
By- Chad Whitacre
-
News
04 Jun 2024
NHS services at major London hospitals disrupted by cyber attack
A major cyber attack at NHS services provider Synnovis is disrupting frontline care at hospitals across London Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Jun 2024
Haier Europe taps Orange Business to build responsive SD-WAN
Looking to offer a scalable, secure networking infrastructure to support its growth, Fortune 500 home appliances company works with business arm of telco to deploy cloud-first platform enhancing security, visibility and agility Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
04 Jun 2024
Russia used fake AI Tom Cruise in Olympic disinformation campaign
Microsoft threat researchers report a surge in Russian disinformation campaigns targeting the 2024 Summer Olympics, including AI-enhanced propaganda Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
04 Jun 2024
What is cloud security management? A strategic guide
This cloud security guide explains challenges enterprises face today; best practices for securing and managing SaaS, IaaS and PaaS; and comparisons of cloud-native security tools. Continue Reading
By- Phil Sweeney, Industry Editor
- Stephen J. Bigelow, Senior Technology Editor
-
News
03 Jun 2024
Police chief commissions ‘independent review’ of surveillance against journalists and lawyers
PNSI chief constable appoints lawyer to conduct review into police phone surveillance of journalists, lawyers and NGOs Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
03 Jun 2024
97 FTSE 100 firms exposed to supply chain breaches
Between March 2023 and March 2024, 97 out of 100 companies on the UK’s FTSE 100 list were put at risk of compromise following supply chain breaches at third-party suppliers Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Jun 2024
Major breaches allegedly caused by unsecured Snowflake accounts
Significant data breaches at Ticketmaster and Santander appear to have been orchestrated through careful targeting of the victims’ Snowflake cloud data management accounts Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Jun 2024
AI Seoul Summit review
Dozens of governments and tech companies attending the second global AI Safety Summit have committed themselves to the safe and inclusive development of the technology, but questions remain around whether the commitments made go far enough Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
03 Jun 2024
McLaren Formula 1 Team revs up network security with Cisco
Legendary motor racing team expands global partnership with networking giant to accelerate network security for on-premise hardware and cloud-based software, including secure firewall and XDR Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
03 Jun 2024
Sellafield local authority slammed over response to North Korean ransomware attack
The local authority for Europe’s biggest nuclear site has been slammed by auditors for its response to a North Korea-linked cyber attack that temporarily crippled its operations Continue Reading
By -
News
02 Jun 2024
Ticketek Australia hit by data breach
Customer names, dates of birth and email addresses of Ticketek Australia account holders reportedly impacted in latest data breach affecting event ticketing firm Continue Reading
By- Aaron Tan, TechTarget
-
News
31 May 2024
Law student ‘unfairly disciplined’ after reporting data breach blunder
A law student has accused a leading legal college of unethical behaviour and a “lack of integrity” after it brought misconduct proceedings against him when he reported a data security blunder Continue Reading
By -
News
30 May 2024
Europol sting operation smokes multiple botnets
Malware droppers including Bumblebee and Smokeloader were among those targeted in one of the largest ever joint operations against cyber criminal botnets Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 May 2024
Storebrand divests from IBM over supply of biometrics to Israel
Norwegian asset manager Storebrand’s decision to divest from IBM comes amid growing scrutiny of the role technology companies play in Israel’s human rights abuses Continue Reading
-
News
29 May 2024
Proofpoint exposes AFF scammers’ piano gambit
Ransomware and nation state actors dominate the headlines, but fraud and scams still net career cyber criminals thousands from unsuspecting members of the public. Proofpoint reports on a campaign targeting victims of a musical inclination Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 May 2024
Organisations value digital trust, but aren’t working at it
Three quarters of organisations believe digital trust is relevant to their businesses, yet clear gaps in strategies still seem to persist Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
29 May 2024
How to avoid joining the Dead Java Code Society
Unused or dead Java code is bogging down software engineers and developers, causing weird dependencies and security risks. Eric Costlow of Azul shares some advice on how to avoid becoming a member of a rather unpleasant club Continue Reading
By- Eric Costlow
-
Opinion
29 May 2024
AI governance needs global approach
Doreen Bogdan-Martin, Secretary-General of the UN agency, International Telecommunication Union (ITU) argues that AI governance needs a world-wide approach Continue Reading
By- Doreen Bogdan-Martin
-
News
29 May 2024
Interview: EU data chief Ulrich Ahle on obstacles to Europe’s digital single market
EU data scheme Gaia-X is trying to plug the UK into Europe’s planned digital single market as opposition mounts to efforts to extend the reach of Europe’s vast and controversial data laws over global supply chains Continue Reading
By -
News
28 May 2024
Executive Interview: Why Dell wants to be your one-stop AI shop
At Dell Technologies World in Las Vegas, artificial intelligence was the talk of the town as Dell staked out an all-encompassing strategy ahead of an anticipated goldrush. Dell’s Nick Brackney explains why the tech giant believes it's onto a winner Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 May 2024
Why reliable data is essential for trustworthy AI
In little over two years, generative AI has changed the shape of the technology industry. Now is the time for proper due diligence Continue Reading
-
News
24 May 2024
Parliamentarians warn of UK election threat from Russia, China and North Korea
Joint parliamentary security committee chair Margaret Beckett writes to prime minister urging government to prepare for foreign states interfering with 4 July election Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
24 May 2024
Networks emerge as catalyst for digital business success
Global networking trends report for 2024 reveals continued measurable impact of the network in advancing business goals, with 72% planning on deploying integrated network management platforms over the next two years Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Definition
23 May 2024
wireless intrusion prevention system (WIPS)
A wireless intrusion prevention system (WIPS) is a dedicated security device or integrated software application that monitors a wireless local area network (WLAN) or Wi-Fi network's radio spectrum for rogue access points (APs) and other wireless threats. Continue Reading
By -
Definition
23 May 2024
Regulation SCI (Regulation Systems Compliance and Integrity)
Regulation SCI (Regulation Systems Compliance and Integrity) is a set of rules adopted by the U.S. Securities and Exchange Commission (SEC) to monitor the security and capabilities of U.S. securities markets' technology infrastructure. Continue Reading
-
News
23 May 2024
Northern Ireland police face £750,000 fine after data protection blunder put lives at risks
Information commissioner John Edwards uses discretion to reduce proposed fine from £5.6m to £750,000 Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
23 May 2024
Munich Re sees strong growth in AI insurance
Global reinsurance giant Munich Re expects more demand for AI insurance from organisations that are looking to manage the risks of AI as they experiment more with the technology Continue Reading
-
News
22 May 2024
Rockwell urges users to disconnect ICS equipment
ICS systems maker Rockwell Automation calls on users to take steps to secure their equipment, and reminds them there is no reason to ever have its hardware connected to the public internet, as it tracks an increase in global threat activity Continue Reading
By- Alex Scroxton, Security Editor