IT security
-
News
28 Oct 2025
Effective cyber sanctions require a joined-up approach, says Rusi
Calling out and sanctioning cyber threat actors can be an effective tool, but is not a universal panacea, and needs to be considered as part of a wider, strategic approach, say Rusi think tank analysts Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
28 Oct 2025
Pulling the plug: A way to halt a cyber attacker in your network?
Rumours of an organisation taking its systems offline during a cyber attack spurred conversation on the consequences of simply pulling the power, or internet access, to stop intruders. We consider the ethics and practicality Continue Reading
By
-
News
27 Oct 2025
Hamas lawyer seeks appeal following police’s seizure of his phone at Welsh port
Police say that solicitors cannot have a ‘cast iron defence’ to protect their electronic devices from ever being searched Continue Reading
By -
News
27 Oct 2025
BDO Unibank taps Zscaler to secure cloud migration
Zscaler’s deal with the Philippine bank comes as it is expanding its platform’s capabilities and footprint across Asia Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
24 Oct 2025
UK ramps up ransomware fightback with supply chain security guide
Multinational guidance, developed by the UK and Singapore, is designed to help organisations reinforce their supply chain against ransomware attacks Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
24 Oct 2025
Who knew? How Starmer kept his digital ID plan secret for months
When prime minister Keir Starmer announced on 26 September that the government was to introduce a mandatory national digital ID scheme, it came as a surprise to many people – not least those in the ... Continue Reading
By- Bryan Glick, Editor in chief
-
News
23 Oct 2025
Bereaved families call for public inquiry over suicide forum
The Molly Rose Foundation and families bereaved by suicide claim Ofcom and government departments have not taken effective action to deal with a forum promoting suicide Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
23 Oct 2025
Amid CISA cuts, US state launches first VDP
Legislators in Annapolis, Maryland, have teamed up with Bugcrowd to launch a statewide vulnerability disclosure programme Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Oct 2025
Ministry of Justice’s OpenAI deal paves way to sovereign AI
OpenAI has been busy signing deals with the UK government to bolster UK artificial intelligence. It’s now launching data residency for UK customers Continue Reading
By- Cliff Saran, Managing Editor
-
Opinion
23 Oct 2025
The US government shutdown is a wake-up call for cyber self-reliance
As the US government shutdown heads towards a second month, could the disruption to cyber security programmes be the impetus end-users need to pull themselves up by their own bootstraps? Continue Reading
By- John Paul Cunningham, Silverfort Inc
-
News
23 Oct 2025
Cabinet Office pinches digital ID responsibility from GDS
Prime minister Keir Starmer announces Cabinet Office will take over responsibility for the government’s new digital identity scheme Continue Reading
By -
News
23 Oct 2025
Business leaders raise concerns over public cloud data sovereignty
The unpredictable geopolitical climate is having an impact on IT strategies, a report from Kyndryl has found Continue Reading
By- Cliff Saran, Managing Editor
-
News
22 Oct 2025
Singapore unveils efforts to govern agentic AI, prepare for post-quantum era
Guidelines and tools will help organisations in the city-state manage risks from AI agents and prepare for a future where quantum computers could break current encryption Continue Reading
By- Aaron Tan, Informa TechTarget
-
Definition
22 Oct 2025
What is data masking?
Data masking is a security technique that modifies sensitive data in a data set so it can be used safely in a non-production environment. Continue Reading
-
News
22 Oct 2025
Jaguar Land Rover attack to cost UK £1.9bn, say cyber monitors
The UK's Cyber Monitoring Centre calculates the overall cost of the Jaguar Land Rover cyber attack will be almost two billion pounds Continue Reading
By- Alex Scroxton, Security Editor
-
Quiz
22 Oct 2025
Cybersecurity awareness quiz: Questions and answers
From phishing to patching, file sharing to MFA, find out how much you know about preventing cybersecurity incidents in this security awareness training quiz. Continue Reading
By -
News
22 Oct 2025
Inspired by the EU: Sweden eyes open standard for encrypted chat services
What if your messaging and collaboration app could talk to all the others? Swedish government agencies are investigating the possibility Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
22 Oct 2025
Building security and trust in AI agents
AI agents require standardised guidelines, clear human responsibility and a shared language between developers and policymakers to be secure and trusted, experts say Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
21 Oct 2025
New cyber resilience centre to help SMEs fend off cyber threats
Spearheaded by the Singapore Business Federation, the cyber resilience centre will equip SMEs in the city-state with cyber security capabilities to mitigate and recover from cyber attacks Continue Reading
By- Aaron Tan, Informa TechTarget
-
21 Oct 2025
European digital sovereignty: Storage, surveillance concerns to overcome
As China and the US increase surveillance capabilities, are European companies caught in the middle of a data security storm? Dan Raywood reports Continue Reading
-
News
20 Oct 2025
France’s Atos eyes UK public sector with investment in secure UK infrastructure
French IT services supplier invests in highly secure and accredited UK-based infrastructure Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
20 Oct 2025
Microsoft admonished for role in facilitating Gaza genocide
Following credible allegations that Microsoft Azure was being used to facilitate mass surveillance and lethal force against Palestinians, which prompted the company to suspend services to the Israeli military unit responsible, human rights organisations are calling for further action Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
16 Oct 2025
Gov.uk One Login live with digital Veteran Card
The digital version of the Veteran Card is the first government-issued document available in the Gov.uk One Login app, allowing veterans to use their smartphone to access discounts and services Continue Reading
By -
E-Zine
16 Oct 2025
CW EMEA: Tech that buys time
The speed at which cyber crime evolves as criminals circumvent security is driving research and innovation in academia. The quality of deepfakes is improving, with artificial intelligence generating videos that are difficult to identify, and multiple tools are required to spot a fake. In this issue, we look at the Netherlands Forensic Institute and its research into the analysis of blood flow patterns in the human face, which deepfakes can’t imitate. Continue Reading
-
16 Oct 2025
Norway fixing Big Bang e-health botch with fintech security
Experts call for Europe’s health sector to protect medical APIs with security originated from UK open banking as officials take urgent measures against unprecedented attacks Continue Reading
-
16 Oct 2025
Dutch researchers use heartbeat detection to unmask deepfakes
Dutch method to counter deepfakes analyses blood flow patterns in faces that current deepfake generation tools cannot yet replicate Continue Reading
-
News
16 Oct 2025
Microsoft identifies boardroom cyber awareness as a top priority
Digital security report urges IT leaders to convince company boards that cyber security is a board-level problem Continue Reading
By- Cliff Saran, Managing Editor
-
Definition
16 Oct 2025
What is antivirus software?
Antivirus software (antivirus program) is a security program designed to prevent, detect, search and remove viruses and other types of malware from computers, networks and other devices. Continue Reading
By- Paul Kirvan
- Kinza Yasar, Technical Writer
- Linda Rosencrance
-
News
16 Oct 2025
Securing the AI era: Huawei’s cyber security strategy for the GCC
At Gitex 2025, Sultan Mahmood, chief security officer for Huawei Gulf North, outlined how the company supports GCC digital sovereignty, AI security, and enterprise cyber resilience Continue Reading
By- Andrea Benito , Computer Weekly
-
News
16 Oct 2025
Gitex 2025: Help AG aims to be global cyber force as UAE leads AI security transformation
Acting CEO Aleksandar Valjarevic discusses how Help AG is evolving from a regional cyber security authority into a global innovation-driven player, powered by sovereign services, AI automation and managed security models Continue Reading
By- Andrea Benito , Computer Weekly
-
Blog Post
16 Oct 2025
Why Vodafone's outage shows up critical national infrastructure failings
Just days after Steve Knibbs, director at Vodafone Business Security Enhanced, wrote on the company’s website about the importance of securing UK business supply chains, the company’s customers ... Continue Reading
By- Cliff Saran, Managing Editor
-
News
16 Oct 2025
F5 admits nation-state actor stole BIG-IP source code
F5 discloses that a nation-state actor has stolen source code and unpatched vulnerability data for its widely used BIG-IP products, raising supply chain security concerns across the industry Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
15 Oct 2025
ICO fines Capita £14m after ransomware caused major data breach
Outsourcing giant hit with £14m fine over 2023 cyber attack, but costs could rise as legal actions continue Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
15 Oct 2025
Patch Tuesday: Windows 10 end of life pain for IT departments
Windows 10 is no longer supported, but that does not mean it is not impacted by the latest Patch Tuesday update Continue Reading
By- Cliff Saran, Managing Editor
-
Definition
15 Oct 2025
What is a cloud access security broker (CASB)?
A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure. Continue Reading
By- Paul Kirvan
- Alexander S. Gillis, Technical Writer and Editor
- Dan Sullivan
-
News
15 Oct 2025
Obsession with cyber breach notification fuelling costly mistakes
The race to meet security breach notification deadlines is leading to staff burnout, destroyed evidence and a culture of blame, warns a Trend Micro risk and security strategist Continue Reading
-
News
15 Oct 2025
Dreamforce 2025: Benioff vaunts Slack as interface to agentic enterprise
Salesforce has launched Agentforce 360, a platform for agentic AI, integrating Slack as its interface Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
15 Oct 2025
China responsible for rising cyber attacks, says NCSC
Ministers write to business leaders urging them to step up cyber security in wake of threats from ransomware and nation state-sponsored hackers Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
14 Oct 2025
Why Keir Starmer’s mandatory national digital ID system may be neither mandatory nor national
The government’s proposals for a national digital identity scheme have been widely criticised, but is the prime minister smart enough to realise that an alternative plan could bring wider public benefits? Continue Reading
By- Bryan Glick, Editor in chief
-
News
14 Oct 2025
NCSC calls for action after rise in ‘nationally significant’ cyber incidents
National Cyber Security Centre says businesses should take action now as the number of nationally significant cyber incidents doubles Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
13 Oct 2025
Court dismisses Apple’s appeal against Home Office backdoor
Investigatory Powers Tribunal rules that Apple’s appeal against a Home Office order to access encrypted data of Apple users world wide will no longer proceed. Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
13 Oct 2025
UK police to upgrade illicit asset recovery system
A new system is being developed by the Police Digital Service and NEC Software Solutions to help manage the recovery of criminal assets, replacing 20-year-old legacy infrastructure Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
13 Oct 2025
Thales: Trust in AI for critical systems needs to be engineered
Confidence in artificial intelligence capabilities that power critical systems must go beyond words and be built on a hybrid model that combines data with physics and logic to prove reliability, according to Thales’s chief scientist Continue Reading
By- Aaron Tan, Informa TechTarget
-
Feature
13 Oct 2025
The importance of upgrading to the latest Windows operating system
Despite plans to make it the last major upgrade, Windows 10 was superseded by Windows 11, and now Microsoft support for Windows 10 has come to an end Continue Reading
By- Cliff Saran, Managing Editor
-
Opinion
10 Oct 2025
Beyond the refresh: Your cyber strategy must include AI PCs
Viewing a PC refresh as part of security strategy helps build a more resilient and productive enterprise and is an opportunity to move beyond tactical upgrades to adopt a security-first hardware strategy for the AI era. Continue Reading
By- Louise Quennell, Dell Technologies
-
News
09 Oct 2025
Chat Control encryption plans delayed after EU states fail to agree
Plans to require technology companies across Europe to monitor the contents of encrypted messages and emails have been delayed after European Union member states were unable to reach agreement following German objections Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
09 Oct 2025
Warlock ransomware may be linked to Chinese state
The operators of Warlock ransomware who exploited a set of SharePoint Server vulnerabilities earlier this year likely have some kind of link to the Chinese government, researchers claim Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Oct 2025
Teens arrested over Kido nursery hack
London’s Met Police arrested two teenage boys in Hertfordshire on suspicion of involvement in the recent Kido nursery hack that saw the personal data of infants stolen and leaked Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Oct 2025
Qilin gang claims cyber attack on Japanese brewing giant
The Qilin ransomware gang has claimed responsibility for a cyber attack that has halted brewing at Asahi Group Holdings, causing Japanese retailers to run low on beer Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
07 Oct 2025
Why it takes 11 hours to resolve one ID-related cyber incident
A recent ESG study revealed it takes an average of 11 hours for enterprises to resolve a single identity-related security incident. How did we get here, and what do we need to do differently? Continue Reading
By- Ev Kontsevoy, Teleport
-
News
07 Oct 2025
Alert over Medusa ransomware attacks targeting Fortra MFT
Microsoft warns it is seeing potential mass exploitation of a Fortra GoAnywhere vulnerability by a threat actor linked to the Medusa ransomware-as-a-service operation. Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
07 Oct 2025
Our phones as our castles: can His Majesty’s Government enter?
Ancient laws secure the sanctity of even the most humble of homes from government intrusion. How do they fare in an age of digital technology? Continue Reading
By- Joe Jones, IAPP
-
News
07 Oct 2025
Nato chooses Oracle to secure battlefield communications
Nato has chosen Oracle and Druid to secure private 5G networks for cyber defence, war gaming and research, using Oracle Cloud and edge technology Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
07 Oct 2025
The Security Interviews: David Bradbury, CSO, Okta
Okta’s chief security officer talks security by default and explains why he thinks time is running out for the shared responsibility model Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
07 Oct 2025
Building resilience in the cloud: Bridging SLA gaps and mitigating risk
The Computer Weekly Security Think Tank considers how security leaders can help assure access to the new and innovative cloud tech while minimising risk and ensuring they do not fall foul of regulators. Continue Reading
By- Vaibhav Dutta, Tata Communications
-
07 Oct 2025
How cyber security professionals are leveraging AWS tools
It’s now essential for IT security teams to have oversight of cloud computing, and Amazon Web Services offers a plethora of tools to make managing it easier. Find out how cyber pros are using them in the wild. Continue Reading
-
E-Zine
07 Oct 2025
Is the UK’s digital ID scheme doomed to fail?
In this week’s edition of Computer Weekly, we take a look at the government’s somewhat controversial plan to introduce a national, compulsory digital ID scheme. Ranil Boteju, chief data and analytics officer at Lloyds Banking Group, also runs us through how the financial services giant is planning to use agentic AI to improve the customer experience. In the third part of our buyer’s guide on cloud management and security, details about the plethora of security tools that exist for enterprises looking to manage their Amazon Web Services stacks gets the deep-dive treatment. And, in our final feature in the issue, we look at the evolution in mobile app technology within the retail space. Read the issue now. Continue Reading
-
News
06 Oct 2025
Oracle patches E-Business suite targeted by Cl0p ransomware
Oracle pushes a patch for a dangerous zero-day under active exploitation by one of the most notorious ransomware gangs around Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Oct 2025
Police ordered to give reasons in closed court for seizing phone of UK Hamas lawyer
London court orders police to disclose reasons for seizing and copying the contents of a phone belonging to a UK lawyer who represented Hamas, but refuses an injunction to prevent police from reviewing the phone until after judicial review Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
06 Oct 2025
Police facial recognition trials show little evidence of benefits
In-the-wild testing of police facial recognition systems has failed to generate clear evidence of the technology’s benefits, or to assess the full range of socio-technical impacts Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
06 Oct 2025
Data sovereignty demand pushes Herabit to get S3 storage
Italian service provider gets Cubbit DS3 distributed S3 storage to provide up to 2PB of cloud services to customers demanding data sovereignty, while cutting costs by up to 50% Continue Reading
By- Antony Adshead, Storage Editor
-
News
06 Oct 2025
Gartner: IT leaders need to prepare for GenAI legal issues
GenAI is being embedded into enterprise software. This has implications for governance and regulatory compliance Continue Reading
By- Cliff Saran, Managing Editor
-
News
06 Oct 2025
UK government to consult on police live facial recognition use
The UK’s policing minister has confirmed the government will consult on the use of live facial recognition by law enforcement before expanding its use throughout England, but so far, the technology has been deployed with minimal public debate or consultation Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
05 Oct 2025
Nakivo expands Proxmox backup and DR capabilities in v11.1
Latest version of Backup & Replication adds MSP features, plus Proxmox VM backup functionality, while Nakivo responds to critical vulnerability it was tipped off about in February Continue Reading
By- Antony Adshead, Storage Editor
-
News
02 Oct 2025
PSNI appoints legal counsel to report on police conduct after McCullough surveillance review
The Police Service of Northern Ireland has commissioned a senior lawyer to report back on whether there was any misconduct by police officers following the McCullough Review into the surveillance of journalists, lawyers and NGOs Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
01 Oct 2025
Home Office issues new ‘backdoor’ order over Apple encryption
A second Home Office technical capability notice requires Apple to provide access to encrypted data and messages of British users stored on its iCloud service Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
01 Oct 2025
US government shutdown stalls cyber intel sharing
A key US law covering cyber security intelligence sharing has expired without an extension or replacement amid a total shutdown of the federal government, putting global security collaboration at risk. Continue Reading
By- Alex Scroxton, Security Editor
-
News
01 Oct 2025
EU Chat Control plans pose ‘existential catastrophic risk’ to encryption, says Signal
As EU member states prepare to vote on plans to mandate tech companies to introduce technology to scan messages before they are encrypted, Signal warns that Chat Control will create new security risks Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
01 Oct 2025
Cato extends zero trust access to SASE platform
Capability launched for secure access service edge platform extends zero trust network access to unmanaged devices including personal, contractor and BYOD endpoints Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
30 Sep 2025
MPs press outsourcer TCS over Jaguar cyber attack
The government’s cross-bench Business and Trade Committee has written to Tata Consultancy Services seeking answers over possible links to cyber attacks on Jaguar Land Rover, Marks and Spencer, and Co-op Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Sep 2025
Apple’s first iOS 26 security update fixes memory corruption flaw
Apple issues an update for its brand new iOS 26 mobile operating system, fixing a potentially dangerous vulnerability affecting iPhones, iPads and other Mac devices Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Sep 2025
Cloud provider publishes ‘tech sovereignty’ plan for UK
In the face of mounting data sovereignty concerns across Europe, UK cloud provider Civo lays out high-level plan for how the government can retain control and access of its data should the geopolitical situation sour Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
30 Sep 2025
Harrods hackers start contacting customers
Retailer Harrods has revealed that a number of customers whose data was stolen in a cyber attack have been contacted by the perpetrators Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Sep 2025
Google unveils AI-powered security to trap ransomware attacks
The new security capability, available at no extra cost for most Google Workspace users, detects mass file encryption during ransomware attacks, stops the attacks from spreading and allows for restoration of files Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
29 Sep 2025
UK and US urge Cisco users to ditch end-of-life security appliances
An ongoing campaign of cyber attacks is targeting users of end-of-life Cisco security appliance kit Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Sep 2025
Harrods hit by second cyber attack in six months
Data on approximately 430,000 Harrods shoppers was stolen in a third-party breach, but the cyber attack is not related to an earlier Scattered Spider incident, says the retailer Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Sep 2025
JLR tentatively restarts production, following £1.5bn government backing
Jaguar Land Rover is to resume car production after a £1.5bn government loan guarantee amid its cyber attack fallout. Debate is growing over the bailout and insurance Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
Opinion
29 Sep 2025
Why SLA gaps should not hinder cloud innovation
The Computer Weekly Security Think Tank considers how security leaders can help assure access to the new and innovative cloud tech while minimising risk and ensuring they do not fall foul of regulators. Continue Reading
By- Ashley Barker and Irfan Ahmed, PA Consulting
-
News
26 Sep 2025
Keir Starmer launches digital ID scheme, but does it stand a chance?
Amid an economic crisis, public scepticism and confusing messages, could the government’s digital identity programme fail before it even gets off the ground? Continue Reading
By -
News
26 Sep 2025
Over half of India-based companies suffer security breaches
Business supply chains, which include Indian companies, are at risk of attack as more than half of suppliers were breached last year Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
26 Sep 2025
Microsoft hides key data flow information in plain sight
Microsoft’s own documentation confirms that data hosted in its hyperscale cloud architecture routinely traverses the globe, but the tech giant is actively obfuscating this vital information from its UK law enforcement customers Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
26 Sep 2025
Government to introduce mandatory digital ID
Prime minister Keir Starmer says the scheme, which will be compulsory by the end of this parliament, will help crack down on illegal workers, as well as provide benefits to citizens Continue Reading
By -
News
26 Sep 2025
Okta CEO: AI security and identity security are one and the same
At Oktane 2025 in Las Vegas, Okta CEO Todd McKinnon describes AI security and identity security as inseparable as he tees up a series of agentic security innovations Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Sep 2025
How Mediacorp stops livestreams from freezing at key moments
Singapore’s national broadcaster has achieved a 99.5% crash-free rate for its mobile apps by using observability tools to find and fix issues in real time, ensuring a smoother experience for users Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
25 Sep 2025
Government might support Jaguar Land Rover supply chain to mitigate cyber attack impact
The government is considering buying car parts from JLR’s supply chain to sell them on to the company once it recovers from the August cyber attack Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
25 Sep 2025
Co-op declares cyber attack damage cost £206m
Co-op reveals £206m costs from April cyber attack, with revenues hit, member data stolen and shelves emptied, exposing major retail supply chain vulnerabilities Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
25 Sep 2025
Netherlands establishes cyber resilience network to strengthen public-private digital defence
Network will connect organisations in a cyber crime defence initiative that goes way beyond information sharing Continue Reading
By- Kim Loohuis
-
News
25 Sep 2025
Get HDD temperature right, or risk more drive failures
We talk to Rainer Kaese of Toshiba about the right temperature to run hard disk drives at. Not getting it right risks higher failure rates than what would normally be expected Continue Reading
-
News
24 Sep 2025
Oktane 2025: Okta takes aim at agentic AI governance gap
Identity specialist Okta is laying the groundwork for a number of incoming announcements designed to help its customers get to grips with the challenge of securing non-human, agentic identities. Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
24 Sep 2025
Controversy ahead - the many challenges facing a UK government national digital ID scheme
It seems we are to expect some sort of announcement on digital identity at the forthcoming Labour conference. Briefings to select national newspapers have trailed the likelihood of prime minister ... Continue Reading
By- Bryan Glick, Editor in chief
-
News
24 Sep 2025
NCA arrests man following cyber attack that disrupted air travel
The NCA has arrested a man in West Sussex over the cyber attack on Collins Aerospace that disrupted Heathrow and other EU airports. He has been released on conditional bail Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
24 Sep 2025
McCullough Review finds PSNI failures but no ‘systemic’ surveillance of journalists
A review by Angus McCullough KC reveals that Northern Ireland police failed to comply with the law but that there was no ‘widespread and systemic’ surveillance of journalists, lawyers and NGOs Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
24 Sep 2025
Salesforce shifts focus from AI models to agentic AI
Rather than being preoccupied with large language models, Salesforce is now focused on building AI agents, with an eye on achieving what it calls ‘enterprise general intelligence’ Continue Reading
By- Aaron Tan, Informa TechTarget
-
Definition
23 Sep 2025
What is SOX compliance? A complete guide and checklist
SOX compliance entails adhering to the Sarbanes-Oxley Act of 2002, a U.S. law introduced to enhance investor protection by ensuring greater accuracy, transparency and accountability in public companies' financial reporting. Continue Reading
By- Kinza Yasar, Technical Writer
-
News
23 Sep 2025
SolarWinds warns over dangerous RCE flaw
A newly uncovered RCE flaw in SolarWinds’ helpdesk product bypasses two previously issued fixes, and users should prioritise updates as exploitation is likely to occur Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
23 Sep 2025
Rethinking identity in the age of AI impersonation
Trust in business has long hinged on human instincts but with the advent of deepfakes, it is becoming dangerous to assume too much. Continue Reading
By- Akif Khan, Gartner
-
News
23 Sep 2025
Jaguar Land Rover extends cyber attack-induced shutdown to October
Jaguar Land Rover is extending its production shutdown caused by the 31 August cyber attack into next month, as government ministers drop by and supply chain workers lose wages Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
23 Sep 2025
‘Our worst day’: The untold story of the Electoral Commission cyber attack
As head of digital at The Electoral Commission, Andrew Simpson’s mettle was tested when threat actors gained access to the regulator’s email systems and accessed sensitive voter data. Three years on, he tells his story to Computer Weekly Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
23 Sep 2025
Digital ID risks turning UK into ‘Checkpoint Britain’
Keir Starmer is expected to announce plans for mandatory ID cards at the Labour Party Conference next week. It risks urging in an era of surveillance, digital check points, reliance on online systems, and the risk of data breaches. Continue Reading
By- Rebecca Vincent
-
Opinion
23 Sep 2025
How to fend off identity-based cyber attacks
Attackers are using legitimate credentials to walk through the front door and “live off the land”. True cyber resilience now depends on protecting identity, not just the perimeter Continue Reading
By- Kavitha Mariappan
-
Opinion
23 Sep 2025
Angus McCullough’s review: A reckoning for the PSNI – and for press freedom
The McCullough Review to be published on Wednesday could mark a turning point for press freedom and for policing in Northern Ireland Continue Reading
By- Donal MacIntyre
-
Opinion
22 Sep 2025
From breach to resilience: How the Electoral Commission rebuilt its cyber defences
The UK's Electoral Commission fell victim to a major cyber attack in 2022. Three years on, the organisation is reflecting on its experience and sharing the lessons it learned to help others improve their security resilience. Continue Reading
By- Andrew Simpson, The Electoral Commission
