Privacy and data protection
-
News
19 Aug 2025
Google spins up agentic SOC to speed up incident management
Google Cloud elaborates on its vision for securing artificial intelligence unveiling new protections and capabilities across its product suite Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Aug 2025
Deepfake AI scammers target the Big Yin
Cyber criminal scammers exploiting GenAI to create deepfake AI tools are targeting one of the UK’s most beloved comics, and one of its strongest accents Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Aug 2025
US says UK has agreed to drop encryption ‘back door’ demands against Apple
US and UK end diplomatic row over UK encryption ‘back door’ order against Apple, but it remains unclear whether Apple will restore advanced encryption services to UK users Continue Reading
By- Bill Goodwin, Investigations Editor
-
19 Aug 2025
Met Police to double facial recognition use amid budget cuts
The UK’s largest police force is massively expanding its use of live facial recognition technology, despite ongoing concerns over privacy and bias, as it prepares to lose 1,700 officers and staff Continue Reading
-
News
18 Aug 2025
Workday hit in wave of social engineering attacks
A campaign of voice-based social engineering attacks targeting users of Salesforce’s services appears to have struck HR platform Workday Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Aug 2025
Extremist hacker who defaced websites and stole data imprisoned
Hacker Al-Tahery Al-Mashriky pled guilty to attacking multiple websites based on extremist political and religious ideology Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Aug 2025
Warlock claims ransomware attack on network services firm Colt
UK network services firm Colt is attempting to recover various customer-facing systems following a cyber attack that has been claimed by the Warlock ransomware gang and may have arisen via a SharePoint flaw Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Aug 2025
US trade body calls on Washington to cut cyber red tape
The US Information Technology Industry Council has called on the White House’s Office of the National Cyber Director to cut burdensome regulations in areas such as AI and incident reporting, and to do more to build a unified security regime Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
14 Aug 2025
Protecting your data in the EU means protecting an independent authority
As the EU faces mounting scrutiny over institutional transparency, ensuring the genuine independence of the European Data Protection Supervisor is key to preserving the rule of law and the credibility of the Union’s digital governance. Continue Reading
By- Aída Ponce Del Castillo, senior researcher at the Foresight Unit, ETUI
-
News
12 Aug 2025
Researchers firm up ShinyHunters, Scattered Spider link
ReliaQuest researchers present new evidence that firms up a potential link, or outright partnership, between the ShinyHunters and Scattered Spider cyber gangs Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Aug 2025
UK work visa sponsors are target of phishing campaign
Mimecast identifies a phishing campaign targeting UK organisations that sponsor migrant workers and students, opening the door to account compromise and visa fraud Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Aug 2025
Workday research: 75% of employees will work with artificial intelligence, but not for it
Workday research finds 75% of workers like AI as a teammate, but only 30% want it to be the boss. Trust in the technology may grow with use, but human focus, clear roles and governance are key Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
Feature
11 Aug 2025
ShinyHunters Salesforce cyber attacks explained: What you need to know
Computer Weekly gets under the skin of an ongoing wave of ShinyHunters cyber attacks orchestrated via social engineering against Salesforce users Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
11 Aug 2025
How CISOs can adapt cyber strategies for the age of AI
Traditional security measures may not be able to cope with the AI reality. In order to safeguard enterprise operations, reputation and data integrity in an AI-first world, security leaders need to rethink. Continue Reading
By- Martin Riley, Bridewell Consulting
-
News
11 Aug 2025
McCullough Review into PSNI spying on journalists and lawyers delayed
Angus McCullough KC is to present findings of an independent review of police spying on phone data of lawyers, journalists and NGOs in Northern Ireland in October Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
11 Aug 2025
Watching the watchers: Is the Technical Advisory Panel a match for MI5, MI6 and GCHQ?
Dame Muffy Calder is chair of the Technical Advisory Panel (TAP), a small group of experts that advises the Investigatory Powers Commissioner on surveillance technology. Do they have what it takes to oversee the intelligence community? Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
08 Aug 2025
OpenAI closes gap to artificial general intelligence with GPT-5
As OpenAI’s latest large language model delivers smarter AI, experts are wary of the risks GPT-5 poses to human creativity Continue Reading
By- Cliff Saran, Managing Editor
-
News
06 Aug 2025
Black Hat USA: Startup breaks secrets management tools
Researchers at Cyata, an agentic identity specialist that has just emerged from stealth, found 14 CVEs in the widely used CyberArk Conjur and HashiCorp Vault enterprise secrets management platforms Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Aug 2025
Companies House ID verification to start in November 2025
Companies House plans to start vetting director identities from mid-November, but its reliance on the troubled One Login digital identity service may be cause for concern Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Aug 2025
Australian scaleup to bring AI-led data protection to the MoD
The UK’s Ministry of Defence is embracing AI-led data protection in the wake of a major privacy breach, enlisting Australian cyber firm Castlepoint Systems to oversee sensitive records Continue Reading
By- Alex Scroxton, Security Editor
-
Tip
05 Aug 2025
8 ways to enhance data center physical security
Data center physical security is just as important as cybersecurity. Organizations can follow these eight security approaches to enhance facility access monitoring. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
E-Zine
05 Aug 2025
Digitising fan experience
In this issue, discover the latest twist regarding a secret Home Office order requiring Apple to give UK law enforcement access to users’ encrypted data stored on the Apple iCloud. Also discover how the Premier League is using digital means to reach fans, and learn about identity security in SaaS deployments. Read the issue now. Continue Reading
-
News
04 Aug 2025
Black Hat USA: Halcyon and Sophos tag-team ransomware fightback
Ransomware experts Halcyon and Sophos are to pool their expertise in ransomware, working together to enhance data- and intelligence-sharing and bringing more comprehensive protection to customers Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Aug 2025
Proliferation of on-premise GenAI platforms is widening security risks
Research finds increased adoption of unsanctioned generative artificial intelligence platforms is magnifying risk and causing a headache for security teams Continue Reading
By- Alex Scroxton, Security Editor
- 04 Aug 2025
-
News
01 Aug 2025
Met Police to double facial recognition use amid budget cuts
The UK’s largest police force is massively expanding its use of live facial recognition technology as it prepares to lose 1,700 officers and staff Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
01 Aug 2025
Securing agentic identities focus of Palo Alto’s CyberArk buy
Palo Alto Networks is entering the identity security space with a multibillion-dollar acquisition, and plans to address growing concerns around protecting identities associated with AI agents Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
31 Jul 2025
I lost my sister to online harms, the OSA is failing vulnerable people
Adele is a member of Families and Survivors to Prevent Online Suicide Harms campaign, a network that brings together survivors and families bereaved by online harm-related suicides. They are calling for changes to the enforcement of the Online Safety Act Continue Reading
-
News
30 Jul 2025
Apple pushes almost 30 security fixes in mobile update
Apple pushes what will likely be the last major security update to its current iPhone and iPad operating systems, fixing 29 vulnerabilities in its mobile ecosystem Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
30 Jul 2025
GDPR’s 7th anniversary: in the AI age, privacy legislation is still relevant
Seven years after GDPR reshaped data protection, AI is forcing a fresh look at governance. GDPR’s principles remain critical, guiding ethical AI use, risk management, and trusted innovation Continue Reading
By- James Hodge
-
News
30 Jul 2025
Industry experts warn crypto infrastructure is ‘creaking’
A report from experts at HSBC, Thales and InfoSec Global claims decades-old cryptographic systems are failing, putting businesses at risk from current vulnerabilities and the threat from quantum computing Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
29 Jul 2025
Senator warns of new UK surveillance risks to US citizens following Apple ‘backdoor’ row
US lawmaker calls for the US to publish an assessment of the risks posed by UK surveillance laws to US citizens in the wake of disclosures that the UK has ordered Apple to introduce ‘backdoors’ in Apple encryption Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
29 Jul 2025
Austrian government faces likely legal challenge over state spyware
Civil society groups are talking to opposition MPs about bringing a legal challenge to the Austrian constitutional court over ‘state trojan’ law Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
29 Jul 2025
European Commission ignores calls to reassess Israel data adequacy
The European Commission is ignoring calls to reassess Israel’s data adequacy status in spite of concerns raised about its data protection framework and use of personal data in ‘repressive practices’ Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
28 Jul 2025
Data resilience critical as ransomware attacks target backups
With more threat actors targeting backup repositories to ensure a payday, Veeam urges organisations to treat data resilience as a competitive advantage, not just an insurance policy Continue Reading
-
Opinion
25 Jul 2025
The UK’s ransomware payment ban is a strategic win
The UK's proposed public sector ransomware payment ban could be a bold step, but it can't operate in isolation. Continue Reading
By- Rob Dartnall, SecAlliance
-
News
24 Jul 2025
US seeks ‘unquestioned’ AI dominance
US AI action plan sets out aims to expand American dominance in the world of artificial intelligence Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Jul 2025
SharePoint users hit by Warlock ransomware, says Microsoft
Microsoft’s security analysts confirm a number of cyber attacks on on-premise SharePoint Server users involve ransomware Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Jul 2025
Dutch researchers use heartbeat detection to unmask deepfakes
Dutch method to counter deepfakes analyses blood flow patterns in faces that current deepfake generation tools cannot yet replicate Continue Reading
By- Kim Loohuis
-
News
24 Jul 2025
Monzo’s £21m fine highlights banks’ cyber security failures
Monzo’s recent fine over failings in its customer verification processes highlights wider security and privacy shortcomings in the personal finance world Continue Reading
-
News
23 Jul 2025
WhatsApp is refused right to intervene in Apple legal action on encryption ‘backdoors’
Investigatory Powers Tribunal to hear arguments in public over lawfulness of secret UK order requiring Apple to give UK law enforcement access to users’ encrypted data stored on the Apple iCloud Continue Reading
By- Bill Goodwin, Investigations Editor
-
Feature
23 Jul 2025
Disaster recovery: As-a-service vs on-premise?
It’s easy to backup to the cloud, and we run lots of applications there now, too. So, running DR as-a-service in the cloud makes perfect sense for many. We look at the pros and cons Continue Reading
-
News
22 Jul 2025
Microsoft confirms China link to SharePoint hacks
Microsoft confirms two known China-nexus threat actors, and one other suspected state-backed hacking group, are exploiting vulnerabilities in SharePoint Server Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Jul 2025
Chinese cyber spies among those linked to SharePoint attacks
Exploitation of the ToolShell RCE zero-day in Microsoft SharePoint continues to gather pace, with evidence emerging of exploitation by nation state-backed threat actors Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Jul 2025
UK government to bring in ransomware payment ban
Critical infrastructure operators, hospitals, local councils and schools will be among those banned from giving in to cyber criminal demands as the UK moves forward with proposals to address the scourge of ransomware Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
22 Jul 2025
UKtech50 2025: The most influential people in UK IT
In this week’s edition of Computer Weekly, we share the results of this year’s UKTech50 list of the IT leaders who are shaping the UK’s digital economy. We also feature a profile of this year’s winner, DeepMind CEO Demis Hassabis, who is the first person ever to top the list twice. Elsewhere in the issue, we also take a look at what steps IT leaders can take to lockdown their Amazon Web Services stacks, and discover the role that data management platforms play in the delivery of a great customer experience. Read the issue now. Continue Reading
-
News
21 Jul 2025
Netherlands calls for European shift to post-tracking internet as privacy laws fail
Dutch research institute argues decade of regulation hasn’t curbed surveillance capitalism, proposes fundamental business model change Continue Reading
By- Kim Loohuis
-
News
18 Jul 2025
NCSC exposes Fancy Bear's Authentic Antics malware attacks
Amid a new round of UK government sanctions targeting Moscow's intelligence apparatus, the NCSC has formally attributed attacks orchestrated with a cleverly-designed malware to the GRU's Fancy Bear cyber unit Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Jul 2025
DWP accused of shielding AI deployments from public scrutiny
Amnesty International and Big Brother Watch say Department for Work and Pensions’ ‘unchecked’ and opaque use of AI in the UK benefits system treats claimants as suspicious and is shielded from public scrutiny Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
16 Jul 2025
Co-op chief ‘incredibly sorry’ for theft of 6.5m members’ data
Co-op chief executive Shirine Khoury-Haq has revealed that all the personal data of all 6.5 million of its members was compromised in the April 2025 cyber attack on its systems Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Jul 2025
MoD cyber breach put thousands of Afghan lives at risk
More than 18,000 Afghan citizens eligible to relocate to the UK under a government programme to protect them from the Taliban were put at risk in a heretofore unreportable data breach Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
15 Jul 2025
Data (Use and Access) Act: Reflections on an eight-month statute
It took a long time, but the government's new data legislation finally made it into the statute book - it holds a lot of promise, but also leaves a lot of unanswered questions Continue Reading
By- Lord Chris Holmes, House of Lords
-
Feature
14 Jul 2025
Assessing the risk of AI in enterprise IT
We speak to security experts about how IT departments and security leaders can ensure they run artificial intelligence systems safely and securely Continue Reading
By- Cliff Saran, Managing Editor
-
News
11 Jul 2025
European Commission accused of rigging data watchdog appointment
The European Commission has been accused of rigging the selection process for the next European Data Protection supervisor Continue Reading
By- Bill Goodwin, Investigations Editor
- Sebastian Klovig Skelton, Data & ethics editor
-
News
10 Jul 2025
Government funding to help SMEs protect their IP
Scheme will see SMEs and innovative startups working in sensitive sectors receive advice on enhancing cyber and physical security measures to protect their valuable intellectual property Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Jul 2025
Four arrested in M&S cyber attack investigation
Police have made four arrests in connection with a trio of cyber attacks on UK retailers Marks & Spencer, Co-op and Harrods Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Jul 2025
Qantas details impact of data breach on 5.7 million customers
Australian flag carrier begins notifying millions of individuals after a cyber attack on a call centre, confirming that while financial and passport details are safe, a significant volume of other personal information was compromised Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
08 Jul 2025
AI for Good: Signal president warns of agentic AI security flaw
Secure by design is a mantra of the tech sector, but not if it’s agentic AI, which wants ‘root’ access to everything Continue Reading
By- Cliff Saran, Managing Editor
-
E-Zine
08 Jul 2025
Do tech executives in US Army present conflict of interest?
In this week’s Computer Weekly, we take a deep dive into the controversial news that four technology executives have been sworn into the US military to make the armed forces ‘more lethal’. In other US-centric news, we look at how President Trump’s downgrading of diversity and inclusion initiatives could be potentially rippling across the Atlantic and affecting tech hiring trends in the UK. We also hear about a UK startup that is using AI to pinpoint the genetic code that needs tweaking to increase tomato and potato yields, as part of a broader push to increase the nation’s food security in the face of climate change. Read the issue now. Continue Reading
-
News
08 Jul 2025
Proofpoint bets on APAC growth amid spike in AI-driven threats
With cyber attacks spiking in non-English-speaking markets such as Japan, the security firm is boosting its regional presence to combat a wave of AI-generated threats Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
07 Jul 2025
Digital warfare is blurring civilian front lines
Singapore’s defence cyber chief warns that the traditional lines between military conflict and civilian life are blurring, with adversaries now targeting civilian systems and using AI to put the threat landscape on steroids Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
04 Jul 2025
Medow Health AI debuts AI scribe tool in Singapore
The Australian health technology company has launched its AI-powered scribe platform in Singapore to help healthcare professionals automatically capture and structure clinical notes, reports and referral letters Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
02 Jul 2025
US CISA agency extends Iran cyber alert, warns of CNI threat
The US Cybersecurity and Infrastructure Security Agency reiterates guidance for operators of critical national infrastructure as it eyes the possibility of cyber attacks from Iran Continue Reading
By- Alex Scroxton, Security Editor
-
News
02 Jul 2025
Google fixes type confusion flaw in Chrome browser
An actively exploited type confusion vulnerability in the Google Chrome web browser needs immediate attention from users Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
02 Jul 2025
What is quantum key distribution (QKD)?
Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties. Continue Reading
By- Nick Barney, Technology Writer
- Alexander S. Gillis, Technical Writer and Editor
-
News
02 Jul 2025
Dutch study uncovers cognitive biases undermining cyber security board decisions
Dutch research reveals how cognitive biases can lead to catastrophic security decisions Continue Reading
By- Kim Loohuis
-
News
02 Jul 2025
Qantas customer data exposed in contact centre breach
Australian flag carrier is investigating significant data theft of personal information for up to six million customers after a third-party platform used by its call centre was compromised Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
01 Jul 2025
Cloudflare to let customers block AI web crawlers
Publishers and other providers of creative content now have the option to block AI crawlers from accessing and scraping their intellectual property with new tools from Cloudflare. Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Jun 2025
Scattered Spider cyber gang turns fire on aviation sector
Multiple reports are emerging of cyber attacks on airlines – Google Cloud’s Mandiant believes them to be linked Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Jun 2025
Over 2 million affected by US supermarket breach
Belgian-Dutch supermarket operator Ahold Delhaize reveals that more than two million people, including employees, had their data compromised following a November 2024 ransomware attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Jun 2025
Ciaran Martin: AI might disturb attacker-defender security balance
The founder of the National Cyber Security Centre spoke with Computer Weekly at Infosecurity Europe 2025 about how artificial intelligence might disturb the attacker-defender security equilibrium Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
26 Jun 2025
Sky ECC distributor released from French custody pending trial
Canadian businessman accused of distributing Sky ECC encrypted phones has been released on bail after over four years in custody without a trial Continue Reading
By- Rebecca Tidy
- Bill Goodwin, Investigations Editor
-
News
24 Jun 2025
One year since being freed, Julian Assange still a victim of state secrecy
If the State Department’s arguments prevail in FOIA litigation, the truth about US action against Julian Assange and WikiLeaks journalists will never be known Continue Reading
By- Stefania Maurizi
-
E-Zine
24 Jun 2025
Digital ID: cool or contentious?
In this week’s Computer Weekly, we dig into the discourse surrounding the proposal to roll out a national digital identity scheme across the UK, and hear from HPE’s CIO on what he’s learned from his time previously working as an IT chief in the retail sector. We round out the buyer’s guide to cloud repatriation with a look at what’s driving the trend, before concluding the issue with a look at the controversy surrounding quantum computing. Read the issue now. Continue Reading
-
News
23 Jun 2025
Police to gain powers to grab online data when they seize phones and laptops
Academics and civil liberties experts say that proposed ‘authoritarian’ powers to allow police to trawl online and cloud services used by owners of seized devices should require approval from a judge Continue Reading
By- Bill Goodwin, Investigations Editor
-
Opinion
20 Jun 2025
Beyond the AI hype: How data laws quietly handed power to government and Big Tech
The UK is at risk of becoming an ‘algorithm state’ as the government hands more power to Big Tech and reduces the rights of individuals Continue Reading
By- James Baker, Platform Power Programme Manager at Open Rights Group
-
News
16 Jun 2025
Intelligence sharing key to cyber security in Europe, says EU Commission cyber expert
Cyber criminals choose not to attack Europe due to its resilience and preparedness, says the EU Commission’s principal advisor for cyber security coordination, Despina Spanou Continue Reading
By -
Definition
16 Jun 2025
What is HMAC (Hash-Based Message Authentication Code)?
Hash-based message authentication code (HMAC) is a message encryption method that uses a cryptographic key with a hash function. Continue Reading
By- Scott Robinson, New Era Technology
- Rahul Awati
-
News
12 Jun 2025
UKtech50 2025: the longlist of the UK’s influential tech leaders
Each year, Computer Weekly launches a search for the most influential people in UK IT, asking the tech community who it thinks should be in the top 50 – here is the longlist of everyone nominated for 2025 Continue Reading
By -
News
12 Jun 2025
Apple encryption row: Does law enforcement need to use Technical Capability Notices?
History shows that law enforcement can bring successful prosecutions without the need for the Home Office to introduce ‘backdoors’ into end-to-end encryption Continue Reading
By- Professor Peter Sommer, digital evidence expert witness
-
News
11 Jun 2025
WhatsApp seeks to join Apple in legal challenge against Home Office encryption orders
WhatsApp today applied to intervene in an Investigatory Powers Tribunal case that is considering the UK’s ability to issue a technical capability notice on Apple to ‘weaken encryption’ Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
11 Jun 2025
Government using national security as ‘smokescreen’ in Apple encryption row
Senior conservative MP David Davis says the Home Office should disclose how many secret orders it has issued against telecoms and internet companies to Parliament Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
11 Jun 2025
Cyber Bill at risk of becoming a missed opportunity, say MPs
An APPG report warns that the government’s flagship cyber security legislation is too narrow in its scope and risks missing opportunities to embed resilience at the heart of the British economy Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
09 Jun 2025
Are we normalising surveillance in schools?
Children and teenagers are subjected to a vast array of surveillance technologies in schools. These are intended to keep them safe, but are we normalising surveillance for young people? Continue Reading
-
News
09 Jun 2025
US lawmakers say UK has ‘gone too far’ by attacking Apple’s encryption
US politicians are calling for Congress to rewrite the US Cloud Act to prevent the UK issuing orders to require US tech companies to introduce ‘backdoors’ in end-to-end encrypted messaging and storage Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
06 Jun 2025
UK ICO publishes AI and biometrics strategy
The UK data regulator has outlined how it will approach the regulation of artificial intelligence and biometric technologies, which will focus in particular on automated decision-making systems and police facial recognition Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
06 Jun 2025
CISOs must translate cyber threats into business risk
To manage risk effectively and secure board-level buy-in, CISOs must stop talking about technology and start speaking the language of business, according to a senior Check Point executive Continue Reading
-
News
05 Jun 2025
UK’s error-prone eVisa system is ‘anxiety-inducing’
People experiencing technical errors with the Home Office’s electronic visa system explain the psychological toll of not being able to reliably prove their immigration status in the face of a hostile and unresponsive bureaucracy Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
04 Jun 2025
NCSC sets out how to build cyber safe cultures
The UK’s National Cyber Security Centre has published guidance for security teams and leaders on how to foster accessible and appropriate cyber security cultures in their organisations Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Jun 2025
Investigatory powers: Guidelines for police and spies could also help businesses with AI
Computer Weekly talks to Muffy Calder, technology advisor to the UK’s investigatory powers commissioner, about privacy, intrusion and artificial intelligence Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
04 Jun 2025
Microsoft outlines three-pronged European cyber strategy
Microsoft chair Brad Smith outlines an expansive cyber programme targeting governments across Europe with enhanced threat intelligence and support Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Jun 2025
Infosecurity 2025: SMEs feel on their own in the face of cyber attacks
Project findings to be presented at Infosecurity Europe 2025 highlight vulnerability of SMEs to cyber attack Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
Opinion
03 Jun 2025
Preparing for AI: The CISO’s role in security, ethics and compliance
The Security Think Tank considers how CISOs can best plan to facilitate the secure running of AI and Gen AI-based initiatives and ensure employees do not inadvertently leak data or make bad decisions. Continue Reading
By- Elliott Wilkes, ACDS
-
News
02 Jun 2025
US cyber agency CISA faces stiff budget cuts
CISA is one of several US agencies facing drastic budget cuts under the Trump administration Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
02 Jun 2025
The hidden security risks of open source AI
The Security Think Tank considers how CISOs can best plan to facilitate the secure running of AI and Gen AI-based initiatives and ensure employees do not inadvertently leak data or make bad decisions. Continue Reading
By- Brian Fox, Sonatype
-
Opinion
02 Jun 2025
AI security: Balancing innovation with protection
The Security Think Tank considers how CISOs can best plan to facilitate the secure running of AI and Gen AI-based initiatives and ensure employees do not inadvertently leak data or make bad decisions. Continue Reading
By- Javvad Malik, KnowBe4
-
Opinion
30 May 2025
Rethinking secure comms: Are encrypted platforms still enough?
A leak of information on American military operations caused a major political incident in March 2025. The Security Think Tank considers what CISOs can learn from this potentially fatal error Continue Reading
By- Russell Auld, PAC
-
News
30 May 2025
Dutch businesses lag behind in cyber resilience as threats escalate
While non-IT business professionals in the middle of their careers face the most disruption from AI, professionals in the IT services sector and their employers must prepare for change Continue Reading
By- Kim Loohuis
-
Feature
30 May 2025
How cyber security professionals are leveraging AWS tools
It’s now essential for IT security teams to have oversight of cloud computing, and AWS offers a plethora of tools to make managing it easier. Find out how cyber pros are using them in the wild Continue Reading
-
Opinion
29 May 2025
Signalgate is a signal to revisit security onboarding and training
A leak of information on American military operations caused a major political incident in March 2025. The Security Think Tank considers what can CISOs can learn from this potentially fatal error. Continue Reading
By- Mike Gillespie and Ellie Hurst, Advent IM
-
Opinion
29 May 2025
RSAC rewind: Agentic AI, governance gaps and insider threats
AI was naturally a major theme of this year's RSAC conference, but we maybe failed to anticipate how it is coming to dominate every conversation. Continue Reading
By- James Robinson, Netskope
-
Feature
29 May 2025
AI and compliance: Staying on the right side of law and regulation
Without careful planning, AI projects risk blundering into a legal and regulatory minefield. We look at the risks from hallucinations, basic errors and coming regulation Continue Reading