IT for manufacturing
Manufacturing is an increasingly IT-intensive industry, as FMCG and consumer goods makers try to understand what consumers want and use information and technology to underpin their business strategies. Analysis of how manufacturers and construction firms use IT to operate cost-effectively and at maximum efficiency holds lessons for IT managers in any sector.
-
News
19 Dec 2024
LockBit ransomware gang teases February 2025 return
An individual associated with the LockBit ransomware gang has broken cover to tease details of a new phase of the cyber criminal operation's activity, which they claim is set to begin in February 2025 Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Dec 2024
Latest attempt to override UK’s outdated hacking law stalls
Amendments to the Data Bill that would have given the UK cyber industry a boost by updating restrictive elements of the Computer Misuse Act have failed to progress beyond a Lords committee Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
23 Jun 2022
Security Think Tank: Supply chain security demands systematic approach
Supply chain security measures need to be systematic and assessed so as to minimise the complexity and cost to the business Continue Reading
-
Opinion
22 Jun 2022
Security Think Tank: Balanced approach can detangle supply chain complexity
Achieving an appropriate balance between people, processes and technology can help to detangle the complexities of the supply chain and create better security practices Continue Reading
By- Francesca Williamson, Information Security Forum
-
News
21 Jun 2022
Government won’t regulate on professional cyber standards
The government has elected not to proceed with regulatory intervention to embed standards and pathways across the cyber profession Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Jun 2022
CNI leaders’ attitude to ransomware lackadaisical at best
A survey of security decision-makers in sectors regarded as critical national infrastructure reveals a disappointing attitude to ransomware threats Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Jun 2022
New coalition lifts Finland’s 6G status
Finland is laying the foundations for future European leadership in 6G research and development Continue Reading
By- Gerard O'Dwyer
-
Opinion
21 Jun 2022
Supply chain security goes deep – forget this at your peril
It may have hit the headlines as an IT issue, but supply chain security goes far deeper into an organisation than just technology Continue Reading
-
News
20 Jun 2022
Hyundai taps Singtel’s 5G network in electric vehicle manufacturing
Automotive giant is tapping Singtel’s 5G network and multi-access edge computing platform to manage and power its electric vehicle factory in Singapore Continue Reading
By- Aaron Tan, TechTarget
-
News
17 Jun 2022
British businesses to recognise Google skills certificates
Google training programmes are being made available to more people in the UK as part of an initiative from the supplier and major UK businesses Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
17 Jun 2022
Government responds to Data Reform Bill consultation
Westminster claims its new data laws will boost British benefits, protect consumers, and seize the ‘benefits’ of Brexit Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
17 Jun 2022
Consider governance, coordination and risk to secure supply chain
A recent ISACA study found myriad factors that give good reason to be concerned about supply chain security. Cyber adviser Brian Fletcher recommends three areas to zero in on Continue Reading
By- Brian Fletcher
-
News
16 Jun 2022
Office 365 loophole may give ransomware an easy shot at your files
Researchers at Proofpoint have discovered potentially dangerous Microsoft Office 365 functionality that they believe may give ransomware a clear shot at files stored on SharePoint and OneDrive Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
16 Jun 2022
Security Think Tank: Best practices for boosting supply chain security
In a highly connected world, managing the supply chain landscape requires an adaptation of the ‘traditional’ approach to managing cyber risk Continue Reading
By- Carl Nightingale
-
News
15 Jun 2022
Patch Tuesday dogged by concerns over Microsoft vulnerability response
The last Patch Tuesday in its current form is overshadowed by persistent concerns about how Microsoft deals with vulnerability disclosure Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
15 Jun 2022
Security Think Tank: Basic steps to secure your supply chain
When it comes to supply chain security, there are some core things you should be doing – but remember, the devil is in the detail Continue Reading
By -
News
14 Jun 2022
MS Azure Synapse vulnerability fixed after six-month slog
Microsoft patched a critical Azure Synapse vulnerability twice, but each time the researcher who discovered it was able to bypass it with ease, leading to a lengthy saga Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
10 Jun 2022
Security Think Tank: Don’t trust the weakest link? Don’t trust any link
Your security model shouldn’t fall apart just because a part of your business, or a partner, has weak security. This is why information-centric security is a must Continue Reading
By- Tim Holman, 2-sec
-
News
10 Jun 2022
Snake Keylogger climbing malware charts, says Check Point
Cyber criminals behind Snake Keylogger campaigns have been switching up their tactics in the past few weeks, say researchers Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Jun 2022
Researchers find eight CVEs in single building access system
A series of eight vulnerabilities in Carrier LenelS2 building access panels could enable malicious actors to obtain physical access to their targets Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Jun 2022
CIO interview: Yiannis Levantis aims at total quality for Unipart IT
Unipart has a heritage in quality manufacturing and services that CIO Yiannis Levantis is building on, in part by harnessing SAP’s cloud-based business transformation service Rise Continue Reading
By- Brian McKenna, Senior Analyst, Business Applications
-
News
08 Jun 2022
Executive interview: Clive Benford, Jaguar Land Rover
The head of the corporate analytics programme at JLR talks to Computer Weekly about data democratisation Continue Reading
By- Cliff Saran, Managing Editor
-
News
08 Jun 2022
ProxyLogon, ProxyShell may have driven increase in dwell times
The median network intruder dwell time was up 36% to 15 days last year, thanks to massive exploitation of the ProxyLogon and ProxyShell vulnerabilities by IABs, according to new Sophos data Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
06 Jun 2022
IT departments need holistic circular economies to fight climate change
With sustainability moving up the boardroom agenda, IT managers should revamp procurement strategies to align with the principles of the circular economy, but what does this mean for managing the IT lifecycle? Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Definition
02 Jun 2022
molecule
A molecule is two or more atoms connected by chemical bonds, which form the smallest unit of a substance that retains the composition and properties of that substance. Continue Reading
By -
Opinion
31 May 2022
The importance of making information security more accessible
Robin Smith, CSO of Aston Martin Lagonda, talks about how an accessible approach to cyber is helping him to keep the organisation secure Continue Reading
By- Robin Smith, chief security officer, Aston Martin Lagonda
-
News
31 May 2022
Heineken puts employees in charge of their own careers with new HR system
According to Sanne Noordam, head of SAP SuccessFactors in the Netherlands, companies need to look and listen more closely to the needs of employees in order to attract and retain them Continue Reading
By- Kim Loohuis
-
News
31 May 2022
Industrial systems not safe for the future, say Dutch ethical hackers
Ethical hackers in the Netherlands say operational technology and IT networks need to be integrated to prevent cyber attacks penetrating their operations Continue Reading
By- Kim Loohuis
-
News
30 May 2022
UAE residents think 3D printing will have the most positive impact on society
People in the UAE believe next-generation technologies such as 3D printing and artificial intelligence will become widespread in the country Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Opinion
30 May 2022
Strong internal foundations are key to withstanding external threats
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these attack pathways better in order to fight back Continue Reading
By- Steve Forbes
-
News
26 May 2022
Two-thirds of UK organisations defrauded since start of pandemic
Nearly two out of three UK companies say they have experienced some form of fraud or economic crime in the past two years, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 May 2022
Dutch companies struggle to fill tech jobs
There are plenty of IT job vacancies in the Netherlands, but a shortage of IT professionals Continue Reading
By- Pat Brans, Pat Brans Associates/Grenoble Ecole de Management
-
News
24 May 2022
Ransomware volumes grew faster than ever in 2021
Verizon’s annual DBIR assessment of the security landscape highlights an unprecedented boom in ransomware volumes, to the surprise of nobody Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
18 May 2022
Security Think Tank: To follow a path, you need a good map
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these attack pathways better in order to fight back Continue Reading
By -
News
17 May 2022
(ISC)² to train 100,000 cyber pros in UK
Security association (ISC)² unveils ambitious UK training programme Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 May 2022
CyberUK 22: Five Eyes focuses on MSP security
The western intelligence community has set out practical steps IT service providers and their customers can take to protect themselves Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 May 2022
Cyber accreditation body Crest forges new training partnerships
Crest says partnerships with Hack The Box and Immersive Labs will enhance its members’ defensive and offensive security skills Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 May 2022
Microsoft fixes three zero-days on May Patch Tuesday
It’s the second-to-last Patch Tuesday as we know it, and Microsoft has fixed a total of 75 bugs, including three zero-days Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 May 2022
CyberUK 22: Cyber leaders affirm UK’s whole-of-society strategy
On the opening day of CyberUK 2022, GCHQ director Jeremy Fleming and NCSC CEO Lindy Cameron have spoken of their commitment to the government’s ambition for a whole-of-society cyber strategy Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 May 2022
CyberUK 22: NCSC refreshes cloud security guidance
The National Cyber Security Centre is revising its cloud guidance as increasing uptake of potentially vulnerable cloud services puts more organisations at risk of compromise Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
09 May 2022
Lean Six Sigma
Lean Six Sigma is a data-driven approach to improving efficiency, customer satisfaction and profits. Continue Reading
By- Kinza Yasar, Technical Writer
- Tom Gambardella, Editorial Assistant
-
News
04 May 2022
CIO interview: Loïc Giraud, global head of digital platform and product delivery, Novartis
Data is at the heart of life sciences – and for Novartis, that means investigating emerging technologies such as quantum computing and blockchain, as well as using analytics, artificial intelligence and automation Continue Reading
By -
News
28 Apr 2022
Ransomware recovery costs dwarf actual ransoms
The cost of recovering from a ransomware attack far outweighs the ransoms now being demanded by cyber criminals, according to recent data Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Apr 2022
Manufacturer sues JPMorgan after cyber criminals stole $272m
Manufacturer files lawsuit alleging that US bank failed to inform it of suspicious transaction activity Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
28 Apr 2022
Russia plumbs new depths in cyber war on Ukraine
Microsoft details cyber attacks on Ukrainian civilian communications, nuclear safety authorities, and the exploitation of the destruction of Mariupol in a phishing campaign Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Apr 2022
Log4Shell, ProxyLogon, ProxyShell among most exploited bugs of 2021
These 15 CVEs were the most commonly exploited last year, and if you haven’t mitigated against them, now is the time Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Apr 2022
Ransomware victims paying out when they don’t need to
Sophos’s annual State of Ransomware report shows dramatic increases in the impact of ransomware attacks, but also finds many organisations are paying ransoms when they don’t need to Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Apr 2022
Government digital ignorance puts Dutch economy at risk
In this interview, Michiel Steltman, managing director of Digital Infrastructure Netherlands, tells Computer Weekly why the Dutch digital economy is at risk due to a lack of knowledge and understanding at government level Continue Reading
By- Kim Loohuis
-
News
26 Apr 2022
BCS passes defiant Ukrainian tech industry message to its members
BCS, the Chartered Institute for IT, has passed on a message from Ukrainian IT suppliers that the country is open for, and in need of, business Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
26 Apr 2022
Emotet tests new tricks to thwart enhanced security
The operators of the Emotet botnet seem to be trying to find a way to get around recent changes made by Microsoft to better protect its users Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Apr 2022
Five Eyes in new Russia cyber warning
Latest cross-body alert warns of Russian threat to utilities and other core elements of national infrastructure Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Apr 2022
Incontroller ICS malware has ‘rare, dangerous’ capabilities, says Mandiant
Mandiant joins a growing chorus of warnings over novel nation state threats to ICS systems Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Apr 2022
WatchGuard firewall users urged to patch Cyclops Blink vulnerability
The US authorities have seen fit to add the WatchGuard vulnerability used by Sandworm to build the Cyclops Blink botnet to its list of must-patch vulnerabilities Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Apr 2022
Microsoft patches two zero-days, 10 critical bugs
Patch Tuesday is here once again. This month, security teams must fix two privilege escalation zero-days in the Windows Common Log File System Driver and the Windows User Profile Service Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Apr 2022
European IT and BPO outsourcing off to strong start
European IT and business process outsourcing services continue to increase rapidly, with cloud-based services now more than half of the total Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
06 Apr 2022
Siemens looks at quantum computing to accelerate simulations
Using quantum computing to solve complex non-linear differential equations offers a way to speed up digital-twin simulations Continue Reading
By- Cliff Saran, Managing Editor
-
News
05 Apr 2022
Triple-threat Borat malware no joke for victims
Unlike its namesake, the newly discovered Borat malware won’t raise a smile for IT security pros Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Apr 2022
Saudi Arabian ICT sector hits $32.1bn after strong pandemic response
The Saudi Arabian IT and communications sector is recovering strongly from the Covid-19 pandemic Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
04 Apr 2022
Environmental campaigners halt Meta datacentre construction in the Netherlands
Datacentre being built to serve ‘metaverse’ worlds would consume nearly half as much energy as all other datacentres in the country Continue Reading
By- Mark Ballard
-
News
01 Apr 2022
Four moves to ‘checkmate’ critical assets thanks to lax cloud security
Malicious actors can compromise 94% of critical assets within four steps of the initial breach point, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
30 Mar 2022
Fast Guide to acronyms used in manufacturing
The following glossary or acronyms are those most used in internal communications within the manufacturing industry. Continue Reading
-
News
30 Mar 2022
One-third of UK firms suffer a cyber attack every week
New statistics from the annual DCMS Cyber security breaches survey reveal the extent and frequency with which UK organisations are being attacked by malicious actors Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
30 Mar 2022
Recruitment risks: Avoiding the dangers of fraudulent candidates
Tech companies are seeing an increase in fraudulent job applications, with associated impacts on risk and cyber security. So how can organisations protect themselves from fraudulent applicants while ensuring they recruit the best talent? Continue Reading
-
News
29 Mar 2022
NCSC: Not necessarily wise to ditch Kaspersky
UK’s National Cyber Security Centre issues refreshed guidance on organisations’ usage of technology and services of Russian origin, but stops short of advising users to expunge all Russian products from their IT estates Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Mar 2022
Wave of Log4j-linked attacks targeting VMware Horizon
Sophos issues a new warning to organisations that have so far failed to patch their VMware Horizon servers against Log4Shell Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Mar 2022
Most big businesses are taking up banking as a service
API-based banking services allow corporate customers to offer financial services without the need for heavy tech development or regulatory approval Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Feature
28 Mar 2022
Industry clouds are all the rage, but are they driven by marketing or customer need?
Industry clouds – cloud applications designed for specific sectors – are fashionable staples of supplier marketing, but are they what corporate IT is demanding? Continue Reading
-
News
22 Mar 2022
BMW Group adopts HPE GreenLake to improve data management
HPE GreenLake will enable the vehicle manufacturer to provide a unified cloud for data management Continue Reading
By- Cliff Saran, Managing Editor
-
Opinion
22 Mar 2022
Revised scope of UK security strategy reflects digitised society
The omission of the word ‘security’ from the title of the UK government’s new National Cyber Strategy is a telling one, reflecting our increasingly digitised society, say Maximillian Brook and Arunoshi Singh of the ISF Continue Reading
By- Maximillian Brook & Arunoshi Singh
-
Opinion
21 Mar 2022
UK Cyber Strategy a welcome injection of progress
The National Cyber Strategy should be seen as a welcome injection of both focus and investment in bettering cyber defence for everyone, says Turnkey Consulting senior consultant Louise Barber Continue Reading
By- Louise Barber, Turnkey Consulting
-
News
21 Mar 2022
NZ glassmaker taps IoT to track delivery trolleys
Architectural Glass Products has installed tracking devices on delivery trolleys to track its products and delivery trolleys in real time Continue Reading
By- Aaron Tan, TechTarget
-
Feature
21 Mar 2022
Cloud ERP: Rise of the industry cloud
There is a new variable in the build or buy debate, and it’s all about the way cloud-based services connect internal and external business processes Continue Reading
By- Cliff Saran, Managing Editor
-
News
18 Mar 2022
Ukrainian cyber defences prove resilient
Thanks to a combination of prior experience and global support, Ukraine’s defences against cyber incidents are holding strong in the face of Russian attacks Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
18 Mar 2022
National Cyber Strategy will enhance UK’s cyber power status
The UK punches above its weight when it comes to wielding cyber power around the world, but challenges to this status are clear. The National Cyber Strategy has a clear role to play in maintaining and enhancing this status, writes Paddy Francis of Airbus Cybersecurity Continue Reading
-
News
17 Mar 2022
How multiphysics simulation might accelerate the advent of quantum computing – and vice versa
Sophisticated tools that simulate more than one physical phenomenon at a time may help designers home in on optimal architectures for quantum computers at less cost – and much faster Continue Reading
By- Pat Brans, Pat Brans Associates/Grenoble Ecole de Management
-
News
16 Mar 2022
German authorities warn on Kaspersky but stop short of ban
Germany authorities warn Kaspersky users to consider alternatives to the firm’s flagship antivirus software, citing national security concerns and the war on Ukraine Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
15 Mar 2022
How cyber security teams can conquer the four-day working week
The four-day week may be an idea whose time has come, but for always-on cyber security professionals, the impact of squeezing more work into fewer days is a tricky proposition Continue Reading
By- Keiron Holyome
-
Feature
15 Mar 2022
How data analytics drives wind turbine power generation
Data analytics and related software lies behind the burgeoning wind turbine industry, with predictive maintenance to the fore. We find out how Continue Reading
By -
Feature
14 Mar 2022
How can I avoid an exodus of cyber talent linked to stress and burnout?
Cyber security professionals have played a crucial role during the pandemic, yet many feel like their employers aren’t providing adequate mental health support and have considered quitting their jobs as a result. What can employers do to help them? Continue Reading
-
News
11 Mar 2022
Volvo Cars recruiting 700 tech professionals for Stockholm hub
Software is increasingly becoming a differentiator for car manufacturers, says the Swedish giant Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Opinion
10 Mar 2022
National Cyber Strategy misses the mark in one important way
The National Cyber Strategy is full of fine words, says Petra Wenham, but as the old expression goes, fine words butter no parsnips, and it misses the mark in one very important way Continue Reading
By -
News
10 Mar 2022
Tech brands sign on to HackerOne responsible security drive
Tech companies sign HackerOne’s new corporate security responsibility pledge to bring cyber out of the shadows and promote effective, secure development practices Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Mar 2022
China’s APT41 exploited Log4j within hours
APT41 compromised multiple government organisations via the Log4Shell exploit within hours of its initial disclosure, Mandiant claims Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Mar 2022
Microsoft serves up three zero-days on March Patch Tuesday
Three zero-days pop up in Microsoft’s March update, along with a number of other noteworthy concerns for defenders Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Mar 2022
Boardroom does not see ransomware as a priority
Less than a quarter of company directors think ransomware is a top priority for their security teams, according to Egress Continue Reading
By- Alex Scroxton, Security Editor
-
News
02 Mar 2022
Gothenburg University makes breakthrough in energy efficient computers
Swedish and Japanese universities make advancement in the development of computers that can work as energy efficiently as a brain Continue Reading
By- Gerard O'Dwyer
-
News
02 Mar 2022
Middle East IT spending to recover to at least pre-pandemic levels
Middle East IT leaders expect budgets to increase this year, with spending to match or exceed pre-Covid levels Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
01 Mar 2022
Toyota production to resume after supply chain attack
Toyota production has been set back by over 10,000 vehicles following a cyber attack on a critical components supplier in Japan Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Feb 2022
Ukraine cyber attacks seen spiking, but no destructive cyber war yet
While cyber attacks linked to Russia’s war on Ukraine are taking place, they are having little impact beyond the region Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Feb 2022
KnowBe4 cyber drama tackles Colonial Pipeline in fourth season
KnowBe4’s ongoing cyber security training drama, The Inside Man, reaches its fourth season with a plot drawing inspiration from one of the most impactful cyber attacks of 2021 Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Feb 2022
Russia behind dangerous Cyclops Blink malware
Joint NCSC CISA advisory attributes a dangerous malware, dubbed Cyclops Blink, to Russia’s Sandworm APT, likely a GRU unit, with WatchGuard users at particular risk Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Feb 2022
Backups ‘no longer effective’ for stopping ransomware attacks
Traditional methods of mitigating ransomware are less efficacious thanks to the rise in double and triple extortion techniques Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Feb 2022
Microsoft extends Defender umbrella to Google Cloud Platform
Redmond says extending Defender for Cloud native capabilities to the Google Cloud Platform will help simplify security for organisations pursuing multicloud strategies by eliminating the gaps where the bad guys can get in Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Feb 2022
No imminent cyber threat to UK from Russia
Intelligence officials say they have no evidence or indication that Russian cyber attackers are preparing offensive assaults on infrastructure or organisations in Britain Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Feb 2022
UK organisations swift to chide phishing victims
While UK organisations are doing better at security training, many are quick to punish employees who fall victim to phishing attacks, whether real or simulated Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
22 Feb 2022
Security Think Tank: Good training is all about context
In-house or outsourced? What makes a good security training programme, and what questions should buyers ask when procuring training as a service? Continue Reading
By- Emma Bickerstaffe, Information Security Forum (ISF)
-
Feature
21 Feb 2022
Storage and 5G: Big impacts likely as wide-area topologies evolve
Enterprise 5G will boost the need for storage generally. It will also push capacity needs closer to the edge and create new locations for processing and storage Continue Reading
By- Antony Adshead, Storage Editor
-
News
18 Feb 2022
UK organisations untroubled by Trickbot surge
A surge in Trickbot infections is targeting some of the world’s most prominent brands, but UK organisations seem thankfully unaffected Continue Reading
By- Alex Scroxton, Security Editor
-
News
17 Feb 2022
How Signify accelerated automation projects as pandemic challenges mounted
Dutch lighting manufacturer used robotic process automation technology to help it address Covid-19-inflicted disruption Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
16 Feb 2022
2021 another record year for UK cyber investment
Total revenue generated by the UK’s cyber sector was up 14% last year, and UK-registered security firms raised over £1bn in investment Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 Feb 2022
Nordic countries lack a unified approach to AI
Nordic countries need to work together on a pan-regional artificial intelligence strategy Continue Reading
By- Gerard O'Dwyer
-
News
15 Feb 2022
China emerges as leader in vulnerability exploitation
Threat actors linked to China are emerging as a significant force in the weaponisation of newly discovered CVEs Continue Reading
By- Alex Scroxton, Security Editor