IT management
-
News
21 Nov 2024
Brit charged in US over Scattered Spider cyber attacks
A UK national named as Tyler Robert Buchanan has been charged in the US over his alleged involvement in cyber attacks perpetrated by the Scattered Spider gang Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
21 Nov 2024
Post Office Horizon IT scandal inquiry: Three years of shocking revelations
Nearly three years of shocking revelations from the Post Office Horizon scandal inquiry Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
30 Sep 2022
How Endowus is leveraging Kafka and microservices
The Singapore-based financial technology company built a distributed microservices architecture to ensure its investment platform remains resilient at all times Continue Reading
By- Aaron Tan, TechTarget
-
Definition
29 Sep 2022
distributor
A distributor is an intermediary entity between a producer of a product, or manufacturer, and a downstream entity in the distribution channel or supply chain. Continue Reading
-
News
29 Sep 2022
CDO interview: Danny Gonzalez, chief digital and innovation officer, London North Eastern Railway
The rail franchise is driving a wide-ranging digital transformation, encompassing back-office improvements and enhancing passenger experience Continue Reading
By -
News
29 Sep 2022
Cost-of-living crisis could spur fintech adoption
The cost-of-living crisis could have a similar impact on fintech and digital banking as the Covid-19 pandemic did, inducing further innovation in the fintech sector Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
29 Sep 2022
Five startups to join NCSC for Startups initiative
The NCSC has invited five startups to join its NCSC for Startups programme to help the government with pressing cyber challenges facing the UK Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Feature
29 Sep 2022
Carbon copies: How to stop data retention from killing the planet
Our society has a serious digital hoarding problem, which is coming at a cost to the environment. But what can be done to address it? Continue Reading
-
News
29 Sep 2022
KPMG: IT chiefs vote for innovation, but are they forgetting tech debt?
New study from KPMG shows businesses are keen to adopt new technologies to drive improvements to customer experience Continue Reading
By- Cliff Saran, Managing Editor
-
Feature
28 Sep 2022
AIOps for storage: Potential huge benefits, but lots of lock-in
Applying artificial intelligence and machine learning to storage can help to predict bottlenecks, diagnose I/O issues and recommend upgrades, but suppliers’ products are largely limited to their own hardware Continue Reading
-
Podcast
28 Sep 2022
Koch’s networking: Computer Weekly Downtime Upload podcast
Matt Hoag, CTO of Koch Business Solutions, discusses networking as a service Continue Reading
By- Cliff Saran, Managing Editor
-
Feature
28 Sep 2022
How to make the right business case for a tech spend
CIOs should help evaluate management goals to support long-term strategy. Learn how IT can assist business objectives and justify tech spending with a business case. Continue Reading
By- Jerald Murphy, Nemertes Research
-
News
28 Sep 2022
UK suffers third highest number of ransomware attacks globally
Based on an analysis of around 5,000 ransomware incidents, NordLocker has found that UK businesses, and small businesses in particular, are a priority target for ransomware gangs Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
28 Sep 2022
Whistleblower Peter Duffy calls for oversight of NHS records to prevent evidence tampering
A whistleblower has called for greater oversight in the handling of ‘safety-critical digital information’ across the NHS, in light of a number of cases that raise questions about data governance and record-keeping within the health service Continue Reading
By- Tommy Greene
-
News
28 Sep 2022
Russia ready for complete switch to domestic IT infrastructure
In a bid to counter sanctions imposed following its invasion of Ukraine, the Russian government is implementing a policy of import substitution in the country’s domestic IT sector Continue Reading
By- Computer Weekly correspondent
-
Opinion
28 Sep 2022
Security Think Tank: Three steps to a solid DevSecOps strategy
Read about how buyers can manage third-party risk when procuring applications, how to secure the software development process, and even how to affect cultural change among developers not used to thinking cyber first Continue Reading
By- Cate Pye and Farrukh Ahmad
-
News
28 Sep 2022
Online Safety Bill needs complete overhaul, say rights groups
Civil society groups write to new digital minister to challenge various aspects of the upcoming Online Safety Bill, which they say threatens rights to privacy and freedom of expression Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
28 Sep 2022
Most hackers exfiltrate data within five hours of gaining access
Insights from more than 300 sanctioned adversaries, otherwise known as ‘ethical’ hackers, reveal that around two-thirds are able to collect and exfiltrate data within just five hours of gaining access Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
27 Sep 2022
Fraudsters adapt phishing scams to exploit cost-of-living crisis
Around 80,000 Brits a month are falling victim to phishing attacks as fraudsters switch up tactics to take advantage of cost-of-living crisis and behavioural changes prompted by pandemic Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
27 Sep 2022
Guy’s Cancer collaborates with healthtech provider to digitise patient care
Guy’s and St Thomas’ NHS Foundation Trust has begun working with digital healthcare platform provider Carology to build capacity, drive efficiencies and improve patient experience Continue Reading
By- Cliff Saran, Managing Editor
-
27 Sep 2022
SAP maintenance fee increase: What you need to know
We weigh up the options for SAP customers after supplier announces a rise in annual maintenance fees. Continue Reading
-
27 Sep 2022
How Mondelez is driving change with tech
From empowering citizen developers to deploying drones to monitor the health of cocoa trees, the owner of Cadbury, Oreo and Toblerone is firing on all cylinders to disrupt the old ways of doing things. Continue Reading
-
E-Zine
27 Sep 2022
Making digital a key ingredient at Mondelez
In this week’s Computer Weekly, we talk to snack giant Mondelez, the owner of Cadbury, about how AI and data are transforming its business. SAP is increasing support costs for the first time in years – we assess the impact on customers. And a Ukrainian tech CEO tells us how his company kept going despite the Russian invasion. Read the issue now. Continue Reading
-
News
26 Sep 2022
How Russian intelligence hacked the encrypted emails of former MI6 boss Richard Dearlove
Hack by Russian-linked ColdRiver group exposed former MI6 chief Richard Dearlove’s contacts and email communications with government, military, intelligence and political officials Continue Reading
By- Duncan Campbell , 2QQ Ltd, Sussex University
-
News
26 Sep 2022
Data analysis and artificial intelligence key industrial strategy missions for Labour
Shadow business secretary announces Labour’s proposed industrial strategy, in which data would take a central role Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
26 Sep 2022
More than 30 startups to join Plexal’s Cyber Runway accelerator
Now in its second year, the Cyber Runway accelerator has been designed to support firms at various stages of growth, as well as help the cyber security sector to improve on its diversity, inclusion and regional representation Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
26 Sep 2022
FCSA calls for government clampdown on cloned umbrella companies
One year has passed since the Freelancer and Contractor Services Association spoke out about the problem of umbrella company cloning, and it claims the authorities are not moving fast enough to tackle the issue Continue Reading
By- Caroline Donnelly, Datacentre Editor
-
News
23 Sep 2022
The challenges of verifying AI for healthcare
Artificial intelligence promises to revolutionise healthcare, but even in areas such as medical imaging, where it is easy to spot AI errors, more research is needed Continue Reading
By- Cliff Saran, Managing Editor
-
Opinion
23 Sep 2022
It’s time for engineering teams to own DevSecOps
It may seem counterintuitive, but maybe organisations should consider delegating responsibility for DevSecOps to engineering teams, not security teams, argues Elastic’s Mandy Andress Continue Reading
By- Mandy Andress, Elastic
-
News
23 Sep 2022
Threat actors abused lack of MFA, OAuth in spam campaign
Microsoft threat researchers have reported on a series of cyber attacks in which enterprises with lax IAM policies had their systems hijacked to conduct spam email campaigns Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Sep 2022
Mini-Budget 2022: HMRC tells firms to update payroll software ahead of November NI tax cut
HMRC is urging employers to ensure their payroll software systems are updated now, before the reversal of the previous government’s National Insurance tax hike kicks in Continue Reading
By- Caroline Donnelly, Datacentre Editor
-
News
23 Sep 2022
How Great Eastern is transforming its IT organisation
Singapore-based insurer Great Eastern made painstaking efforts to rid itself of legacy systems and transformed its IT organisation to become nimbler by building up its cloud and DevOps capabilities Continue Reading
By- Aaron Tan, TechTarget
-
Definition
22 Sep 2022
non-uniform memory access (NUMA)
Non-uniform memory access, or NUMA, is a method of configuring a cluster of microprocessors in a multiprocessing system so they can share memory locally. Continue Reading
By -
Definition
22 Sep 2022
watt-hour (Wh)
The watt-hour, which is symbolized Wh, is a unit of energy equivalent to one watt of power expended for one hour of time. Continue Reading
By -
News
22 Sep 2022
Tech Nation announces 13 startups for 11th Future Fifty cohort
Thirteen high-growth startups set to join Tech Nation’s 11th annual Future Fifty programme to help them scale further Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
22 Sep 2022
Nordic private equity firms pursue cyber security acquisitions
Increasing interest in the security sector from Nordic private equity firms is a reflection of growing threats and increasing enterprise security budgets Continue Reading
By- Gerard O'Dwyer
-
Blog Post
22 Sep 2022
Ofcom adapts to the changing face of communications
Earlier this year, Ofcom commissioned Analysys Mason to look at the digital value chain. It is this study that sets the scene for a more expansive role at the regulator, as Ofcom looks to stay ... Continue Reading
By- Cliff Saran, Managing Editor
-
Blog Post
22 Sep 2022
God save the sysadmin
From: [email protected] To: [email protected] Subject: Welcome Charlie and Camilla Dear all, Hope you all had a great weekend and as I always like to say, are ready to get back at IT! LOL ... Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Sep 2022
CCS £2bn big data and analytics framework goes live
The Crown Commercial Service has launched a big data and analytics framework worth up to £2bn over the course of the agreement Continue Reading
By -
News
22 Sep 2022
Ofcom turns its attention to the hyperscalers
The regulator sees its role expanding into emerging areas of communications technologies and public cloud services Continue Reading
By- Cliff Saran, Managing Editor
-
News
22 Sep 2022
Inside SolarWinds’ observability playbook
SolarWinds’ CEO Sudhakar Ramakrishna talks up the company’s observability playbook and offers a glimpse into its technology roadmap Continue Reading
By- Aaron Tan, TechTarget
-
News
22 Sep 2022
ALPHV/BlackCat ransomware family becoming more dangerous
Researchers from Symantec share fresh insight into the ongoing development of the ransomware-as-a-service family known variously as ALPHV, BlackCat and Noberus Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Sep 2022
Privacy Pledge signatories dream of alternative internet
A group of privacy-focused organisations have come together to establish a set of principles for taking the internet back from big tech and surveillance capitalism Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Sep 2022
American Express recruiting thousands of tech professionals
Amex will add 5,000 IT professionals to its workforce in 2022 as digital products and services become the staple of the finance sector Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
21 Sep 2022
Contractors call for IR35 review and tax cuts in Chancellor’s mini-Budget
The contractor community is patiently awaiting the outcome of this Friday’s mini-Budget, with hopes for some concrete details on the Prime Minister’s proposed IR35 review and news of a corporation tax cut Continue Reading
By- Caroline Donnelly, Datacentre Editor
-
News
21 Sep 2022
NCSC publishes cyber guidance for retailers
The NCSC has published tailored advice to support online retailers, hospitality providers and utility services in protecting themselves and their customers from cyber crime Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Sep 2022
European Central Bank working on prototypes of digital Euro interfaces
European Central Bank’s digital Euro investigation phase is at the point of developing and testing systems that might interface with consumers Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
21 Sep 2022
15-year-old Python bug present in 350,000 open source projects
A Python tarfile vulnerability first disclosed in 2007 still persists to this day, according to analysis from Trellix Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Sep 2022
Mobile operators work on holographic calling pilot
Thanks to 5G, it may soon be possible add a third dimension to video calls using ‘realistic’ holograms Continue Reading
By- Cliff Saran, Managing Editor
-
Feature
21 Sep 2022
Business-led IT strategy casts shadow IT in more positive light
Traditional shadow IT is giving way to business-led technology deployments that have the IT department's approval. But CIOs must manage the process to avoid problems. Continue Reading
-
News
20 Sep 2022
Thousands of customers affected in Revolut data breach
Digital challenger bank has warned its customers to be vigilant after their data was exposed in a cyber attack Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
20 Sep 2022
IHG attackers phished employee to deploy destructive wiper
A couple from Vietnam who claim to be behind a destructive wiper cyber attack on hotel operator IHG told the BBC how they orchestrated their operation Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Sep 2022
Reports Uber and Rockstar incidents work of same attacker
Rockstar Games was hit over the weekend by an attacker who claimed to have accessed its Slack channel to steal data on an upcoming release, and may be the same person who compromised Uber Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Sep 2022
NHS Scotland to transform population health through digital technologies
A collaboration between NHS Scotland, industry partners and academia aims to launch large-scale programmes to improve population health in the country through digital technologies and new patient pathways Continue Reading
By -
News
20 Sep 2022
Dutch student team aims to enable uninterrupted drone cargo delivery
Dutch student team aims to make the world of flying more sustainable by creating a global network of autonomously flying cargo drones that can have their batteries swapped mid-air Continue Reading
By- Kim Loohuis
-
E-Zine
20 Sep 2022
A gold medal performance for networking
In this week’s Computer Weekly, we find out how the IT team behind the 2022 Commonwealth Games in Birmingham delivered a winning performance. We also look at how the centuries-old London insurance market is going digital, thanks to Lloyd’s of London. And we find out how low-cost high street stores succumbed to the inevitable and are going online. Read the issue now. Continue Reading
-
News
20 Sep 2022
India ramps up on AI amid talent and scalability challenges
Indian organisations are speeding up deployments of AI across multiple sectors, but legacy systems, siloed data and a shortage of AI-specific talent will stand in the way of greater adoption Continue Reading
By- Harigunani P
-
News
19 Sep 2022
How Mondelez is driving change with tech
From empowering citizen developers to deploying drones to monitor the health of cocoa trees, Mondelez has been firing on all cylinders to disrupt the old ways of doing things Continue Reading
By- Aaron Tan, TechTarget
-
News
16 Sep 2022
Barnet Council awards Capita contract extension
Barnet Council has awarded Capita a contract extension as part of its transition away from a large contract with the supplier Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
16 Sep 2022
Six new vulnerabilities added to CISA catalogue
CISA adds six new vulnerabilities to its most-wanted list, including one that dates back to 2010 Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 Sep 2022
Uber suffers major cyber attack
Details are trickling out of an apparent ‘near total’ compromise of ride-sharing service Uber by an alleged teenage hacktivist Continue Reading
By- Alex Scroxton, Security Editor
-
Podcast
16 Sep 2022
Energy crisis IT impact: Computer Weekly Downtime Upload podcast
In this special edition of the Computer Weekly Downtime Upload podcast, Gartner analyst Tiny Haynes discusses datacentre energy management. Continue Reading
By- Cliff Saran, Managing Editor
-
Definition
16 Sep 2022
fist to five (fist of five)
Fist to five, or fist of five, is a consensus-building technique used by Agile software development teams to poll team members and come to an agreement. Continue Reading
By -
News
15 Sep 2022
EU Cyber Resilience Act sets global standard for connected products
European Commission lays out proposed security regulations on device and software security to better protect consumers and drive global standards Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
15 Sep 2022
Has Putin started a server revolution?
The European Commission wants Member States to reduce consumption. “Demand reduction is fundamental: it lowers energy bills, ends Putin's ability to weaponise his energy resources, reduces ... Continue Reading
By- Cliff Saran, Managing Editor
-
News
15 Sep 2022
SAP maintenance fee increase: What you need to know
SAP has written to its customers informing them of a price increase on annual maintenance fees. What are your options? Continue Reading
By- Cliff Saran, Managing Editor
-
News
15 Sep 2022
Nominations closing soon for annual cyber awards
Nominations for the annual Security Serious Unsung Heroes Awards closes 16 September Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Sep 2022
New player pioneers ‘active cyber insurance’ for UK market
Arrival of US-based insurer Coalition in London will supposedly offer SMEs more options when it comes to cyber security insurance Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Sep 2022
Organisations failing to account for digital trust
The vast majority of businesses are well aware of the importance of digital trust, yet very few have a dedicated staff role responsible for it, report finds Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Sep 2022
Full-stack observability top priority for IT teams
Annual forecast reveals observability – the ability to see everything in the tech stack that could affect customer experience – has become a board-level imperative, but only a quarter of organisations have achieved it Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
15 Sep 2022
US charges three Iranians over CNI cyber attacks
Three Iranian nationals have been indicted over a spate of ransomware attacks against organisations in the US, UK, Israel and Iran Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Sep 2022
Airtel to deploy edge computing platform
Bharti Airtel will deploy its multi-access edge compute platform across India to support edge computing applications in manufacturing and other industries, as India gears up for 5G Continue Reading
By- Aaron Tan, TechTarget
-
Definition
15 Sep 2022
Pomodoro Technique
The Pomodoro Technique is a time management method based on 25-minute stretches of focused work broken by five-minute breaks. Continue Reading
-
News
14 Sep 2022
FormBook knocks Emotet off top of malware chart
FormBook emerged as the most widely seen malware in August, according to Check Point’s latest data Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Sep 2022
Ex-CISA head Krebs: Disrupt ransomware support networks to win the war
Speaking at an event hosted by data protection specialist Rubrik, former CISA director Chris Krebs calls for the security community to work collectively to kick out the supports from under ransomware gangs Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Sep 2022
Microsoft patches 64 vulnerabilities on September Patch Tuesday
Microsoft drops fixes for five critical vulnerabilities and one zero-day in its latest monthly update Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Sep 2022
VMware Cloud on AWS debuts in Hong Kong
VMware has expanded its VMware Cloud on AWS to Hong Kong, following the launch of the Alibaba Cloud VMware service in Greater China Continue Reading
By- Aaron Tan, TechTarget
-
Definition
14 Sep 2022
von Neumann bottleneck
The von Neumann bottleneck is a limitation on throughput caused by the standard personal computer architecture. Continue Reading
-
News
13 Sep 2022
Cloud compromise a doddle for threat actors as victims attest
Two separate studies into the state of public cloud security reveal insight into the ease with which threat actors can compromise vast numbers of targets, and some of the challenges security teams are facing in the cloud Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
13 Sep 2022
AI Sweden connects the dots to keep the country competitive
How and why a centre dedicated to accelerating the adoption of artificial intelligence technology has been created in Sweden Continue Reading
By- Pat Brans, Pat Brans Associates/Grenoble Ecole de Management
-
News
13 Sep 2022
Users warned over Azure Active Directory authentication flaw
Secureworks researchers found what they say is a serious vulnerability in an Azure Active Directory authentication method, but Microsoft says it should not pose a serious risk to users Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Sep 2022
Cisco confirms leaked data was stolen in Yanluowang ransomware hit
Cisco has confirmed that data leaked last week by the Yanluowang ransomware gang was that stolen during a May 2022 cyber attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Sep 2022
JP Morgan acquires fintech for payments modernisation
JP Morgan acquires cloud-native payments technology as it modernises its IT infrastructure Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
13 Sep 2022
Blancco works with charity to provide IT for African schools
Blancco is providing data sanitisation and erasure software to The Turing Trust so that old IT equipment can be securely reused by school children in Sub-Saharan Africa, instead of adding to world’s growing e-waste problem Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
13 Sep 2022
Multi-persona impersonation adds new dimension to phishing
Iranian APT used multiple personas on a single email thread to convince targets of the legitimacy of its phishing lures Continue Reading
By- Alex Scroxton, Security Editor
-
13 Sep 2022
Tech sector efforts to root out forced labour are failing
Digitally mapping supply chains to identify forced labour and slavery is no longer a technology problem for the IT sector, but a lack of government enforcement and corporate inaction are major barriers to effective change. Continue Reading
-
E-Zine
13 Sep 2022
Source responsibly: Tech sector efforts to root out forced labour are failing
In this week’s Computer Weekly, we analyse the technology industry’s failure to extirpate forced labour and slavery from its supply chains. We find out how cyber security firm Okta is rebuilding customer trust after a major security incident. And we discover how Caterpillar is modernising its data management to offer better customer service. Read the issue now. Continue Reading
-
News
12 Sep 2022
Mandiant floats off into Google Cloud
As planned, the acquisition of Mandiant will see the threat intel and incident response giant become a part of Google’s Cloud business Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Sep 2022
Contractors lack confidence in prime minister to follow through with promised IR35 review
Contractor poll suggests lack of faith among freelancers about new prime minister Liz Truss honouring her pledge to review the IR35 rules Continue Reading
By- Caroline Donnelly, Datacentre Editor
-
News
12 Sep 2022
Mistakenly transferred $504m to be returned to Citigroup
Judge rules that creditors should return $504m that was accidentally transferred to them by Citigroup Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
12 Sep 2022
CISOs should spend on critical apps, cloud, zero-trust, in 2023
Faced with a global recession next year, security buyers should try to direct investment towards technology that protects customer-facing and revenue-generating workloads, say analysts Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Sep 2022
Lloyd’s of London is digitally transforming through the front door
Centuries-old financial services organisation is transforming its complex IT infrastructure through digital data Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Feature
12 Sep 2022
RPA’s day has come – the intelligent evolution of a productivity bot
By trying to emulate humans for tasks such as data entry, robotic process automation has found a niche home in many an enterprise back office Continue Reading
-
News
09 Sep 2022
Third of IT decision-makers rely on gut feel when choosing network operator
Study from customer experience technology provider shows lack of transparency is cited as the most consistent quality failure of network providers Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
09 Sep 2022
Interview: Keeping an IT business going during the Russian invasion
After heading home and discovering that his country had been invaded, Konstantin Klyagin was forced to make life-changing family and business decisions Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Blog Post
09 Sep 2022
Apple iPhone 14: Time to put our desire for shiny new things into perspective
Can the launch of the iPhone 14 have come at a worse time? The standard of living of people is falling, inflation is rising rapidly, the pound is crashing and fuel bills are sky high and set to ... Continue Reading
By- Cliff Saran, Managing Editor
-
E-Zine
09 Sep 2022
CW Europe: Why Russia could become the world’s biggest market for illegal IT
Faced with international sanctions and the departure of many global IT suppliers from Russia, companies there are seeking alternative, and sometimes illegal, routes to access IT products. Also read how new requirements are driving scientists and engineers in Europe back to the lab to start developing 6G technology. Continue Reading
-
Opinion
09 Sep 2022
Security Think Tank: Adding trust to AppSec and DevSecOps
When building in trust and assurance into app development through standards, it is critically important not to stifle innovation Continue Reading
By- Rowland Johnson
-
News
08 Sep 2022
NCSC CyberUK event heads to Belfast in 2023
National Cyber Security Centre’s annual CyberUK roadshow is crossing the Irish Sea to Belfast in April 2023 Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Sep 2022
CGI gets ESA order to develop predictive routing tool for satellite constellations
Tool will support increased need to equip satellite networks with software-defined networking to deliver simplified management, better end-to-end network automation support and streamlined delivery of network services Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
08 Sep 2022
Chinese APT using PlugX malware on espionage targets
China’s Bronze President APT is once again targeting government officials of interest to its paymasters, this time using forged diplomatic correspondence, according to the Secureworks Counter Threat Unit Continue Reading
By- Alex Scroxton, Security Editor
-
Podcast
08 Sep 2022
Does quantum matter? A Computer Weekly Downtime Upload podcast
In this special edition of the Computer Weekly Downtime Upload podcast, Ilyas Khan, CEO of Quantinuum, discusses the quantum computing revolution Continue Reading
By- Cliff Saran, Managing Editor