IT operations management and IT support
-
News
10 Oct 2024
Afas leads the way with four-day work week in the Netherlands
Dutch labour unions want a shorter working week and software company Afas is leading the way, introducing a four-day work week from 1 January 2025 Continue Reading
-
News
11 Jul 2024
Dutch research firm TNO pictures the SOC of the future
In only a few years, security operations centres will have a different design and layout, and far fewer will remain Continue Reading
-
News
30 Nov 2022
Subpostmaster federation deliberately kept public in dark over computer problems
The federation representing subpostmasters deliberately suppressed information about computer errors that could have saved its members from devastating life-changing events Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
30 Nov 2022
Latest LockBit ransomware versions have wormable capabilities
Sophos researchers have reverse-engineered the Lockbit 3.0 ransomware, shedding new light on its evolving capabilities and firming up links with BlackMatter Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Nov 2022
Parity AI talks about auditing recruitment algorithms for bias
Algorithmic auditing firm Parity speaks to Computer Weekly about the process of auditing artificial intelligence for bias, following its partnership with AI-powered recruitment platform Beamery Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
30 Nov 2022
Think technology, process, human risk to manage ransomware
Effective ransomware handling boils down to three core areas – technology, process and human risk Continue Reading
By- Andrew Morris, Turnkey Consulting
-
Opinion
29 Nov 2022
Chartered status and aligned standards are crucial for the UK's cyber sector
As the UK moves closer to ushering in the world’s first chartered cyber professionals, the UK Cyber Security Council’s Simon Hepburn outlines the sector’s defining moment Continue Reading
By- Simon Hepburn, UK Cyber Security Council
-
News
29 Nov 2022
Digital Transformation Week Amsterdam: HSBC discusses low-code in financial services
A member of HSBC’s global transformation team has shared her views on low-code with an audience in Amsterdam Continue Reading
By- Pat Brans, Pat Brans Associates/Grenoble Ecole de Management
-
Feature
29 Nov 2022
How gamifying cyber training can improve your defences
Security training is the cornerstone of any cyber defence strategy. With ever-escalating online threats, it is now more important than ever that this training is an engaging experience Continue Reading
-
News
28 Nov 2022
How MongoDB is driving growth in ANZ
MongoDB, which counts the likes of Bendigo and Adelaide Bank as clients, has been driving skills development and investing in local manpower in Australia and New Zealand Continue Reading
-
Feature
28 Nov 2022
Ransomware: Practical tips to improve resiliency
With ransomware attacks on organisations increasing, the question is not if an attack will happen, but when. We look at ways to minimise the impact of such an attack Continue Reading
By- Cliff Saran, Managing Editor
-
News
25 Nov 2022
Data management, backup becoming the CISO's responsibility
More and more CISOs are taking on responsibility for wider data management strategies, and this trend looks set to grow next year Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
24 Nov 2022
Your staff are the frontline in your ransomware fight
As part of a solid cyber defence plan, the CISO must make sure that the frontline within the organisation is prepared for an attack, says Theodore Wiggins of Airbus Protect Continue Reading
By- Theodore Wiggins, Airbus Protect
-
News
23 Nov 2022
AI accountability held back by ‘audit-washing’ practices
Algorithmic auditing will be useless in holding artificial intelligence accountable until there are common standards, approaches and goals that scrutinise systems at each stage of development and deployment, says think-tank Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
23 Nov 2022
How Photobox keeps site reliability in the picture
Photobox’s site reliability head discusses how the photo book and personalised gifts site manages a complex microservices architecture Continue Reading
By- Cliff Saran, Managing Editor
-
News
23 Nov 2022
Red team tool developer slams ‘irresponsible’ disclosure
UK security firm MDSec defends its Nighthawk command and control penetration testing framework after suggestions were made that it could be appropriated by threat actors Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Nov 2022
Netherlands wants watchdog to reduce bias in artificial intelligence
Dutch government will take swift action to prevent citizens getting into trouble due to the misuse of algorithms Continue Reading
By- Kim Loohuis
-
News
23 Nov 2022
Dutch national cyber security strategy aims to protect digital society
Cabinet sets up national cyber security strategy to make the Netherlands digitally secure Continue Reading
By- Kim Loohuis
-
News
22 Nov 2022
IT services sector hiring slows to pre-pandemic levels
IT services firms have slowed their recruitment after a major acceleration in hiring during the Covid-19 pandemic Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
22 Nov 2022
Killnet DDoS hacktivists target Royal Family and others
Russia-aligned hacktivists targeted multiple UK websites, including those of the Royal Family, in a new campaign of DDoS attacks Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Nov 2022
C-suite mystified by cyber security jargon
Malware, supply chain attack, zero-day, IoC, TTP and Mitre ATT&CK are just some of the everyday terms that security pros use that risk making the world of cyber incomprehensible to outsiders Continue Reading
By- Alex Scroxton, Security Editor
-
22 Nov 2022
Cracking the code for a modern approach to enterprise software development
Overworked IT departments need a better way to deliver digitally enabled products and services at the speed that the business requires. We report from the Gartner Symposium in Barcelona. Continue Reading
-
News
21 Nov 2022
EDF UK deploys Riverbed’s Alluvio Aternity to tackle IT issues
Monitoring software links into ServiceNow and PowerShell scripts are being used to automate remediation Continue Reading
By- Cliff Saran, Managing Editor
-
News
21 Nov 2022
Bug Bounty Calculator helps organisations fine-tune their payouts
Newly launched comparison tool will supposedly help operators of vulnerability disclosure or bug bounty programmes to ensure their payments match market rates and expectations, and attract the right sort of attention Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Nov 2022
Is Elon Musk’s Twitter safe, and should you stop using it?
With a litany of security and compliance issues exposed and in many cases caused by Elon Musk’s takeover of social media platform Twitter, some may be asking if it’s still safe or appropriate to use Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Nov 2022
New gold standard to protect good faith hackers
HackerOne’s new Gold Standard Safe Harbour statement will supposedly act as a guarantee for good faith hacking Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Nov 2022
CyberPeace Institute helps NGOs improve their security resilience
Adrien Ogée of the CyberPeace Institute talks about his work supporting NGOs and humanitarian organisations, and how the security community at large can help protect the world’s most vulnerable people Continue Reading
By- Alex Scroxton, Security Editor
-
News
17 Nov 2022
Another Log4Shell warning after Iranian attack on US government
The breach of a US federal body by an Iranian threat actor exploiting the Adobe Log4j Log4Shell vulnerability has prompted a fresh flurry of patching Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
17 Nov 2022
Gartner: Three key tasks needed to decommission applications
A guide to slimming down a full portfolio of applications that are expensive to maintain and difficult to adapt to business needs Continue Reading
By- Stefan Van Der Zijden
-
News
16 Nov 2022
Team working on controversial Post Office Horizon EPOSS software was the ‘joke of the building’
Former members of the ICL team developing software for the Post Office Horizon EPOSS system were unqualified and engaged in poor software development practices, public inquiry told Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
16 Nov 2022
Agility, business more important than cost, network management for IT teams
Cisco report finds new rules applying in a multicloud world, with IT decision-makers regarding security as the top networking challenge when managing distributed and hybrid workloads Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
16 Nov 2022
Global network fragmentation a source of increasing risk
Risk consultancy’s report says the weaponisation of cyber space and geopolitical clashes herald a breakdown of global networks into distinct regional or national architectures Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Nov 2022
Post Office changed view of Horizon problems before roll-out, because of a ‘sunk cost fallacy’
Insider tells public inquiry that the Post Office continued to roll out the controversial Horizon system despite a ‘considerable’ number of errors, because it was too committed Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
15 Nov 2022
A modern approach to enterprise software development
Overworked IT departments need a better way to deliver digitally enabled products and services at the speed the business requires Continue Reading
By- Cliff Saran, Managing Editor
-
News
15 Nov 2022
Inside Singapore’s public sector IT strategy
Adopting a platform approach with products that can scale across the board and building a strong engineering bench are some of the key aspects in Singapore’s public sector IT strategy Continue Reading
By- Aaron Tan, TechTarget
-
News
15 Nov 2022
Met Police removes nearly two-thirds of people from gangs matrix
Legal action by human rights group Liberty forces Met Police to overhaul its gangs violence matrix database Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
14 Nov 2022
Sadiq Khan launches Data for London Advisory Board
Board will look at how to join up and share data between public and private London organisations in an effort to build a stronger data economy and improve public services Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
14 Nov 2022
CaixaBank robot answers the most customer questions
AI-based virtual assistant at Spanish bank is now used by over four million customers Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Opinion
14 Nov 2022
Security Think Tank: Let’s be transparent about ransomware
Greater transparency regarding ransomware attacks, including details about attack methods used and what kinds of assets were compromised, would likely help the community prevent future attacks Continue Reading
By- John Tolbert, KuppingerCole
-
Feature
11 Nov 2022
An encouraging new conversation around sustainable IT, says Nordic CIO
What started as a whisper a decade ago has become distinctly audible chatter among IT leaders sharing best practices on how to protect the environment Continue Reading
By- Pat Brans, Pat Brans Associates/Grenoble Ecole de Management
-
News
11 Nov 2022
MoD recruits Immersive Labs to bolster cyber resilience
UK’s Ministry of Defence will run cyber drills and address its security talent gap with Immersive Labs’ CyberPro, Cyber Crisis Simulator and Application Security products Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Nov 2022
Lenovo bolsters services play with PCCW Solutions
Lenovo’s acquisition of PCCW Solutions brings sought-after capabilities in hybrid cloud and application modernisation as it expands its services footprint in Asia Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
11 Nov 2022
Security Think Tank: To stop ransomware, preparation is the best medicine
You can’t ‘stop’ ransomware, but you can do a lot to keep yourself from becoming ensnared when it strikes Continue Reading
By- Paul Watts, Information Security Forum
-
Feature
10 Nov 2022
The world's oldest cryptocurrency exchange prefers doing business in Luxembourg
One of the newest niches in fintech, cryptocurrency exchanges may fare very well in Luxembourg Continue Reading
By- Pat Brans, Pat Brans Associates/Grenoble Ecole de Management
-
Podcast
10 Nov 2022
Inflation-busting IT: A Computer Weekly Downtime Upload podcast
In this podcast, Gartner’s Stewart Buchanan discusses how to fund digital technology initiatives Continue Reading
By- Cliff Saran, Managing Editor
-
News
09 Nov 2022
Microsoft serves smorgasbord of six zero-days
November’s Patch Tuesday fixes significantly fewer vulnerabilities of late, but includes six actively-exploited zero-days, three of them of critical severity Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Nov 2022
Fujitsu expert witness in subpostmaster trial ‘manoeuvred’ into role, public inquiry told
A former Fujitsu technology expert who defended the Horizon system’s robustness in court was unhappy after being ‘manoeuvred’ into acting as an expert witness, public inquiry hears Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Opinion
09 Nov 2022
Security Think Tank: Anti-ransomware strategies should be as easy as ABC
When developing and implementing ransomware protection strategies, the importance of paying thorough attention to security measures you might consider elementary cannot be understated Continue Reading
By -
News
08 Nov 2022
Six subpostmaster convictions referred for appeal in Scotland
Six former subpostmasters in Scotland will have appeals against criminal convictions heard after being referred by Scotland’s Criminal Cases Review Commission Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Feature
08 Nov 2022
How Imec hopes to industrialise artificial intelligence
Pure research explores the fundamental questions of artificial intelligence, but applied research takes those ideas to industry, making it all worthwhile Continue Reading
By- Pat Brans, Pat Brans Associates/Grenoble Ecole de Management
-
Opinion
07 Nov 2022
To fight ransomware, we must treat digital infrastructure as critical
Ransomware defence is failing because we don’t view our digital infrastructure in the same way as our physical infrastructure, argues Elastic’s Mandy Andress Continue Reading
By- Mandy Andress, Elastic
-
Feature
07 Nov 2022
Why automating finance is just an integration game
We look at how the software that powers finance departments can help businesses navigate the worsening economic climate Continue Reading
-
News
04 Nov 2022
Microsoft: Nation-state cyber attacks became increasingly destructive in 2022
The willingness of nation-state actors to conduct destructive cyber attacks is a source of grave concern, as Microsoft’s latest annual Digital Defence Report lays bare Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
04 Nov 2022
Security Think Tank: Ransomware and CISOs’ balancing act
Ransomware has the potential to cause irreversible business damage, so CISOs should consider not only protection but also response and recovery Continue Reading
By- Arina Palchik and Charles Moorey
-
Definition
03 Nov 2022
legacy system (legacy application)
A legacy system is any outdated computing system, hardware or software that is still in use. Legacy systems include computer hardware, software applications, file formats and programming languages. Continue Reading
By- Nick Barney, Technology Writer
- Margaret Rouse
- Emily Mell, Former Site Editor
-
News
03 Nov 2022
Microsoft pledges $100m in new IT support for Ukraine
Microsoft will continue to offer free-of-charge technology support to Ukraine for the foreseeable future Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Nov 2022
Automated threats biggest source of cyber risk for retailers
Threat actors targeting retailers during the coming holiday season are increasingly turning to automated forms of cyber attack, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
Podcast
03 Nov 2022
Business workflows: A Computer Weekly Downtime Upload podcast
How ServiceNow is being used to drive business processes across IT and other business areas Continue Reading
By- Cliff Saran, Managing Editor
-
Definition
02 Nov 2022
intellectual property core (IP core)
An intellectual property core (IP core) is a functional block of logic or data used to make a field-programmable gate array (FPGA) or application-specific integrated circuit for a product. Continue Reading
By -
Opinion
02 Nov 2022
Security Think Tank: Know your networks, know your suppliers
To combat the ransomware scourge, we must work harder to monitor and learn from the increasingly complex threat environment, keep a closer eye on supply chains, and share our insights Continue Reading
By- Rob Dartnall, SecAlliance
-
News
02 Nov 2022
Game of ‘hardball’ in Horizon negotiations left subpostmasters exposed to tragedy
‘Hardball’ negotiations between the government, the Post Office and ICL meant subpostmasters were ignored and thrown into a tragedy that could have been averted Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
01 Nov 2022
A third of UK cyber leaders want to quit, report says
Nearly a third of UK security leaders are considering leaving their current role, and more than half are struggling to keep on top of their workload Continue Reading
By- Alex Scroxton, Security Editor
-
News
01 Nov 2022
NCSC looks back on year of ‘profound change’ for cyber
The NCSC ramped up its support for UK plc in the past 12 months, but it was events beyond the UK’s borders that proved the most impactful Continue Reading
By- Alex Scroxton, Security Editor
-
News
01 Nov 2022
How Elastic is going beyond enterprise search
Elastic has been doubling down on the security and observability capabilities of its open-source platform, going beyond its roots in enterprise search Continue Reading
By- Aaron Tan, TechTarget
-
News
31 Oct 2022
Prepare today for potentially high-impact OpenSSL bug
OpenSSL trailed a critical vulnerability patch last week, which will be only the second such flaw ever found in the open source encryption project. Unfortunately, the first was Heartbleed Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
31 Oct 2022
Security Think Tank: Container security: why so different?
Done well, container security can be a model for securing the enterprise, and businesses that focus their teams on solving it can help accelerate positive change in other areas Continue Reading
By- Bernard Brantley
-
News
28 Oct 2022
Post Office warned of Horizon software-induced ‘tragedy’ in 1999
Problems experienced during live trials of the Post Office Horizon system predicted the ‘tragedy’ that unfolded Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Feature
27 Oct 2022
Will the OCSF create an open and collaborative cyber industry?
The Open Cybersecurity Schema Framework promises to transform security data analysis and collection, but there are challenges around adoption Continue Reading
-
News
27 Oct 2022
Horizon system EPOSS code writers lacked basic programming skills, public inquiry hears
Horizon system code writers lacked basic programming skills, according to the task force set up to investigate reported problems with the controversial software Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
26 Oct 2022
New minister asked to pause Fujitsu government contracts
Parliamentarians keep focus on Fujitsu’s role in the Post Office Horizon scandal with demand for pause on government contracts to the supplier Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
26 Oct 2022
When technology lets you sleep easy
Indian mattress supplier Duroflex has taken a leaf out of mattress design in its technology implementation to double its growth in an industry dominated by unorganised players Continue Reading
-
News
25 Oct 2022
One in five tech workers subject to workplace surveillance
Digital surveillance is now a common feature of the UK’s post-pandemic economy, says Prospect Union, adding to growing calls for workers to be given a greater say over how technologies are deployed in the workplace Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
24 Oct 2022
Government speeds up NHS Digital and NHS England merger
NHS bodies will now merge in early January 2023, aiming to create a single statutory body for NHS data and technology Continue Reading
By -
News
21 Oct 2022
Ukrainian and UK IT sectors to deepen collaboration, partnerships
BCS, the Chartered Institute for IT, and the IT Ukraine Association have signed an MoU to deepen collaboration between the UK and Ukrainian IT sectors, and champion new partnerships and growth opportunities Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
20 Oct 2022
What do the US’s new software security rules mean for UK organisations?
The White House announced recently that all software supplied to the US government and its agencies needs to be secure, so what does this mean for the UK and EU security sectors? Continue Reading
-
News
20 Oct 2022
The Security Interviews: Why now for ZTNA 2.0?
With organisations facing escalating online threats, security teams need to improve their defences using zero-trust network access to preserve the integrity of their systems. Palo Alto Networks’ Simon Crocker shares his views on zero-trust network access Continue Reading
-
News
20 Oct 2022
Cyber professional shortfall hits 3.4 million
Shortage of cyber security professionals continues to grow and shows no signs of abating, says report Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Oct 2022
Treat cyber crime as a ‘strategic threat’, UK businesses told
The government’s new National Cyber Advisory Board aims to help elevate cyber discussion and spur action in the business community Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Oct 2022
Apache vulnerability a risk, but not as widespread as Log4Shell
A newly disclosed Apache Commons Text vulnerability may put many at risk, but does not appear to be as impactful or widespread as Log4Shell Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Oct 2022
Virtually all vulnerable open source downloads are avoidable
Some 96% of known vulnerable open source downloads could have been avoided altogether, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Oct 2022
Subpostmaster federation failed its members when they needed it most
A dereliction of duty saw subpostmaster federation ignore its members when IT problems hit and allowed the Post Office destroy their lives Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
17 Oct 2022
Global IT and business services spending slows amid economic fears
Spending on IT and business services is declining amid economic fears, with the possibility of a further fall on the horizon Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
14 Oct 2022
Office 365 email encryption flaw could pose risk to user privacy
A vulnerability in Microsoft Office 365 Message Encryption could leave the contents of emails dangerously exposed, but with no fix coming it’s up to users to decide how at risk they are Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Oct 2022
Unsung Heroes Awards celebrate diversity in cyber community
The seventh annual Security Serious Unsung Heroes Awards recognise those trying to improve diversity and mental health in cyber for the first time Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Oct 2022
Perpetrators of subpostmaster suffering in Horizon scandal must face public inquiry
Victims demand that the perpetrators of the Post Office Horizon IT scandal face the public inquiry Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
13 Oct 2022
Gartner: Remote work, zero trust, cloud still driving cyber spend
Security leaders are eager to spend on categories including remote and hybrid cyber offerings, zero-trust network access, and cloud Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Oct 2022
Finance regulator cracks down on use of messaging apps
The Financial Conduct Authority is taking a closer look at how staff at banks are using WhatsApp in work Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
12 Oct 2022
NCSC urges organisations to secure supply chains
NCSC’s latest guidance package centres supply chain security, helping medium to large organisations assess and mitigate cyber risks from suppliers Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Oct 2022
Santander and Google offer tech to help businesses smooth move to cloud
Dual Run service from Google will be built on top of Santander technology known as Gravity Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
12 Oct 2022
Microsoft fixes lone zero-day on October Patch Tuesday
Microsoft patched a solitary zero-day vulnerability in its latest monthly drop, but fixes for two others disclosed in the past few weeks are nowhere to be seen Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Oct 2022
Post Office scandal inquiry restarts with call for a pause amid disclosure controversy
The statutory public inquiry into the Post Office Horizon scandal has begun phase two with a request for an adjournment amid allegations that the Post Office is failing to meet its obligation to disclose all relevant documents Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Opinion
10 Oct 2022
Currency markets causing choppy waters for UK outsourcing
Anthony Drake, director at tech advisory ISG, explains how the UK government’s botched mini-Budget announcement raised the cost of IT outsourcing Continue Reading
By- Anthony Drake
-
News
10 Oct 2022
Ukraine and EU explore deeper cyber collaboration
A Ukrainian delegation has met with officials from the EU’s ENISA cyber agency to explore deeper cooperation on cyber security issues Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
10 Oct 2022
Security Think Tank: Design security in to reap container benefits
Provided container security basics are built into your development and runtime environment from the start, containerised services and applications can provide rapid – and secure – achievement of business objectives Continue Reading
By- Mairi MacLeod and Farrukh Ahmad
-
News
06 Oct 2022
SMEs in Europe ready to invest in real-time payment capabilities
Small and medium-sized enterprises are losing business because of the time it takes to receive payments, with many considering API-based services to address the problem Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
06 Oct 2022
JPMorgan’s UK digital bank app outage locks customers out
App-based Chase Bank suffered tech outage that left customers unable to access its services Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Opinion
05 Oct 2022
Three ways that APIs can fail
It’s all very well having an API strategy, but software teams need to be ready for when things start going wrong Continue Reading
By- Stephen Feloney
-
Opinion
03 Oct 2022
How to protect against SMS mobile security weakness
The simple messaging service provides two-factor authentication in banking and e-commerce, but what happens if your SIM card is stolen? Continue Reading
By- Junade Ali
-
News
29 Sep 2022
Five startups to join NCSC for Startups initiative
The NCSC has invited five startups to join its NCSC for Startups programme to help the government with pressing cyber challenges facing the UK Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
29 Sep 2022
KPMG: IT chiefs vote for innovation, but are they forgetting tech debt?
New study from KPMG shows businesses are keen to adopt new technologies to drive improvements to customer experience Continue Reading
By- Cliff Saran, Managing Editor
-
Feature
28 Sep 2022
AIOps for storage: Potential huge benefits, but lots of lock-in
Applying artificial intelligence and machine learning to storage can help to predict bottlenecks, diagnose I/O issues and recommend upgrades, but suppliers’ products are largely limited to their own hardware Continue Reading
-
Opinion
28 Sep 2022
Security Think Tank: Three steps to a solid DevSecOps strategy
Read about how buyers can manage third-party risk when procuring applications, how to secure the software development process, and even how to affect cultural change among developers not used to thinking cyber first Continue Reading
By- Cate Pye and Farrukh Ahmad