IT security
-
News
25 Oct 2024
Dutch critical infrastructure at risk despite high leadership confidence
Stark paradox in Dutch cyber security landscape has business leaders expressing high confidence in their IT infrastructure as cyber attacks rise Continue Reading
-
News
11 Jul 2024
Dutch research firm TNO pictures the SOC of the future
In only a few years, security operations centres will have a different design and layout, and far fewer will remain Continue Reading
-
News
08 Jan 2025
German court finds hacked EncroChat phone evidence inadmissible
The Berlin Regional Court has found that evidence obtained by a joint French and Dutch operation to hack the EncroChat encrypted mobile phone network is legally inadmissible, raising questions about its use in other European countries Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
07 Jan 2025
Regional skills plan to boost UK cyber defences
Over 30 projects in England and Northern Ireland will receive a share of a £1.9m fund designed to enhance cyber security skills and protect small businesses Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
07 Jan 2025
Why CISOs should build stronger bonds with the legal function in 2025
The Computer Weekly Security Think Tank considers how security leaders should best navigate the multitude of new national and multinational regulations affecting their work, and ensure their organisations remain compliant and protected. Continue Reading
By- Mandy Andress, Elastic
-
News
07 Jan 2025
Saudi Arabia calls for humanitarian AI after tightening screws on rights protesters
Oppressive state wants global digital identity system at the heart of all AI, to make it trustworthy and prevent it being used for ‘unauthorised surveillance’ Continue Reading
By -
News
06 Jan 2025
Government develops quantum tech for military
A high-tech atomic clock has been developed by a ‘secret lab’ and aims to decrease the reliance on GPS technology Continue Reading
By -
Blog Post
05 Jan 2025
Relaunch of the Norwood Community Safety Partnership
Neighbours by chance, working together by choice: the relaunch of Neighbourhood Watch in Lambeth. Approximately 6% of the 20 million households in England and Wales are signed up to Neighbourhood ... Continue Reading
By- Philip Virgo, Winsafe Ltd
-
Definition
03 Jan 2025
What is the Gramm-Leach-Bliley Act (GLBA)?
The Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways financial institutions deal with the private information of individuals. Continue Reading
-
News
03 Jan 2025
US Treasury incident a clear warning on supply chain security in 2025
A cyber incident at the US Department of the Treasury – blamed on a Chinese state actor – raises fresh warnings about supply chain risk after it was found to have originated via vulnerabilities in a remote tech support product Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Jan 2025
Corporate cover-up behind world-beating cyber security record in Middle East
Report ranking Gulf corporations ahead of US and EU counterparts for cyber security has sparked debate about the region’s tendency for secrecy and state control Continue Reading
By -
News
31 Dec 2024
Top 10 surveillance, journalism and encryption stories of 2024
Revelations of covert and unlawful monitoring of journalists and their confidential sources by the Police Service of Northern Ireland and the Metropolitan Police attracted a huge amount of attention this year Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
27 Dec 2024
Top 10 ANZ stories of 2024
The 2024 tech landscape in Australia and New Zealand was dotted with developments spanning cloud migrations and AI adoption to heightened data security and real-time data streaming Continue Reading
By- Aaron Tan, TechTarget
-
News
24 Dec 2024
Top 10 police technology stories of 2024
Here are Computer Weekly’s top 10 police technology stories of 2024 Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Definition
23 Dec 2024
What is a public key and how does it work?
In cryptography, a public key is a large numerical value that is used to encrypt data. Continue Reading
By -
Definition
23 Dec 2024
What is a proxy firewall?
A proxy firewall is a network security system that protects network resources by filtering messages at the application layer. Continue Reading
By -
Feature
23 Dec 2024
6 must-read blockchain books for 2025
Numerous sources provide comprehensive information on blockchain fundamentals and applications. We narrowed the field to six of the most popular and diverse books available. Continue Reading
By- Kinza Yasar, Technical Writer
-
News
20 Dec 2024
Top 10 data and ethics stories of 2024
Here are Computer Weekly’s top 10 data and ethics stories of 2024 Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
19 Dec 2024
Top 10 ASEAN stories of 2024
Southeast Asia’s 2024 tech landscape saw major companies embracing AI, shifts in open source and the emergence of local large language models to address the needs of a diverse region Continue Reading
By- Aaron Tan, TechTarget
-
News
19 Dec 2024
LockBit ransomware gang teases February 2025 return
An individual associated with the LockBit ransomware gang has broken cover to tease details of a new phase of the cyber criminal operation's activity, which they claim is set to begin in February 2025 Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Dec 2024
Latest attempt to override UK’s outdated hacking law stalls
Amendments to the Data Bill that would have given the UK cyber industry a boost by updating restrictive elements of the Computer Misuse Act have failed to progress beyond a Lords committee Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
19 Dec 2024
The Data Bill: It’s time to cyber up
The Computer Misuse Act is outdated and needs reform - so it's disappointing to see the government decline an opportunity to update the legislation, says the peer who proposed amendments Continue Reading
By- Lord Chris Holmes, House of Lords
-
Opinion
19 Dec 2024
Innovation, insight and influence: the CISO playbook for 2025 and beyond
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Mandy Andress, Elastic
-
Definition
19 Dec 2024
What is a public key certificate?
A public key certificate is a digitally signed document that serves to validate the sender's authorization and name. Continue Reading
By -
News
19 Dec 2024
French court refuses to expedite trial of Sky ECC cryptophone distributor Thomas Herdman
Canadian businessman Thomas Herdman, who was arrested by French police despite agreeing a deal to cooperate with US investigators, has been denied bail after 42 months in pre-trial detention Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
18 Dec 2024
The Security Interviews: Martin Lee, Cisco Talos
Threat intel expert and author Martin Lee, EMEA technical lead for security research at Cisco Talos, joins Computer Weekly to mark the 35th anniversary of the first ever ransomware attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Dec 2024
Top 10 cyber security stories of 2024
Data breaches, data privacy and protection, and the thorny issue of open source security were all hot topics this year. Meanwhile, security companies frequently found themselves hitting the headlines, and not always for good reasons. Here are Computer Weekly's top 10 cyber security stories of 2024 Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
18 Dec 2024
Look to the future: How the threat landscape may evolve next
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Elliott Wilkes, ACDS
-
News
18 Dec 2024
Top 10 cyber crime stories of 2024
From ransomware targeting the NHS to nation-state-backed intrusions, 2024 was another big year for cyber criminals and cyber spooks alike, but they didn't have it all their own way as the good guys fought back Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Dec 2024
Axon still in possession of Police Scotland encryption keys
Supplier’s possession of encryption keys for Police Scotland data sharing system opens potential for access and transfer of sensitive data without the knowledge or consent of the force Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
17 Dec 2024
2025-30: Geopolitical influence on cyber and the convergence of threat
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Rob Dartnall, SecAlliance
-
Opinion
17 Dec 2024
Using AI to build stronger client relationships in 2025
On the Twelfth Day of AI, we explore the key benefits of Copilot, the potential risks, barriers to adoption, and strategies for ensuring successful implementation. Continue Reading
By- Josie Rickerd, ANS
-
News
17 Dec 2024
Conservative MP adds to calls for public inquiry over PSNI police spying
Conservative MP David Davis calls for a public inquiry following a court ruling that the PSNI and Metropolitan Police unlawfully placed journalists under electronic surveillance Continue Reading
By- Bill Goodwin, Computer Weekly
- Cormac Kehoe
-
Definition
17 Dec 2024
What is PKI (public key infrastructure)?
PKI (public key infrastructure) is the underlying framework that enables the secure exchange of information over the internet using digital certificates and public key encryption. Continue Reading
By -
Definition
17 Dec 2024
What is passwordless authentication?
Passwordless authentication allows a user to sign into a service without using a password. This is often done using certificates, security tokens, one-time passwords (OTPs) or biometrics. Continue Reading
By- Kinza Yasar, Technical Writer
- Gavin Wright
- Alexander S. Gillis, Technical Writer and Editor
-
News
17 Dec 2024
Top 10 end user computing stories of 2024
Here are Computer Weekly’s top 10 end user stories of the year, overlooking the growth of new PC form factors and devices equipped with neural processing units for AI acceleration Continue Reading
By- Cliff Saran, Managing Editor
-
News
17 Dec 2024
Digital Ethics Summit 2024: recognising AI’s socio-technical nature
At trade association TechUK’s eighth annual Digital Ethics Summit, public officials and industry figures and civil society groups met to discuss the ethical challenges associated with the proliferation of artificial intelligence tools globally and the direction of travel set for 2025 Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
17 Dec 2024
Tribunal criticises PSNI and Met Police for spying operation to identify journalists’ sources
The Investigatory Powers Tribunal has criticised the Police Service of Northern Ireland and the Metropolitan Police for unlawfully spying on journalists Continue Reading
By- Bill Goodwin, Computer Weekly
-
E-Zine
17 Dec 2024
Technology on the beat
In this week’s Computer Weekly, we examine the future of technology in policing as the Home Office announces plans for a new IT organisation. We look at the security risks from employees using publicly available generative AI tools in the workplace. And we hear how Hyatt Hotels is creating a data culture across the organisation. Read the issue now. Continue Reading
-
News
17 Dec 2024
How NCS is tackling the enterprise IT market
The technology service provider is counting on its government experience, global expert network and cyber security capabilities to penetrate the enterprise IT market Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
16 Dec 2024
Private vs public AI: Which should your business use in 2025?
On the Eleventh Day of AI, we explore the differences between private and public AI, the key benefits and downsides of private AI, future trends, and how to get started with a hybrid AI approach. Continue Reading
By- Chris Folkerd, ANS
-
16 Dec 2024
What are the security risks of bring your own AI?
The rise of generative AI has led to a plethora of publicly accessible artificial intelligence tools, but what are the risks when external AI tools are used with corporate data? Continue Reading
-
Definition
16 Dec 2024
What is a business continuity plan audit and how do you create one?
A business continuity plan audit is a formalized method for evaluating how business continuity processes are being managed. Continue Reading
By- Scott Robinson, New Era Technology
- Erin Sullivan, Senior Site Editor
- Andrew Burton
-
News
16 Dec 2024
The Security Interviews: Stephen McDermid, Okta
Okta regional chief security officer for EMEA sits down with Dan Raywood to talk about how Okta is pivoting to a secure-by-design champion Continue Reading
By -
Opinion
13 Dec 2024
Decoding the end of the decade: What CISOs should watch out for
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Paul Lewis, Nominet
-
News
13 Dec 2024
Computer Misuse Act reform gains traction in Parliament
An amendment to the proposed Data (Access and Use) Bill that will right a 35-year-old wrong and protect security professionals from criminalisation is to be debated at Westminster Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Dec 2024
How AWS is protecting customers from cyber threats
Amazon Web Services reveals how its threat intelligence capabilities work under the hood to thwart cyber attacks and keep its customers’ data safe Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
12 Dec 2024
CISOs: Don’t rely solely on technical defences in 2025
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Deepti Gopal, Gartner
-
News
12 Dec 2024
Emerging Ymir ransomware heralds more coordinated threats in 2025
A newly observed ransomware strain has the community talking about more collaboration, and blurred lines, between threat groups next year, according to NCC’s monthly cyber barometer Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Dec 2024
Russia focuses cyber attacks on Ukraine rather than West despite rising tension
Computer Weekly talks to GCHQ’s National Cyber Security Centre operations director Paul Chichester and former NCSC chief executive Ciaran Martin on Russia, China and Salt Typhoon Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
10 Dec 2024
Dangerous CLFS and LDAP flaws stand out on Patch Tuesday
Microsoft has fixed over 70 CVEs in its final Patch Tuesday update of the year, and defenders should prioritise a zero-day in the Common Log File System Driver, and another impactful flaw in the Lightweight Directory Access Protocol Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Dec 2024
iOS vuln leaves user data dangerously exposed
Jamf threat researchers detail an exploit chain for a recently patched iOS vulnerability that enables a threat actor to steal sensitive data, warning that many organisations are still neglecting mobile updates Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
10 Dec 2024
Defending against cyber grinches: AI for enhanced security
On the Seventh Day of AI, Defending against cyber grinches: AI for enhanced security, we explore the double-edged sword of AI in cybersecurity and how businesses can protect themselves against the cyber grinches. Continue Reading
By- Justin Young, ANS
-
Definition
10 Dec 2024
What is a block cipher?
A block cipher is a method of encrypting data in blocks to produce ciphertext using a cryptographic key and algorithm. Continue Reading
By -
Definition
10 Dec 2024
What is a stream cipher?
A stream cipher is an encryption method in which data is encrypted one byte at a time. Continue Reading
By -
News
10 Dec 2024
UK police continue to hold millions of custody images unlawfully
Annual report from the biometrics and surveillance camera commissioner of England and Wales highlights the ongoing and unlawful retention millions of custody images of innocent people never charged with a crime by police Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
10 Dec 2024
DWP ‘fairness analysis’ reveals bias in AI fraud detection system
Information about people’s age, disability, marital status and nationality influences decisions to investigate benefit claims for fraud, but the Department for Work and Pensions says there are ‘no immediate concerns of unfair treatment’ Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
10 Dec 2024
Top IT predictions in APAC in 2025
Enterprises across the Asia-Pacific region are expected to focus on securing their AI workloads, invest in energy efficient infrastructure and rethink their platform strategy, among other tech trends in the new year Continue Reading
By- Aaron Tan, TechTarget
-
10 Dec 2024
NCSC boss calls for ‘sustained vigilance’ in an aggressive world
Richard Horne, the CEO of NCSC, echoed wider warnings about the growing number and severity of cyber threats facing the UK as he launched the security body’s eighth annual report. Continue Reading
-
E-Zine
10 Dec 2024
On the road to change at Aston Martin
In this week’s Computer Weekly, we talk to the CIO at luxury car maker Aston Martin to find out how technology is helping tackle the huge challenges facing the automotive sector. The new National Cyber Security boss explains why organisations need to be extra vigilant against the growing online threats. And we examine the future of secure remote connectivity in the cloud era. Read the issue now. Continue Reading
-
Opinion
09 Dec 2024
In 2025: Identities conquer, and hopefully unite
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Stephen McDermid, Okta
-
Opinion
09 Dec 2024
AI and cloud: The perfect pair to scale your business in 2025
On the Sixth Day of AI, we explore how leveraging AI and cloud can enhance business performance and shares tips for successful implementation. Continue Reading
By- Matt Gallagher, ANS
-
Definition
09 Dec 2024
What is a session key?
A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session between a user and another computer or between two computers. Continue Reading
By -
Definition
09 Dec 2024
What is cipher block chaining (CBC)?
Cipher block chaining (CBC) is a mode of operation for a block cipher -- one in which a sequence of bits are encrypted as a single unit, or block, with a cipher key applied to the entire block. Continue Reading
By -
Definition
09 Dec 2024
What is user authentication?
User authentication refers to the process of verifying the identity of a user attempting to gain access to a computer network, system or device. This process runs in the background and can be done through different means, such as asking the user to enter a password, provide a PIN or provide a fingerprint. Continue Reading
By -
News
09 Dec 2024
Bahrain faces legal action after planting Pegasus spyware on UK blogger
A court has given the go-ahead to UK-based blogger Yusuf Al-Jamri to seek damages from the Kingdom of Bahrain after it deployed spyware from Israel’s NSO Group to hack his phone Continue Reading
By- Bill Goodwin, Computer Weekly
-
Opinion
06 Dec 2024
Six trends that will define cyber through to 2030
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Pierre-Martin Tardif, ISACA
-
News
06 Dec 2024
US TikTok ban imminent after appeal fails
TikTok’s appeal against a US government ban has failed, with a judge dismissing its arguments that its First Amendment free speech rights are being restricted Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
06 Dec 2024
How AI can help you attract, engage and retain the best talent in 2025
On the Fifth Day of AI, we explore how AI is reshaping HR – boosting productivity, addressing concerns, and preparing organisations for the future. Continue Reading
By- Toria Walters, ANS
-
News
06 Dec 2024
TfL cyber attack cost over £30m to date
TfL provides more detail on the financial impact of the September 2024 cyber attack that crippled several of its online systems Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
05 Dec 2024
What are Common Criteria (CC) for Information Technology Security Evaluation?
Common Criteria (CC) is an international standard (ISO/IEC 15408) for evaluating information technology security products. Continue Reading
-
News
05 Dec 2024
Government agencies urged to use encrypted messaging after Chinese Salt Typhoon hack
Chinese hacking of US telecom networks raises questions about the exploitation by hostile hacking groups of government backdoors to provide lawful access to telecoms services Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
05 Dec 2024
Met Police challenged on claim LFR supported by ‘majority of Lewisham residents’
A community impact assessment for the Met Police’s deployment of live facial-recognition tech in Lewisham brings into question the force’s previous claims to Computer Weekly that its use of the technology is supported by ‘the majority of residents’ Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
05 Dec 2024
Are you on the naughty or nice list for responsible AI adoption?
On the Fourth Day of AI, we discuss the value of adopting AI responsibly, and outlines how businesses can build responsible adoption into their plans Continue Reading
By- Kyle Hill, ANS
-
News
04 Dec 2024
Shared digital gateway was source of three NHS ransomware attacks
Alder Hey children’s hospital confirms ransomware operators accessed its systems through a shared digital gateway, but is standing firm in the face of the gang’s demands Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Dec 2024
NCA takes out network that laundered ransomware payments
NCA-led Operation Destabilise disrupts Russian crime networks that funded the drugs and firearms trade in the UK, helped Russian oligarchs duck sanctions, and laundered money stolen from the NHS and others by ransomware gangs Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
04 Dec 2024
The most pressing challenges for CISOs and cyber security teams
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Elliot Rose, PA Consulting
-
News
04 Dec 2024
Nordics move to deepen cyber security cooperation
Nordic countries are increasing collaboration on cyber security amid more sophisticated and aggressive attacks Continue Reading
By- Gerard O'Dwyer
-
Blog Post
04 Dec 2024
Headline: Major SI Commits To A Properly Good, Modern Technology... As Tested!
In recent blogs – and in many recent conversations with folks from various echelons and shades of IT – I’ve talked about the need for some bravery among the SI and MSP communities to run with some ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
News
03 Dec 2024
US updates telco security guidance after mass Chinese hack
Following the widespread Salt Typhoon hacks of US telecoms operators including AT&T and Verizon, CISA and partner agencies have launched refreshed security guidance for network engineers and defenders alike Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Dec 2024
F1 heightens fan experiences with the power of Salesforce
Learn how the technical teams behind Formula One are using Salesforce’s tools to enhance fan activation and engagement at 24 races across the world, and how they are bringing AI into play with Agentforce capabilities Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
03 Dec 2024
Curing cancer with computers
In this week’s Computer Weekly, we go behind the scenes at the Francis Crick Institute to find out how data science and AI support its groundbreaking medical research. As courts on both sides of the Atlantic target Google, we analyse the legal threats for Big Tech. And our latest buyer’s guide examines cloud and object storage. Read the issue now. Continue Reading
-
News
02 Dec 2024
APAC businesses face cyber onslaught
The Asia-Pacific region is a cyber security hotspot, enduring significantly more cyber attacks than the global average, with AI-powered threats and skills shortages exacerbating the problem Continue Reading
-
News
02 Dec 2024
NCSC boss calls for ‘sustained vigilance’ in an aggressive world
NCSC CEO Richard Horne is to echo wider warnings about the growing number and severity of cyber threats facing the UK as he launches the security body’s eighth annual report Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
02 Dec 2024
CISOs will face growing challenges in 2025 and beyond
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Mike Gillespie and Ellie Hurst, Advent IM
-
Opinion
02 Dec 2024
Unwrapping the benefits of AI for marketing
In the first of a new series of articles, the 12 Days of AI, we explore how AI is being used in marketing, the benefits and key use cases, as well as concerns and how marketers can best take advantage of AI Continue Reading
By- Sophie Rea, ANS
-
News
02 Dec 2024
UK economy could see £600m boost through digital IDs for businesses
Government-backed organisation kicks off initiative to widen use of digital identities, in an effort to streamline financial services and cut hundreds of millions of pounds of economic crime Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Feature
29 Nov 2024
Automated patch management: A proactive way to stay ahead of threats
Timely patch management should be crucial in any organisation, but too often it goes by the wayside. Automating the process may offer a path forward for hard-pressed cyber defenders Continue Reading
By -
News
29 Nov 2024
Second Merseyside hospital hit by cyber attack
Hot on the heels of a major cyber attack at a nearby NHS trust, one of Europe’s biggest and busiest children’s hospitals is reportedly scrambling to deal with ransomware gang Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
29 Nov 2024
Swedish authorities urged to discontinue AI welfare system
Amnesty International is calling on Sweden’s social insurance agency to immediately discontinue its machine learning-based welfare system, following an investigation by Lighthouse Reports and Svenska Dagbladet that found it to be discriminatory Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
28 Nov 2024
Energy sector’s digital shift opens door to cyber threats
The transition to renewable energy and the increasing integration of IT and OT systems in the energy sector are creating new cyber security challenges Continue Reading
-
Definition
27 Nov 2024
What is obfuscation and how does it work?
Obfuscation means to make something difficult to understand. Programming code is often obfuscated to protect intellectual property or trade secrets, and to prevent an attacker from reverse engineering a proprietary software program. Continue Reading
By- Rahul Awati
- Ben Lutkevich, Site Editor
-
News
27 Nov 2024
Scientists demonstrate Pixelator deepfake image verification tool
With the age of deepfake imagery upon us, a team led by York St John University researchers has created a tool to help people ‘navigate the fine line between reality and fabrication’ Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Nov 2024
Further disruption expected after latest NHS cyber attack
IT and security teams at Wirral University Teaching Hospitals NHS Trust continue to work around the clock following a major cyber incident, with services disrupted and no timeline for resolution Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
27 Nov 2024
In the cloud, effective IAM should align to zero-trust principles
The Security Think Tank considers best practices in identity and access management and how can they be deployed to enable IT departments to combat cyber-attacks, phishing attacks and ransomware Continue Reading
By- Vladimir Jirasek, Foresight Cyber
-
News
26 Nov 2024
Sellafield operator opens dedicated cyber centre
The UK’s Nuclear Decommissioning Authority has opened a cyber security centre spanning its activities across the nuclear sector Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Nov 2024
Blue Yonder ransomware attack breaks systems at UK retailers
UK supermarkets continue to deal with the impact of a ransomware attack on the systems of supply chain software supplier Blue Yonder, which is disrupting multiple aspects of their businesses including deliveries and staff management Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
26 Nov 2024
What is compliance risk?
Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting from its failure to act in accordance with industry laws and regulations, internal policies or prescribed best practices. Continue Reading
-
Definition
26 Nov 2024
What is managed detection and response (MDR)?
Managed detection and response (MDR) services are a collection of network-, host- and endpoint-based cybersecurity technologies that a third-party provider manages for a client organization. Continue Reading
By- Nick Barney, Technology Writer
- Kinza Yasar, Technical Writer
- Ben Lutkevich, Site Editor
-
E-Zine
26 Nov 2024
The Most Influential Women in UK Technology 2024
In this week’s Computer Weekly, we reveal the 50 most influential women in UK technology for 2024. Read an interview with the winner, co-CEO of Tech She Can, Sheridan Ash. And meet this year’s rising stars – six women with a bright future in IT leadership. Read the issue now. Continue Reading
-
News
26 Nov 2024
Russian threat actors poised to cripple power grid, UK warns
UK government escalates cyber rhetoric in a speech at a Nato event, saying Russian advanced persistent threats stand ready to conduct cyber attacks that could ‘turn off the lights for millions’ Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Nov 2024
BT unveils managed SASE service
Telecoms provider expands managed software-defined wide area network solution with new security service edge capabilities to help businesses transition to a secure access service edge model Continue Reading
By- Joe O’Halloran, Computer Weekly