IT security
-
News
08 May 2025
UK government websites to replace passwords with secure passkeys
Government websites are to replace difficult-to-remember passwords with highly secure passkeys that will protect against phishing and cyber attackers Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
07 May 2025
Meta awarded $167m in court battle with spyware mercenaries
WhatsApp owner Meta is awarded millions of dollars in damages and compensation after its service was exploited by users of mercenary spyware developer NSO’s infamous Pegasus mobile malware Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 May 2025
Europe leads shift from cyber security ‘headcount gap’ to skills-based hiring
Research from Sans Institute reveals European organisations are leading a global shift in hiring priorities, driven by regional regulatory frameworks Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
07 May 2025
Chaos spreads at Co-op and M&S following DragonForce attacks
No end is yet in sight for UK retailers subjected to apparent ransomware attacks Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 May 2025
Oxford Uni adds cyber resilience module to MBA programme
Oxford University’s Saïd Business School is working with cyber response specialist Sygnia to help future business leaders get on top of security Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 May 2025
UK at risk of Russian cyber and physical attacks as Ukraine seeks peace deal
UK cyber security chief warns of ‘direct connection’ between Russian cyber attacks and physical threats to the UK Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
07 May 2025
DSIT aims to bolster expertise with year-long secondments
To drive forward its Plan for Change, the Labour government is looking to hire 25 experts for the Department for Science, Innovation and Technology Fellowship programme Continue Reading
By- Cliff Saran, Managing Editor
-
News
07 May 2025
UK critical systems at risk from ‘digital divide’ created by AI threats
GCHQ’s National Cyber Security Centre warns that a growing ‘digital divide’ between organisations that can keep pace with AI-enabled threats and those that cannot is set to heighten the UK's overall cyber risk Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
06 May 2025
Government industrial strategy will back cyber tech in drive for economic growth
With over 2,000 cyber security businesses across the UK, the government plans to target cyber as a priority to grow the economy Continue Reading
By- Bill Goodwin, Computer Weekly
-
Opinion
06 May 2025
Unspoken risk: Human factors undermine trusted platforms
A leak of information on American military operations caused a major political incident in March 2025. The Security Think Tank considers what can CISOs can learn from this potentially fatal error. Continue Reading
By- Aditya K Sood, Aryaka
-
News
06 May 2025
Data issues cost Australian businesses nearly A$500k annually
Research reveals Australian organisations are losing an average of nearly half a million dollars annually due to poor data integrity, hindering their ability to leverage AI and eroding their competitive edge Continue Reading
By- Aaron Tan, TechTarget
-
Feature
06 May 2025
Beyond the hook: How phishing is evolving in the world of AI
Phishing attacks are evolving. Gone are the days of clumsy, error-ridden emails that were easy to spot – today’s campaigns harness advanced techniques to bypass even the latest defences. A new approach is needed Continue Reading
By -
Opinion
06 May 2025
Security and verification concerns dog debate over Data (Use & Access) Bill
With the long-awaited Data (Use & Access) Bill returning to the House of Commons on 7 May, there remain pros and cons in the bill in relation to financial crime and cyber security Continue Reading
By- Andrew Churchill
-
Definition
06 May 2025
What is segregation of duties (SoD)?
Segregation of duties (SoD) is an internal control mechanism designed to prevent errors and fraud by ensuring at least two individuals are responsible for the separate parts of any task. Continue Reading
-
Opinion
02 May 2025
Security Think Tank: What CISOs can learn from Signalgate
A leak of information on American military operations caused a major political incident in March 2025. The Security Think Tank considers what can CISOs can learn from this potentially fatal error. Continue Reading
By- Javvad Malik, KnowBe4
-
News
02 May 2025
Retail cyber crime spree a ‘wake-up call’, says NCSC CEO
The National Cyber Security Centre confirms it is providing assistance to M&S, Co-op and Harrods as concerns grow among UK retailers Continue Reading
By- Alex Scroxton, Security Editor
-
News
02 May 2025
Government and Ofcom disagree about scope of Online Safety Act
MPs heard different views from the online harms regulator and the UK government about whether and how the Online Safety Act obliges platforms to deal with disinformation Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
01 May 2025
Explaining what’s happening in a cyber attack is hard but crucial
The recent attacks on Marks and Spencer, Harrods and the Co-op show why it is essential for organisations to have a strategy to communicate effectively with customers affected Continue Reading
By- Mikey Hoare, Kekst CNC
-
News
01 May 2025
Harrods becomes latest UK retailer to fall victim to cyber attack
Harrods confirms it is the latest UK retailer to experience a cyber attack, shutting off a number of systems in an attempt to lessen the impact Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
01 May 2025
Signalgate: Learnings for CISOs securing enterprise data
A leak of information on American military operations caused a major political incident in March 2025. The Security Think Tank considers what can CISOs can learn from this potentially fatal error. Continue Reading
By- Todd Thiemann, Principal Analyst
-
News
01 May 2025
Co-op instructs staff to be wary of lurking hackers
Co-op tells staff to stop using their VPNs and be wary that their communications channels may be being monitored, as a cyber attack on the organisation continues to develop Continue Reading
By- Alex Scroxton, Security Editor
-
News
01 May 2025
Thomas Herdman’s legal battle over Sky ECC encrypted phone distribution set to enter fifth year
Computer Weekly speaks to Julie Kawai Herdman, daughter of Thomas Herdman, the only person in custody for distributing Sky ECC encrypted phones Continue Reading
By- Bill Goodwin, Computer Weekly
- Rebecca Tidy
-
Opinion
30 Apr 2025
Is the Investigatory Powers Tribunal powerless?
Five judges have found the Investigatory Powers Tribunal has no statutory powers to impose financial sanctions against police and intelligence services. Their findings raise significant and serious concerns about the integrity of our legal system. Continue Reading
By- Maria Theodoulou, Partner at Stokoe Partnership Solicitors
-
News
30 Apr 2025
Current SaaS delivery model a risk management nightmare, says CISO
JPMorgan Chase security chief Patrick Opet laments the state of SaaS security in an open letter to the industry and calls on software providers to do more to enhance resilience Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Apr 2025
Co-op shuts off IT systems to contain cyber attack
A developing cyber incident at Co-op has forced the retailer to pull the plug on some of its IT systems as it works to contain the attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Apr 2025
How AI can attack corporate decision-making
As AI gets embedded in corporate systems, experts warn of emerging security risks caused by influencing retrieval augmentation systems Continue Reading
By- Cliff Saran, Managing Editor
-
Feature
30 Apr 2025
RSAC Conference 2025 video reports
We chatted on camera with attendees and presenters at RSAC 2025. Check out this video collection to get highlights from one of the world's major cybersecurity conferences. Continue Reading
By- Brenda L. Horrigan, Executive Managing Editor
-
News
30 Apr 2025
AI in national security raises proportionality and privacy concerns
AI could enable investigations to cover far more individuals than was ever previously possible, which is why oversight is needed Continue Reading
By- Cliff Saran, Managing Editor
-
News
29 Apr 2025
Scattered Spider on the hook for M&S cyber attack
The infamous Scattered Spider hacking collective may have been behind the ongoing cyber attack on Marks and Spencer that has crippled systems at the retailer and left its ecommerce operation in disarray. Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Apr 2025
Gov.uk One Login yet to meet government cyber security standards for critical public services
The government’s flagship digital identity system still does not fully conform to key national security standards three years after launch, while questions remain over whether historic security problems have been resolved Continue Reading
By- Bryan Glick, Editor in chief
-
News
29 Apr 2025
Kaspersky calls for cyber immunity amid growing cyber threats
The rise of professional cyber crime groups and state-sponsored actors targeting critical infrastructure requires a move towards inherently secure ‘cyber immune’ systems, says Kaspersky CEO Eugene Kaspersky Continue Reading
By- Aaron Tan, TechTarget
-
E-Zine
29 Apr 2025
Making divorce digital
In this week’s Computer Weekly, we talk to the CEO of the National Family Mediation charity about its tech overhaul and how divorce is going digital. The government’s One Login digital identity system is under scrutiny over security problems – we examine the issues. And we explain what’s happening in the UK competition watchdog’s investigation into AWS and Microsoft cloud services. Read the issue now. Continue Reading
-
Blog Post
28 Apr 2025
Maintaining Your Borders
It seems like every other – and that’s being conservative – conversation I have in my day job, every other post on the likes of LinkedIn and even on the BBC website is talking about how AI is ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
Definition
28 Apr 2025
What is a risk map (risk heat map)?
A risk map, or risk heat map, is a data visualization tool for communicating specific risks an organization faces. Continue Reading
-
News
25 Apr 2025
UK MoJ crime prediction algorithms raise serious concerns
The Ministry of Justice is using one algorithm to predict people’s risk of reoffending and another to predict who will commit murder, but critics say the profiling in these systems raises ‘serious concerns’ over racism, classism and data inaccuracies Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
25 Apr 2025
M&S suspends all online sales as cyber attack worsens
M&S shuts down online sales as it works to contain and mitigate a severe cyber attack on its systems Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Apr 2025
M&S systems remain offline days after cyber incident
M&S is still unable to provide contactless payment or click-and-collect services amid a cyber attack that it says has forced it to move a number of processes offline to safeguard its customers, staff and business Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Apr 2025
Data breach class action costs mount up
Organisations exposed to the US market paid out over $150m in class action settlements in just six months. Security leaders must do more to address cyber gaps, respond better to incidents and demonstrate compliance Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
24 Apr 2025
Challenges persist as UK’s Cyber Security and Resilience Bill moves forward
Elements of the Cyber Security and Resilience Bill are welcome but questions remain about how best to act in the face of persistent challenges like geopolitical chaos, threats to critical infrastructure, and technological advances Continue Reading
By- James Morris, CSBR
-
Podcast
24 Apr 2025
Podcast: RSA 2025 to grapple with AI compliance, US and EU regulation
We preview RSA 2025 with Vigitrust CEO Mathieu Gorge who looks forward to learning lots around compliance and regulation as CIOs wrestle with artificial intelligence and geopolitical upheavals Continue Reading
By- Antony Adshead, Storage Editor
-
News
24 Apr 2025
Ericsson boosts NetCloud SASE with integrated clientless ZTNA for wireless WAN
Leading comms tech provider claims industry’s first fully integrated clientless zero-trust network access, designed for wireless wide area network with update to core secure access service edge platform Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
24 Apr 2025
March ransomware slowdown probably a red herring
An apparent slowdown in ransomware attack volumes is raising eyebrows, but the statistics never tell the full story Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
24 Apr 2025
What is risk exposure in business?
Risk exposure is the quantified potential loss from currently underway or planned business activities. Continue Reading
By- Dave Shackleford, Voodoo Security
- Ben Cole, Executive Editor
-
Opinion
23 Apr 2025
Rethink authentication to remove the burden on users
The rise of AI powered threats and non-human identities will push an already strained identity security model over the edge Continue Reading
By- Patrick Wardrop, IBM
-
News
23 Apr 2025
Financially motivated cyber crime remains biggest threat source
Mandiant’s latest annual threat report reveals data on how financially motivated cyber criminals, such as ransomware gangs, dominate the cyber security landscape Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
23 Apr 2025
Enterprise strategies for API management
Application programming interfaces are the connective tissue of the modern enterprise, driving innovation and integration. But managing them effectively requires enterprises to consider governance, security and lifecycle management while preparing for emerging threats and technologies like AI Continue Reading
By- Aaron Tan, TechTarget
-
News
23 Apr 2025
Amid uncertainty, Armis becomes newest CVE numbering authority
Amid an uncertain future for vulnerability research, exposure management company Armis has been given the authority to assign CVE IDs to newly discovered vulnerabilities Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Apr 2025
Qualys goes to bat for US cricket side San Francisco Unicorns
Cloud security specialist Qualys partners with US T20 cricket squad San Francisco Unicorns and its Sparkle Army fanclub as the team prepares for its summer 2025 campaign Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Apr 2025
Digital ID sector calls for changes to government data legislation
Suppliers urge technology secretary to work more collaboratively with private sector over concerns government’s digital wallet will gain a monopoly in the market Continue Reading
By- Bryan Glick, Editor in chief
-
News
22 Apr 2025
Cyber attack downs systems at Marks & Spencer
A cyber attack at Marks & Spencer has caused significant disruption to customers, leaving them unable to make contactless payments or use click-and-collect services Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Apr 2025
Cyber ‘agony aunts’ launch guidebook for women in security
Cyber ‘agony aunts’ Amelia Hewitt and Rebecca Taylor are launching a book aimed at empowering women in their cyber security careers Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Apr 2025
Secure Future Initiative reveals Microsoft staff focus
IT security is now a metric in the Microsoft employee appraisal process Continue Reading
By- Cliff Saran, Managing Editor
-
Opinion
22 Apr 2025
Beyond baselines - getting real about security and resilience
In an increasingly contested world, the UK government needs a security certification that goes beyond baseline measures. Continue Reading
By- Neil Ashdown and Tash Buckley
-
News
22 Apr 2025
Ofcom bans leasing of Global Titles to crackdown on spoofing
Telco regulator Ofcom is cracking down on a loophole being exploited by cyber criminals to access sensitive mobile data Continue Reading
By- Cliff Saran, Managing Editor
-
News
22 Apr 2025
AI-powered APIs proving highly vulnerable to attack
The growth of AI is proving a double-edged sword for API security, presenting opportunities for defenders to enhance their resilience, but also more risks from AI-powered attacks, according to report Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Apr 2025
Investigatory Powers Tribunal has no power to award costs against PSNI over evidence failures
Investigatory Powers Tribunal judges have called for the Home Secretary to step in after finding they have no powers to award costs against government bodies that fail to disclose evidence Continue Reading
By- Bill Goodwin, Computer Weekly
-
Definition
21 Apr 2025
What is a brute-force attack?
A brute-force attack is a trial-and-error hacking method cybercriminals use to decode login information and encryption keys to gain unauthorized access to systems. Continue Reading
By- Mary E. Shacklett, Transworld Data
- Katie Terrell Hanna
-
News
21 Apr 2025
Top APAC firms recognised at innovation awards
Citic Telecom, CapitaLand Investment and DBS Bank were among the region’s top industry innovators recognised for their digital transformation efforts at the Computer Weekly Innovation Awards APAC 2025 Continue Reading
By- Aaron Tan, TechTarget
-
News
21 Apr 2025
CW Innovation Awards: Transforming cyber security with AI
Facing rising cyber threats and a shortage of experts, Citic Telecom International CPC developed an AI-powered penetration testing tool to automate security audits and reduce costs Continue Reading
By -
Feature
18 Apr 2025
How do cybercriminals steal credit card information?
Cybercriminals have various methods at their disposal to hack and exploit credit card information. Learn what they are, how to prevent them and what to do when hacked. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
17 Apr 2025
Norway says ‘no way’ to global financial crime
Oslo’s startup ecosystem is fighting back against cyber criminals with tech to wipe out attacks rather than just detect them. Continue Reading
-
E-Zine
17 Apr 2025
CW EMEA: Shutting down cyber crime
In the Netherlands, the average ransomware attack costs firms about €514,000, and these huge sums mean it makes sense that the police invest their time and resources into combating it. One PhD student spent four years embedded in Dutch police cyber teams to conduct research on their efficacy. Continue Reading
-
17 Apr 2025
Dutch police disrupt half of ransomware operations, finds embedded PHD student
Dutch PhD study reveals the impact of centralised intelligence and strategic interventions in the fight against ransomware. Continue Reading
-
News
17 Apr 2025
Tariff turmoil is making supply chain security riskier
Many businesses around the world are taking the decision to alter their supplier mix in the face of tariff uncertainty, but in doing so are creating more cyber risks for themselves, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
17 Apr 2025
Collaboration is the best defence against nation-state threats
The rise of DeepSeek has prompted the usual well-documented concerns around AI, but also raised worries about its potential links to the Chinese state. The Security Think Tank considers the steps security leaders can take to counter threats posed by nation state industrial espionage? Continue Reading
By- Stephen McDermid, Okta
-
News
17 Apr 2025
Standard Chartered grounds AI ambitions in data governance
The bank’s group chief data officer, Mohammed Rahim, outlines how the bank is modernising its data infrastructure and governance practices to support its AI initiatives Continue Reading
By- Aaron Tan, TechTarget
-
Definition
16 Apr 2025
What is Pretty Good Privacy and how does it work?
Pretty Good Privacy, or PGP, was a popular program used to encrypt and decrypt email over the internet, as well as authenticate messages with digital signatures and encrypted stored files. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Peter Loshin, Former Senior Technology Editor
- Rob Wright, Senior News Director
-
News
16 Apr 2025
Footballers object to processing of performance data
Football players are seeking to gain more control of their performance data through ‘stop processing’ requests, in an attempt to strike a better balance between firms’ commercial interests and the data rights of footballers Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
16 Apr 2025
CISA extends Mitre CVE contract at last moment
The US Cybersecurity and Infrastructure Security Agency has ridden to the rescue of the under-threat Mitre CVE Programme, approving a last-minute, 11-month contract extension to preserve the project’s vital security vulnerability work Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 Apr 2025
CVE Foundation pledges continuity after Mitre funding cut
With news that Mitre’s contract to run the world-renowned CVE Programme is abruptly terminating, a breakaway group is setting up a non-profit foundation to try to ensure the project’s continuity Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
16 Apr 2025
UK digital identity turns to drama (or farce?) over industry fears and security doubts
Government at loggerheads with industry. Warnings of serious security and data protection problems undermining a vital public service. A burgeoning political campaign seeking greater influence. You ... Continue Reading
By- Bryan Glick, Editor in chief
-
News
16 Apr 2025
Security leaders grapple with AI-driven threats
Experts warn of AI’s dual role in both empowering and challenging cyber defences, and called for intelligence sharing and the need to strike a balance between AI-driven innovation and existing security practices Continue Reading
By- Aaron Tan, TechTarget
-
News
15 Apr 2025
Mitre warns over lapse in CVE coverage
Mitre, the operator of the world-renowned CVE repository, has warned of significant impacts to global cyber security standards, and increased risk from threat actors, as it emerges its US government contract will lapse imminently Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Apr 2025
Hertz warns UK customers of Cleo-linked data breach
Car hire giant Hertz reveals UK customer data was affected in a cyber incident orchestrated via a series of vulnerabilities in Cleo managed file transfer products Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Apr 2025
The Investigatory Powers Tribunal explained
The Investigatory Powers Tribunal is a semi-secret judicial body that has made significant legal rulings on privacy, surveillance and the use of investigatory powers. What does it do and why is it important? Continue Reading
By- Bernard Keenan, UCL
-
News
14 Apr 2025
Meta settles lawsuit over surveillance business model
Meta settles lawsuit over use of personal data in targeted advertising, opening up the possibility of other UK users raising legal objections to its processing Continue Reading
-
Definition
14 Apr 2025
What is corporate governance?
Corporate governance is the combination of rules, processes and laws by which businesses are operated, regulated and controlled. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
- Ben Lutkevich, Site Editor
- Sarah Lewis
-
Definition
14 Apr 2025
What is cloud security?
Cloud security, or cloud computing security, is a set of policies, practices and controls deployed to protect cloud-based data, applications and infrastructure from cyberattacks and cyberthreats. Continue Reading
By- Mary E. Shacklett, Transworld Data
- Kinza Yasar, Technical Writer
- Andrew Froehlich, West Gate Networks
-
News
14 Apr 2025
Government faces claims of serious security and data protection problems in One Login digital ID
The Government Digital Service was warned about serious cyber security and data protection problems in its flagship digital identity system, with insider claims that the data of three million users may still be at risk Continue Reading
By- Bryan Glick, Editor in chief
-
Feature
14 Apr 2025
The role of small language models in enterprise AI
Small language models do not require vast amounts of expensive computational resources and can be trained on business data Continue Reading
By- Cliff Saran, Managing Editor
- Adrian Bridgwater
-
Opinion
14 Apr 2025
What’s the government up to with digital verification services? ‘ID’ like to know
Is the government really looking to compete with the private sector for provision of digital identity? Such a move risks fundamentally undermining public trust in critical digital verification services Continue Reading
By- Lord Chris Holmes, House of Lords
-
Opinion
14 Apr 2025
Defending the grid with secure connectivity
Connectivity providers, device manufacturers and the energy companies they support must prioritise cyber security as the use of IoT grows in Singapore's energy sector Continue Reading
By- Simon Trend
-
News
11 Apr 2025
AI surveillance towers place migrants in ‘even greater jeopardy’
The use of autonomous surveillance towers throughout the English coast forces migrants into increasingly dangerous routes and contributes to their criminalisation Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
11 Apr 2025
Comms consortium calls for greater vigilance on subsea cable security
Open letter from European telecommunications operators and subsea cable stakeholders calls on cables ecosystem to align security objectives with operational feasibility as well create viable business model based on risk-based best practices Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Blog Post
11 Apr 2025
No Complaints About Automating Compliance
I was recently in London recording some podcasts for a Data Centre client, Asanti, and two of the areas we discussed were – surely not – AI and… compliance. It seems to that Asanti’s Co-Lo ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
News
11 Apr 2025
Met Police to deploy permanent facial recognition tech in Croydon
The Met Police is set deploy permanent live facial recognition cameras on street furniture in Croydon from summer 2025, but local councillors say the decision – which has taken place with no community input – will further contribute the over-policing of Black communities Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
11 Apr 2025
Warranty fraud fuels hidden army of hardware hackers
Widespread warranty fraud is not only costing companies billions but also creating a breeding ground for advanced hardware exploits, warns hardware hacker and researcher Bunnie Huang at Black Hat Asia 2025 Continue Reading
By- Aaron Tan, TechTarget
-
News
10 Apr 2025
Google bets on unifying security tools to ease CISO pain
At Google Cloud Next in Las Vegas, Google launches its Unified Security platform with the goal of bringing together disparate security solutions to help cyber leaders and practitioners address their most keenly felt pain points Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
10 Apr 2025
GCHQ historian Dave Abrutat’s mission to preserve the UK’s forgotten signals intelligence history
Dave Abrutat, GCHQ’s official historian, is on a mission to preserve the UK’s historic signals intelligence sites and capture their stories before they disappear from folk memory. A new charity, NSIST, will raise funds and recruit volunteers Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
10 Apr 2025
Companies House goes live with One Login ID verification
People can verify their identity with Companies House using Gov.uk One Login as the central government body becomes the 36th service to start using the digital identity system Continue Reading
By -
News
10 Apr 2025
Spirit of openness helps banks get serious about stopping scams
Recent announcements show that banks, financial services firms and IT companies are increasing efforts to curb online scams Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
10 Apr 2025
Investigative reporter files legal action over police surveillance and social media monitoring
Journalist complains to Investigatory Powers Tribunal after Northern Irish police placed him under surveillance as he investigated their handling of a high-profile death Continue Reading
By -
News
09 Apr 2025
Microsoft’s April 2025 bumper Patch Tuesday corrects 124 bugs
Microsoft is correcting 124 vulnerabilities in its March Patch Tuesday, one of which is being actively exploited in the wild, and 11 of which are ‘critical’ Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
09 Apr 2025
Nokia, Telia, Finnish Defence Forces claim 5G standalone slice first
Companies showcase potential of 5G technology in enhancing critical communications for defence units operating in coalition environments to ensure seamless experience when crossing country borders Continue Reading
-
News
08 Apr 2025
NCSC issues warning over Chinese Moonshine and BadBazaar spyware
Two spyware variants are being used to target the mobile devices of persons of interest to Chinese intelligence, including individuals in the Taiwanese, Tibetan and Uyghur communities Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
08 Apr 2025
DeepSeek will help evolve the conversation around privacy
The rise of DeepSeek has prompted the usual well-documented concerns around AI, but also raised worries about its potential links to the Chinese state. The Security Think Tank considers the steps security leaders can take to counter threats posed by nation state industrial espionage? Continue Reading
By- Nick New, Optalysys
-
Definition
08 Apr 2025
What is sustainability risk management (SRM)?
Sustainability risk management (SRM) is a business strategy that aligns profit goals with a company's environmental, social and governance (ESG) policies. Continue Reading
-
News
08 Apr 2025
Labour MPs launch digital ID campaign
A large group of Labour MPs have called for the introduction of a digital ID system to crack down on illegal migration and benefits fraud Continue Reading
By -
News
08 Apr 2025
Spoofing vuln threatens security of WhatsApp Windows users
Meta has disclosed and patched a potentially dangerous spoofing flaw in WhatsApp for Windows that could have caused big problems for unwitting users Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Apr 2025
IBM boosts AI mainframe capabilities with Z17
IBM continues to try to break out of the mindset that mainframes are just for transaction processing. The latest server offers greater AI capabilities Continue Reading
By- Cliff Saran, Managing Editor
-
Opinion
08 Apr 2025
It’s time to stop the victim-blaming and insist on safer software
Businesses spend too much time and money protecting themselves against flaws and vulnerabilities in modern software products, when they ought to raise their expectations and insist on better solutions from providers Continue Reading
By- Mandy Andress, Elastic
-
News
08 Apr 2025
Government punts cyber governance code of practice for UK businesses
The Department for Science, Innovation and Technology’s cyber security minister Feryal Clark announces a cyber security code of governance for UK businesses to follow Continue Reading
By- Brian McKenna, Enterprise Applications Editor