IT security
-
News
11 Jul 2024
Dutch research firm TNO pictures the SOC of the future
In only a few years, security operations centres will have a different design and layout, and far fewer will remain Continue Reading
-
News
04 Apr 2024
Changes needed for SOCs and CSIRTs, claims Dutch research institute
Cyber security specialists need a game-changer to keep up with their adversaries, who increasingly use automation and AI for their attacks Continue Reading
-
News
21 Oct 2024
Can AI be secure? Experts discuss emerging threats and AI safety
International cyber security experts call for global cooperation and proactive strategies to address the security challenges posed by artificial intelligence Continue Reading
By- Aaron Tan, TechTarget
-
Definition
17 Oct 2024
What is tailgating (piggybacking)?
Tailgating, sometimes referred to as piggybacking, is a type of physical security breach in which an unauthorized person follows an authorized individual to enter secured premises while avoiding detection by an electronic or human access control (or alarm) system. Continue Reading
By -
News
17 Oct 2024
NCSC chief warns of gap in cyber threats and defence capabilities
The UK and its allies must take collective action to improve their cyber resilience and repel the increasing volume of severe cyber attacks, says NCSC chief Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
17 Oct 2024
EU cyber security bill NIS2 hits compliance deadline
The EU’s NIS2 bill will harmonise how companies and member states approach cyber security, but its success will depend on how well it is implemented and enforced Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
17 Oct 2024
Preparing for disruptions to enterprise application ecosystems
From undersea cable sabotage to AI deepfakes and restrictive regulations, modern applications face a barrage of threats. Organisations must prioritise resilience by diversifying infrastructure, investing in cyber security, and embracing sustainable practices to ensure business continuity Continue Reading
By- Neha Ralhan
-
Feature
16 Oct 2024
How to build an incident response plan, with examples, template
With cyberthreats and security incidents growing by the day, every organization needs a solid incident response plan. Learn how to create one for your company. Continue Reading
By -
News
16 Oct 2024
Cato further expands SASE platform for ‘complete’ UK delivery
Secure access service edge platform gains digital experience monitoring capability so enterprises can monitor user experiences and fix them online or in private datacentres Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
15 Oct 2024
NCSC expands school cyber service to academies and private schools
The National Cyber Security Centre is expanding its PDNS for Schools service to encompass a wider variety of institutions up and down the UK Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
15 Oct 2024
Reinventing security operations for the modern threat landscape
The growing pace of digital transformation has opened new avenues for attackers, making traditional security measures obsolete. Organisations must modernise their security operations to fortify their defences and navigate the evolving threat landscape Continue Reading
By- Aaron Tan, TechTarget
-
News
15 Oct 2024
Telefónica and Halotech integrate post-quantum encryption into IoT devices
Leading global telco implements state-of-the-art cyber security through internet of things managed connectivity platform allowing devices to be controlled and monitored in real time and remotely Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
14 Oct 2024
How Zoom is charting its course towards an AI-first platform
Zoom CEO Eric Yuan talks up his vision for the future of work, the company's transition to an AI-powered platform and what it is doing to stay ahead of rivals Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
11 Oct 2024
Robust cloud IAM should align to zero-trust principles
The Security Think Tank considers best practices in identity and access management and how can they be deployed to enable IT departments to combat cyber-attacks, phishing attacks and ransomware. Continue Reading
By- Ricky Simpson, Quorum Cyber
-
News
11 Oct 2024
NFL and Cisco gain yardage with network and security partnership
Cisco scores contract extension with US sports body NFL to connect and protect 2024 roster of International Games in the UK, Germany, Brazil and Spain in 2025 Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Definition
11 Oct 2024
What is the Mitre ATT&CK framework?
The Mitre ATT&CK -- pronounced miter attack -- framework is a free, globally accessible knowledge base that describes the latest behaviors and tactics of cyberadversaries to help organizations strengthen their cybersecurity strategies. Continue Reading
By- Paul Kirvan
- Kinza Yasar, Technical Writer
- Ben Lutkevich, Site Editor
-
News
10 Oct 2024
NCSC issues fresh alert over wave of Cozy Bear activity
The NCSC, FBI and NSA publish updated warning about Cozy Bear’s activities, highlighting a range of vulnerabilities the threat actor is using to set up its cyber attacks Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
10 Oct 2024
What is threat intelligence?
Threat intelligence, also known as cyberthreat intelligence, is information gathered from a range of sources about current or potential attacks against an organization. Continue Reading
-
News
10 Oct 2024
Government launches cyber standard for local authorities
Local government bodies are being invited to take advantage of a new NCSC-derived Cyber Assessment Framework to help enhance their resilience and ward off cyber attacks Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Oct 2024
How Recorded Future finds ransomware victims before they get hit
Threat intel specialists at Recorded Future have shared details of newly developed techniques they are using to disrupt Rhysida ransomware attacks before the gang even has a chance to execute them Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Oct 2024
Internet Archive web historians target of hacktivist cyber attack
The Internet Archive nonprofit digital library and Wayback Machine operator has been attacked by pro-Palestinian hacktivists Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Oct 2024
UK and US pledge closer working on children’s online safety
In their first agreement on the subject of children’s online safety, the UK and US governments have said they will create a new working group to boost cooperation Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
10 Oct 2024
Australia bolsters cyber defences with security bill
Legislation tackles IoT security and establishes a Cyber Incident Review Board to bolster Australia’s cyber resilience Continue Reading
-
Blog Post
10 Oct 2024
The Complexities Of Reinventing The Mainframe “Easy Life”
Just got back from a Commvault event in London (where I saw more people in 10 seconds than I do in a month in Devon!) which also gave me the opp to catch-up with old PR mate Ben Ralph. In between ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
News
09 Oct 2024
MoneyGram customer data breached in attack
MoneyGram confirms that customer data has been stolen in an incident that appears to have started with a social engineering attack on its IT helpdesk staff Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Oct 2024
Five zero-days to be fixed on October Patch Tuesday
Stand-out vulnerabilities in Microsoft’s latest Patch Tuesday drop include problems in Microsoft Management Console and the Windows MSHTML Platform Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
09 Oct 2024
What is OPSEC (operations security)?
OPSEC (operations security) is an analytical process that military, law enforcement, government and private organizations use to prevent sensitive or proprietary information from being accessed inappropriately. Continue Reading
By- Robert Sheldon
- Linda Rosencrance
- Ben Cole, Executive Editor
-
News
09 Oct 2024
UK Cyber Team seeks future security professionals
Young people from across the UK have a chance to represent the country in international competitions and advance their future careers in cyber security Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Oct 2024
Secureworks: Ransomware takedowns didn’t put off cyber criminals
The number of active cyber criminal ransomware gangs has surged by almost a third in the space of 12 months, according to the latest intelligence from Secureworks Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Oct 2024
UK’s cyber incident reporting law to move forward in 2025
The UK government says that enforced cyber incident and ransomware reporting for critical sectors of the economy will help to build a better picture of the threat landscape and enable more proactive and preventative responses Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Oct 2024
IBM: Data breach cost in ASEAN hits new high
The average cost of a data breach in ASEAN grew by 7% from last year, as organisations grapple with increasingly distributed IT environments and complex security systems Continue Reading
By- Aaron Tan, TechTarget
-
News
04 Oct 2024
UK telcos including BT at risk from DrayTek router vulnerabilities
A series of vulnerabilities in DrayTek's Vigor router product lines affects multiple comms service providers in the UK, according to new analysis Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Oct 2024
NCSC celebrates eight years as Horne blows in
Outgoing NCSC interim leader Felicity Oswald shares her thoughts on the body’s work over the past eight years as she hands over the reins to incoming CEO Richard Horne Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Oct 2024
Cups Linux printing bugs open door to DDoS attacks, says Akamai
The Cups Linux printing vulnerabilities disclosed at the end of September would seem to have a nasty sting in their tail, according to researchers at Akamai Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Oct 2024
Detective wrongly claimed journalist’s solicitor attempted to buy gun, surveillance tribunal hears
Darren Ellis, who led a surveillance operation against journalists who exposed police failures, wrongly accused a solicitor of attempting to buy arms Continue Reading
By- Bill Goodwin and Cormac Kehoe
-
News
03 Oct 2024
Ex-PSNI officer seeking legal advice over comments made at Investigatory Powers Tribunal
Ex PSNI officer ‘deeply angered’ by comments made by a former detective at a tribunal investigating allegations of unlawful surveillance against journalists Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
03 Oct 2024
Microsoft files lawsuit to seize domains used by Russian spooks
Microsoft has been given permission to seize multiple domains used by the Russian state threat actor Star Blizzard as part of a coordinated disruption effort undertaken ahead of the US elections Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Oct 2024
SOC teams falling out of love with threat detection tools
Security operations centre practitioners are fed up of being flooded with pointless alerts and many no longer have much confidence in their threat detection tools, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
03 Oct 2024
Rise of the cyber clones: When seeing isn’t believing
It is frighteningly easy to clone someone else's identity using readily-available artificial intelligence tools Continue Reading
By- Jake Moore, ESET
-
News
03 Oct 2024
Nutanix courts VMware customers in APAC amid Broadcom concerns
Nutanix is driving double-digit growth across the region by capitalising on the evolving cloud landscape with its hybrid cloud and artificial intelligence offerings, as well as anxieties about the future direction of VMware under Broadcom’s ownership Continue Reading
By- Aaron Tan, TechTarget
-
News
02 Oct 2024
UK and Singapore to collaborate on supporting ransomware victims
At the fourth Counter Ransomware Initiative Summit in the US, both the UK and Singapore have committed to working on new guidance designed to better support victims and undermine cyber criminal business models Continue Reading
By- Alex Scroxton, Security Editor
-
News
02 Oct 2024
Detective behind ‘unlawful’ surveillance blamed Catholics for ‘perverse’ court decisions
A former detective claimed Irish judges were ‘sectarians in robes’ after a court found police had unlawfully arrested journalists who produced a film exposing collusion with paramilitary murderers Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
02 Oct 2024
Cyber UK’s quickest growing tech field, but skills gap remains
More people than ever are joining the cyber security profession in the UK, according to a report, but there is still a serious shortage even with a doubling in numbers Continue Reading
By- Alex Scroxton, Security Editor
-
News
02 Oct 2024
Amazon Mechanical Turk workers suspended without explanation
A likely glitch in Amazon Payments resulted in hundreds of Mechanical Turk workers being suspended from the platform without proper explanation or pay Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
01 Oct 2024
Detective reported journalist’s lawyers to regulator in ‘unlawful’ PSNI surveillance case
Former Durham detective Darren Ellis told the Investigatory Powers Tribunal that he had concerns about lawyers acting for journalists placed under surveillance by Northern Irish police Continue Reading
By- Bill Goodwin & Cormac Kehoe
-
News
01 Oct 2024
Unmasked: The Evil Corp cyber gangster who worked for LockBit
The NCA has named and shamed a prominent member of the Evil Corp cyber crime collective who also worked as an affiliate of the LockBit ransomware gang as the UK unveils new sanctions against 16 Russian cyber criminals Continue Reading
By- Alex Scroxton, Security Editor
-
News
01 Oct 2024
Businesses are getting some value from AI, but struggling to scale
Survey from KPMG reveals IT leaders struggling to keep up with the pace of technology innovation Continue Reading
By- Cliff Saran, Managing Editor
-
News
01 Oct 2024
Post Office ditches MoneyGram after cyber attack
The Post Office offered a short extension to enable it to asses the impact of the MoneyGram cyber incident, but the contract has now expired and MoneyGram services are no longer available in Post Office branches Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
01 Oct 2024
Cyber teams say they can’t keep up with attack volumes
Over 60% of European security pros say their teams are understaffed, and over 50% don’t have enough budget, according to data from ISACA Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
30 Sep 2024
The cyber industry needs to accept it can't eliminate risk
The Computer Weekly Security Think Tank panel considers incident response in the wake of the July CrowdStrike incident, sharing their views on what CrowdStrike got wrong, what it did right, and next steps Continue Reading
By- Paul Lewis, Nominet
-
Definition
30 Sep 2024
What is WPA3 (Wi-Fi Protected Access 3)?
WPA3, also known as Wi-Fi Protected Access 3, is the third iteration of a security certification standard developed by the Wi-Fi Alliance. WPA3 is the latest updated implementation of WPA2, which has been in use since 2004. Continue Reading
By- Gavin Wright
- Alexander S. Gillis, Technical Writer and Editor
-
Definition
27 Sep 2024
What is access control?
Access control is a security technique that regulates who or what can view or use resources in a computing environment. Continue Reading
By- Gavin Wright
- Ben Lutkevich, Site Editor
-
News
27 Sep 2024
UK on high alert over Iranian spear phishing attacks, says NCSC
The NCSC and counterpart agencies in the US have issued a warning over enhanced Iranian spear phishing activity targeting politicians, journalists, activists and others with an interest in Middle Eastern affairs Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Sep 2024
Printing vulnerability affecting Linux distros raises alarm
Security pros need to get in front of a series of vulnerabilities affecting the Cups Linux printing service after an apparently botched disclosure process saw technical details published in advance of a patch Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
27 Sep 2024
Defaulting to open: Decoding the (very public) CrowdStrike event
The Computer Weekly Security Think Tank panel considers incident response in the wake of the July CrowdStrike incident, sharing their views on what CrowdStrike got wrong, what it did right, and next steps Continue Reading
By- Elliott Wilkes, ACDS
-
Opinion
27 Sep 2024
Cyber companies need a best practice approach to major incidents.
The Computer Weekly Security Think Tank panel considers incident response in the wake of the July CrowdStrike incident, sharing their views on what CrowdStrike got wrong, what it did right, and next steps Continue Reading
By- Andy Bridden and Ashley Barker, PA Consulting
-
Definition
27 Sep 2024
What is a cloud access security broker (CASB)?
A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Dan Sullivan
-
News
27 Sep 2024
How UEM Sunrise is driving transformation with Salesforce and AI
Malaysian property developer UEM Sunrise is leveraging Salesforce and AI to boost sales and enhance customer experience while prioritising data sovereignty and a diversified cloud strategy Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
27 Sep 2024
Closing the curtain on cyber security theatre
Leaders must redefine expectations, rethink responsibility, and eliminate unproductive practices to move towards real security, says Gartner vice-president analyst Richard Addiscott Continue Reading
By- Richard Addiscott
-
News
26 Sep 2024
Racist Network Rail Wi-Fi hack was work of malicious insider
Police have revealed that this week’s racist cyber attack on public Wi-Fi networks at stations across the UK appears to have been the work of a malicious insider, after arresting an employee of one of the service providers Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Sep 2024
Islamophobic cyber attack downs Wi-Fi at UK transport hubs
An apparent hacktivist attack disrupted public-facing Wi-Fi networks at UK rail stations to display Islamophobic content Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Sep 2024
CrowdStrike apologises to US government for global mega-outage
CrowdStrike executive Adam Meyers appears before a US government committee to explain the series of errors that led directly to one of the biggest IT outages in history Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Sep 2024
Splunk and Cisco integration moving apace
Splunk is rapidly integrating with Cisco’s technology to enable seamless transitions between their platforms while delivering advanced threat detection capabilities Continue Reading
By- Aaron Tan, TechTarget
-
News
24 Sep 2024
Money transfer firm MoneyGram rushes to contain cyber attack
Money transfer specialist MoneyGram services remain down several days after a network outage developed into a full-blown cyber security incident Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
24 Sep 2024
What is a business continuity plan (BCP)?
A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue operating during an unplanned event. Continue Reading
By- Cameron Hashemi-Pour, Site Editor
- Vicki-Lynn Brunskill
-
News
24 Sep 2024
Unique malware sample volumes seen surging
BlackBerry’s latest ‘Global threat intelligence’ report details a surge in unique malware samples as threat actors ramp up the pace of targeted attacks Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
24 Sep 2024
How to respond when your cyber company becomes the story
The Computer Weekly Security Think Tank panel considers incident response in the wake of the July CrowdStrike incident, sharing their views on what CrowdStrike got wrong, what it did right, and next steps Continue Reading
By- Stephen McDermid
-
News
23 Sep 2024
Microsoft shares progress on Secure Future Initiative
Microsoft has published a progress report on its Secure Future Initiative, launched last year in the wake of multiple security incidents, and made a series of commitments to improve its internal cyber culture Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
23 Sep 2024
Powering Britain’s economy – datacentres gain in status
In this week’s Computer Weekly, the UK government has finally classified datacentres as critical national infrastructure – we ask, what took it so long? We assess the impact of the EU’s new energy efficiency rules on datacentre operators. And we discuss the power of information and diversity with the chief data officer at Legal & General. Read the issue now. Continue Reading
-
Opinion
23 Sep 2024
Security Think Tank: Win back lost trust by working smarter
The Computer Weekly Security Think Tank panel considers incident response in the wake of the July CrowdStrike incident, sharing their views on what CrowdStrike got wrong, what it did right, and next steps Continue Reading
By- Vladimir Jirasek, Foresight Cyber
-
News
23 Sep 2024
Home Office eVisa scheme is ‘broken’, says Open Rights Group
Digital rights campaigners say the Home Office’s plan to make its new electronic Visa scheme a real-time online-only process is part and parcel of the 'hostile environment' around immigration status Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
23 Sep 2024
Gartner: Mitigating security threats in AI agents
Agents represent a step-change in the use of artificial intelligence in the enterprise - as attendees at Salesforce's annual conference saw first hand this month - but do not come without their risks Continue Reading
By- Avivah Litan, Gartner
-
News
23 Sep 2024
UK, US and Canada to collaborate on AI and cyber security
International collaboration agreement will see the governments of Canada, the UK and the US work together to research, evaluate and test new defence technologies Continue Reading
By -
News
23 Sep 2024
Medtech startup brings Oracle AI to bear on cancer drug research
Learn how Oracle Cloud Infrastructure and its cutting-edge AI features are bringing new benefits to cancer care by helping doctors identify better treatment options Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
20 Sep 2024
CrowdStrike incident shows we need to rethink cyber
The Computer Weekly Security Think Tank panel considers incident response in the wake of the July CrowdStrike incident, sharing their views on what CrowdStrike got wrong, what it did right, and next steps Continue Reading
-
News
19 Sep 2024
HSBC tests post-quantum VPN tunnel for digital ledgers
Encryption required for post-quantum cryptography will have a material impact on the performance of distributed ledgers Continue Reading
By- Cliff Saran, Managing Editor
-
News
18 Sep 2024
NCSC exposes Chinese company running malicious Mirai botnet
The NCSC and its Five Eyes allies have published details of the activities of a China-based cyber security company that is operating a Mirai IoT botnet in the service of government-backed intrusions Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Sep 2024
Europol provides detail on Ghost encrypted comms platform takedown
Law enforcement bodies from across the world have revealed how they collaborated to bring down encrypted network Ghost and the new ways of working that have been established with Europol at the centre Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
18 Sep 2024
Global AI regulation is heating up: can the UK afford to remain silent?
Why UK lawmakers should be pro-active about introducing AI regulation Continue Reading
By- Peter van der Putten, Director, AI Lab, Pegasystems
-
Definition
18 Sep 2024
What is email spam and how to fight it?
Email spam, also known as 'junk email,' refers to unsolicited email messages, usually sent in bulk to a large list of recipients. Humans send spam, but more often, botnets are responsible for sending it. Continue Reading
-
News
18 Sep 2024
Police make arrests after hacking Ghost encrypted comms app
An international police operation has penetrated an end-to-end encrypted communications service allegedly used by organised criminals in Australia, Ireland, Sweden and Italy Continue Reading
By- Bill Goodwin, Computer Weekly
-
Definition
17 Sep 2024
What is passive keyless entry (PKE)?
Passive keyless entry (PKE) is an automotive security system that operates automatically when the user is in proximity to the vehicle, unlocking the door on approach or when the door handle is pulled, and locking it when the user walks away or touches the car on exit. Continue Reading
-
Feature
17 Sep 2024
Misinformation runs deeper than social media
While social media may contribute to the increasing rapid spread and reach of misinformation, the root causes of the problem go much deeper than the role of a particular company or way of using technology to communicate Continue Reading
-
News
17 Sep 2024
Salesforce’s agentic AI platform to transform business automation
CRM giant’s Agentforce lets organisations build and deploy autonomous agents to automate business processes through advanced learning and data integration Continue Reading
By- Aaron Tan, TechTarget
-
News
17 Sep 2024
First CyberBoost Catalyse startup cohort named
The first group of companies named to a cyber incubator programme run by Plexal and the National University of Singapore includes two growing UK businesses Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
16 Sep 2024
Will autonomous weapons make humans passive participants in war?
Experts warn the emergence and adoption of AI-powered military systems may eventually push battlefield decision-making beyond the limits of human cognition Continue Reading
By- Kyle Hiebert, Computer Weekly
-
News
16 Sep 2024
Crest secures FCDO funding to help overseas countries increase their cyber-readiness
Non-profit Crest is launching an initiative to help overseas, private-sector firms get better prepared for cyber threats Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
Feature
16 Sep 2024
Automation driving SD-WAN optimisation
AIOps is being deployed to help manage highly distributed enterprise networking configurations Continue Reading
By- Cliff Saran, Managing Editor
-
News
15 Sep 2024
UK unites nations to discuss closing global cyber skills gap
The UK government invites representatives from around the world to a summit to discuss how to address global IT security skills gap Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
13 Sep 2024
UN-backed cyber security report highlights global shortfalls in preparedness
In the three years since the UN-backed cyber security report was published, countries have been making a concerted effort to protect themselves from cyber threats, but there’s more to do Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
13 Sep 2024
Cyber workforce must almost double to meet global talent need
Research from ISC2 finds global cyber workforce needs additional 4.8 million people to fully secure businesses Continue Reading
By- Clare McDonald, Business Editor
-
Feature
12 Sep 2024
Kubernetes disaster recovery: Five key questions
We look at disaster recovery for Kubernetes environments, the key challenges to deployment of K8s DR, the risks we aim to mitigate, how to build a plan and the key infrastructure requirements Continue Reading
-
News
12 Sep 2024
Teenager arrested in TfL cyber attack investigation
New security measures following the cyber attack, which took down some of TfL’s services, have led to delays in contactless roll-out Continue Reading
By- Cliff Saran, Managing Editor
-
News
12 Sep 2024
Lord introduces bill to regulate public sector AI and automation
A private members’ bill seeking to regulate the use of artificial intelligence (AI) and other automated technologies throughout the public sector has been brought to Parliament Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
12 Sep 2024
Data sharing for immigration raids ferments hostility to migrants
Data sharing between public and private bodies for the purposes of carrying out immigration raids helps to prop up the UK’s hostile environment by instilling an atmosphere of fear and deterring migrants from accessing public services Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
12 Sep 2024
European enterprise networking lacks hybrid maturity
Deploying a complex hybrid and multicloud IT architecture has an impact on enterprise network management Continue Reading
By- Cliff Saran, Managing Editor
-
News
11 Sep 2024
Datacentres granted critical national infrastructure status
The global IT outage caused by CrowdStrike has shown why keeping datacentres secure and safe is critical to the UK Continue Reading
By- Cliff Saran, Managing Editor
-
News
11 Sep 2024
September Patch Tuesday: Update before 1 October
Four critical remote code execution bugs in Windows and three critical elevated privileges vulnerabilities will keep admins busy Continue Reading
By- Cliff Saran, Managing Editor
-
News
11 Sep 2024
How Sonar is elevating code quality in the age of AI
Sonar’s code quality platform helps developers maintain secure, high-quality code amid the rise of artificial intelligence-based coding assistants, now expanding into the Asian market Continue Reading
By- Aaron Tan, TechTarget
-
News
11 Sep 2024
ICO and NCA sign MoU to provide joint support for cyber crime victims
UK data protection watchdog joins forces with law enforcement agency to provide more support for organisations that fall victim to cyber crime and ransomware attacks Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
10 Sep 2024
JFrog and GitHub unveil open source security integrations
Secure software specialist JFrog is working with code development service GitHub to integrate the onboard capabilities of its Software Supply Chain Platform service into GitHub’s platform Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Sep 2024
ANZ CIOs to prioritise cyber security investments in 2025
Cyber security remains high on the agenda for ANZ CIOs, followed by data analytics, cloud and generative AI Continue Reading
By- Aaron Tan, TechTarget