Category: ComputerWeekly

Securing the edge: A new battleground in mobile network security
23
Apr
2024

Securing the edge: A new battleground in mobile network security

Edge computing is no longer a mere concept; it’s a reality that’s reshaping industries and transforming how we approach mobile…

Questions for IT and cyber leaders from the CSRB Microsoft report
23
Apr
2024

Questions for IT and cyber leaders from the CSRB Microsoft report

In January of this year I was prompted by Microsoft’s admission of a successful attack by Russia-backed hacking group Midnight…

How data keeps Britain’s trains on track
23
Apr
2024

How data keeps Britain’s trains on track

Thank you for joining! Access your Pro+ Content below. 23 April 2024 How data keeps Britain’s trains on track Share…

Lords split over UK government approach to autonomous weapons
23
Apr
2024

Lords split over UK government approach to autonomous weapons

Lords are split in their opinions of the UK government’s approach to autonomous weapons, with some arguing for a much…

Controversial Post Office Capture system was developed in-house
23
Apr
2024

Expert investigating Capture system refuses to meet ‘untrustworthy’ Post Office

A former long-serving Post Office executive, who is campaigning for users of a second controversial Post Office IT system, has…

NetApp ‘unified storage’ adds new ASA block storage at Insight
23
Apr
2024

Five reasons why – and when – cloud storage is the answer

When it comes to data storage, public cloud is now firmly mainstream. According to a recent survey, close to a…

IT Sustainability Think Tank: Carbon accounting and the changing regulatory landscape
19
Apr
2024

IT Sustainability Think Tank: Sustainable innovation key to carbon emissions transparency

Demonstrating a commitment to sustainability is fast becoming a prerequisite for successful business partnerships, but many firms struggle to demonstrate…

International police operation infiltrates LabHost phishing website used by thousands of criminals
18
Apr
2024

International police operation infiltrates LabHost phishing website used by thousands of criminals

Police have shut down a web service used by more than 2,000 criminals worldwide to launch and manage phishing attacks….

Lords to challenge controversial DWP benefits bank account surveillance powers
18
Apr
2024

Lords to challenge controversial DWP benefits bank account surveillance powers

Members of the House of Lords are pressing for changes to legislation that will give the Department of Work and…

TUC publishes legislative proposal to protect workers from AI
18
Apr
2024

TUC publishes legislative proposal to protect workers from AI

The Trades Union Congress (TUC) has published a “ready-to-go” law for regulating artificial intelligence (AI) in the workplace, setting out…

What secure coding practices mean to modern cyber security
18
Apr
2024

Security Think Tank: Approaches to ransomware need a course correction

Back in 2015, my team and I were speaking at the government’s Security & Policing event in Farnborough. We had…

Attention-seeking KillNet hacktivists becoming more dangerous
18
Apr
2024

IT talent trap: How cloud skills suffer as a result of supplier lock-in

Supplier lock-in, especially at hyperscale level, is a fact of life in the cloud that can mean in-house skills wither…