Category: ComputerWeekly

Why we need a secure side door for encrypted apps, not a back door  
16
May
2023

Why we need a secure side door for encrypted apps, not a back door  

There has been a significant uptick in interest in e2e encryption as the UK Government tries to establish “back doors”…

Interview: Rachel Phillips, vice-president UK&I, Okta
16
May
2023

Interview: Rachel Phillips, vice-president UK&I, Okta

Since the Covid-19 pandemic forced many people to work from home in 2020 and beyond, spending five days a week…

Microsoft and Google go into battle for enterprise AI
16
May
2023

Microsoft and Google go into battle for enterprise AI

Thank you for joining! Access your Pro+ Content below. 16 May 2023 Microsoft and Google go into battle for enterprise…

Demand for access to talent driving UK IT outsourcing growth
15
May
2023

Demand for access to talent driving UK IT outsourcing growth

Increasing demand for IT talent is driving the IT outsourcing sector, with 63% of UK organisations planning to continue outsourcing…

What secure coding practices mean to modern cyber security
15
May
2023

Security Think Tank: To secure code effectively, verify at every step

By Published: 15 May 2023 It’s been quite a while since I dd any actual coding and while I have…

MS macro-blocking has forced cyber criminals to innovate
15
May
2023

MS macro-blocking has forced cyber criminals to innovate

Microsoft’s attempt to thwart malicious actors from tricking users into executing malware and ransomware, by blocking Visual Basic for Applications…

Online sales suffer as consumers hit shops for bargains
15
May
2023

Online sales suffer as consumers hit shops for bargains

The cost of living is having an impact on online sales as consumers seek out better prices in stores, according…

Post Office executive told to report false bill of health on controversial software
15
May
2023

Post Office executive told to report false bill of health on controversial software

The Post Office commissioned an internal report on the performance of its controversial Horizon system in 2010, setting out to…

What secure coding practices mean to modern cyber security
12
May
2023

What secure coding practices mean to modern cyber security

The world as we know it is comprised of layers upon layers of carefully connected technology, found in everything from…

IT Priorities 2023: Business automation intensifies as data governance returns
12
May
2023

IT Priorities 2023: Business automation intensifies as data governance returns

Accelerated business automation, a rediscovery of data governance and a significant shift to customer experience activities are highlights of enterprise software…

MEPs vote in raft of amendments to EU AI Act
12
May
2023

MEPs vote in raft of amendments to EU AI Act

MEPs in two European Parliament committees have overwhelmingly voted for a raft of amendments to the Artificial Intelligence Act (AIA),…

Let’s put an end to secrecy and cover-ups in ransomware attacks
12
May
2023

Let’s put an end to secrecy and cover-ups in ransomware attacks

The UK’s National Cyber Security Centre (NCSC), and the Information Commissioner’s Office (ICO), have banded together to urge those affected…