Category: ComputerWeekly

Police Digital Service board director quits several months after CISO departs
23
Jul
2025

Predictive analytics in policing: Weighing up the pros and cons

Despite fears of surveillance state activities reminiscent of dark sci-fi stories, police hope predictive analytics developments will help them to…

CMA prepares roadmap ahead of Apple and Google SMS decision
23
Jul
2025

CMA prepares roadmap ahead of Apple and Google SMS decision

The Competition and Markets Authority (CMA) has published a set of proposals and a roadmap outlining actions it will take…

Disaster recovery: As-a-service vs on-premise?
23
Jul
2025

Disaster recovery: As-a-service vs on-premise?

Enterprise options for disaster recovery (DR) have changed significantly over the past decade. Cloud computing and low-cost cloud storage has…

British hacker IntelBroker faces years in a US prison cell
23
Jul
2025

Judge questions HP’s ‘exaggerated’ Autonomy loss claim

HP’s valuation of Autonomy, the company it acquired in 2011 for $11bn and took a $5bn financial hit on in…

Interview: Is there an easier way to refactor applications?
23
Jul
2025

Interview: Is there an easier way to refactor applications?

Looking at a typical Java migration, Jonathan Schneider, CEO and co-founder of Moderne, believes the approach organisations tend to take…

Evidence reveals Post Office scandal victims short-changed in compensation payouts
23
Jul
2025

Subpostmasters shoulder costs of Fujitsu’s Post Office IT outage

Subpostmasters lost hundreds of thousands of pounds in business through lost sales and costs when Fujitsu’s datacentre outage cut them…

Business resilience needs comprehensive approach
23
Jul
2025

Business resilience needs comprehensive approach

In Britain, describing Marks & Spencer (M&S) as a high-profile retailer is akin to describing King Charles III as a…

Chinese cyber spies among those linked to SharePoint attacks
22
Jul
2025

Chinese cyber spies among those linked to SharePoint attacks

An as-yet unnamed Chinese state threat actor appears to be among those exploiting CVE-2025-53770 (aka ToolShell), a remote code execution vulnerability…

Overconfidence in cyber security: a silent catalyst for CNI breaches
22
Jul
2025

Overconfidence in cyber security: a silent catalyst for CNI breaches

Critical National Infrastructure (CNI) lies at the heart of modern society, powering essential systems vital for daily life. Yet, it…

Widening Middle Eastern war increases cyber risk
22
Jul
2025

Microsoft confirms China link to SharePoint hacks

Microsoft has revealed that Chinese state threat actors are actively targeting and exploiting a highly-dangerous new zero-day vulnerability in SharePoint…

Artificial intelligence to initiate and manage litigations after ‘landmark’ approval
22
Jul
2025

UK government to bring in ransomware payment ban

Hospitals and other public health bodies, public sector organisations such as councils and schools, and operators of critical national infrastructure…

BBVA creates ChatGPT Store and expands use of the GenAI tool
22
Jul
2025

Interview: How OpenAI is making ChatGPT public and private sector-ready

OpenAI’s mission statement is focused on building artificial general intelligence (AGI) to benefit everyone. It has now signed a strategic…