Category: ComputerWeekly

How Chinese-owned Radisson Hotel Group split US enterprise resource planning
09
Dec
2025

How Chinese-owned Radisson Hotel Group split US enterprise resource planning

Among the interesting discussions taking place during this year’s annual UKISUG 25 conference was how much SAP customisation is actually…

Digital sovereignty about outcomes, not theoretical ideals
09
Dec
2025

Digital sovereignty about outcomes, not theoretical ideals

The conversation around digital sovereignty is gaining momentum worldwide. In today’s climate of geopolitical uncertainty and technological competition, it is…

Why bug bounty schemes have not led to secure software
09
Dec
2025

Why bug bounty schemes have not led to secure software

Governments should make software companies liable for developing insecure computer code. So says Katie Moussouris, the white hat hacker and security…

Post Office extends controversial Fujitsu contract in £41m deal
09
Dec
2025

Fujitsu underestimated Post Office scandal backlash

HM Revenue and Customs (HMRC) has replaced a consortium led by Fujitsu on its post-Brexit trading service for Northern Ireland,…

Supporting sustainability in IT
09
Dec
2025

Supporting sustainability in IT

Thank you for joining! Access your Pro+ Content below. 9 December 2025 Supporting sustainability in IT Share this item with…

Ethical hackers can be heroes: It's time for the law to catch up
09
Dec
2025

Ethical hackers can be heroes: It’s time for the law to catch up

The last year has seen some of the costliest cyber attacks on UK businesses to date. Attacks on Marks &Spencer…

Popular LLMs dangerously vulnerable to iterative attacks, says Cisco
09
Dec
2025

NCSC warns of confusion over true nature of AI prompt injection

The UK’s National Cyber Security Centre (NCSC) has highlighted a potentially dangerous misunderstanding surrounding emergent prompt injection attacks against generative…

How police live facial recognition subtly reconfigures suspicion
08
Dec
2025

How police live facial recognition subtly reconfigures suspicion

Police use of live facial recognition (LFR) technology reconfigures suspicion in subtle yet important ways, undermining so-called human-in-the-loop safeguards. Despite…

Subpostmaster was told no jury would believe Post Office had ‘dodgy computer’
08
Dec
2025

Forrester: The role of internal developer platforms in DevOps

DevOps adoption has been going on for a decade and shows no signs of slowing. In Forrester’s 2024 developer experience…

Cyber teams on alert as React2Shell exploitation spreads
05
Dec
2025

Cyber teams on alert as React2Shell exploitation spreads

A remote code execution (RCE) vulnerability in the React JavaScript library, which earlier today caused disruption across the internet as…

Cloudflare fixes second outage in a month
05
Dec
2025

Cloudflare fixes second outage in a month

Cloudflare has successfully recovered its services after a second outage in the space of three weeks briefly took down Cloudflare…

Scattered Spider cyber gang turns fire on aviation sector
05
Dec
2025

Edinburgh Airport grounds flights due to IT issue affecting air traffic control provider

Flights to and from Edinburgh Airport are continuing to be beset by delays, after an undisclosed IT issue grounded passengers…