Privacy and data protection
-
News
03 Mar 2025
Singapore’s HomeTeamNS hit by ransomware attack
The non-profit organisation suffered a ransomware attack that affected some servers containing employee and member data, prompting an investigation and enhanced security measures Continue Reading
By- Aaron Tan, TechTarget
-
News
23 Feb 2025
Check Point co-founder on AI, quantum and independence
Gil Shwed, Check Point’s co-founder and executive chairman, discusses the company’s focus on artificial intelligence-driven security and his commitment to remaining an independent force in the cyber security market Continue Reading
By- Aaron Tan, TechTarget
-
News
03 Mar 2025
Singapore’s HomeTeamNS hit by ransomware attack
The non-profit organisation suffered a ransomware attack that affected some servers containing employee and member data, prompting an investigation and enhanced security measures Continue Reading
By- Aaron Tan, TechTarget
-
News
26 Feb 2025
US intelligence chief Tulsi Gabbard probes UK demand for Apple’s encrypted data
A secret order issued by the UK against Apple would be a ‘clear and egregious violation’ if it provides back door access to Americans’ encrypted data, says US director of national intelligence Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
26 Feb 2025
CISOs spending more on insider risk
Insider risk management budgets have more than doubled in the past 12 months and look set to grow further still in 2025, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
26 Feb 2025
Everything, everywhere, all at once: automated decision-making in public services
Despite the UK government's fervent embrace of artificial intelligence, there is still little meaningful transparency around the scope of the technology's deployment throughout public services Continue Reading
By- Jasleen Chaggar, Big Brother Watch
-
Opinion
24 Feb 2025
UK businesses should look to Ireland amid EU cyber security overhaul
With a flourishing technology sector and a direct line to Brussels, investing in Ireland may be a sound bet for UK organisations looking to navigate Europe's transforming cyber landscape. Continue Reading
By- Anne-Marie Tierney-Le Roux, IDA Ireland
-
Opinion
24 Feb 2025
The need for secure data sharing: Lessons learned from public health
Privacy-enhancing technologies can help healthcare organisations build resilience against cyber threats while maintaining patient privacy, security and regulatory compliance. Continue Reading
By- Ronen Cohen, Duality Technologies
-
News
23 Feb 2025
Check Point co-founder on AI, quantum and independence
Gil Shwed, Check Point’s co-founder and executive chairman, discusses the company’s focus on artificial intelligence-driven security and his commitment to remaining an independent force in the cyber security market Continue Reading
By- Aaron Tan, TechTarget
-
News
21 Feb 2025
Apple withdraws encrypted iCloud storage from UK after government demands ‘back door’ access
After the Home Office issued a secret order for Apple to open up a backdoor in its encrypted storage, the tech company has instead chosen to withdraw the service from the UK Continue Reading
By- Bill Goodwin, Computer Weekly
-
E-Zine
20 Feb 2025
CW APAC – Trend Watch: CIO trends 2025
It will be no surprise to see artificial intelligence high on the agenda for 2025. In this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly looks at how banks are navigating technology, the continued importance of cyber security, and how enterprises can cement their AI future. Continue Reading
-
Opinion
20 Feb 2025
Privacy at a crossroads in the age of AI and quantum
The confluence of artificial intelligence and quantum computing magnifies the risk to privacy, data security and trust, says Gartner's Bart Willemsen Continue Reading
By- Bart Willemsen, Gartner
-
Feature
19 Feb 2025
Quantum computing in cyber security: A double-edged sword
Scepticism still abounds, but quantum computing stocks have boomed this year. In the world of cyber, however, quantum brings both unprecedented capabilities and significant threats, demanding careful attention Continue Reading
By -
News
19 Feb 2025
Warning over privacy of encrypted messages as Russia targets Signal Messenger
Russia is using phishing attacks to compromise encrypted Signal Messenger services used by targets in the Ukraine. Experts warn that other encrypted app users are at risk Continue Reading
By- Bill Goodwin, Computer Weekly
-
Feature
17 Feb 2025
AI models explained: The benefits of open source AI models
In this guide, we explore how to get started with open source AI models and go over how they support your enterprise IT strategy Continue Reading
By- Cliff Saran, Managing Editor
-
Opinion
16 Feb 2025
How to get employees to take cyber risk more seriously
To combat risky cyber security behaviour, organisations must move beyond awareness training and cultivate a culture where security violations are personally felt and socially unacceptable, leveraging existing values, real-world impacts, and even humour Continue Reading
By- Leigh McMullen
-
News
14 Feb 2025
Gartner: CISOs struggling to balance security, business objectives
Only 14% of security leaders can ‘effectively secure organisational data assets while also enabling the use of data to achieve business objectives’, according to Gartner Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Feb 2025
Lenovo CSO: AI adoption fuels security paranoia
Doug Fisher, Lenovo’s chief security officer, outlines the company’s approach to security and AI governance, and the importance of having a strong security culture to combat cyber threats amplified by the use of AI Continue Reading
By- Aaron Tan, TechTarget
-
News
14 Feb 2025
Government renames AI Safety Institute and teams up with Anthropic
Addressing the Munich Security Conference, UK government technology secretary Peter Kyle announces a change to the name of the AI Safety Institute and a tie-up with AI company Anthropic Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
14 Feb 2025
Top cryptography experts join calls for UK to drop plans to snoop on Apple’s encrypted data
Some of the world’s leading computer science experts have signed an open letter calling for home secretary Yvette Cooper to drop a controversial secret order to require Apple to provide access to people’s encrypted data Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
13 Feb 2025
UK accused of political ‘foreign cyber attack’ on US after serving secret snooping order on Apple
US administration asked to kick UK out of 65-year-old UK-US Five Eyes intelligence sharing agreement after secret order to access encrypted data of Apple users Continue Reading
By- Duncan Campbell , 2QQ Ltd, Sussex University
-
News
11 Feb 2025
Google: Cyber crime meshes with cyber warfare as states enlist gangs
A report from the Google Threat Intelligence Group depicts China, Russia, Iran and North Korea as a bloc using cyber criminal gangs to attack the national security of western countries Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
Definition
11 Feb 2025
What is Blowfish?
Blowfish is a variable-length, symmetric, 64-bit block cipher. Continue Reading
By -
News
10 Feb 2025
Apple: British techies to advise on ‘devastating’ UK global crypto power grab
A hitherto unknown British organisation – which even the government may have forgotten about – is about to be drawn into a global technical and financial battle, facing threats from Apple to pull out of the UK Continue Reading
By- Duncan Campbell , 2QQ Ltd, Sussex University
- Bill Goodwin, Computer Weekly
-
News
07 Feb 2025
Tech companies brace after UK demands back door access to Apple cloud
The UK has served a notice on Apple demanding back door access to encrypted data stored by users anywhere in the world on Apple’s cloud service Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
07 Feb 2025
US lawmakers move to ban DeepSeek AI tool
US politicians have introduced a bill seeking to ban the use of the DeepSeek AI tool on government-owned devices, citing national security concerns due to its alleged links to the Chinese state Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
07 Feb 2025
Self-healing networks: The next evolution in network management
The age of AI is highlighting the security risks and pitfalls of traditional network management techniques. Self-healing networks may offer a solution that not only bolsters security, but makes IT and network teams more efficient Continue Reading
By -
Definition
07 Feb 2025
What is cyber insurance, and why is it important?
Cyber insurance, also called cyber liability insurance or cybersecurity insurance, is a contract a business or other organization can purchase to reduce the financial risks associated with doing business online. Continue Reading
By- Cameron Hashemi-Pour, Former Site Editor
- Kinza Yasar, Technical Writer
-
News
05 Feb 2025
Met Police spied on BBC journalists’ phone data for PSNI, MPs told
The Metropolitan Police monitored the phones of 16 BBC journalists on behalf of police in Northern Ireland, a cross-party group of MPs heard Continue Reading
By- Bill Goodwin, Computer Weekly
- Cormac Kehoe
-
News
05 Feb 2025
Youth activists protest Meta over mental health impacts
Protest outside Meta’s London offices marks launch of Mad Youth Campaign, an effort by activists to challenge the ways in which corporate power negatively shapes the conditions young people live under Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
03 Feb 2025
New Relic extends observability to DeepSeek
The observability tools supplier now offers enhanced monitoring for DeepSeek models to help businesses reduce the costs and risks of generative AI development Continue Reading
By- Aaron Tan, TechTarget
-
News
03 Feb 2025
DeepSeek-R1 more readily generates dangerous content than other large language models
Research scientists at cyber firm Enkrypt AI publish concerning findings from a red team exercise conducted against DeepSeek, the hot new generative AI tool Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Feb 2025
Australian government doubles down on AWS
Federal government signs three-year whole-of-government agreement with Amazon Web Services, expanding access to cloud services for all levels of government Continue Reading
By- Aaron Tan, TechTarget
-
News
31 Jan 2025
Police swoop on Sky ECC cryptophone distributors in Spain and Holland
Dutch and Spanish police have arrested four people accused of making millions of euros by distributing Sky ECC encrypted phones to criminal organisations Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
31 Jan 2025
AI jailbreaking techniques prove highly effective against DeepSeek
Researchers at Palo Alto have shown how novel jailbreaking techniques were able to fool breakout GenAI model DeepSeek into helping to create keylogging tools, steal data, and make a Molotov cocktail Continue Reading
By- Alex Scroxton, Security Editor
-
News
31 Jan 2025
DeepSeek API, chat log exposure a ‘rookie’ cyber error
Security researchers at Wiz find a trove of DeepSeek data including API secrets and chat logs publicly exposed via an open source database management tool, raising questions about the fast-growing service’s approach to security Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
31 Jan 2025
What is biometrics?
Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics. Continue Reading
By- Cameron Hashemi-Pour, Former Site Editor
- Alexander S. Gillis, Technical Writer and Editor
- Peter Loshin, Former Senior Technology Editor
-
Opinion
29 Jan 2025
Data protection and consumer trust are the key to unlocking AI
The government is pushing a light touch to regulating AI training but the public have real concerns about data privacy Continue Reading
By- Miriam Everett, partner Herbert Smith Freehills
-
News
29 Jan 2025
Vallance rejects latest charge to reform UK hacking laws
Science minister Patrick Vallance rejects proposed amendments to the Computer Misuse Act, arguing that they could create a loophole for cyber criminals to exploit Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Jan 2025
Over 40 journalists and lawyers submit evidence to PSNI surveillance inquiry
Angus McCullough, who is leading a review into the police surveillance of journalists and lawyers in Northern Ireland, says victims will be informed if they were unlawfully spied on – subject to ‘legal constraints’ Continue Reading
By- Bill Goodwin, Computer Weekly
-
Feature
28 Jan 2025
EU law could usher in transformative change to digital ecosystems
The EU’s Digital Fairness Act aims to end exploitative practices online and enhance consumer protection, but civil society groups say it must address the power and information asymmetries between users and tech firms Continue Reading
-
Opinion
28 Jan 2025
Your first steps to improve international compliance
The Computer Weekly Security Think Tank considers how security leaders should best navigate the multitude of new national and multinational regulations affecting their work, and ensure their organisations remain compliant and protected Continue Reading
By -
Definition
28 Jan 2025
What is a hardware security module?
A hardware security module (HSM) is a physical device that provides extra security for sensitive data. Continue Reading
By- Rahul Awati
- Elizabeth Davies
- Cameron McKenzie, TechTarget
-
E-Zine
28 Jan 2025
Turbulent times ahead for tech
In this week’s Computer Weekly, the World Economic Forum in Davos highlighted growing risks to digital supply chains – we examine the turbulence ahead. Data sovereignty is becoming a growing issue as companies move to the cloud – we look at the regulatory challenges. And we analyse the best practices in automated patch management. Read the issue now. Continue Reading
-
News
27 Jan 2025
Three sentenced over OTP.Agency MFA fraud service
Three men have been sentenced over their role in a cyber criminal subscription service that offered access to online accounts using illicitly obtained one-time passcodes Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
27 Jan 2025
VMware backup: Key decision points if you migrate away from VMware
VMware’s pricing changes have spurred some organisations to move to new virtualisation environments, but they’ll need backing up. We look at the key points to consider Continue Reading
-
News
24 Jan 2025
US indicts five in fake North Korean IT contractor scandal
The US authorities have accused five men, including two American citizens, of involvement in a scheme which saw companies duped into hiring fake North Korean IT contractors Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Jan 2025
High Court: Sky Betting ‘parasitic’ in targeting problem gambler
UK High Court rules that Sky Betting acted unlawfully after breaching a customer’s data protection rights when it obtained his personal data through cookies and used it to profile him for the purposes of direct marketing, despite his ‘impaired’ ability to provide meaningful consent Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
23 Jan 2025
ICO launches major review of cookies on UK websites
ICO sets out 2025 goals, including a review of cookie compliance across the UK’s top 1,000 websites, as it seeks to achieve its ultimate goal of giving the public meaningful control over how their data is used Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
23 Jan 2025
Why run AI on-premise?
Much of artificial intelligence’s rapid growth has come from cloud-based tools. But there are very good reasons to host AI workloads on-premise Continue Reading
-
News
22 Jan 2025
Privacy professionals expect budget cuts, lack confidence
Over 50% of privacy professionals in Europe expect to see less money earmarked for data security initiatives in 2025, and many don’t have faith their organisations are taking the issue seriously, according to an ISACA report Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Jan 2025
Funksec gang turned up ransomware heat in December
The criminal ransomware fraternity was hard at work over the festive period, with attack volumes rising and a new threat actor emerging on the scene Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Jan 2025
Europol seeks evidence of encryption on crime enforcement as it steps-up pressure on Big Tech
Europol wants examples of police investigations hampered by end-to-end encryption as it pressures tech companies to provide law enforcement access to encrypted messages Continue Reading
By- Bill Goodwin, Computer Weekly
-
Definition
21 Jan 2025
What is a private key?
A private key, also known as a secret key, is a variable in cryptography used with an algorithm to encrypt or decrypt data. Continue Reading
By- Rahul Awati
- Peter Loshin, Former Senior Technology Editor
- Michael Cobb
-
E-Zine
21 Jan 2025
Will the UK become an AI powerhouse?
In this week’s Computer Weekly, we analyse the UK government’s new AI strategy and ask if the ambitious plans are achievable. The latest EU regulation affecting cyber security, called DORA, will affect digital resilience plans for many businesses – we examine the implications. We also look at the benefits and technologies behind cloud data lakes. Read the issue now. Continue Reading
-
News
17 Jan 2025
US Supreme Court upholds TikTok ban
The US Supreme Court has upheld a legal ban on TikTok, meaning that the video-sharing application will be shut down from midnight on Sunday 19 January Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
17 Jan 2025
Cyber innovation to address rising regulatory, threat burden
The Computer Weekly Security Think Tank considers how security leaders should best navigate the multitude of new national and multinational regulations affecting their work, and ensure their organisations remain compliant and protected Continue Reading
By- Nick New, Optalysys
-
News
16 Jan 2025
Biden signs new cyber order days before Trump inauguration
With days left in the White House, outgoing US president Joe Biden has signed a wide-ranging cyber security executive order with far-reaching implications Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 Jan 2025
Russia’s Star Blizzard pivots to WhatsApp in spear-phishing campaign
The Russian cyber spy operation known as Star Blizzard changed tactics after a takedown operation by Microsoft and the US authorities, turning to widely used messaging platform WhatsApp to try to ensnare its targets Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 Jan 2025
Davos 2025: Digital supply chains at risk as world faces two years of turbulence
World Economic Forum urges digital business leaders to build the resilience of supply chains, improve cyber defences and develop contingency plans Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
15 Jan 2025
Cyber security dovetails with AI to lead 2025 corporate IT investment
Cyber security and GenAI top enterprise IT investment plans for 2025, whether singly or together, according to research from Enterprise Strategy Group Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
15 Jan 2025
Users protest, flee TikTok as clock ticks on US ban
As the US Supreme Court prepares to rule on the future of TikTok, rumours of a sale are swirling around Washington DC while panicked users make plans for an exodus Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Jan 2025
Davos 2025: Misinformation and disinformation are most pressing risks, says World Economic Forum
World leaders, business chiefs and civil society organisations will discuss the risks posed by misinformation, disinformation and artificial intelligence at the World Economic Forum Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
14 Jan 2025
Barings Law enleagues 15,000 claimants against Google and Microsoft
Barings Law has signed up 15,000 claimants in a data breach suit against Microsoft and Google. The firm says the tech giants use personal data without proper consent to train AI models Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
E-Zine
14 Jan 2025
Generating customer experience at NatWest Bank
In this week’s Computer Weekly, we find out how NatWest Bank is using generative AI to enhance its customer experience. Our latest buyer’s guide examines the emerging regulatory compliance environment affecting IT leaders. And we learn how Toyota is turning to automation to improve its helpdesk support service for employees. Read the issue now. Continue Reading
-
Opinion
13 Jan 2025
Why we need better cyber regulation to protect the UK from disruption
The Computer Weekly Security Think Tank considers how security leaders should best navigate the multitude of new national and multinational regulations affecting their work, and ensure their organisations remain compliant and protected. Continue Reading
By- Adam Stringer, PA Consulting
-
Feature
13 Jan 2025
Preparing for AI regulation: The EU AI Act
The EU AI Act builds on existing cyber security, privacy and data governance regulations such as GDPR Continue Reading
By- Cliff Saran, Managing Editor
-
News
10 Jan 2025
US bank FNBO uses Pindrop to tackle voice fraud, deepfakes
Learn how First National Bank of Omaha in the US is enhancing customer authentication and verification in its contact centres, eliminating friction points and making life easier for its customer service teams, with Pindrop voice security technology Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Jan 2025
German court finds hacked EncroChat phone evidence inadmissible
The Berlin Regional Court has found that evidence obtained by a joint French and Dutch operation to hack the EncroChat encrypted mobile phone network is legally inadmissible, raising questions about its use in other European countries Continue Reading
By- Bill Goodwin, Computer Weekly
-
Opinion
07 Jan 2025
Why CISOs should build stronger bonds with the legal function in 2025
The Computer Weekly Security Think Tank considers how security leaders should best navigate the multitude of new national and multinational regulations affecting their work, and ensure their organisations remain compliant and protected. Continue Reading
By- Mandy Andress, Elastic
-
News
07 Jan 2025
Saudi Arabia calls for humanitarian AI after tightening screws on rights protesters
Oppressive state wants global digital identity system at the heart of all AI, to make it trustworthy and prevent it being used for ‘unauthorised surveillance’ Continue Reading
By -
News
31 Dec 2024
Top 10 surveillance, journalism and encryption stories of 2024
Revelations of covert and unlawful monitoring of journalists and their confidential sources by the Police Service of Northern Ireland and the Metropolitan Police attracted a huge amount of attention this year Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
27 Dec 2024
Top 10 ANZ stories of 2024
The 2024 tech landscape in Australia and New Zealand was dotted with developments spanning cloud migrations and AI adoption to heightened data security and real-time data streaming Continue Reading
By- Aaron Tan, TechTarget
-
News
24 Dec 2024
Top 10 police technology stories of 2024
Here are Computer Weekly’s top 10 police technology stories of 2024 Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Definition
23 Dec 2024
What is a public key and how does it work?
In cryptography, a public key is a large numerical value that is used to encrypt data. Continue Reading
By -
News
20 Dec 2024
Top 10 data and ethics stories of 2024
Here are Computer Weekly’s top 10 data and ethics stories of 2024 Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
18 Dec 2024
The Security Interviews: Martin Lee, Cisco Talos
Threat intel expert and author Martin Lee, EMEA technical lead for security research at Cisco Talos, joins Computer Weekly to mark the 35th anniversary of the first ever ransomware attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Dec 2024
Top 10 cyber security stories of 2024
Data breaches, data privacy and protection, and the thorny issue of open source security were all hot topics this year. Meanwhile, security companies frequently found themselves hitting the headlines, and not always for good reasons. Here are Computer Weekly's top 10 cyber security stories of 2024 Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
18 Dec 2024
Look to the future: How the threat landscape may evolve next
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Elliott Wilkes, ACDS
-
News
18 Dec 2024
Top 10 cyber crime stories of 2024
From ransomware targeting the NHS to nation-state-backed intrusions, 2024 was another big year for cyber criminals and cyber spooks alike, but they didn't have it all their own way as the good guys fought back Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
17 Dec 2024
2025-30: Geopolitical influence on cyber and the convergence of threat
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Rob Dartnall, SecAlliance
-
Opinion
17 Dec 2024
Using AI to build stronger client relationships in 2025
On the Twelfth Day of AI, we explore the key benefits of Copilot, the potential risks, barriers to adoption, and strategies for ensuring successful implementation. Continue Reading
By- Josie Rickerd, ANS
-
News
17 Dec 2024
Conservative MP adds to calls for public inquiry over PSNI police spying
Conservative MP David Davis calls for a public inquiry following a court ruling that the PSNI and Metropolitan Police unlawfully placed journalists under electronic surveillance Continue Reading
By- Bill Goodwin, Computer Weekly
- Cormac Kehoe
-
News
17 Dec 2024
Digital Ethics Summit 2024: recognising AI’s socio-technical nature
At trade association TechUK’s eighth annual Digital Ethics Summit, public officials and industry figures and civil society groups met to discuss the ethical challenges associated with the proliferation of artificial intelligence tools globally and the direction of travel set for 2025 Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
17 Dec 2024
Tribunal criticises PSNI and Met Police for spying operation to identify journalists’ sources
The Investigatory Powers Tribunal has criticised the Police Service of Northern Ireland and the Metropolitan Police for unlawfully spying on journalists Continue Reading
By- Bill Goodwin, Computer Weekly
-
E-Zine
17 Dec 2024
Technology on the beat
In this week’s Computer Weekly, we examine the future of technology in policing as the Home Office announces plans for a new IT organisation. We look at the security risks from employees using publicly available generative AI tools in the workplace. And we hear how Hyatt Hotels is creating a data culture across the organisation. Read the issue now. Continue Reading
-
Opinion
16 Dec 2024
Private vs public AI: Which should your business use in 2025?
On the Eleventh Day of AI, we explore the differences between private and public AI, the key benefits and downsides of private AI, future trends, and how to get started with a hybrid AI approach. Continue Reading
By- Chris Folkerd, ANS
-
Opinion
13 Dec 2024
Decoding the end of the decade: What CISOs should watch out for
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Paul Lewis, Nominet
-
News
13 Dec 2024
Computer Misuse Act reform gains traction in Parliament
An amendment to the proposed Data (Access and Use) Bill that will right a 35-year-old wrong and protect security professionals from criminalisation is to be debated at Westminster Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
12 Dec 2024
CISOs: Don’t rely solely on technical defences in 2025
From Covid-19 to war in Ukraine, SolarWinds Sunburst, Kaseya, Log4j, MOVEit and more, the past five years brought cyber to mainstream attention, but what comes next? The Computer Weekly Security Think Tank looks ahead to the second half of the 2020s Continue Reading
By- Deepti Gopal, Gartner
-
News
12 Dec 2024
Emerging Ymir ransomware heralds more coordinated threats in 2025
A newly observed ransomware strain has the community talking about more collaboration, and blurred lines, between threat groups next year, according to NCC’s monthly cyber barometer Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Dec 2024
Russia focuses cyber attacks on Ukraine rather than West despite rising tension
Computer Weekly talks to GCHQ’s National Cyber Security Centre operations director Paul Chichester and former NCSC chief executive Ciaran Martin on Russia, China and Salt Typhoon Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
10 Dec 2024
Dangerous CLFS and LDAP flaws stand out on Patch Tuesday
Microsoft has fixed over 70 CVEs in its final Patch Tuesday update of the year, and defenders should prioritise a zero-day in the Common Log File System Driver, and another impactful flaw in the Lightweight Directory Access Protocol Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Dec 2024
iOS vuln leaves user data dangerously exposed
Jamf threat researchers detail an exploit chain for a recently patched iOS vulnerability that enables a threat actor to steal sensitive data, warning that many organisations are still neglecting mobile updates Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
10 Dec 2024
Defending against cyber grinches: AI for enhanced security
On the Seventh Day of AI, Defending against cyber grinches: AI for enhanced security, we explore the double-edged sword of AI in cybersecurity and how businesses can protect themselves against the cyber grinches. Continue Reading
By- Justin Young, ANS
-
Definition
10 Dec 2024
What is a block cipher?
A block cipher is a method of encrypting data in blocks to produce ciphertext using a cryptographic key and algorithm. Continue Reading
By -
Definition
10 Dec 2024
What is a stream cipher?
A stream cipher is an encryption method in which data is encrypted one byte at a time. Continue Reading
By -
News
10 Dec 2024
UK police continue to hold millions of custody images unlawfully
Annual report from the biometrics and surveillance camera commissioner of England and Wales highlights the ongoing and unlawful retention millions of custody images of innocent people never charged with a crime by police Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
10 Dec 2024
DWP ‘fairness analysis’ reveals bias in AI fraud detection system
Information about people’s age, disability, marital status and nationality influences decisions to investigate benefit claims for fraud, but the Department for Work and Pensions says there are ‘no immediate concerns of unfair treatment’ Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
09 Dec 2024
AI and cloud: The perfect pair to scale your business in 2025
On the Sixth Day of AI, we explore how leveraging AI and cloud can enhance business performance and shares tips for successful implementation. Continue Reading
By- Matt Gallagher, ANS
-
Definition
09 Dec 2024
What is a session key?
A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session between a user and another computer or between two computers. Continue Reading
By -
Definition
09 Dec 2024
What is cipher block chaining (CBC)?
Cipher block chaining (CBC) is a mode of operation for a block cipher -- one in which a sequence of bits are encrypted as a single unit, or block, with a cipher key applied to the entire block. Continue Reading
By