- — Taking a ‘good enough’ approach with cloud security isn't enough
- In the wake of the January 2025 'Codefinger' attacks against AWS S3 users, Thales Rob Elliss argues that many organisations are dropping the ball when it comes to their understanding of cloud security best practice
- — Apple’s appeal to the Investigatory Powers Tribunal over the UK’s encryption ‘back door’ explained
- No more information available.
- — What is a uniform resource identifier (URI)?
- No more information available.
- — Keysight introduces AI network architecture validation, optimisation tool
- No more information available.
- — What is an initialization vector?
- No more information available.
- — Gmail ‘bubble’ encryption may be an S/MIME killer, says Google
- No more information available.
- — Top 1,000 IT service providers in scope of UK cyber bill
- No more information available.
- — What is a hacker?
- No more information available.
- — Countering nation-state cyber espionage: A CISO field guide
- No more information available.
- — Surging cyber threats drive IT directors to decentralised networks
- No more information available.
- — Research team demonstrates certified quantum randomness
- No more information available.
- — Advanced Software fined £3m over LockBit attack
- No more information available.
- — What is a web application firewall (WAF)? WAF explained
- No more information available.
- — Gartner on agentic AI: A Computer Weekly Downtime Upload podcast
- No more information available.
- — Public Accounts Committee calls out legacy IT
- No more information available.
- — Nokia, Numana, Honeywell Aerospace team to advance quantum-safe networks
- No more information available.
- — ETSI launches first post-quantum encryption standard
- No more information available.
- — Tech specialist files legal claim after being refused security clearance for MI6 role
- No more information available.
- — Why I am challenging Yvette Cooper’s ‘secret backdoor’ order against Apple’s encryption
- No more information available.
- — Why I am challenging Yvette Cooper’s ‘secret back door’ order against Apple’s encryption
- No more information available.
- — Will DeepSeek force us to take application security seriously?
- No more information available.
As of 4/3/25 3:49pm. Last new 4/3/25 10:53am.
- Next feed in category: TMC