- — Norway and Nordic financial sector ramps up cyber security
- Finans Norge sets up cyber security unit CTSU to support the finance sector in Norway amid increasing threats
- — Banks to share fraud data with tech firms in cross-sector collaboration
- UK banks join tech firms in fraud data-sharing initiative to enable collaboration on action to stop online scams
- — Taking a ‘good enough’ approach with cloud security isn't enough
- In the wake of the January 2025 'Codefinger' attacks against AWS S3 users, Thales Rob Elliss argues that many organisations are dropping the ball when it comes to their understanding of cloud security best practice
- — Apple’s appeal to the Investigatory Powers Tribunal over the UK’s encryption ‘back door’ explained
- No more information available.
- — What is a uniform resource identifier (URI)?
- No more information available.
- — Keysight introduces AI network architecture validation, optimisation tool
- No more information available.
- — What is an initialization vector?
- No more information available.
- — Gmail ‘bubble’ encryption may be an S/MIME killer, says Google
- No more information available.
- — Top 1,000 IT service providers in scope of UK cyber bill
- The government’s proposed Cyber Security and Resilience Bill is set to include regulatory provisions covering both datacentre operators and larger IT service providers
- — What is a hacker?
- A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.
- — Countering nation-state cyber espionage: A CISO field guide
- The rise of DeepSeek has prompted the usual well-documented concerns around AI, but also raised worries about its potential links to the Chinese state. The Security Think Tank considers the steps security leaders can take to counter threats posed by nation state industrial espionage?
- — Surging cyber threats drive IT directors to decentralised networks
- As directors increasingly recognise the threats posed by increasingly sophisticated, AI-driven cyber attacks, risks are being mitigated by changes in physical infrastructure networks, research finds
- — Research team demonstrates certified quantum randomness
- A 56-qubit trapped ion quantum computer from Quantinuum has demonstrated quantum supremacy as a random number generator
- — Advanced Software fined £3m over LockBit attack
- The ICO has issued a £3m fine to software provider Advanced in the wake of security failings that led to significant disruption to NHS customers in a ransomware attack
- — What is a web application firewall (WAF)? WAF explained
- A web application firewall (WAF) is a firewall that is meant to protect web applications against common web-based threats.
- — Gartner on agentic AI: A Computer Weekly Downtime Upload podcast
- We speak to Gartner’s Anushree Verma about the route from robotic process automation to agentic AI in corporate IT
- — Public Accounts Committee calls out legacy IT
- Unsupported and out-of-date software and hardware are hindering the government’s artificial intelligence plans for the public sector
- — Nokia, Numana, Honeywell Aerospace team to advance quantum-safe networks
- Collaboration designed to drive innovation and enable a global post-quantum security economy for enterprises using quantum key distribution and advanced cryptographic network technologies to safeguard digital infrastructure
- — ETSI launches first post-quantum encryption standard
- European telco standards body launches its first post-quantum cryptography cyber standard, covering the security of critical data and communications
- — Tech specialist files legal claim after being refused security clearance for MI6 role
- An IT specialist has asked the Investigatory Powers Tribunal to investigate a series of hacking incidents after disclosing their social media accounts to MI6 vetting staff
- — Why I am challenging Yvette Cooper’s ‘secret backdoor’ order against Apple’s encryption
- No more information available.
As of 4/4/25 9:24am. Last new 4/4/25 9:24am.
- Next feed in category: TMC