Regulatory compliance and standard requirements
-
News
07 Nov 2025
Popular LLMs dangerously vulnerable to iterative attacks, says Cisco
Cisco researchers probed some of the most widely used public GenAI LLMs and found many of them were dangerously susceptible to so-called multi-turn cyber attacks producing undesirable outputs Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
07 Nov 2025
Resilience for resilience: Managing burnout among cyber leaders
The Computer Weekly Security Think Tank considers the burdens and responsibilities that accompany the role of chief information security officer, and share guidance on how to navigate a challenging career path. Continue Reading
-
News
07 Nov 2025
Industry calls for clarity on government digital ID plans
The digital identity industry asks UK government for transparency on its digital identity scheme and proposes a formal collaboration agreement Continue Reading
By -
News
05 Nov 2025
Dutch boardroom cyber security knowledge gap exposed
Cyber security governance professor warns that executives lack the capability to assess cyber threats in implementation approaches Continue Reading
By- Kim Loohuis
-
News
04 Nov 2025
Ryt Bank taps agentic AI for conversational banking
Malaysia’s Ryt Bank is using its own LLM and agentic AI framework to allow customers to perform banking transactions in natural language, replacing traditional menus and buttons Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
04 Nov 2025
The Security Interviews: Colin Mahony, CEO, Recorded Future
Recorded Future’s CEO talks threat intelligence, AI in cyber security and the ever-changing cyber threat landscape Continue Reading
By -
News
04 Nov 2025
Nordic investors drive investment in region’s defence sector
Slush Startup in Helsinki will feature dual-use, defence and security events that bring suppliers together Continue Reading
By- Gerard O'Dwyer
-
News
04 Nov 2025
UAE Sovereign Launchpad begins nationwide roll-out with support from e& and AWS
The cloud infrastructure platform aims to strengthen digital resilience and regulatory compliance across government and regulated sectors in the United Arab Emirates Continue Reading
By- Andrea Benito , Computer Weekly
-
News
04 Nov 2025
Fewer data breaches in Australia, but human error now a bigger threat
Australian privacy commissioner warns that the human factor is a growing threat as notifications caused by staff mistakes rose significantly even as total breaches declined 10% from a record high Continue Reading
By- Aaron Tan, Informa TechTarget
-
Opinion
03 Nov 2025
CISOs in court: Balancing cyber resilience and legal accountability
The Computer Weekly Security Think Tank considers the burdens and responsibilities that accompany the role of chief information security officer, and share guidance on how to navigate a challenging career path. Continue Reading
By- Aditya K Sood, Aryaka
-
Opinion
03 Nov 2025
Just weeks left until Companies House ID changes: how to prepare
Just over two weeks remain before Companies House starts enforcing new digital identity verification procedures for company directors, but there's still time to get ready. Continue Reading
By- Tim Barnett, Credas Technologies
-
News
29 Oct 2025
Rapid7: Cyber defences stuck in the 1980s as threats mount
The company’s chief product officer notes that many defence tactics are still stuck in the past, urging organisations to adopt AI-driven security platforms to improve threat detection and response Continue Reading
-
News
29 Oct 2025
Scope of US state-level privacy laws expands rapidly in 2025
Nine state-level data protection laws have come into force in the US this year, and three more are slated for January 2026. Navigating this complex landscape is becoming a challenge Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Oct 2025
Effective cyber sanctions require a joined-up approach, says Rusi
Calling out and sanctioning cyber threat actors can be an effective tool, but is not a universal panacea, and needs to be considered as part of a wider, strategic approach, say Rusi think tank analysts Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
27 Oct 2025
Use second-layer tools for AI safety
While some enterprises find it difficult to adopt AI, they can now use second-layer AI tools that enable businesses to implement the technology safely Continue Reading
By- Sooyeon Kim
-
News
27 Oct 2025
Hamas lawyer seeks appeal following police’s seizure of his phone at Welsh port
Police say that solicitors cannot have a ‘cast iron defence’ to protect their electronic devices from ever being searched Continue Reading
By -
News
23 Oct 2025
Amid CISA cuts, US state launches first VDP
Legislators in Annapolis, Maryland, have teamed up with Bugcrowd to launch a statewide vulnerability disclosure programme Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Oct 2025
Ministry of Justice’s OpenAI deal paves way to sovereign AI
OpenAI has been busy signing deals with the UK government to bolster UK artificial intelligence. It’s now launching data residency for UK customers Continue Reading
By- Cliff Saran, Managing Editor
-
Opinion
23 Oct 2025
The US government shutdown is a wake-up call for cyber self-reliance
As the US government shutdown heads towards a second month, could the disruption to cyber security programmes be the impetus end-users need to pull themselves up by their own bootstraps? Continue Reading
By- John Paul Cunningham, Silverfort Inc
-
News
23 Oct 2025
Business leaders raise concerns over public cloud data sovereignty
The unpredictable geopolitical climate is having an impact on IT strategies, a report from Kyndryl has found Continue Reading
By- Cliff Saran, Managing Editor
-
News
22 Oct 2025
Singapore unveils efforts to govern agentic AI, prepare for post-quantum era
Guidelines and tools will help organisations in the city-state manage risks from AI agents and prepare for a future where quantum computers could break current encryption Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
22 Oct 2025
Jaguar Land Rover attack to cost UK £1.9bn, say cyber monitors
The UK's Cyber Monitoring Centre calculates the overall cost of the Jaguar Land Rover cyber attack will be almost two billion pounds Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Oct 2025
Building security and trust in AI agents
AI agents require standardised guidelines, clear human responsibility and a shared language between developers and policymakers to be secure and trusted, experts say Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
21 Oct 2025
New cyber resilience centre to help SMEs fend off cyber threats
Spearheaded by the Singapore Business Federation, the cyber resilience centre will equip SMEs in the city-state with cyber security capabilities to mitigate and recover from cyber attacks Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
20 Oct 2025
France’s Atos eyes UK public sector with investment in secure UK infrastructure
French IT services supplier invests in highly secure and accredited UK-based infrastructure Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
16 Oct 2025
Microsoft identifies boardroom cyber awareness as a top priority
Digital security report urges IT leaders to convince company boards that cyber security is a board-level problem Continue Reading
By- Cliff Saran, Managing Editor
-
News
16 Oct 2025
Securing the AI era: Huawei’s cyber security strategy for the GCC
At Gitex 2025, Sultan Mahmood, chief security officer for Huawei Gulf North, outlined how the company supports GCC digital sovereignty, AI security, and enterprise cyber resilience Continue Reading
By- Andrea Benito , Computer Weekly
-
News
15 Oct 2025
ICO fines Capita £14m after ransomware caused major data breach
Outsourcing giant hit with £14m fine over 2023 cyber attack, but costs could rise as legal actions continue Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
15 Oct 2025
Obsession with cyber breach notification fuelling costly mistakes
The race to meet security breach notification deadlines is leading to staff burnout, destroyed evidence and a culture of blame, warns a Trend Micro risk and security strategist Continue Reading
-
News
07 Oct 2025
The Security Interviews: David Bradbury, CSO, Okta
Okta’s chief security officer talks security by default and explains why he thinks time is running out for the shared responsibility model Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
07 Oct 2025
Building resilience in the cloud: Bridging SLA gaps and mitigating risk
The Computer Weekly Security Think Tank considers how security leaders can help assure access to the new and innovative cloud tech while minimising risk and ensuring they do not fall foul of regulators. Continue Reading
By- Vaibhav Dutta, Tata Communications
-
News
06 Oct 2025
Police ordered to give reasons in closed court for seizing phone of UK Hamas lawyer
London court orders police to disclose reasons for seizing and copying the contents of a phone belonging to a UK lawyer who represented Hamas, but refuses an injunction to prevent police from reviewing the phone until after judicial review Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
06 Oct 2025
Data sovereignty demand pushes Herabit to get S3 storage
Italian service provider gets Cubbit DS3 distributed S3 storage to provide up to 2PB of cloud services to customers demanding data sovereignty, while cutting costs by up to 50% Continue Reading
By- Antony Adshead, Computer Weekly
-
News
02 Oct 2025
PSNI appoints legal counsel to report on police conduct after McCullough surveillance review
The Police Service of Northern Ireland has commissioned a senior lawyer to report back on whether there was any misconduct by police officers following the McCullough Review into the surveillance of journalists, lawyers and NGOs Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
01 Oct 2025
Home Office issues new ‘backdoor’ order over Apple encryption
A second Home Office technical capability notice requires Apple to provide access to encrypted data and messages of British users stored on its iCloud service Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
01 Oct 2025
US government shutdown stalls cyber intel sharing
A key US law covering cyber security intelligence sharing has expired without an extension or replacement amid a total shutdown of the federal government, putting global security collaboration at risk. Continue Reading
By- Alex Scroxton, Security Editor
-
News
01 Oct 2025
EU Chat Control plans pose ‘existential catastrophic risk’ to encryption, says Signal
As EU member states prepare to vote on plans to mandate tech companies to introduce technology to scan messages before they are encrypted, Signal warns that Chat Control will create new security risks Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
30 Sep 2025
MPs press outsourcer TCS over Jaguar cyber attack
The government’s cross-bench Business and Trade Committee has written to Tata Consultancy Services seeking answers over possible links to cyber attacks on Jaguar Land Rover, Marks and Spencer, and Co-op Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Sep 2025
JLR tentatively restarts production, following £1.5bn government backing
Jaguar Land Rover is to resume car production after a £1.5bn government loan guarantee amid its cyber attack fallout. Debate is growing over the bailout and insurance Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
26 Sep 2025
Over half of India-based companies suffer security breaches
Business supply chains, which include Indian companies, are at risk of attack as more than half of suppliers were breached last year Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
26 Sep 2025
Microsoft hides key data flow information in plain sight
Microsoft’s own documentation confirms that data hosted in its hyperscale cloud architecture routinely traverses the globe, but the tech giant is actively obfuscating this vital information from its UK law enforcement customers Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
26 Sep 2025
Okta CEO: AI security and identity security are one and the same
At Oktane 2025 in Las Vegas, Okta CEO Todd McKinnon describes AI security and identity security as inseparable as he tees up a series of agentic security innovations Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Sep 2025
Netherlands establishes cyber resilience network to strengthen public-private digital defence
Network will connect organisations in a cyber crime defence initiative that goes way beyond information sharing Continue Reading
By- Kim Loohuis
-
News
24 Sep 2025
McCullough Review finds PSNI failures but no ‘systemic’ surveillance of journalists
A review by Angus McCullough KC reveals that Northern Ireland police failed to comply with the law but that there was no ‘widespread and systemic’ surveillance of journalists, lawyers and NGOs Continue Reading
By- Bill Goodwin, Investigations Editor
-
Definition
23 Sep 2025
What is SOX compliance? A complete guide and checklist
SOX compliance entails adhering to the Sarbanes-Oxley Act of 2002, a U.S. law introduced to enhance investor protection by ensuring greater accuracy, transparency and accountability in public companies' financial reporting. Continue Reading
By- Kinza Yasar, Technical Writer
-
News
23 Sep 2025
‘Our worst day’: The untold story of the Electoral Commission cyber attack
As head of digital at The Electoral Commission, Andrew Simpson’s mettle was tested when threat actors gained access to the regulator’s email systems and accessed sensitive voter data. Three years on, he tells his story to Computer Weekly Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
23 Sep 2025
Angus McCullough’s review: A reckoning for the PSNI – and for press freedom
The McCullough Review to be published on Wednesday could mark a turning point for press freedom and for policing in Northern Ireland Continue Reading
By- Donal MacIntyre
-
Opinion
22 Sep 2025
From breach to resilience: How the Electoral Commission rebuilt its cyber defences
The UK's Electoral Commission fell victim to a major cyber attack in 2022. Three years on, the organisation is reflecting on its experience and sharing the lessons it learned to help others improve their security resilience. Continue Reading
By- Andrew Simpson, The Electoral Commission
-
Definition
22 Sep 2025
What is regulatory compliance?
Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business processes. Continue Reading
By- Scott Robinson, New Era Technology
- Ben Cole, Executive Editor
-
News
19 Sep 2025
UK cyber action plan lays out path to resilience
A report produced for the government by academics at Imperial College London and the University of Bristol sets out nine recommendations to strengthen the UK’s cyber sector Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Sep 2025
French court ruling may lead to legal challenges over state Sky ECC and EncroChat phone hack
A decision by the French supreme court may pave the way for defendants to challenge the lawfulness of France’s hacking of the EncroChat and Sky ECC cryptophone networks used by organised crime groups Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
17 Sep 2025
Firms urged to adopt risk-based data sovereignty strategy
Geopolitical uncertainty is forcing organisations to rethink where their data is located, but a full retreat from the public cloud is not the answer Continue Reading
-
Podcast
17 Sep 2025
Podcast: Data sovereignty and what you need to do about it
Patrick Smith, EMEA CTO of Pure Storage, talks about data sovereignty, what’s driving heightened interest in it, and how customers, the tech industry and states are preparing for it Continue Reading
By- Antony Adshead, Computer Weekly
-
News
17 Sep 2025
Hamas lawyer challenges police after they seized legal files from phone in Schedule 7 stop
A UK solicitor hired by Hamas to challenge its proscription in the UK as a terrorist organisation argues police acted unlawfully by seizing a phone containing confidential legally privileged material about his clients Continue Reading
By- Bill Goodwin, Investigations Editor
-
Opinion
16 Sep 2025
Cyber leaders must make better use of risk experts
The Computer Weekly Security Think Tank considers how security leaders can help assure access to the new and innovative cloud tech while minimising risk and ensuring they do not fall foul of regulators. Continue Reading
By- Ellie Hurst, Advent IM
- Mike Gillespie
-
News
15 Sep 2025
Arqit to support NCSC’s post-quantum cryptography pilot
Quantum specialist Arqit will provide specialised post-quantum migration planning services to organisations preparing to address the imminent risks to traditional cryptography Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Sep 2025
Forrester Technology & Innovation Summit preview: Digital sovereignty in the public cloud
We look at how IT leaders need to balance data access, data residency and data sovereignty Continue Reading
By- Cliff Saran, Managing Editor
-
News
11 Sep 2025
Chat Control: EU to decide on requirement for tech firms to scan encrypted messages
Law enforcement and police experts meet on Friday to decide on proposals to require technology companies to scan encrypted messages for possible child abuse images amid growing opposition from security experts Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
10 Sep 2025
UK contactless card payment limits could be unlimited
The UK Financial Conduct Authority says contactless payment technology and fraud protections have advanced enough for firms to adjust the limit Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
08 Sep 2025
Northern Ireland police kept inspectors in dark over surveillance of journalists
The Police Service of Northern Ireland failed to inform the Investigatory Powers Commissioner’s Office about surveillance operations against journalists during annual inspections Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
05 Sep 2025
US politicians ponder Wimwig cyber intel sharing law
US cyber data sharing legislation is set to replace an Obama-era law, but time is running out to get it over the line, with global ramifications for the security industry, and intelligence and law enforcement communities Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
05 Sep 2025
SLA promises, security realities: Navigating the shared responsibility gap
The Computer Weekly Security Think Tank considers how security leaders can help assure access to the new and innovative cloud tech while minimising risk and ensuring they do not fall foul of regulators. Continue Reading
By- Aditya K Sood, Aryaka
-
News
04 Sep 2025
UK sets out plans for AI assurance leadership
Labour wants the UK to become the world leader in artificial intelligence assurance Continue Reading
By- Cliff Saran, Managing Editor
-
Opinion
03 Sep 2025
Bridging the SLA gap: A guide to managing cloud provider risk
The Computer Weekly Security Think Tank considers how security leaders can help assure access to the new and innovative cloud tech while minimising risk and ensuring they do not fall foul of regulators. Continue Reading
By- John Bruce, Quorum Cyber
-
News
03 Sep 2025
European court upholds EU-US Data Privacy Framework data-sharing agreement
EU General Court upholds EU-US Data Privacy Framework, bringing certainty to businesses that exchange data with the US – for now. An appeal may be in the offing Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
31 Aug 2025
Google Cloud brings on-premise Gemini AI to Singapore
Move allows government agencies and regulated industries to run Google’s most powerful artificial intelligence models in their own datacentres, directly addressing data security and residency requirements to fuel the nation’s AI ambitions Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
29 Aug 2025
Home Office ‘backdoor’ seeks worldwide access to Apple iCloud users’ data, court documents confirm
A court filing states that a government order against Apple would give it the capability to access communications and metadata of customers using the iCloud service anywhere in the world Continue Reading
By- Bill Goodwin, Investigations Editor
-
Feature
28 Aug 2025
AI and backup: How backup products leverage AI
We look at how AI helps with backup, from AI analysis of backup jobs and their integrity through natural language support functionality to ransomware and anomaly detection Continue Reading
-
News
28 Aug 2025
UK cyber security centre helps expose China-based cyber campaign
GCHQ cyber security centre and its international partners release details of malicious cyber activity linked to Chinese businesses Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
21 Aug 2025
Scale of MoD Afghan data breaches widens dramatically
Many more data breaches at the MoD's Arap programme to relocate at-risk Afghan citizens to Britain have emerged following an FoI request by BBC journalists Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
21 Aug 2025
European digital sovereignty: Storage, surveillance concerns to overcome
As China and the US increase surveillance capabilities, are European companies caught in the middle of a data security storm? Continue Reading
By -
News
20 Aug 2025
Microsoft starts including PQC algorithms in cyber foundations
Microsoft updates on its post-quantum cyber strategy as it continues integrating quantum-safe algorithms into some of the core foundations underpinning its products and services Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Aug 2025
Google spins up agentic SOC to speed up incident management
Google Cloud elaborates on its vision for securing artificial intelligence unveiling new protections and capabilities across its product suite Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Aug 2025
ISACA launches AI security management certification
ISACA accredited security professionals can now pursue a new AI security management credential Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Aug 2025
US says UK has agreed to drop encryption ‘backdoor’ demands against Apple
US and UK end diplomatic row over UK encryption ‘backdoor’ order against Apple, but it remains unclear whether Apple will restore advanced encryption services to UK users Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
19 Aug 2025
Singapore board directors to get cyber crisis training
The Singapore Institute of Directors and Ensign InfoSecurity have launched a programme to equip 1,000 board leaders with the skills to navigate high-stakes decisions during a cyber crisis Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
18 Aug 2025
L’Oréal to promote cyber resilience for Britain’s beauty salons
L’Oréal UK and Ireland will work with law enforcement, cyber educators and students, and other large organisations to help thousands of small salons across the UK improve their cyber resilience practice Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Aug 2025
UK cyber leaders feel impact of Trump cutbacks
The ripple effects of US cyber security cutbacks have reached this side of the Atlantic, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Aug 2025
US trade body calls on Washington to cut cyber red tape
The US Information Technology Industry Council has called on the White House’s Office of the National Cyber Director to cut burdensome regulations in areas such as AI and incident reporting, and to do more to build a unified security regime Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
13 Aug 2025
What the UK's ransomware crackdown signals for Europe
The UK government is forging a bold path as it aims to ban ransomware payments from certain organisations. Its actions could herald an inflexion point in Europe's broader response to ransomware. Continue Reading
By- Fintan Quinn, Gartner
-
News
12 Aug 2025
Norway fixing Big Bang e-health botch with fintech security
Experts call for Europe’s health sector to protect medical APIs with security originated from UK open banking as officials take urgent measures against unprecedented attacks Continue Reading
By- Mark Ballard
-
Opinion
11 Aug 2025
How CISOs can adapt cyber strategies for the age of AI
Traditional security measures may not be able to cope with the AI reality. In order to safeguard enterprise operations, reputation and data integrity in an AI-first world, security leaders need to rethink. Continue Reading
By- Martin Riley, Bridewell Consulting
-
News
11 Aug 2025
McCullough Review into PSNI spying on journalists and lawyers delayed
Angus McCullough KC is to present findings of an independent review of police spying on phone data of lawyers, journalists and NGOs in Northern Ireland in October Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
11 Aug 2025
Watching the watchers: Is the Technical Advisory Panel a match for MI5, MI6 and GCHQ?
Dame Muffy Calder is chair of the Technical Advisory Panel (TAP), a small group of experts that advises the Investigatory Powers Commissioner on surveillance technology. Do they have what it takes to oversee the intelligence community? Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
06 Aug 2025
Black Hat USA: Startup breaks secrets management tools
Researchers at Cyata, an agentic identity specialist that has just emerged from stealth, found 14 CVEs in the widely used CyberArk Conjur and HashiCorp Vault enterprise secrets management platforms Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Aug 2025
Companies House ID verification to start in November 2025
Companies House plans to start vetting director identities from mid-November, but its reliance on the troubled One Login digital identity service may be cause for concern Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Aug 2025
NCSC updates CNI Cyber Assessment Framework
Updates to the NCSC’s Cyber Assessment Framework are designed to help providers of critical services better manage their risk profiles Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Aug 2025
Australian scaleup to bring AI-led data protection to the MoD
The UK’s Ministry of Defence is embracing AI-led data protection in the wake of a major privacy breach, enlisting Australian cyber firm Castlepoint Systems to oversee sensitive records Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Aug 2025
Proliferation of on-premise GenAI platforms is widening security risks
Research finds increased adoption of unsanctioned generative artificial intelligence platforms is magnifying risk and causing a headache for security teams Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
01 Aug 2025
The blind spot: digital supply chain is now a board-level imperative
Many companies lack visibility into complex digital supply chains, meaning hidden risks and regulatory exposure. Cyber security requires continuous mapping and board engagement Continue Reading
By- Tim Grieveson
-
News
30 Jul 2025
AI-enabled security pushes down breach costs for UK organisations
Organisations that are incorporating AI and automation into their cyber security practice are seeing improved outcomes when incidents occur, according to an IBM study Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
30 Jul 2025
Cyber governance practices are maturing - and reshaping leadership expectations
How technology leaders can help organisations shape their cyber governance practices and strengthen their collaboration across the executive team Continue Reading
By- Susanne Alfs, Cyber4Directors
-
Opinion
30 Jul 2025
GDPR’s 7th anniversary: in the AI age, privacy legislation is still relevant
Seven years after GDPR reshaped data protection, AI is forcing a fresh look at governance. GDPR’s principles remain critical, guiding ethical AI use, risk management, and trusted innovation Continue Reading
By- James Hodge
-
News
30 Jul 2025
Industry experts warn crypto infrastructure is ‘creaking’
A report from experts at HSBC, Thales and InfoSec Global claims decades-old cryptographic systems are failing, putting businesses at risk from current vulnerabilities and the threat from quantum computing Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
29 Jul 2025
Senator warns of new UK surveillance risks to US citizens following Apple ‘backdoor’ row
US lawmaker calls for the US to publish an assessment of the risks posed by UK surveillance laws to US citizens in the wake of disclosures that the UK has ordered Apple to introduce ‘backdoors’ in Apple encryption Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
29 Jul 2025
Austrian government faces likely legal challenge over state spyware
Civil society groups are talking to opposition MPs about bringing a legal challenge to the Austrian constitutional court over ‘state trojan’ law Continue Reading
By- Bill Goodwin, Investigations Editor
-
Definition
29 Jul 2025
What is good automated manufacturing practice (GAMP)?
Good automated manufacturing practice (GAMP) is a set of guidelines for pharmaceutical manufacturers. Continue Reading
By -
Opinion
25 Jul 2025
The UK’s ransomware payment ban is a strategic win
The UK's proposed public sector ransomware payment ban could be a bold step, but it can't operate in isolation. Continue Reading
By- Rob Dartnall, SecAlliance
-
News
24 Jul 2025
Scattered Spider victim Clorox sues helpdesk provider
Cleaning products manufacturer Clorox fell victim to a Scattered Spider social engineering attack two years ago – it blames its IT helpdesk provider, Cognizant Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Jul 2025
Dutch researchers use heartbeat detection to unmask deepfakes
Dutch method to counter deepfakes analyses blood flow patterns in faces that current deepfake generation tools cannot yet replicate Continue Reading
By- Kim Loohuis
-
News
24 Jul 2025
Monzo’s £21m fine highlights banks’ cyber security failures
Monzo’s recent fine over failings in its customer verification processes highlights wider security and privacy shortcomings in the personal finance world Continue Reading
-
News
23 Jul 2025
WhatsApp is refused right to intervene in Apple legal action on encryption ‘backdoors’
Investigatory Powers Tribunal to hear arguments in public over lawfulness of secret UK order requiring Apple to give UK law enforcement access to users’ encrypted data stored on the Apple iCloud Continue Reading
By- Bill Goodwin, Investigations Editor
