




A newly-uncovered malware targeting the Android operating system seems to exploit Google’s Gemini GenAI tool to help it maintain persistence. Continue Reading

Government officials form the US and Europe have condemned UN special rapporteur Francesca Albanese for remarks about Israel she never made, based on a truncated clip circulating online that takes her statements out of context Continue Reading

AI is introducing new risks that existing evaluation and governance approaches were never designed to manage, creating a widening gap between what AI-backed security tools promise and what can be realistically controlled. Continue Reading

Ertug Ayik, managing director for Middle East and Africa at HP Inc, outlines how on-device artificial intelligence, embedded security and a partner-first model are positioning the company at the heart of MENA’s digital transformation Continue Reading

The conduct of powerful nations is causing knock-on effects in the cyber world as long-standing security frameworks appear increasingly precarious Continue Reading

Labour proposals to restrict social media use to people aged 16 and under could have unintended consequences for businesses using virtual private networks Continue Reading

The US government is incorporating social media vetting as part of its border control policy, leading to concerns about what data will be collected and how it will be protected Continue Reading

Growing reliance on artificial intelligence is encroaching into the stock market, finds research Continue Reading

UK government says half of all small businesses have been cyber breached in the recent past as it urges them to ‘lock the door’ Continue Reading

British Transport Police will deploy facial recognition for six months despite calls for the government to halt its rapid expansion of the technology Continue Reading

Project sees long-range 5G Standalone data communication at sea successfully demonstrated, with on-board connectivity and naval vessel systems tested in real day and night operations Continue Reading

The fallout from the Post Office scandal is a recurring theme of reporting for Computer Weekly, and in this week’s ezine, we find out how the organisation’s efforts to address the shortcomings of its Horizon software have resulted in it being hit with a multimillion-pound IR35-related tax bill. We also sit down with Checkout.com CTO Mariano Albera to find out how he’s applying his knowledge of e-commerce to the finance sector, and why coding will always have a special place in his heart. In the third and final instalment of the AI security buyer’s guide, we take a look at how the technology can both help and hinder enterprise IT security strategies. And, rounding out the issue, we find out how five different charities are using CRM and digital experience technologies to bolster donations. Read the issue now. Continue Reading

Cyber security companies have jumped on the AI bandwagon. We look at where artificial intelligence is a useful add-on and where it poses potential risks Continue Reading

European data protection supervisors warn the European Commission against narrowing the privacy protections for personal data as it gears up for a swathe of data protection reforms Continue Reading

Frameworks provide the structure for an effective incident response program. Here's where to turn for guidance on what to include. Continue Reading

In a preliminary ruling, European Commission says TikTok’s additive design features are in breach of laws designed to create safer digital spaces Continue Reading

The number of vulnerabilities to be disclosed in 2026 is almost certain to exceed last year's total, and may be heading towards 100,000, according to analysis Continue Reading

In lieu of a full-blown ban on the technology, Green London Assembly member Zoë Garbett has called for a number of new safeguards to be implemented that she feels would protect Londoners from ‘escalating’ biometric surveillance Continue Reading

Mick Baccio, global security advisor at Splunk SURGe and Cisco Foundation AI, reveals how the experience of running cyber on a dime for a US presidential campaign has informed how he does security, and why the basics still matter Continue Reading

While it may not be something IT leaders want to talk about, managing technical debt is critical to moving forward with IT innovation Continue Reading

As artificial intelligence permeates aspects of the economy and society, individuals and civic groups are devising creative ways to rebel - but any impact on AI’s development, adoption and regulation is unclear Continue Reading

The rapid exploitation of a bug in Office by Russian cyber attackers shows that the current system of patching - for a software application that is practically ubiquitous in enterprise IT - has become a security risk for everyone Continue Reading

Following the launch of its full portfolio in Malaysia, the SOC provider discusses the security challenges facing lean IT teams, the value of supplier neutrality, and its roadmap for AI and ransomware protection Continue Reading

Microsoft releases patches for six zero-day flaws in its latest monthly update, many of them related to security feature bypass issues Continue Reading

Researchers at Huntress and Microsoft have shared findings from their analysis of a new SolarWinds Web Help Desk vulnerability Continue Reading

If organisations using agentic and generative AI don’t codify ethics and oversight now, the future may be filled with AI agents using generative AI to communicate with other agents, destroying trust in social media Continue Reading

More than 100 artificial intelligence experts have produced the second international AI safety report ahead of a summit in India, outlining a high degree of uncertainty about the development and risks of AI Continue Reading

Major study finds debate over AI adoption is over as almost every finance firm in the world is already using the technology Continue Reading

Rik Ferguson, vice-president of security intelligence at Forescout, considers what CISOs and buyers need to know to cut through the noise around artificial intelligence and assess the various AI cyber use cases Continue Reading

This week’s edition of the Computer Weekly ezine takes a closer look at the technology changes the Home Office is seeking to introduce to the UK policing sector as part of its wide-ranging reform programme. We also hear from the global CIO of PC hardware manufacturer Lenovo about the work he is doing to grow the company’s services business. Rounding out the issue, we have two features digging deep-er into the security side of artificial intelligence, with one looking at how suppliers are adding the technology to their security portfolios and the other guiding buyers on what to look for when selecting AI security products. Read the issue now. Continue Reading

With threat actors exploiting the growing use of generative AI tools and the prevalence of shadow AI, organisations must strengthen their security programmes and culture to manage the rising risk Continue Reading

Operation Cyber Guardian mobilised over 100 defenders to neutralise UNC3886, which infiltrated Singtel, StarHub, M1 and Simba networks, operators issue joint pledge on defence-in-depth Continue Reading

A series of Russian cyber attacks targeting Poland’s energy infrastructure has prompted a warning from the UK’s National Cyber Security Centre Continue Reading

Through its Falcon models and an open, efficiency-driven research strategy, the Technology Innovation Institute is positioning the UAE as a producer of foundational AI, not merely a consumer of global platforms Continue Reading

Kyndryl’s proposed takeover shows how critical systems become exposed to foreign control without an overarching policy decision Continue Reading

Experts at the inaugural CYSAT Asia in Singapore warn of the urgency of securing space assets amid growing geopolitical tensions and supply chain vulnerabilities Continue Reading

Know thine enemy -- and the common security threats that can bring an unprepared organization to its knees. Learn what these threats are and how to prevent them. Continue Reading

Exploitation of CVE-2025-40551, an RCE flaw affecting SolarWinds Web Help Desk, appears to be spreading, with defenders on high alert Continue Reading

While AI presents a significant opportunity to further the way we do business, what if it’s time to consider a new direction? What if the safest and most effective path for AI isn’t to go larger, but smaller instead? Continue Reading

As the UK government develops its National Cyber Action Plan, a report from the Rusi think tank urges Westminster to take a more interventionist approach Continue Reading

Ransomware-as-a-service operations are increasingly seeking to forge connections with employees, contractors and trusted partners of their target organisations as an alternative to straight-up hacking, says NCC Continue Reading

Defendants and lawyers are demanding transparency about digital evidence from police hacking operations used in criminal prosecutions across Europe following a series of critical court judgments. Continue Reading

Infosecurity Europe 2026 will feature a cyber security startup exhibition zone and a competition for business support, in conjunction with the UK Cyber Flywheel organisation Continue Reading

Banks paid 88% losses claimed by customers that fell victim to authorised push payment fraud last year Continue Reading

The UK needs clear and unambiguous laws around the use of digital evidence in court. The law has become tangled following rulings in the country’s EncroChat prosecutions. It’s time to allow intercept data to be used as evidence in legal cases Continue Reading

This week’s Computer Weekly ezine digs into the latest twist in a long-running datacentre planning saga, concerning a server farm in Iver, Buckinghamshire, that the government has now admitted it was wrong to grant planning permission for. We also hear from the head of advanced analytics at Dutch Bank ING about how its foray into using AI technologies is benefiting both its business and the customers it serves. Sticking with the AI theme, we take a deep dive into how the technology is being used as an enabler for the development of urban digital twins, and find out how it can be used to assist IT security teams. Read the issue now. Continue Reading

As it underwent a growth spurt in the early 2020s, graphic design platform Canva turned to 1Password to manage identity across its expanding organisation Continue Reading

Intercepted communications data used to prosecute drug crime gangs is unreliable and does not conform to international standards of evidence, according to an expert report presented to a court in Antwerp Continue Reading

Amid a wave of market consolidation, Computer Weekly speaks to Keeper Security’s leadership on how identity and access management systems are becoming unified identity platforms capable of securing both human and machine identities Continue Reading

Forrester examines the key factors security leaders and IT decision-makers need to evaluate when considering AI-enabled IT security Continue Reading

The Home Office plans to ramp up its deployment of artificial intelligence and facial-recognition technologies under wide-ranging reforms to UK policing Continue Reading

Two former directors of London tech company nChain, associated with a computer scientist who falsely claimed to be bitcoin inventor Satoshi Nakamoto, have told an employment tribunal they were dismissed in retaliation for whistleblowing Continue Reading

For years, anti-virus tools have used behavioural analysis and machine learning to identify rogue programs and unusual user activity. And as the tools evolved from simple pattern matching machines ... Continue Reading

RAMP, an infamous Russian-speaking cyber crime forum, has gone off the air after an apparent US operation Continue Reading

The Metropolitan Police has defended its use of live facial recognition against a legal challenge that claims there are no effective constraints on where it can deploy the technology Continue Reading

As supply chain attacks continue, ERP security requires strong authentication, regular patching, monitoring and incident response practices across cloud and on-premises systems. Continue Reading

The number of people working in the cyber security field has almost trebled in the 2020s, with one cyber professional for every 68 businesses in the UK Continue Reading

Singapore researchers show how adapting pre-trained AI models can solve data scarcity issues in countries with limited resources. Separately, they have proposed forming an international consortium to build consensus on AI governance in medicine Continue Reading

The ShinyHunters hacking collective that caused chaos in 2025 is ramping up a new voice phishing campaign, with several potential victims already identified Continue Reading

A court has found that the Kingdom of Saudi Arabia subjected a London-based human rights activist to abuse and physical violence after infecting his phone with Pegasus spyware Continue Reading

A coding error in an emergent strain of ransomware leaves victims unable to recover their data, even if they cooperate with the hackers’ demands Continue Reading

Splunk finds 75% of UK IT teams had outages from missed alerts in 2025, driven by alert fatigue and tool sprawl. Collaboration between cyber and observability teams can help Continue Reading

This week’s edition of the Computer Weekly ezine has a focus on digital sovereignty, as we delve into why the Open Rights Group thinks it is high time the UK government has a formalised strategy, championing homegrown tech providers. The last in our recent run of buyer’s guides also touches on this topic. Elsewhere, we hear from the CISO of online retailer Zalando about how she’s drawing on her career in tech to reshape the firm’s approach to security. Rounding out the ezine, we find out how the adoption of AI is affecting employee autonomy in the workplace. Read the issue now. Continue Reading
The High Court will examine whether the Metropolitan Police is acting lawfully with its deployments of live facial recognition, in the UK’s first judicial review of how the technology is being used Continue Reading

The Security Think Tank considers what CISOs and buyers need to know to cut through the noise around AI and figure out which AI cyber use cases are worth a look, and which are just hype. Continue Reading

Organisations need to demonstrate not just how much they are spending to improve their security but that they are spending it effectively. They should report annually to regulators on how their ... Continue Reading

US lawmakers have extended the Cybersecurity Information Sharing Act of 2015 for another nine months, buying time to enact a replacement for the legislation. Continue Reading

Black Hat Europe made clear that cyber security can no longer be separated from politics, economics and behaviour, as ransomware, AI and long-standing security failures combine Continue Reading

The Infocomm Media Development Authority has released a guide to help enterprises deploy artificial intelligence agents safely and address specific risks such as unauthorised actions and automation bias Continue Reading

The rapid proliferation of artificial intelligence will prompt ‘civil unrest’ if governments and companies fail to protect workers from its displacing effects, says JPMorgan boss Continue Reading

In this quarter’s issue of CW EMEA, we look at the decision in Sweden to discontinue the use of a machine learning model to identify benefit fraud. The country’s Data Protection Authority became involved in November 2024, when it was revealed that a machine learning system being used by Försäkringskassan, the Swedish Social Insurance Agency, was disproportionally and wrongly flagging certain groups for further investigation over social benefits fraud. We also explore the impact of Women in Cybersecurity Middle East’s partnership with Black Hat MEA. Read the issue now. Continue Reading

Details of over 70 million customers of US sportswear giant Under Armour were leaked following a supposed ransomware attack by the Everest gang Continue Reading

The digital version of the physical driving licence will be made available through an app-based digital wallet, with testing underway before wider roll-out later this year Continue Reading

London and Beijing have supposedly conducted high-level talks seeking to establish a joint security forum to help de-escalate potential cyber flashpoints, according to reports Continue Reading

Organisations are implementing zero-trust models for data governance thanks to the proliferation of poor quality AI-generated data, often known as AI slop Continue Reading

AI browsers can improve employee productivity through autonomous workflows, but their security flaws and data leakage risks can expose enterprises to critical cyber threats Continue Reading

Hacktivists aligned to the Russian state are ramping up their targeting of UK organisations with denial of service attacks Continue Reading

Met Police boasts that its permanent deployment of live facial recognition cameras in Croydon has led to more than 100 arrests and prompted a double-digit reduction in local crime, ahead of an upcoming judicial review assessing the technology’s lawfulness Continue Reading

In this week’s edition of the Computer Weekly ezine, we take a look at how – eight years after its introduction – the concept of open banking is expanding and evolving, and giving rise to new use cases within financial services. We also sit down with the CTO of Norsk Global and find out how swapping out its legacy VMware estate for Nutanix’s technology has saved it money and helped it shift away from having a reactive IT strategy. Elsewhere in the issue, we find out how agentic AI is shaking up business processes within the enterprise architecture landscape. And in the second of our three buyer’s guide features on digital sovereignty, we find out why this is a topic IT buyers and IT departments need to get a handle on in 2026. Read the issue now. Continue Reading

In spite of headlines that suggest every business should be ploughing vast sums of money into tech innovation, the reality remains that IT plays a supporting role for most firms. Continue Reading

As the UK government considers its approach to artificial intelligence and copyright, Computer Weekly explores the dynamics at play in copyright markets, and what measures can be taken to ensure that creatives are protected Continue Reading

As work consolidates in browsers and quick-entry paths, access decisions are shifting to the front door of enterprise systems, often without clear ownership or centralized control. Continue Reading

The agency leading the US government’s cryptology and cyber security strategies has published its latest zero-trust guidance Continue Reading
Professional cyber association ISC2 pledges support to UK government’s Software Security Ambassador scheme, part of the recently unveiled Cyber Action Plan Continue Reading

New Dubai and Abu Dhabi facilities support data sovereignty, providing CIOs with local access to more than 100 Zoho and ManageEngine cloud services Continue Reading

A US judge has dismissed a lawsuit filed by CrowdStrike shareholders over the July 2024 outage that caused widespread disruption around the world Continue Reading

Microsoft has taken down the RedDVS cyber crime-as-a-service network after obtaining a UK court order, marking its first civil legal action outside of the US Continue Reading

Industrial cyber security firm Nozomi Networks has opened its Singapore headquarters, doubling its regional headcount, and pledging to remain vendor agnostic while targeting the manufacturing and utility sectors Continue Reading

The UK government’s plans for a national digital identity scheme were never going to be mandatory. That’s not some sort of scoop – although Computer Weekly predicted as much last year - nor is it ... Continue Reading

The proposed national digital identity app will no longer be compulsory for conducting right-to-work checks, removing the most contentious and widely criticised element of the scheme Continue Reading

January brings a larger-than-of-late Patch Tuesday update out of Redmond, but an uptick in disclosures is often expected at this time of year Continue Reading

Business email compromise remains a significant threat as cyber fraudsters deploy a more diverse range of tactics against their potential victims, according to a report Continue Reading

The Security Think Tank considers what CISOs and buyers need to know to cut through the noise around AI and figure out which AI cyber use cases are worth a look, and which are just hype. Continue Reading

In spite of headlines that suggest every business should be ploughing vast sums of money into tech innovation, the reality remains that IT plays a supporting role for most firms Continue Reading

In the first edition of the Computer Weekly ezine for 2026, we reveal who in the world of tech has received gongs in the New Year Honours List, and why. We also sit down with competition lawyer Maria Luisa Stasi, who is in the midst of a legal action to secure billions of pounds in compensation for UK businesses that have been allegedly overcharged by Microsoft for opting to run its software in competing cloud environments. Elsewhere in the issue, we find out why automotive enterprises are being advised to revamp their networks and embrace openness. And in the first of our three buyer’s guide features on the knotty topic of digital sovereignty, we find out what role data auditing has to play in building a cast-iron data sovereignty strategy. Read the issue now. Continue Reading

C-suite executives are more concerned with risks arising from AI vulnerabilities and cyber fraud than ransomware, according to the World Economic Forum Continue Reading

Elon Musk’s Grok image generator, from parent company X, is being investigated by the UK regulator under the Online Safety Act Continue Reading

Cigna Healthcare’s Jean Wiles warns that healthcare security teams must act faster without sacrificing accuracy or compliance as threats driven by artificial intelligence scale Continue Reading

We look at data sovereignty – what it is and how to build a data sovereignty strategy around data auditing Continue Reading

The two countries will work together to bridge the gap between quantum research and real-world commercialisation, marking Singapore’s first government-to-government pact dedicated to the technology Continue Reading

Partnerships with Finland’s Unikie and Solita will bring UAE-developed secure autonomy technologies to critical infrastructure, public safety and AI-enabled operations across Northern Europe Continue Reading

The Security Think Tank considers what CISOs and buyers need to know to cut through the noise around AI and figure out which AI cyber use cases are worth a look, and which are just hype. Continue Reading
In The Current Issue:Agentic AI is forcing CIOs to rethink IT strategy. Success depends on identifying key use cases, assessing data readiness, ...
The real risk of AI isn't experimentation—it's deployment. Leaders must address governance, data gaps and oversight before ...
In 2026, CIOs need to stay aware of the technologies and events impacting their businesses. Listening to these six podcasts will ...
Next-generation firewalls are critical tools in today's evolving threat landscape. Learn how to evaluate and select an NGFW that ...
Elevating cybersecurity to a state of resilience requires a security team to adapt and strengthen defenses. The result should be ...
Business email compromise feeds on professional email norms -- and exploits emotions such as fear or urgency. Learn what BEC is, ...
FWA delivers wireless broadband internet to remote regions, temporary setups and other locations not suitable for wired ...
The internet would be different today without DNS anchoring digital communications. Companies can take some basic steps to ensure...
Cisco's entrée into 102.4 Tbps silicon boasts in-place programmability and new AgenticOps features as enterprise AI ...
Follow this step-by-step guide on decommissioning a data center, covering planning, inventory management, data security, and ...
Smart data centers reduce costs and enhance grid stability, enabling operators to evolve from passive consumers to active ...
Due to rapid AI hardware advancement, companies release advanced products yearly to keep up with the competition. The new ...
Establish a multi-phased approach that turns a risky situation into a managed process with several departments working in ...
New Agentic Data Plane features enable users to create a governance layer for agents and could help the vendor differentiate ...
AI's competitive advantage is shifting from model scale to data quality. Organizations that invest in governance and ...