Computer Weekly Feed
Microsoft chair Brad Smith outlines an expansive cyber programme targeting governments across Europe with enhanced threat intelligence and support
Microsoft chair Brad Smith outlines an expansive cyber programme targeting governments across Europe with enhanced threat intelligence and support
Categories: Computer Weekly
Civil society organisations have urged the European Commissioner to not renew the UK’s data adequacy, given the country’s growing divergence from European data protection standards
Civil society organisations have urged the European Commissioner to not renew the UK’s data adequacy, given the country’s growing divergence from European data protection standards
Categories: Computer Weekly
Eindhoven University of Technology has planned multi-factor authentication and regularly practised cyber crisis drills – yet it still fell victim to attackers who exploited gaps in its defences
Eindhoven University of Technology has planned multi-factor authentication and regularly practised cyber crisis drills – yet it still fell victim to attackers who exploited gaps in its defences
Categories: Computer Weekly
The UK mapping service has moved on a long way from paper maps as it now looks to use artificial intelligence to understand, interpret and derive insights from geographical data
The UK mapping service has moved on a long way from paper maps as it now looks to use artificial intelligence to understand, interpret and derive insights from geographical data
Categories: Computer Weekly
Legacy IT is a drag on profits and innovation, but AI agents will help companies rebuild their processes better than before, claims Pegasystems CTO Don Schuerman
Legacy IT is a drag on profits and innovation, but AI agents will help companies rebuild their processes better than before, claims Pegasystems CTO Don Schuerman
Categories: Computer Weekly
Project findings to be presented at Infosecurity Europe 2025 highlight vulnerability of SMEs to cyber attack
Project findings to be presented at Infosecurity Europe 2025 highlight vulnerability of SMEs to cyber attack
Categories: Computer Weekly
Global fintech revenues reached £280bn in 2024, according to Boston Consulting Group report
Global fintech revenues reached £280bn in 2024, according to Boston Consulting Group report
Categories: Computer Weekly
The National Grid has started work on building a new substation on the outskirts of Greater London to ease pressure on local electricity transmission and distribution networks
The National Grid has started work on building a new substation on the outskirts of Greater London to ease pressure on local electricity transmission and distribution networks
Categories: Computer Weekly
CISA is one of several US agencies facing drastic budget cuts under the Trump administration
CISA is one of several US agencies facing drastic budget cuts under the Trump administration
Categories: Computer Weekly
Even when parts of a job are being automated, those who know how to work with artificial intelligence tools can expect higher salaries
Even when parts of a job are being automated, those who know how to work with artificial intelligence tools can expect higher salaries
Categories: Computer Weekly
CISA is one of several US agencies facing drastic budget cuts under the Trump administration.
CISA is one of several US agencies facing drastic budget cuts under the Trump administration.
Categories: Computer Weekly
Over a third of Microsoft 365 users who took part in trials across government departments claimed they saved more than half an hour in productivity a day
Over a third of Microsoft 365 users who took part in trials across government departments claimed they saved more than half an hour in productivity a day
Categories: Computer Weekly
The government has set out plans to spend over a billion pounds on digital and cyber warfare capabilities to enhance the UK’s ability to defend itself and fight offensive wars
The government has set out plans to spend over a billion pounds on digital and cyber warfare capabilities to enhance the UK’s ability to defend itself and fight offensive wars
Categories: Computer Weekly
The Security Think Tank considers how CISOs can best plan to facilitate the secure running of AI and Gen AI-based initiatives and ensure employees do not inadvertently leak data or make bad decisions.
The Security Think Tank considers how CISOs can best plan to facilitate the secure running of AI and Gen AI-based initiatives and ensure employees do not inadvertently leak data or make bad decisions.
Categories: Computer Weekly
Artificial intelligence is not just for business efficiency. Company boards should deploy the technology to support their own processes
Artificial intelligence is not just for business efficiency. Company boards should deploy the technology to support their own processes
Categories: Computer Weekly
Will Lyne, head of cyber intelligence at the National Crime Agency, sketches out cyber criminal trends as ransomware and other attack varieties become democratised beyond Russophone, skilled software developers
Will Lyne, head of cyber intelligence at the National Crime Agency, sketches out cyber criminal trends as ransomware and other attack varieties become democratised beyond Russophone, skilled software developers
Categories: Computer Weekly
While non-IT business professionals in the middle of their careers face the most disruption from AI, professionals in the IT services sector and their employers must prepare for change
While non-IT business professionals in the middle of their careers face the most disruption from AI, professionals in the IT services sector and their employers must prepare for change
Categories: Computer Weekly
An assessments of the risks VMware customers on perpetual licences now need to consider
An assessments of the risks VMware customers on perpetual licences now need to consider
Categories: Computer Weekly
It’s now essential for IT security teams to have oversight of cloud computing, and AWS offers a plethora of tools to make managing it easier. Find out how cyber pros are using them in the wild
It’s now essential for IT security teams to have oversight of cloud computing, and AWS offers a plethora of tools to make managing it easier. Find out how cyber pros are using them in the wild
Categories: Computer Weekly
With millions of businesses now using AWS, it’s vital for IT security teams to have oversight, but the company offers a plethora of tools to make managing it easier. Find out how cyber pros are using them in the wild
With millions of businesses now using AWS, it’s vital for IT security teams to have oversight, but the company offers a plethora of tools to make managing it easier. Find out how cyber pros are using them in the wild
Categories: Computer Weekly