Alcatel-Lucent Adds Versa SD-WAN, SASE to Network Portfolio

Giant software vendor Alcatel-Lucent Enterprise is bolstering its networking and edge security capabilities by offering technologies from Versa Networks in its portfolio. The European-based company recently announced that Versa’s... Read more »

Data Loss Prevention (DLP) Best Practices & Strategies

Exchanging data across networks and within enterprises requires security measures to protect the data from being lost or stolen. How do you ensure that your company’s sensitive data isn’t... Read more »

Best Data Recovery Software for Restoring Data 2021

You’ve accidentally deleted a file. Your system crashed and you lost data as a result. A virus infiltrated your systems and deleted or otherwise altered important company documents. Many... Read more »

Contact Center as a Service (CCaaS) vs. Communications Platform as a Service (CPaaS)

In recent years , the use of cloud-based solutions have become increasingly popular across all industries. Businesses need reliable, flexible, and cost-effective ways to communicate with their customers, and... Read more »

Ofcom begins investigation of explicit image generation on Grok

Elon Musk’s Grok image generator, from parent company X, is being investigated by the UK regulator under the Online Safety Act Read more »

Intersec Dubai highlights why AI has become critical in the race against cyber attackers

Cigna Healthcare’s Jean Wiles warns that healthcare security teams must act faster without sacrificing accuracy or compliance as threats driven by artificial intelligence scale Read more »

Auditing, classifying and building a data sovereignty strategy

We look at data sovereignty – what it is and how to build a data sovereignty strategy around data auditing Read more »

From promise to proof: making AI security adoption tangible

The Security Think Tank considers what CISOs and buyers need to know to cut through the noise around AI and figure out which AI cyber use cases are worth... Read more »

Computer Misuse Act reform is overdue – not all anniversaries should be celebrated

Let’s not have any further anniversaries for the UK’s outdated cyber security laws – the government has dragged its heels for too long and reform is urgently needed Read more »

Personal data of thousands stolen in attack on London councils

The West London council at the centre of a major cyber incident has now started the process of informing residents that their personal data was compromised in the attack. Read more »

Like it or not, AI will transform cyber strategy in 2026

Bubble or no bubble, from cyber skills to defensive strategies to governance, risk and compliance, artificial intelligence will remake the cyber world in 2026 Read more »

Security Think Tank: Stop buying AI, start buying outcomes

The Security Think Tank considers what CISOs and buyers need to know to cut through the noise around AI and figure out which AI cyber use cases are worth... Read more »

SQL Slammer lesson: A Computer Weekly Downtime Upload podcast

We speak to the head of the Microsoft Security Response Center about how the company works with the industry to get systems patched quickly Read more »

Why AI agent recoverability is vital for business resilience

While AI agents are transforming operations they bring risks. Governance, monitoring, and instant rollback can help with resilience, trust, and safe innovation Read more »
Subscribe to our Newsletter