Security Think Tank: Stop buying AI, start buying outcomes

The Security Think Tank considers what CISOs and buyers need to know to cut through the noise around AI and figure out which AI cyber use cases are worth... Read more »

SQL Slammer lesson: A Computer Weekly Downtime Upload podcast

We speak to the head of the Microsoft Security Response Center about how the company works with the industry to get systems patched quickly Read more »

Why AI agent recoverability is vital for business resilience

While AI agents are transforming operations they bring risks. Governance, monitoring, and instant rollback can help with resilience, trust, and safe innovation Read more »

Privacy will be under unprecedented attack in 2026

The UK and Europe are ramping up opposition to encryption and stepping up surveillance of private communications. Here is what to expect this year Read more »

Will there be a technology policy epiphany in 2026?

The UK government faces many complex technology policy decisions in the year ahead, which could reshape the country for a digital, AI-led future Read more »

Results and prospects for AI in business applications in 2026

Agentic AI dominated enterprise IT discourse in 2025, evolving from generative AI. In 2026, AI convergence and governance will determine AI’s impact on enterprise IT Read more »

Fujitsu Post Office IT support team were ‘legalised hackers’

Backdoors meant it was possible for Fujitsu staff to steal money from Post Office branches, says former Fujitsu tech worker Read more »

UK government to spend £210m on public sector cyber resilience

The UK government unveils a £120m Cyber Action Plan to help reinforce and promote IT security resilience across the country’s public services Read more »

How Bahrain is building a region-leading digital economy

From hyperscale cloud and fintech regulation to AI skills and smart manufacturing, Bahrain is positioning technology at the heart of its economic diversification strategy, says Bahrain EDB’s Musab Abdullah Read more »

Identity: the new perimeter of ransomware defence

Ransomware exponents can target identity, bypassing technical defences. Boards should prioritise identity security, align investments, and embed cyber risk in governance Read more »
Subscribe to our Newsletter