Giant software vendor Alcatel-Lucent Enterprise is bolstering its networking and edge security capabilities by offering technologies from Versa Networks in its portfolio. The European-based company recently announced that Versa’s... Read more »
Exchanging data across networks and within enterprises requires security measures to protect the data from being lost or stolen. How do you ensure that your company’s sensitive data isn’t... Read more »
You’ve accidentally deleted a file. Your system crashed and you lost data as a result. A virus infiltrated your systems and deleted or otherwise altered important company documents. Many... Read more »
In recent years , the use of cloud-based solutions have become increasingly popular across all industries. Businesses need reliable, flexible, and cost-effective ways to communicate with their customers, and... Read more »
Discussions of burnout among security pros are about more than just mental health: when burnout strikes, it can present a serious business risk Read more »
We look at the political and government responses to risks around data sovereignty and massive dependence on the three US hyperscalers – AWS, Azure and GCP – in the... Read more »
A data breach affecting 138 members of the Civil Service Pension Scheme piles pressure on the service’s administrator, Capita, amid ongoing issues. Read more »
The UK’s NCSC and Microsoft have shared details of an ongoing cyber espionage campaign targeting vulnerable network routers, orchestrated by the Russian state actor Fancy Bear. Read more »
The general secretary of the UK largest teachers’ union explains why social media should be banned for under-sixteens Read more »
The Computer Weekly Security Think Tank considers the intersection of AI and IAM. In this article, learn how AI-driven IAM projects must account for important questions around data protection,... Read more »
SAP runs enormous cloud environments for some of the world’s most heavily-regulated organisations, and in the hyperscale era, data security and compliance were becoming big challenges. It turned to... Read more »
Thousands of job losses have been reported, affecting many roles at Oracle Cloud Infrastructure including software engineering and product compliance Read more »
The Computer Weekly Security Think Tank considers the intersection of AI and IAM. In this article, learn how while AI‑driven identity solutions offer genuine value, they must be implemented... Read more »
America’s foreign-made router ban sparked valid debate about supply chains, geopolitics and trust, but the truth is that the ban addresses tomorrow’s procurement decisions far more than today’s security... Read more »
