Alcatel-Lucent Adds Versa SD-WAN, SASE to Network Portfolio

Giant software vendor Alcatel-Lucent Enterprise is bolstering its networking and edge security capabilities by offering technologies from Versa Networks in its portfolio. The European-based company recently announced that Versa’s... Read more »

Data Loss Prevention (DLP) Best Practices & Strategies

Exchanging data across networks and within enterprises requires security measures to protect the data from being lost or stolen. How do you ensure that your company’s sensitive data isn’t... Read more »

Best Data Recovery Software for Restoring Data 2021

You’ve accidentally deleted a file. Your system crashed and you lost data as a result. A virus infiltrated your systems and deleted or otherwise altered important company documents. Many... Read more »

Contact Center as a Service (CCaaS) vs. Communications Platform as a Service (CPaaS)

In recent years , the use of cloud-based solutions have become increasingly popular across all industries. Businesses need reliable, flexible, and cost-effective ways to communicate with their customers, and... Read more »

Businesses are paying the price for CISO burnout

Discussions of burnout among security pros are about more than just mental health: when burnout strikes, it can present a serious business risk Read more »

Breaking the stranglehold: Responses to data sovereignty risk

We look at the political and government responses to risks around data sovereignty and massive dependence on the three US hyperscalers – AWS, Azure and GCP – in the... Read more »

Capita’s troubled Civil Service Pension Scheme hit by data breach

A data breach affecting 138 members of the Civil Service Pension Scheme piles pressure on the service’s administrator, Capita, amid ongoing issues. Read more »

Russian cyber spies targeting consumer, Soho routers

The UK’s NCSC and Microsoft have shared details of an ongoing cyber espionage campaign targeting vulnerable network routers, orchestrated by the Russian state actor Fancy Bear. Read more »

Tech can’t wait for regulation to protect children online

The general secretary of the UK largest teachers’ union explains why social media should be banned for under-sixteens Read more »

Identity and AI: Questions of data security, trust and control

The Computer Weekly Security Think Tank considers the intersection of AI and IAM. In this article, learn how AI-driven IAM projects must account for important questions around data protection,... Read more »

How ‘Wikipedia of cyber’ helps SAP make sense of threat data

SAP runs enormous cloud environments for some of the world’s most heavily-regulated organisations, and in the hyperscale era, data security and compliance were becoming big challenges. It turned to... Read more »

What’s driving Oracle’s latest job cuts?

Thousands of job losses have been reported, affecting many roles at Oracle Cloud Infrastructure including software engineering and product compliance Read more »

AI-driven identity must exist in a robust compliance framework

The Computer Weekly Security Think Tank considers the intersection of AI and IAM. In this article, learn how while AI‑driven identity solutions offer genuine value, they must be implemented... Read more »

Banning routers won’t fix what’s already broken

America’s foreign-made router ban sparked valid debate about supply chains, geopolitics and trust, but the truth is that the ban addresses tomorrow’s procurement decisions far more than today’s security... Read more »
Subscribe to our Newsletter