Alcatel-Lucent Adds Versa SD-WAN, SASE to Network Portfolio

Giant software vendor Alcatel-Lucent Enterprise is bolstering its networking and edge security capabilities by offering technologies from Versa Networks in its portfolio. The European-based company recently announced that Versa’s... Read more »

Data Loss Prevention (DLP) Best Practices & Strategies

Exchanging data across networks and within enterprises requires security measures to protect the data from being lost or stolen. How do you ensure that your company’s sensitive data isn’t... Read more »

Best Data Recovery Software for Restoring Data 2021

You’ve accidentally deleted a file. Your system crashed and you lost data as a result. A virus infiltrated your systems and deleted or otherwise altered important company documents. Many... Read more »

Contact Center as a Service (CCaaS) vs. Communications Platform as a Service (CPaaS)

In recent years , the use of cloud-based solutions have become increasingly popular across all industries. Businesses need reliable, flexible, and cost-effective ways to communicate with their customers, and... Read more »

Streisand effect: Businesses that pay ransomware gangs are more likely to hit the headlines

Research by ransomware expert Max Smeets suggests companies that pay up to criminal gangs are more likely to attract press attention Read more »

Trump plans bonfire of US state-level AI regulation

US president’s executive order targets state-level AI regulatory frameworks across the country, saying they are too onerous and endangering leadership in the field Read more »

Quantum risk to quantum readiness: A PQC roadmap

No one knows exactly when quantum computing will arrive, but accelerating progress is prompting security and IT leaders to recognise the potential risks. So how do organisations begin implementing... Read more »

What lies in store for cyber security skills in 2026?

As we prepare to close out 2025, the Computer Weekly Security Think Tank panel looks back at the past year, and ahead to 2026. Read more »

Microsoft expands Bug Bounty scheme to include third-party software

The company is to offer bug bounty awards for people who report security vulnerabilities in third-party and open source software impacting Microsoft services Read more »

Security pros should prepare for tough questions on AI in 2026

As we prepare to close out 2025, the Computer Weekly Security Think Tank panel looks back at the past year, and ahead to 2026. Read more »

Microsoft patched over 1,100 CVEs in 2025

The final Patch Tuesday update of the year brings 56 new CVEs, bringing the year-end total to over 1,100. Read more »

Are we mistaking regulation for resilience?

We have a growing number of cyber compliance regulations, yet our country’s cyber resilience remains fragile. What is going wrong? Read more »

Why bug bounty schemes have not led to secure software

Computer Weekly speaks to Katie Moussouris, security entrepreneur and bug bounty pioneer, about the life of security researchers, bug bounties and the artificial intelligence revolution Read more »

Ethical hackers can be heroes: It’s time for the law to catch up

The UK government’s plan to finally rewrite the 1990 Computer Misuse Act to provide much-needed legal protections for ethical hackers is welcome, but now we need firm action. Read more »
Subscribe to our Newsletter