Topics Archive
Free guide to low-code & no-code platforms
Platforms that enable shadow IT are changing development roles and processes. Here's why it's time to embrace this new reality.
-
Feature
27 Aug 2025
Making the channel appeal to women
Billy MacInnes canvasses opinion to ask what can be done to increase diversity in the industry and encourage more women to take up roles in the channel Continue Reading
-
News
27 Aug 2025
Home Office Fujitsu contract is ‘de facto’ conflict of interest in Post Office police probe
Fujitsu supplies police with the network that supports national investigations, while its former staff are part of a national investigation Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
27 Aug 2025
Ransomware activity levelled off in July, says NCC
Ransomware levels held steady in the month of July, although the risk remained as persistent as ever Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
27 Aug 2025
Who should start the daily scrum meeting?
Who should start the Daily Scrum? Well, since only developers can participate in the Daily Scrum, the answer has to be 'one of the developers.' Any developer can start the Daily Scrum. Continue Reading
By- Darcy DeClute, Scrumtuous Inc.
-
Tip
27 Aug 2025
10-step guide for testing a backup and recovery plan
Failure is not an option when it comes to backing up data and recovering it if disaster strikes. Data backup testing can pinpoint potential problems in the recovery process. Continue Reading
By -
Tip
27 Aug 2025
Compare Azure Government vs. Azure's commercial cloud
Microsoft's Azure Government and global cloud offerings serve different customers and have different compliance requirements. See how they compare to make the right choice. Continue Reading
By -
Tip
27 Aug 2025
Project vs. program vs. portfolio management, explained
Project, program and portfolio management are related, but they represent three distinct disciplines. Learn about the responsibilities and goals of each and how they differ. Continue Reading
By -
News
26 Aug 2025
TUC calls for government crackdown on business AI shortcuts
Artificial intelligence promises to boost productivity and shareholder value, but the Trades Union Congress is concerned that AI-fuelled economic growth is leaving workers behind Continue Reading
By- Cliff Saran, Managing Editor
-
Tip
26 Aug 2025
Developers and vibe coding: 4 survival tips in the AI age
Programmers can stay a step ahead of AI agents and vibe coding by focusing on four areas: precise AI prompts, a broad architectural perspective, keen analysis and imagination. Continue Reading
By- Bob Reselman, CogArtTech
-
Tutorial
26 Aug 2025
How to use Netdiscover to map and troubleshoot networks
Read installation info, basic commands and practical applications for Netdiscover, an ARP-based tool that identifies live hosts, detects unauthorized devices and enhances security. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
News
26 Aug 2025
Broadcom bundles private AI into VCF, adds security automation
At VMware Explore 2025, Broadcom unveiled an integrated private cloud stack with VMware Private AI now included in VCF subscriptions, alongside cyber security services and support for cloud-native object storage Continue Reading
By- Aaron Tan, Informa TechTarget
-
Definition
26 Aug 2025
What are predictive networks and how do they work?
Predictive networks are intelligent IT network systems that use artificial intelligence (AI), machine learning (ML) and real-time analytics to anticipate and proactively address network issues before they occur. Continue Reading
By- Kinza Yasar, Technical Writer
-
News
26 Aug 2025
Three new Citrix NetScaler zero-days under active exploitation
Citrix patches three new vulnerabilities in its NetScaler lines warning of active zero-day exploitation by an undisclosed threat actor Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Aug 2025
Public companies linked to 92% of AI medical device recalls
Most AI medical device recalls were linked to publicly traded companies, with established public companies' recalled devices often lacking clinical validation, new research shows. Continue Reading
By- Anuja Vaidya, Senior Editor
-
News
26 Aug 2025
Okta makes AI identity play with Axiom acquisition
Okta says Axiom Security’s technology will reinforce its own offerings in privileged access management, especially when it comes to the growing number of non-human identities Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
26 Aug 2025
AI in sports: A look back at the analytics pioneers
Where once baseball's Oakland A's gained a strategic edge by discovering undervalued statistics, teams across all sports are now using emerging technologies to inform decisions. Continue Reading
By- Eric Avidon, Senior News Writer
-
News
26 Aug 2025
Qualcomm claims enterprise mobile processor world first
New chip combines integrated RFID with AI and advanced connectivity, enabling edge devices across retail, commercial and industrial sectors to connect, compute and interact in smarter, proximity-aware ways Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Tip
26 Aug 2025
3 ways to use AI for cloud infrastructure management
Some of the most intensive infrastructure tasks include code generation, monitoring and compliance. Can AI automation improve how cloud admins approach infrastructure management? Continue Reading
By- Damon Garn, Cogspinner Coaction
-
News
26 Aug 2025
AMA outlines proposed fixes to Medicare Plan Finder
AMA said updating the Medicare Plan Finder tool is a step in the right direction, and urged HHS consider fail-safes to avoid inaccurate data from populating the tool. Continue Reading
By- Sara Heath, Executive Editor
-
Tip
26 Aug 2025
5 top RAG tools for 2025
The landscape of RAG tools and frameworks is constantly evolving, making it easier to combine generative AI services with enterprise data. Continue Reading
By- Marius Sandbu, Sopra Steria
-
News
26 Aug 2025
Examining Elon Musk's xAI Lawsuit against OpenAI, Apple
While the lawsuit alleges anticompetitive practices and market monopolization, the case highlights the complexities of proving such claims. Continue Reading
By- Esther Shittu, News Writer
-
Feature
26 Aug 2025
Capital One AI partnerships aim to build trust, grow talent
Capital One's relationships with the National Science Foundation and several universities seek to improve AI's responsiveness and create new metrics to measure its progress. Continue Reading
By- John Moore, Industry Editor
-
Feature
26 Aug 2025
Storage suppliers’ market share and strategy
We look at the top eight enterprise storage suppliers’ market share, product offer and how they’ve responded to AI, hybrid cloud, as-a-service purchasing and containerisation Continue Reading
By- Antony Adshead, Computer Weekly
-
Feature
26 Aug 2025
Using simulation forecasting in business analytics
Simulation forecasting allows organizations to explore future scenarios, strengthen planning efforts and improve outcomes through advanced modeling techniques. Continue Reading
By -
Podcast
26 Aug 2025
Black Girls Code CEO says Diversity in AI includes everyone
Cristina Mancini's journey shows that much still needs to be done to accelerate inclusion in technology. Continue Reading
By- Esther Shittu, News Writer
- Shaun Sutner, Senior News Director
-
Feature
26 Aug 2025
Top 10 HR technology challenges in the workplace
Technology has improved some aspects of HR but brought new problems in some cases as well. Learn about some of the most common tech challenges that come up in HR. Continue Reading
By -
News
26 Aug 2025
VMware adds to AI 'jump ball' effect with Tanzu upgrades
Broadcom's virtualization software business is fortifying its Tanzu offerings with a focus on AI and security. Continue Reading
By- Shane Snider, Senior News Writer
-
Feature
26 Aug 2025
Doing more with less: The state of physician reimbursement
New physician performance data shows increases in net patient revenue and provider productivity while reimbursement stays flat, meaning groups are doing more with fewer resources. Continue Reading
By- Jacqueline LaPointe, Executive Editor
-
News
26 Aug 2025
Private mobile network deployments return to growth
Research finds that mobile private network landscape is diversifying, with specialist and smaller players gaining traction Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
26 Aug 2025
Q&A: Simon West, Network Group
General manager at managed service provider organisation outlines where things are going and how things have evolved over its 30 year history Continue Reading
By- Simon Quicke, Microscope Editor
-
News
26 Aug 2025
Boldyn powers up 5G for VMO2 users at Sunderland’s Stadium of Light
Virgin Media O2 mobile users are first to benefit from Sunderland stadium’s 5G neutral host network, delivered under the auspices of the Open Network EcosysTem project Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Blog Post
26 Aug 2025
Societal implications of enabling a better version of ourselves
In the Adam and Eve Garden of Eden that is artificial intelligence (AI), the forbidden fruit appears to be AI that is subtly better at being human than us. For all the potential to improve society, ... Continue Reading
By- Cliff Saran, Managing Editor
-
News
26 Aug 2025
Social media algorithms exposing children to violent pornographic content, report shows
A report by the Children’s Commissioner reveals that social media algorithms are pushing unsolicited, violent, pornographic content to children who use these platforms Continue Reading
By- Tiago Ventura, Computer Weekly
-
Feature
26 Aug 2025
Dartmouth College’s infrastructure head on solving the VMware puzzle and serving Ivy League needs
Ty Peavey from Dartmouth College counts his rapid answer to the Broadcom-VMware farrago as one of his best calls Continue Reading
By- Martin Veitch
-
Opinion
26 Aug 2025
Why digital transformation has a physical address
CCS Insight looks at how Sidara, Cisco, Schneider Electric, Ideal and Para have flipped building design to put digital and sustainability first Continue Reading
By- Bola Rotibi
-
Tip
26 Aug 2025
10 free IT strategic planning templates and examples for CIOs
As technology becomes a business differentiator, a well-thought-out IT strategy plan is more crucial than ever. These IT strategy templates help CIOs make IT a business driver. Continue Reading
By- Kinza Yasar, Technical Writer
- Linda Tucci, Industry Editor -- CIO/IT Strategy
-
Definition
26 Aug 2025
What is Fibre Channel over Ethernet (FCoE)? How it works, benefits, challenges and use cases
Fibre Channel over Ethernet (FCoE) is a storage protocol that enables Fibre Channel (FC) communications to run directly over Ethernet. Continue Reading
-
Feature
26 Aug 2025
Agentic AI compliance and regulation: What to know
Agentic AI's autonomous nature and its ability to access multiple data layers bring heightened risk. Learn how to ensure its deployment meets compliance standards. Continue Reading
-
News
25 Aug 2025
Experts: Intel government stake won't fix long-term woes
A deal giving the U.S. federal government a 10% stake in Intel in exchange for funds won't necessarily ensure the company's ultimate survival, according to industry analysts. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Feature
25 Aug 2025
5 SMART goals for a QA analyst
QA testers can gain peer respect and influence through SMART goals. Take ownership of the software you work on, look up to good product managers and achieve these five goals. Continue Reading
By- Jim Brown, Boston University
-
Video
25 Aug 2025
AWS Certified Cloud Practitioner practice exam
Looking to get AWS Cloud Practitioner certified? Then step through these 65 questions and prepare yourself for the test. Continue Reading
By- Cameron McKenzie, TechTarget
-
Opinion
25 Aug 2025
Cloud becoming vital for VMware modernization
Businesses are experiencing an increase in their VMware pricing. Could modernization with public cloud provide businesses with the cost efficiency they need? Continue Reading
By- Scott Sinclair, Practice Director
-
Omdia
Intelligence and advice powered by decades of global expertise and comprehensive coverage of the tech markets.
-
Video
25 Aug 2025
Deploy apps faster with this AWS Elastic Beanstalk tutorial
AWS Elastic Beanstalk simplifies the deployment of Python, Ruby and Node.js applications. This tutorial shows how to quickly launch applications without complex setup procedures. Continue Reading
By- Cameron McKenzie, TechTarget
-
News
25 Aug 2025
DOJ targets state laws in latest inquiry
In another effort to further President Donald Trump's deregulatory agenda, the DOJ is seeking public comment on state laws that burden U.S. businesses. Continue Reading
By- Makenzie Holland, Senior News Writer
-
Tip
25 Aug 2025
Comparing Microsoft Teams Rooms Basic vs. Pro licenses
Microsoft is moving away from its legacy licensing framework for Teams Rooms. The new options, Basic and Pro, offer some compelling options, with larger groups likely going with Pro. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
News
25 Aug 2025
Medicare bad debt cut plan threatens struggling hospitals
A new study finds hospitals with high bad debt tend to be smaller and have lower operating margins, raising concerns about a potential elimination of Medicare bad debt payments. Continue Reading
By- Jacqueline LaPointe, Executive Editor
-
News
25 Aug 2025
FDA begins publishing daily adverse drug reports for drugs, biologics
The FDA has begun releasing daily FAERS adverse event reports for all prescription drugs and biologics, enhancing post-market surveillance for frequent product monitoring. Continue Reading
By- Alivia Kaylor, MSc, Senior Editor
-
News
25 Aug 2025
DaVita ransomware attack impacts 2.7M individuals
Dialysis provider DaVita suffered a ransomware attack that resulted in one of the largest breaches reported to federal regulators this year. Continue Reading
By- Jill Hughes, Associate Editor
-
Video
25 Aug 2025
Scrum product owner certification practice exam questions
Want to get Scrum product owner certified? This 40-question practice exam will test your mettle and prepare you for the exam. Continue Reading
By- Cameron McKenzie, TechTarget
-
News
25 Aug 2025
How to secure the identity perimeter and prepare for AI agents
Ping Identity CEO Andre Durand explains why identity has become the critical security battleground, how decentralised credentials will reduce data breach risks, and why AI agents will need their own identities to be trusted Continue Reading
-
Tip
25 Aug 2025
Enterprise data governance: Frameworks and best practices
Data backup and recovery depend on a solid governance framework that includes procedures for data management, stewardship, quality monitoring, protection, security and compliance. Continue Reading
-
Definition
25 Aug 2025
What is PHI breach (protected health information breach)?
A PHI (protected health information) breach is unauthorized access, use or disclosure of individually identifiable health information that is held or transmitted by a healthcare organization or its business associates. Continue Reading
By- Rahul Awati
- Shaun Sutner, Senior News Director
-
Feature
25 Aug 2025
Amazon's Project Kuiper vs. Starlink: How do they compare?
Amazon is expanding its horizons as Project Kuiper launched low earth satellites in April 2025. The goal is to bring connectivity to all areas, which is also Starlink's mission. Continue Reading
-
Tip
25 Aug 2025
Red teams and AI: 5 ways to use LLMs for penetration testing
Red teams can harness the power of LLMs for penetration testing. From session analysis to payload crafting, discover five ways AI transforms security testing. Continue Reading
By- Ed Moyle, SecurityCurve
-
Feature
25 Aug 2025
DeepSeek explained: Everything you need to know
DeepSeek, a Chinese AI firm, is disrupting the industry with its low-cost, open source large language models, challenging U.S. tech giants. Continue Reading
-
News
25 Aug 2025
System shocks? EV smart charging tech poses cyber-risks
Trend Micro's Salvatore Gariuolo talks with the Black Hat USA 2025 News Desk about how the new ISO 15118 standard for electric vehicle smart charging and vehicle-to-grid communications can be weaponized by threat actors. Continue Reading
— Dark Reading -
News
25 Aug 2025
Why video game anti-cheat systems are a cybersecurity goldmine
Sam Collins and Marius Muench of the University of Birmingham, UK, join the Black Hat USA 2025 News Desk to explain how anti-cheat systems in video games provide valuable lessons on defending against threat actors' techniques and strategies. Continue Reading
— Dark Reading -
News
25 Aug 2025
Ransomware attack volumes up nearly three times on 2024
During the first six months of 2025, the number of observed and tracked ransomware attacks far outpaced the volume seen in 2024 Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Aug 2025
How architectural controls can help fill the AI security gap
NCC Group's David Brauchler III shares how foundational controls and threat modeling strategies can help secure agentic AI tools in ways traditional guardrails can't. Continue Reading
— Dark Reading -
News
25 Aug 2025
Tree of AST: A bug-hunting framework powered by LLMs
Teenaged security researchers Sasha Zyuzin and Ruikai Peng discuss how their new vulnerability discovery framework leverages LLMs to address limitations of the past. Continue Reading
— Dark Reading -
News
25 Aug 2025
What's the best way to measure health-related social needs?
Research shows no system for measuring health-related social needs can capture every need, suggesting that organizations should leverage multiple systems for a holistic approach. Continue Reading
By- Sara Heath, Executive Editor
-
Podcast
25 Aug 2025
How EY is training employees to use AI in their jobs
In the podcast, Joe Depa, EY global chief innovation officer, explains how a well-designed curriculum targeting different needs results in high AI adoption rates without mandates. Continue Reading
By- David Essex, Industry Editor
-
Answer
25 Aug 2025
The differences between cloud, fog and edge computing
Cloud, edge and fog computing all support modern applications. Cloud computing offers centralized resources, edge enables real-time processing and fog connects them hierarchically. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
-
Definition
25 Aug 2025
Data backup explained: A comprehensive enterprise guide
Data backup is the process of copying data in an IT system to another location so it can be recovered if the original data is lost. Continue Reading
By- John Moore, Industry Editor
-
Blog Post
24 Aug 2025
Create a GitHub Personal Access Token example
This walkthrough shows how to generate a GitHub personal access token, and use the GitHub personal access token to clone, pull, fetch and push changes back to your GitHub repository. Continue Reading
By- Cameron McKenzie, TechTarget
-
Blog Post
23 Aug 2025
Choosing the right container orchestration tool for your project
With so many competing container orchestration tools on the market, it's difficult to settle on which one to choose. But for many, Kubernetes is the right choice, and here's why. Continue Reading
By- Darcy DeClute, Scrumtuous Inc.
-
Blog Post
23 Aug 2025
How to list and show the git stash history
Show your shelved change history with git stash list and show. Continue Reading
By- Cameron McKenzie, TechTarget
-
Blog Post
23 Aug 2025
Java file upload by example with Servlets & JSPs
It's not that hard to perform Java file uploads. The new Servlet and JSP API, along with HTML5 input form enhancements, make Java file uploads, both synchronously and asynchronously with Ajax, ... Continue Reading
By- Cameron McKenzie, TechTarget
-
Tip
22 Aug 2025
Red vs. blue vs. purple team: What are the differences?
Red teams attack, blue teams defend and purple teams facilitate collaboration. Together, they strengthen cybersecurity through simulated exercises and knowledge sharing. Continue Reading
By- Sharon Shea, Executive Editor
-
Tutorial
22 Aug 2025
Vibe coding tutorial with Replit and GitHub Copilot
Vibe coding, or using AI agents to create application code, is all the rage today. This video tutorial shows how it works using popular AI tools Replit and GitHub Copilot. Continue Reading
By- Bob Reselman, CogArtTech
-
Opinion
22 Aug 2025
AI dominates 2025 Future of Memory and Storage conference
Techs discussed at the Future of Memory and Storage event included high-capacity and high-performance SSDs, all against the backdrop of AI. Explore expert analysis from the show. Continue Reading
By- Jim Handy, Objective Analysis
-
News
22 Aug 2025
U.S.-EU trade framework caps pharma tariffs on branded drugs at 15%
A new U.S.-EU trade framework caps pharma tariffs at 15% for branded pharmaceuticals and places generics and their ingredients under the "most-favored nation" rate system. Continue Reading
By- Alivia Kaylor, MSc, Senior Editor
-
Definition
22 Aug 2025
What is Microsoft SSIS (SQL Server Integration Services)?
Microsoft Structured Query Language (SQL) Server Integration Services (SSIS) is an enterprise platform for setting up data integrations and data transformations. Continue Reading
-
News
22 Aug 2025
News brief: Safeguards emerge to address security for AI
Check out the latest security news from the Informa TechTarget team. Continue Reading
By -
Tip
22 Aug 2025
End-to-end network observability for AI workloads
AI-driven technologies require new practices after they're integrated into networks. For AI to run properly, networks must have full network observability. Continue Reading
-
Tip
22 Aug 2025
10 common file-sharing security risks and how to prevent them
IT administrators must understand the top file-sharing security risks and how to ensure they don't create vulnerabilities for the broader organization. Continue Reading
By- Laurence Hart, CGI Federal
- Jessica Groopman, Kaleido Insights
-
News
22 Aug 2025
AWS launches virtual servers with custom Intel Xeon 6 chips
The companies tout a collaboration that will offer better price performance and memory bandwidth for memory-intensive workloads. Continue Reading
By- Shane Snider, Senior News Writer
-
Blog Post
22 Aug 2025
Are there really too many meetings in Scrum?
Some people say there are too many meetings in Scrum. If that's true, which one of the Scrum meeting types would you remove? Planning, reviews, the retrospective or the daily Scrum? Continue Reading
By- Darcy DeClute, Scrumtuous Inc.
-
Definition
22 Aug 2025
What is a SIM swap attack (SIM intercept attack)?
A SIM swap attack (SIM intercept attack) is a form of identity fraud in which the attacker transfers a user's phone number to a different SIM card to gain access to the user's phone calls, text messages, bank accounts, credit card numbers and other sensitive information. Continue Reading
By -
Blog Post
22 Aug 2025
Vast revs up SyncEngine to drive data mobility
Data mobility is of paramount importance… a) always, regardless b) especially in the age of multi-cloud distributed computing c) due to the now widely variegated information landscape that AI ... Continue Reading
-
Blog Post
22 Aug 2025
UBS banks on Domino Data Lab
Enterprise technology vendors sell to customers. That makes vendors vendors and it makes customers customers, usually. Every now and again, that part of the fabric in the space-time continuum gets ... Continue Reading
-
Tip
22 Aug 2025
ESG data collection: Guide and best practices
Sustainability initiatives won't succeed without quality data. Following an ESG data collection framework and best practices ensures program and reporting success. Continue Reading
-
Tip
22 Aug 2025
AI implementation: 13 steps to achieve success in your business
AI technologies can enable and support essential business functions. But organizations must have a solid foundation in place to bring value to their business strategy and planning. Continue Reading
By- Kinza Yasar, Technical Writer
-
Opinion
21 Aug 2025
Can the M1-Simba merger rewrite the telco playbook?
The merger of investment-heavy M1 and lean challenger Simba has created Singapore’s newest telecom giant. Their attempt to solve the “investment-agility paradox” could offer a blueprint for saturated telco markets in Asia-Pacific Continue Reading
By- Edwin Lin
-
Blog Post
21 Aug 2025
HTTP request methods explained
While there are almost 40 registered HTTP request methods, most RESTful web developers only use five of them. Here are the most important HTTP methods and examples of how to use them. Continue Reading
By- Cameron McKenzie, TechTarget
-
Blog Post
21 Aug 2025
PUT vs POST: What's the difference?
What's the difference between PUT and POST methods? Here we compare POST versus PUT in terms of idempotence, URL usage, payloads and their use in RESTful APIs. Continue Reading
By- Cameron McKenzie, TechTarget
-
News
21 Aug 2025
Proposed U.S. law targets contact center AI, offshoring
Contact centers are in the sights of bills before the House and Senate with bipartisan support. Continue Reading
By- Don Fluckinger, Senior News Writer
-
News
21 Aug 2025
Google AI Mode, DeepSeek-V3.1 deliver new agentic features
The cloud provider introduced ways for AI Mode to browse restaurants for reservations, while the Chinese AI vendor upgraded its V3 model. Continue Reading
By- Esther Shittu, News Writer
-
Blog Post
21 Aug 2025
Five ways to fix the 'no persistence.xml file found' error in Eclipse
No persistence.xml file found fix The hardest part about learning Hibernate and JPA 3 is how to get your first project up and running. Some will encounter the dreaded no persistence.xml file found ... Continue Reading
By- Cameron McKenzie, TechTarget
-
Feature
21 Aug 2025
Using AI to identify, expose online drug counterfeiters
Pharmaceutical companies are leveraging AI's advanced detection and enforcement tools to combat the online counterfeit drug market, protecting brand integrity and consumer safety. Continue Reading
By- Alivia Kaylor, MSc, Senior Editor
-
News
21 Aug 2025
Moscow exploiting seven-year-old Cisco flaw, says FBI
US authorities warn of an uptick in state-sponsored exploitation of a seven-year-old vulnerability in Cisco's operating system software Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
21 Aug 2025
What is an air gap backup? Strategy, benefits and use cases
An air gap backup, or an air-gapped backup, is an optional data backup practice used to isolate backup storage from the principal network, such as a business local area network or wide area network, protecting sensitive business data from unauthorized access, tampering or other malicious acts, including malware attacks. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
News
21 Aug 2025
Scale of MoD Afghan data breaches widens dramatically
Many more data breaches at the MoD's Arap programme to relocate at-risk Afghan citizens to Britain have emerged following an FoI request by BBC journalists Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Aug 2025
Apple iOS update fixes new iPhone zero-day flaw
Latest Apple zero-day found in the ImageIO framework opens the door for targeted zero-click attacks on iPhone users Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
21 Aug 2025
Four tech companies increasing manufacturing in the U.S.
Tech companies are pledging to increase U.S. manufacturing by building new or expanding existing facilities as well as investing in research and development. Continue Reading
-
Video
21 Aug 2025
Transfer out of GoDaddy and into Amazon Route 53
If you're using AWS for API gateways and S3 buckets, it makes sense to host your domain there as well. Here's how to transfer out of GoDaddy and into Amazon Route 53. Continue Reading
By- Cameron McKenzie, TechTarget
-
Definition
21 Aug 2025
What is digital resilience? Definition, strategy and use cases
Digital resilience is an organization's ability to manage risks and disruptions to its infrastructure, services and applications, regaining full functionality as quickly as possible while also learning from the experience. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
News
21 Aug 2025
U.S. could feel effects of EU AI Act as companies comply
The U.S. may be making a deregulatory push on AI, but the EU AI Act means large U.S. AI developers must comply with AI regulations that will affect their models regardless. Continue Reading
By- Makenzie Holland, Senior News Writer
-
News
21 Aug 2025
ICO investigates lawfulness of algorithms used in immigration enforcement
The UK information commissioner is investigating claims that the use of algorithms by the Home Office to make recommendations on migrants breaches privacy laws Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
21 Aug 2025
86% of docs say medical misinformation has become more insidious
As docs say medical misinformation has gotten worse, many fear the impact it will have on patient care and outcomes. Continue Reading
By- Sara Heath, Executive Editor