Topics Archive
Free guide to low-code & no-code platforms
Platforms that enable shadow IT are changing development roles and processes. Here's why it's time to embrace this new reality.
-
Video
22 Jul 2025
An explanation of firewall types and uses
Firewalls protect networks by stopping malware at the perimeter. The various types can be deployed with other security measures but can also be used unethically to prohibit access. Continue Reading
By- Sabrina Polin, Managing Editor
-
News
22 Jul 2025
MSPs unprepared to deal with financial impact of cyber attacks
Insights into the attitude of managed service providers to ransomware from CyberSmart has exposed a mixed response towards planning for the worst Continue Reading
By- Simon Quicke, Microscope Editor
-
Feature
22 Jul 2025
Adding digital transformation firepower to Arsenal FC
Arsenal football club deploys customer experience and engagement systems from digital transformation partner to bring fans closer to the game while blending club traditions with a fresh approach to technology Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
22 Jul 2025
AWS adds vector functionality to S3 object storage
S3 Vectors allows customers to store AI vector data in S3 object storage, a move that potentially allows for much cheaper storage of vectorised data usually held in vector databases Continue Reading
By- Antony Adshead, Computer Weekly
-
News
22 Jul 2025
The Bank of England’s quiet ‘Big Bang’
The Bank of England has completed its generational project to replace part of the UK’s critical infrastructure, which went unnoticed beyond the sector it underpins Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Podcast
22 Jul 2025
App refactoring recipe: A Computer Weekly Downtime Upload podcast
We speak to Moderne CEO and OpenRewrite inventor, Jonathan Schneider, about application modernisation Continue Reading
By- Cliff Saran, Managing Editor
-
News
22 Jul 2025
Hitachi Vantara claims Hitachi iQ the most complete AI stack
Hitachi Vantara says its approach to storage and AI offers the most comprehensive solutions, based on its industrial heritage and RAG-like functionality it claims others don’t have Continue Reading
By- Stéphane Larcher, LeMagIT
- Yann Serra, LeMagIT
-
News
22 Jul 2025
Fresh allegations of ‘sustained’ police and MI5 surveillance against BBC reporters
The Investigatory Powers Tribunal is investigating claims that police spied on the phone of investigative journalist Chris Moore amid further claims of a sustained monitoring operation against BBC reporters in Northern Ireland between 2006 and 2022 Continue Reading
By- Bill Goodwin, Investigations Editor
-
E-Zine
22 Jul 2025
UKtech50 2025: The most influential people in UK IT
In this week’s edition of Computer Weekly, we share the results of this year’s UKTech50 list of the IT leaders who are shaping the UK’s digital economy. We also feature a profile of this year’s winner, DeepMind CEO Demis Hassabis, who is the first person ever to top the list twice. Elsewhere in the issue, we also take a look at what steps IT leaders can take to lockdown their Amazon Web Services stacks, and discover the role that data management platforms play in the delivery of a great customer experience. Read the issue now. Continue Reading
-
Opinion
22 Jul 2025
Why enterprise application strategies fail
Enterprise applications are vital for business, yet more than half of all projects fail to deliver a clear return on investment. We explore the common pitfalls and how to build a strategy that ensures success Continue Reading
By- Neha Ralhan
-
Blog Post
22 Jul 2025
Platform engineering - Percona: Driving data in the new normal
This is a guest post for the Computer Weekly Developer Network written by Michal Nosek, senior enterprise architect at Percona. Nosek writes in full as follows... Platform engineering is about ... Continue Reading
-
Feature
22 Jul 2025
Data lake vs. data warehouse: Key differences explained
Data lakes and data warehouses differ in structure, processing and use cases, offering distinct advantages for enterprise analytics and data strategies. Continue Reading
By- Bridget Botelho, Editorial Director, News
-
21 Jul 2025
UKtech50 2025 winner: Demis Hassabis, co-founder and CEO, DeepMind
From chess prodigy to AI visionary, this year’s most influential person in UK technology is far from ordinary. From using AI to win video games to discovering the structure of proteins, Demis Hassabis is a force to be reckoned with Continue Reading
-
21 Jul 2025
UKtech50 2025: The most influential people in UK technology
Computer Weekly has announced the 15th annual UKtech50 – our definitive list of the movers and shakers in the UK tech sector. Continue Reading
-
News
21 Jul 2025
UK may be seeking to pull back from Apple encryption row with US
UK government officials say that attempts by the Home Office to require Apple to introduce ‘backdoors’ to its secure encrypted storage service will cross US red lines Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
21 Jul 2025
As healthcare premiums rise, consumers might feel the pinch
Two reports detail healthcare premium hikes for 2026, which can impact consumers through higher costs and limited employer coverage options. Continue Reading
By- Sara Heath, Executive Editor
-
News
21 Jul 2025
FDA Commissioner names George Tidmarsh as new CDER director
The FDA appointed Stanford physician-scientist and ex-biopharma executive George Tidmarsh as director of its largest division, the Center for Drug Evaluation and Research. Continue Reading
By- Alivia Kaylor, MSc, Senior Editor
-
News
21 Jul 2025
Senators blast pharma-telehealth tie-ups in new report
The report reveals pharma-telehealth partnerships lead to high prescription rates of sponsor medications, raising concerns about conflicts of interest. Continue Reading
By- Anuja Vaidya, Senior Editor
-
Tip
21 Jul 2025
Risk prediction models: How they work and their benefits
Accurate risk prediction models can aid risk management efforts in organizations. Here's a look at how risk models work and the business benefits they provide. Continue Reading
By- Donald Farmer, TreeHive Strategy
-
News
21 Jul 2025
Darktrace buys network visibility specialist Mira
AI cyber giant Darktrace buys network security firm Mira for an undisclosed sum, seeking to enhance the tech stack it offers to highly regulated sectors Continue Reading
By- Alex Scroxton, Security Editor
-
Tip
21 Jul 2025
How to use Windows Update for Business with Group Policy
When organizations need to manage Windows updates, Windows Update for Business can provide all the control they need. And IT should consider Group Policy to manage it. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
Definition
21 Jul 2025
What is the FDA (U.S. Food and Drug Administration)?
The FDA (U.S. Food and Drug Administration) is an agency within the U.S. Department of Health and Human Services (HHS) responsible for protecting public health by ensuring the safety, efficacy and security of human and veterinary drugs, biological products, medical devices, food supply, cosmetics, and products that emit radiation. Continue Reading
By- Katie Terrell Hanna
- Shaun Sutner, Senior News Director
-
News
21 Jul 2025
Patch ToolShell SharePoint zero-day immediately, says Microsoft
The active exploitation of a dangerous zero-day vulnerability chain in Microsoft SharePoint – which was disclosed over the weekend – is underway. Immediate action is advised Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Jul 2025
Oracle adds MCP support to advance agentic AI development
Given that the open standard simplifies the complex process of connecting systems during agentic AI development, the tech giant's integration with MCP stands to benefit users. Continue Reading
By- Eric Avidon, Senior News Writer
-
Feature
21 Jul 2025
How AI is shaping the future of business intelligence
As organisations race to build resilience and agility, business intelligence is evolving into an AI-powered, forward-looking discipline focused on automated insights, trusted data and a strong data culture Continue Reading
By- Aaron Tan, Informa TechTarget
-
Definition
21 Jul 2025
What is SAP MM (SAP Materials Management)?
SAP MM (SAP Materials Management) is a module in the SAP ECC and SAP S/4HANA software suites that enables authorized users to centrally manage purchasing and inventory processes across an entire organization. Continue Reading
By- Rahul Awati
- Jim O'Donnell, News Director
-
News
21 Jul 2025
The Security Interviews: Jason Nurse, University of Kent
Jason Nurse, reader in cyber security at the University of Kent, discusses the psychological side of cyber and online safety, why placing blame on users as ‘the weakest link’ is wrong – and why security pros should think about user needs more Continue Reading
By -
Feature
21 Jul 2025
Meet the deepfake fraudster who applied to work at a deepfake specialist
A recruiter at voice fraud specialist Pindrop had a shock when they came face-to-face with the same deepfake job candidate not once, but twice. Hear their story and learn how to start to protect your hiring process Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Jul 2025
OT security a channel opportunity
Research and anecdotal experiences of those working across the channel all point to operational technology being an area that needs to be secured by partners Continue Reading
By- Simon Quicke, Microscope Editor
-
News
21 Jul 2025
Microsoft SharePoint attacks target on-premises servers
Thousands of organizations, including government agencies, running SharePoint on-premises are vulnerable after Microsoft issued a security alert warning of active attacks. Continue Reading
By- Shane Snider, Senior News Writer
-
Video
21 Jul 2025
An explanation of mesh Wi-Fi
Mesh Wi-Fi networks connect multiple nodes to transmit data without a central router, offering broader coverage and self-healing capabilities, despite higher costs. Continue Reading
By- Jennifer English, Editorial Director
- Sabrina Polin, Managing Editor
-
News
21 Jul 2025
Channel moves: Who's gone where?
Moves of note in the past week at Pax8, SAS, Zero Networks, Vanta and the Chester Business Club Continue Reading
By- Simon Quicke, Microscope Editor
-
Opinion
21 Jul 2025
From IT to OT: The channel’s next growth opportunity
This is an area where the channel can make a real difference, according to Patrick Scholl, head of OT, Infinigate Group Continue Reading
By- Patrick Scholl, head of OT, Infinigate Group
-
Video
21 Jul 2025
AWS Auto Scaling tutorial
Interested in optimizing performance and cost for applications? Learn how to create launch templates and empower EC2 instances to scale with this AWS Auto Scaling tutorial. Continue Reading
By- Cameron McKenzie, TechTarget
-
News
21 Jul 2025
Urban-rural connectivity gap widens in OECD countries
Dataset reveals urban-rural connectivity gap across 60 countries worldwide, highlighting that while access and quality have been improving, divides continue to persist Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Definition
21 Jul 2025
What are oversampling and undersampling?
Oversampling and undersampling are techniques used in data analytics and statistics to modify unequal data classes to create balanced data sets. Continue Reading
By -
Definition
21 Jul 2025
What is Java Development Kit (JDK)?
The Java Development Kit (JDK) is a development environment for building Java applications and applets that can then run on any Java Virtual Machine (JVM). Continue Reading
By- Rahul Awati
- Cameron McKenzie, TechTarget
-
Definition
21 Jul 2025
What is the Common Information Model (CIM)?
The Common Information Model (CIM) is a computer industry standard that defines device and application characteristics so system administrators and management programs can control devices and applications from different manufacturers. Continue Reading
-
Definition
21 Jul 2025
What is a CISO (chief information security officer)?
The CISO (chief information security officer) is a senior-level executive responsible for developing and implementing an information security program. Continue Reading
By- Kinza Yasar, Technical Writer
- Alexander S. Gillis, Technical Writer and Editor
-
Video
21 Jul 2025
An explanation of data breaches
Data breaches can be intentional or accidental and come in various forms, but all types have the potential to cause considerable harm to individuals and organizations. Continue Reading
By- Sabrina Polin, Managing Editor
-
Tip
21 Jul 2025
Demystify the cloud and edge computing relationship
Edge computing remains primarily on-prem, but evolving technologies like 5G might enable some workloads to migrate to shared hosting models, creating a hybrid computing ecosystem. Continue Reading
By- Tom Nolle, Andover Intel
-
News
21 Jul 2025
Linx, Megaport expand connectivity for London networks
London Internet Exchange announces a strategic partnership with global network-as-a-service provider offering one invoice, one port and one point of contact for engineering support Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Opinion
21 Jul 2025
One year on from the CrowdStrike outage: What have we learned?
A year has passed since the CrowdStrike outage caused widespread disruption to enterprise IT systems and infrastructure, but what - if anything - has been learned from the situation? Continue Reading
By- Owen Sayers, Secon Solutions
-
News
21 Jul 2025
Government consults public on self-driving vehicles
The consultation will inform the creation of laws and regulations for autonomous vehicles as the government aims to begin piloting self-driving taxis in spring 2026 Continue Reading
By -
News
21 Jul 2025
Interview: Alexandra Willis, director of digital media and audience development, The Premier League
Digital media is core to engaging nearly two billion fans of Premier League football around the world, with data analytics and AI playing an ever-more important role Continue Reading
By -
News
21 Jul 2025
Singapore under ongoing cyber attack from APT group
Nation-state actor UNC3886 is actively targeting Singapore’s critical national infrastructure in a sophisticated espionage and disruption campaign, with the country mounting a whole-of-government response Continue Reading
By- Aaron Tan, Informa TechTarget
-
Blog Post
21 Jul 2025
F5 expands AI-XOps automation & customisation controls
As part of a recent round of platform updates, the Computer Weekly Developer Network notes that F5 has announced new tools to reduce the complexity that cross-functional operations (XOps) teams ... Continue Reading
-
News
21 Jul 2025
Netherlands calls for European shift to post-tracking internet as privacy laws fail
Dutch research institute argues decade of regulation hasn’t curbed surveillance capitalism, proposes fundamental business model change Continue Reading
By- Kim Loohuis
-
Feature
21 Jul 2025
The role of customer data platforms
We look at where a customer data platform sits alongside other technologies that offer features to boost customer experience Continue Reading
By- Cliff Saran, Managing Editor
-
Definition
21 Jul 2025
What is IoT (internet of things)?
The internet of things, or IoT, is a network of interrelated devices that connect and exchange data with other IoT devices and the cloud. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Kinza Yasar, Technical Writer
-
Blog Post
20 Jul 2025
How to fork a Git repository
Looking for the fork command in Git? Well, it doesn’t exist. Here we'll show you how to fork a Git or GitHub repo on your own. Continue Reading
By- Cameron McKenzie, TechTarget
-
Blog Post
19 Jul 2025
Principle of least privilege examples & best practices
We see examples of the principle of least privilege everywhere in our daily lives. What does the principle of least privilege mean as applied to security in software development and DevOps? Continue Reading
By- Cameron McKenzie, TechTarget
-
Blog Post
19 Jul 2025
How to write your first Java program
Want to learn to code and write your first Java program? Here's a quick and fun Java programming tutorial that will have your running your first Java program in less than 10 minutes. Continue Reading
By- Darcy DeClute, Scrumtuous Inc.
-
News
18 Jul 2025
NCSC exposes Fancy Bear's Authentic Antics malware attacks
Amid a new round of UK government sanctions targeting Moscow's intelligence apparatus, the NCSC has formally attributed attacks orchestrated with a cleverly-designed malware to the GRU's Fancy Bear cyber unit Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
18 Jul 2025
What is end-user experience monitoring (EUEM)?
End-user experience monitoring (EUEM) is the process of monitoring the performance of IT resources from an end user's perspective. Continue Reading
By- Mary E. Shacklett, Transworld Data
- Brien Posey
-
Tip
18 Jul 2025
How to create a risk management plan: Template, key steps
A risk management plan provides a framework for managing business risks. Here's what it includes and how to develop one, plus a downloadable plan template. Continue Reading
By- Donald Farmer, TreeHive Strategy
-
Blog Post
18 Jul 2025
How to format a Java int or long with printf example
Here's a quick tutorial on how to use printf to format Java int, long, short and byte values. It's pretty easy to do. And the output you can generate can be very visually appealing. Continue Reading
By- Cameron McKenzie, TechTarget
-
Feature
18 Jul 2025
CISO role in ASM could add runtime security, tokenization
Runtime security and tokenization stand to play a bigger role in attack surface management, a development that could influence security leaders' responsibilities. Continue Reading
By- John Moore, Industry Editor
-
Definition
18 Jul 2025
What is MySQL?
MySQL is a popular, scalable, user-friendly, open source and free relational database management system (RDBMS) that uses Structured Query Language (SQL) to store, manage, and manipulate data. Continue Reading
-
Blog Post
18 Jul 2025
How to use Java's var keyword
While the use of var in Java brings inferred typing to the platform, it does not negate Java's dedication to strong typing. Here's how the Java var keyword works, along with simple examples of how ... Continue Reading
By- Cameron McKenzie, TechTarget
-
News
18 Jul 2025
News brief: Cyberattack trends signal security arms race
Check out the latest security news from the Informa TechTarget team. Continue Reading
By -
News
18 Jul 2025
Soracom unveils Connectivity Hypervisor to expand IoT flexibility
IoT technology and services provider takes step towards intelligent connectivity management, giving deployments ‘unprecedented’ flexibility and control over cellular connectivity Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Tip
18 Jul 2025
9 challenges of data analytics in HR
HR teams can capitalize on data they're already collecting by implementing analytics. But be on the lookout for these roadblocks. Continue Reading
By -
Video
18 Jul 2025
An explanation of local area networks
Local area networks are interconnected systems that share resources within a limited geographic area. They can be wired, wireless or virtual, depending on workplace needs. Continue Reading
By- Tommy Everson, Assistant Editor
-
News
18 Jul 2025
Data-driven AI: How AWS partners and customers operate
A key factor is driving how organizations like The Ocean Cleanup and Dine Brands apply AWS' technology to their applications and needs. Continue Reading
By- Esther Shittu, News Writer
-
News
18 Jul 2025
CISPE criticised over securing preferential cloud pricing on Microsoft products for members
Microsoft has signed an agreement with cloud trade body CISPE to secure more agreeable pricing on the software giant’s cloud products for its members, much to the chagrin of the wider European cloud community Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
18 Jul 2025
DWP accused of shielding AI deployments from public scrutiny
Amnesty International and Big Brother Watch say Department for Work and Pensions’ ‘unchecked’ and opaque use of AI in the UK benefits system treats claimants as suspicious and is shielded from public scrutiny Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Tip
18 Jul 2025
How to build a cybersecurity team to maximize business impact
How CISOs design and build their security teams is as important as the technology they select to safeguard their organizations' digital assets. Continue Reading
By- Ed Moyle, SecurityCurve
-
News
18 Jul 2025
Sizewell C deploys VodafoneThree dedicated 5G
UK operator inks strategic agreement as a tier one contractor for currently underway nuclear power station project deploying dedicated 5G masts and fibre installations, ensuring Wi-Fi, LAN and WAN connectivity Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Video
18 Jul 2025
A brief explanation of latency
Latency measures data transmission delays between points. Causes include physical distance and hardware issues, while solutions might involve hardware upgrades or edge computing. Continue Reading
By- Sabrina Polin, Managing Editor
-
News
18 Jul 2025
Is history repeating itself with the government’s push to open public sector cloud deals to SMEs?
The UK government wants to help public sector IT buyers do away with legacy tech and migrate to the cloud, with the help of a soon-to-be-launched procurement marketplace. But haven’t we heard all this before? Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
Tip
18 Jul 2025
Why you need a payroll disaster recovery plan
Payroll data is critical, and the consequences of losing it are steep. Learn how to create a strong payroll disaster recovery plan to protect employee data. Continue Reading
By -
News
18 Jul 2025
Entities report several large healthcare data breaches to OCR
Millions of individuals were impacted by the most recent healthcare data breaches reported to HHS. Continue Reading
By- Jill Hughes, Associate Editor
-
News
18 Jul 2025
Peer warns IT suppliers against partnering with Fujitsu in government contracts
According to publicly available figures, Fujitsu has won over half a billion pounds in government business as prime contractor since January 2024, but there is more than what has been reported Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
18 Jul 2025
Exertis Enterprise looks to life after sale of IT business
Enterprise-focused business was not part of the sale earlier this week and continues to operate under the DCC Technology umbrella Continue Reading
By- Simon Quicke, Microscope Editor
-
Definition
18 Jul 2025
What is Samsung Galaxy?
Samsung Galaxy is a product line of Android smartphones, tablets and internet of things devices manufactured by Samsung Electronics. Continue Reading
By- Rosa Heaton, Content Manager
- Nick Barney, Technology Writer
-
Definition
18 Jul 2025
What is biometric authentication?
Biometric authentication is a security process that relies on the unique biological characteristics of individuals to verify their identity. Continue Reading
By- Kinza Yasar, Technical Writer
- Cameron Hashemi-Pour, Former Site Editor
-
Quiz
18 Jul 2025
Sustainability quiz: Test your knowledge of the basics
Have fun testing what you know about climate change basics, contributing factors and potential solutions by taking this sustainability quiz. Continue Reading
By -
News
18 Jul 2025
Channel catch-up: News in brief
Catch up on developments this week at Apogee, Westcon-Comstor, BlueSnap, SoftwareONE and ISS Continue Reading
By- Simon Quicke, Microscope Editor
-
Blog Post
18 Jul 2025
OWC USB-C quad HDMI 4K adapter
Not enough connections. Well, not enough HDMI connections… and it has always been a problem that I’ve been trying to work around. On my constant mission to find more productive ways of working, I ... Continue Reading
-
Blog Post
18 Jul 2025
Java double brace initialization explained by example
Java's double brace initialization feature saves time and shaves off a few keystrokes when you initialize a Set or seed a List for testing. Here's a quick example of how to use Java's double brace ... Continue Reading
By- Cameron McKenzie, TechTarget
-
News
18 Jul 2025
Barracuda: Security opportunities and challenges out there for MSPs
Survey of the market reveals many SME customers are working with the channel, and are prepared to spend to keep themselves protected Continue Reading
By- Simon Quicke, Microscope Editor
-
Blog Post
18 Jul 2025
Perforce puts agentic functions in test scripts
AI ubiquity is driving every vendor worth its salt to detail new functions in its platform. Where we (as the IT industry) were once obsessed with AI, then retrieval augmented generation and then ... Continue Reading
-
News
18 Jul 2025
Charities struggle to find the skills to adopt AI
Charities are building pace with digital adoption, but in many cases a lack of skills stands in the way of properly utilising tech Continue Reading
By- Clare McDonald, Business Editor
-
News
18 Jul 2025
First Post Office Capture conviction referred to Court of Appeal
A former Capture software user’s 1998 theft conviction is the first to be referred to the Court of Appeal Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
18 Jul 2025
European 5G suffers from fragmentation, two-speed competitiveness
Carrot-and-stick mix of spectrum management, subsidies and coverage obligations sees Northern and Southern territories lead in European 5G availability Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Tip
18 Jul 2025
Crisis communications plan: How to build one, with template
Don't overlook crisis communications when you are disaster recovery planning. Use these tips and our free template to build a thorough crisis communications plan. Continue Reading
By -
Blog Post
17 Jul 2025
Java Scanner char input example without nextChar
How to add Java Scanner char support The Java Scanner class provides methods that take String input and convert that String into any Java primitive type you might need, except for one: the char. ... Continue Reading
By- Cameron McKenzie, TechTarget
-
News
17 Jul 2025
Google adds new features in Search as AI race intensifies
The tech giant added more GenAI features to AI Mode, and a new business calling system. The updates respond to growing rivalry in AI search from vendors like OpenAI and Perplexity. Continue Reading
By- Esther Shittu, News Writer
-
Tip
17 Jul 2025
How to calculate cybersecurity ROI for CEOs and boards
Calculating and communicating cybersecurity ROI can help persuade top management to invest. Here's how to use meaningful, concrete metrics that resonate with business leaders. Continue Reading
By- Jerald Murphy, Nemertes Research
- Alissa Irei, Senior Site Editor
-
Blog Post
17 Jul 2025
How to format a Java table with printf example
Why not make your console output look pretty? Create, format and print data tables with Java printf statements, along with a clever combination of dashes, pipelines and printf placeholders. Continue Reading
By- Cameron McKenzie, TechTarget
-
News
17 Jul 2025
Knostic wins 2024 Black Hat Startup Spotlight Competition
During a 'Shark Tank'-like final, each startup's representative spent five minutes detailing their company and product, with an additional five minutes to take questions from eight judges from Omdia, investment firms, and top companies in cyber. Continue Reading
— Dark Reading -
News
17 Jul 2025
Hackers make hay? Smart tractors vulnerable to full takeover
Hackers can spy on tens of thousands of connected tractors in the latest IoT threat, and brick them too, thanks to poor security in an aftermarket steering system. Continue Reading
— Dark Reading -
News
17 Jul 2025
Rethinking cyber-risk as traditional models fall short
Systemic cyber-risk models are not accounting for rapidly evolving threats -- and a time when organizations are more interconnected than ever. Continue Reading
— Dark Reading -
News
17 Jul 2025
We've all been wrong: Phishing training doesn't work
Teaching employees to detect malicious emails isn't really having an impact. What other options do organizations have? Continue Reading
— Dark Reading -
News
17 Jul 2025
Ransomware reshaped how cyber insurers perform security assessments
Cyber-insurance companies were forced to adapt once ransomware skyrocketed and highlighted crucial security weaknesses among organizations in all sectors. Continue Reading
— Dark Reading -
News
17 Jul 2025
New AI malware PoC reliably evades Microsoft Defender
Worried about hackers employing LLMs to write powerful malware? Using targeted reinforcement learning (RL) to train open source models in specific tasks has yielded the capability to do just that. Continue Reading
— Dark Reading -
News
17 Jul 2025
Microsoft deputy CISO recounts responding to the CrowdStrike outage
The industry’s collective response to the massive outage underscored for Ann Johnson its ability to come together and put competitive interests aside. Continue Reading
— Cybersecurity Dive -
News
17 Jul 2025
CISA director: Cybersecurity is ‘not an impossible problem’
In Jen Easterly’s view, the solution to the industry’s pains lies in secure by design. “We got ourselves into this, we have to get ourselves out,” she said during a media briefing at Black Hat. Continue Reading
— Cybersecurity Dive -
News
17 Jul 2025
Black Hat USA 2024 Highlights
Check out all the highlights from Black Hat USA 2024 at the Mandalay Bay in Las Vegas. Continue Reading
— Dark Reading