Topics Archive
Free guide to low-code & no-code platforms
Platforms that enable shadow IT are changing development roles and processes. Here's why it's time to embrace this new reality.
-
Definition
07 Jul 2025
What is service supply chain?
The service supply chain is the part of the supply chain dedicated to providing service on products. Continue Reading
By- David Essex, Industry Editor
-
Definition
07 Jul 2025
What is a network management system?
A network management system (NMS) is an application or set of applications that enable network engineers to manage a network's independent components inside a larger network management framework and perform several key functions. Continue Reading
By- Chuck Moozakis, Editor at Large
-
Tip
07 Jul 2025
How to detect and fix a jailbroken iPhone
Jailbroken devices can give rise to security threats for users and organizations alike. Learn how to prevent, detect and remove jailbreaking on enterprise iPhones. Continue Reading
-
Definition
07 Jul 2025
What is an application support engineer (ASE)?
An application support engineer (ASE) is an IT professional who is responsible for troubleshooting the software applications a company uses and ensuring that help desk tickets are resolved in a timely fashion. Continue Reading
By -
Tip
07 Jul 2025
How to avoid greenwashing as a marketer
Greenwashing can erode customer trust and damage a brand's reputation. To avoid it, organizations can offer evidence to support their claims and earn sustainability certifications. Continue Reading
By- Griffin LaFleur, Swing Education
-
Definition
07 Jul 2025
What is a cloud radio access network (C-RAN)?
A cloud radio access network (C-RAN) is a centralized, cloud computing-based architecture for radio access networks. Continue Reading
By -
Definition
07 Jul 2025
What is a point of presence (PoP)?
A point of presence (PoP) is a point or physical location where two or more networks or communication devices build a connection from one place to the rest of the internet. Continue Reading
-
Tip
07 Jul 2025
Control user storage using Linux quotas
Explore uses and functions of Linux storage quotas plus a step-by-step example of quota configuration. Admins can roll out quotas with minimal disruption to users. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
Feature
07 Jul 2025
Understanding the importance of randomized clinical trials
Randomized controlled trials are the gold standard for proving therapeutic value, drug safety and efficacy, shaping pricing, reimbursement and securing regulatory approval. Continue Reading
By- Alivia Kaylor, MSc, Senior Editor
-
Definition
07 Jul 2025
What is database as a service (DBaaS)?
Database as a service (DBaaS) is a cloud computing managed service offering that provides access to a database without requiring the setup of physical hardware, the installation of software or the need to configure the database. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Craig S. Mullins, Mullins Consulting
-
Tip
07 Jul 2025
The cloud's role in PQC migration
Even though Q-Day might be several years away, enterprises should develop a strategic plan to prepare for the future. Experts share what challenges lie ahead with PQC migration. Continue Reading
-
News
07 Jul 2025
3 questions with Cisco channel exec Rodney Clark
For this episode of CFTV, we caught up with Cisco channel exec Rodney Clark at Cisco Live. Continue Reading
— Channel Futures -
News
07 Jul 2025
Interview: Antony Hausdoerfer, group CIO, The AA
The vehicle recovery specialist is looking to artificial intelligence and connected vehicle technology to enhance customer experience and get drivers back on the road in the shortest possible time Continue Reading
By -
News
07 Jul 2025
Tech firms complicit in ‘economy of genocide’, says UN rapporteur
A UN special rapporteur has called for technology firms operating in Israel and the Occupied Palestinian Territories to immediately halt their activities, in wider report about the role corporate entities have played in the Israeli state’s ongoing ‘crimes of apartheid and genocide’ Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Definition
07 Jul 2025
What is a procurement plan?
A procurement plan -- also called a procurement management plan -- is a document that is used to manage the process of finding and selecting a vendor. Continue Reading
By -
Opinion
07 Jul 2025
Virtualization alternatives and AI: Lessons from HPE Discover
IT vendors continue to deliver VMware alternatives and expand infrastructure systems they offer to support enterprise AI workloads. Continue Reading
By- Scott Sinclair, Practice Director
-
News
07 Jul 2025
Financial services giant Prudential crafts agentic AI strategy
Like all technology deployments in highly regulated industries, agentic AI must be approached carefully. Continue Reading
By- Don Fluckinger, Senior News Writer
-
News
07 Jul 2025
Key healthcare takeaways from Trump’s spending bill
President Trump signed the tax and domestic policy megabill into law, putting in motion massive Medicaid cuts and work requirements, among other healthcare-related provisions. Continue Reading
By- Jacqueline LaPointe, Executive Editor
-
News
07 Jul 2025
Indosat Ooredoo Hutchison, Nokia reduce energy demand and support AI comms
Comms tech provider’s autonomous networks portfolio deployed to enable Asian operator to shut idle and unused radio equipment automatically during low network demand periods Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
07 Jul 2025
More than 70% of parents say kids aren’t taught coding at school
Despite a growing need for tech skills, many parents claim coding isn’t taught in schools, research from the Raspberry Pi Foundation has found Continue Reading
By- Clare McDonald, Business Editor
-
News
07 Jul 2025
Zopa to embed into Manchester’s tech ecosystem
Challenger bank Zopa plans to eventually have 500 staff in its Manchester office, which will launch next month Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Definition
07 Jul 2025
What is a host (in computing)?
A host is a computer or other device that communicates with other hosts on a network. Continue Reading
-
Definition
07 Jul 2025
What is green networking?
Green networking is the practice of selecting energy-efficient networking technologies and products to minimize resource use whenever possible. Continue Reading
By -
Feature
07 Jul 2025
AI lawsuits explained: Who's getting sued?
Authors, artists and others are filing lawsuits against generative AI companies for using their data in bulk to train AI systems without permission. Continue Reading
By- Ben Lutkevich, Site Editor
- Rosa Heaton, Content Manager
-
Conference Coverage
07 Jul 2025
Cisco Live 2025 conference coverage and analysis
Cisco Live 2025 largely focused on the need to modernize infrastructure with AI capabilities. Use this guide to get all the conference news and analysis from this year. Continue Reading
By- Jennifer English, Editorial Director
-
Definition
07 Jul 2025
What is network as a service (NaaS)?
Network as a service (NaaS) is a cloud model for delivering various network services virtually on a subscription basis. Continue Reading
By- John Burke, Nemertes Research
-
Definition
07 Jul 2025
What is ingress filtering?
Ingress filtering is a method used by enterprises and internet service providers to prevent suspicious traffic from entering a network. Continue Reading
-
Podcast
07 Jul 2025
Gartner’s view on AI security: A Computer Weekly Downtime Upload podcast
We speaker to Gartner's Nader Heinen about why access control should be built into enterprise AI Continue Reading
By- Cliff Saran, Managing Editor
-
News
07 Jul 2025
Altnet calls on UK comms regulator to prevent rural broadband stagnation
Northern Ireland broadband supplier calls on Ofcom to cut charges applied by market leader regarding use of communications poles. Meanwhile, leading English altnet is hit by fine for its installed comms apparatus in Birmingham City area Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
07 Jul 2025
Ingram Micro hit by ransomware attack
Distributor Ingram Micro suffers outages after ransomware group targets the channel player Continue Reading
By- Simon Quicke, Microscope Editor
-
News
07 Jul 2025
Boldyn Networks accelerates vision with new CEO, Smart Mobile Labs rebrand
Leading neutral host provider bolsters European presence with new European leadership structure including CEO and CTO, as well as integration of Smart Mobile Labs under core banner Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
07 Jul 2025
Interview: Data processing for particle physics at Cern
We speak to Cern principal scientist Archana Sharma about pattern recognition, machine learning and quantum technology Continue Reading
By- Cliff Saran, Managing Editor
-
News
07 Jul 2025
Channel moves: Who’s gone where?
Moves this past week at BCS, 8x8, Leaseweb, Alteryx, CyberArk and TrafficGuard Continue Reading
By- Simon Quicke, Microscope Editor
-
Feature
07 Jul 2025
How doctors can respond to bad online provider reviews
Clinicians must be mindful of HIPAA compliance and patient privacy as they learn to respond to bad online provider reviews. Continue Reading
By- Sara Heath, Executive Editor
-
News
07 Jul 2025
Digital warfare is blurring civilian front lines
Singapore’s defence cyber chief warns that the traditional lines between military conflict and civilian life are blurring, with adversaries now targeting civilian systems and using AI to put the threat landscape on steroids Continue Reading
By- Aaron Tan, Informa TechTarget
-
Blog Post
07 Jul 2025
Platform engineering - BairesDev: Maturity is redefining talent
This is a guest post written by Justice Erolin in his role, Chief Technology Officer, BairesDev, a nearshore software development and staff augmentation company. Erolin writes in full as follows… ... Continue Reading
-
Feature
07 Jul 2025
Types of backup explained: Incremental vs. differential vs. full, etc.
There are several different types of backup available today. Choose the best way to safeguard your data and recover appropriately in the event of an incident. Continue Reading
By- Erin Sullivan, Senior Site Editor
- Brien Posey
- Paul Crocetti, Editorial Director
-
Feature
07 Jul 2025
What is the future of cybersecurity?
As cyberthreats grow more sophisticated, enterprises face mounting challenges. What does the future of cybersecurity hold, and how can organizations stay ahead? Continue Reading
By- Karen Kent, Trusted Cyber Annex
-
Feature
07 Jul 2025
12 top enterprise risk management trends in 2025
Trends reshaping risk management include use of GRC platforms, risk maturity models, risk appetite statements and AI tools, plus the need to manage AI risks. Continue Reading
-
Opinion
04 Jul 2025
From the FBI to F&A: lessons learnt in safeguarding systems and data
One chief information security officer shares her experience of marshalling what she learned at the FBI for business security, with a particular focus on finance and accounting Continue Reading
By- Jill Knesek
-
News
04 Jul 2025
O2 boosts 4G, 5G network capacity
Ahead of the forthcoming holiday rush this summer, leading UK operator announces mobile upgrades in over 13,000 Scottish postcodes Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
04 Jul 2025
Boost for European space sovereignty as Open Cosmos gets Connected
Open Cosmos acquires Portuguese startup Connected to offer affordable, standardised IoT services from space, with the firm claiming a 100% mission success rate in orbit across all its satellite missions Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
04 Jul 2025
Dassault Systèmes accelerates virtual twin offer with Ascon Qube acquisition
Leading engineering technology provider acquires core technology to advance its virtual twin strategy for factories, with AI-powered, SaaS-ready tech set to enable software-defined automation at the machine level Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Blog Post
04 Jul 2025
How to perform a shallow git clone
This shallow git clone example shows you how to use the --depth switch to limit the git commit history pulled to your local machine. Continue Reading
By- Cameron McKenzie, TechTarget
-
News
04 Jul 2025
Channel catch-up: News in brief
Developments of note at Dell, Gamma Communications, Bytes, TD Synnex, LevelBlue, Crayon, Trend Micro and Brother UK Continue Reading
By- Simon Quicke, Microscope Editor
-
News
04 Jul 2025
NHS to be ‘digital by default’
Single Patient Records, a digitally enabled neighbourhood health service, and the NHS App becoming a ‘doctor in your pocket’ are all part of the government’s 10-year plan for the NHS Continue Reading
By -
News
04 Jul 2025
boxxe bolsters position with CAE buy
Channel consolidation continues, with Cisco and Microsoft partner snapped up in the latest deal Continue Reading
By- Simon Quicke, Microscope Editor
-
E-Zine
04 Jul 2025
MicroScope: Navigating through uncertainty
In this issue, learn about how to navigate the multitude of challenges facing the channel today, from global politics to economics and skills. Also, discover why platforming could be the solution to speed and cost woes, and learn all about BT Wholesale’s approach to the switch to digital Continue Reading
-
News
04 Jul 2025
Orange France, Samsung establish vRAN, Open RAN first pilot
Samsung and Orange France partner to progress open radio access network tech from lab to field, further exploring the performance maturity and operational effectiveness of open, virtualised RAN Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
04 Jul 2025
Medow Health AI debuts AI scribe tool in Singapore
The Australian health technology company has launched its AI-powered scribe platform in Singapore to help healthcare professionals automatically capture and structure clinical notes, reports and referral letters Continue Reading
By- Aaron Tan, Informa TechTarget
-
Blog Post
03 Jul 2025
Create your first Java AWS Lambda function in minutes
If you haven't created a Java-based AWS Lambda function before, you'll be amazed at how easy it is. This quick AWS, Lambda and Java tutorial will quickly get you started in the world of serverless ... Continue Reading
By- Cameron McKenzie, TechTarget
-
Blog Post
03 Jul 2025
OpenUK Public Good AI report 2025, good (could do better)
A balmy summer evening in London and a need to champion open source software, open platforms, open data and open computing at large can only mean one thing. That thing is a chance to celebrate the ... Continue Reading
- 03 Jul 2025
- 03 Jul 2025
- 03 Jul 2025
-
Opinion
03 Jul 2025
AI plans gather pace - but expert partners are the key to success
Kenz Mroue, director EMEA partner sales, Nasuni, shares some thoughts on the role partners play in delivering artificial intelligence Continue Reading
By- Kenz Mroue, director EMEA partner sales, Nasuni,
-
News
03 Jul 2025
Glastonbury hits higher note for mobile performance
Data from mobile network performance analyst shows mobile quality at UK’s leading music festival rising across the board each year, but with much variance between individual operators Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
03 Jul 2025
Partners begin to target agentic AI marketplace platforms
Cloud marketplaces are emerging as key venues for adoption of AI agents. Consultants and integrators aim to offer the technology but will need to work out pricing methods. Continue Reading
By- John Moore, Industry Editor
-
News
03 Jul 2025
Air France-KLM to increase intelligence of bots that have saved 200,000 hours
Airline group will now use agentic AI technology to make existing bots ‘more intelligent’ Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
03 Jul 2025
Advania uses M&A to bolster AI position
Channel player picks up consultancy specialising in artificial intelligence to add more depth to its ability to support customers looking to adopt the technology Continue Reading
By- Simon Quicke, Microscope Editor
-
News
03 Jul 2025
Antonio Neri views HPE and Juniper tie-up as a channel positive
With the deal finally given approval, the HPE boss describes his initial thoughts about what it will mean for partners Continue Reading
By- Simon Quicke, Microscope Editor
-
News
03 Jul 2025
VodafoneThree and Currys ink exclusive multiyear partnership
Newly merged telco seals exclusive multiyear partnership with UK omnichannel retailer of technology products and services to become its sole mobile network operator and expand mobile broadband Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
03 Jul 2025
Space comms reaches commercialisation inflection point
Study finds satellite communications industry gaining altitude with commercialisation increasing apace, especially in enterprise IoT Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
03 Jul 2025
Fine-tuning to deliver business AI value
Foundation AI models offer knowledge that spans the internet, but they generally lack an understanding of proprietary business data and processes Continue Reading
By- Cliff Saran, Managing Editor
-
Blog Post
03 Jul 2025
Cycloid on AI in platform engineering: acceleration, or technical debt on fast forward?
This is a guest post for the Computer Weekly Developer Network written by Benjamin Brial, founder, Cycloid. Brial writes in full as follows... As AI continues to infiltrate every corner of the ... Continue Reading
-
News
03 Jul 2025
How GoTo’s high-stakes cloud shift is powering its AI future
The Indonesian tech giant has migrated half its infrastructure to Alibaba Cloud, paving the way for AI initiatives to solve real-world business problems and support local languages Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
02 Jul 2025
Arista buys VeloCloud from Broadcom
Arista fills a gap in its portfolio with VeloCloud's SD-WAN capabilities. Continue Reading
By- Nicole Laskowski, Senior News Director
-
News
02 Jul 2025
IFS snaps up AI agent platform vendor TheLoops
IFS beefs up its industrial AI agentic capabilities by acquiring TheLoops. Continue Reading
By- Jim O'Donnell, News Director
-
Tip
02 Jul 2025
The pros and cons of geothermal energy use
Data centers continue to strain the grid, stressing the need for alternative energy. Admins should weigh the pros and cons of using geothermal energy as a clean, reliable option. Continue Reading
By -
Tip
02 Jul 2025
Implement a business continuity plan for remote workers
Business continuity efforts don't stop when employees go remote. Learn how to create and manage a reliable business continuity plan for remote workers. Continue Reading
By -
Definition
02 Jul 2025
What is post-quantum cryptography? Comprehensive guide
Post-quantum cryptography, also known as quantum encryption or PQC, is the development of cryptographic systems for classical computers that can prevent attacks launched by quantum computers. Continue Reading
By- Nick Barney, Technology Writer
- Rob Clyde, Isaca
- Alexander S. Gillis, Technical Writer and Editor
-
Tip
02 Jul 2025
Help desk vs. service desk: What's the difference?
Help desks deliver tactical, immediate technical support for specific issues, while service desks offer strategic, comprehensive management of business services. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
Definition
02 Jul 2025
What is mobile computing?
Mobile computing refers to the set of IT technologies, products, services and operational strategies and procedures that enable end users to access computation, information and related resources and capabilities while mobile. Continue Reading
By- Paul Kirvan
- Ben Lutkevich, Site Editor
- Craig Mathias
-
News
02 Jul 2025
US CISA agency extends Iran cyber alert, warns of CNI threat
The US Cybersecurity and Infrastructure Security Agency reiterates guidance for operators of critical national infrastructure as it eyes the possibility of cyber attacks from Iran Continue Reading
By- Alex Scroxton, Security Editor
-
News
02 Jul 2025
Racial bias evident in psychiatric recommendations by LLMs
New research shows psychiatric treatment recommendations by LLMs are prone to racial bias, highlighting the importance of AI oversight to ensure health equity. Continue Reading
By- Anuja Vaidya, Senior Editor
-
Definition
02 Jul 2025
What is a message authentication code (MAC)? How it works and best practices
A message authentication code (MAC) is a cryptographic checksum applied to a message to guarantee its integrity and authenticity. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Robert Sheldon
-
News
02 Jul 2025
Google fixes type confusion flaw in Chrome browser
An actively exploited type confusion vulnerability in the Google Chrome web browser needs immediate attention from users Continue Reading
By- Alex Scroxton, Security Editor
-
News
02 Jul 2025
Scattered Spider link to Qantas hack is likely, say experts
A developing cyber attack at Australian airline Qantas that started at a third-party call centre is already being tentatively attributed to Scattered Spider. Find out more and learn about the next steps for those affected Continue Reading
By- Alex Scroxton, Security Editor
-
News
02 Jul 2025
Qlik adds trust score to aid data prep for AI development
By measuring dimensions such as diversity and timeliness, the vendor's new tool helps users understand if their data is properly prepared to inform advanced applications. Continue Reading
By- Eric Avidon, Senior News Writer
-
Blog Post
02 Jul 2025
Why the Gov.uk App could (maybe, possibly...) be a turning point for digital government
Twelve years ago, the Government Digital Service (GDS) told us that it was “not ‘appy at all”. The March 2013 blog post that announced GDS would not develop a government mobile app and would ... Continue Reading
By- Bryan Glick, Editor in chief
-
News
02 Jul 2025
TSB faces another risky IT migration as Santander eyes UK bank
TSB’s customers were moved to the in-house-developed platform of its parent, Sabadell, in a disastrous migration in 2018 Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
02 Jul 2025
Network failures see third of UK businesses lose £4m a year
Research finds as many as half of UK businesses have been forced to urgently re-evaluate their tech infrastructure following a wave of high-profile IT outages Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
02 Jul 2025
Bias and lack of flexibility hindering diversity, finds DSIT
A diversity and inclusion report compiled for the Department for Science, Innovation and Technology outlines the many barriers to diversity in the UK’s tech sector Continue Reading
By- Clare McDonald, Business Editor
-
Tip
02 Jul 2025
How IoT data collection works
IoT data collection enables organizations to constantly gather and analyze physical measurements, location data and operational metrics with internet-connected sensors and devices. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
Feature
02 Jul 2025
Integrating digital cognitive assessments into primary care
Researchers have found that digital assessments for mild cognitive impairment are feasible within primary care, with high patient acceptance despite workflow adjustments. Continue Reading
By- Anuja Vaidya, Senior Editor
-
Opinion
02 Jul 2025
Technology’s true test - serving people, society, economy, and the planet
The TechUK President's Awards reflect the ambitions that everyone in technology should be striving for - to improve, not simply transform, the world in which we live Continue Reading
By- Julian David, TechUK
-
News
02 Jul 2025
Digital Catapult claims milestone in UK advanced connectivity landscape
Deep tech innovation organisation awarded accreditation as the UK’s only European Open Testing and Integration Centre. Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
02 Jul 2025
TD Synnex adds more development muscle with Apptium
Distributor TD Synnex adds more software development expertise while elsewhere Xerox closes its Lexmark deal Continue Reading
By- Simon Quicke, Microscope Editor
-
Feature
02 Jul 2025
Epic's TEFCA expansion: lessons from 1,000 hospitals and what's next
A tragedy sparked Epic's commitment to interoperability — now it eyes 100% TEFCA participation in its hospitals by year's end. Continue Reading
By- Elizabeth Stricker
-
News
02 Jul 2025
Law professor urges CMA to take swift and urgent action over Microsoft cloud licensing
University of Leeds law professor has published an academic paper calling on the UK Competition and Markets Authority not to drag its heels on correcting Microsoft’s controversial cloud licensing habits Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
Definition
02 Jul 2025
What is a threat actor?
A threat actor, also called a malicious actor, is an entity that poses a security risk and seeks to cause harm to individuals, devices, networks or digital systems, often by exploiting vulnerabilities. Continue Reading
By- Kinza Yasar, Technical Writer
- Rahul Awati
- Ivy Wigmore
-
Conference Coverage
02 Jul 2025
Conference news from Pure//Accelerate 2025
Check out our guide to the annual conference, with key pre-conference material to get you ready and on-the-spot reports from this year's show. Continue Reading
By- Paul Crocetti, Editorial Director
-
Definition
02 Jul 2025
What is quantum key distribution (QKD)?
Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties. Continue Reading
By- Nick Barney, Technology Writer
- Alexander S. Gillis, Technical Writer and Editor
-
Definition
02 Jul 2025
What is the principle of least privilege (POLP)?
The principle of least privilege (POLP) is a concept in computer security that limits users' access rights to only what is strictly required to do their jobs. Continue Reading
By- Kinza Yasar, Technical Writer
- Alexander S. Gillis, Technical Writer and Editor
-
Definition
02 Jul 2025
What is business continuity software?
Business continuity software is an application or suite designed to make business continuity planning/business continuity management (BCP/BCM) processes, metrics and compliance more efficient and accurate. Continue Reading
-
Definition
02 Jul 2025
What is an SBOM (software bill of materials)?
An SBOM (software bill of materials) is a detailed inventory of all components and software dependencies involved in the development and delivery of an application. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Sean Michael Kerner
-
Definition
02 Jul 2025
What is a bogon?
A bogon is an illegitimate Internet Protocol address that falls into a set of IP addresses that haven't been officially assigned to an entity by an internet registration institute, such as the Internet Assigned Numbers Authority (IANA). Continue Reading
By -
Tip
02 Jul 2025
Top 15 IoT security threats and risks to prioritize
Certain IoT security concerns, like botnets, are hard to forget, but others might not come to mind as easily, including DNS threats and physical device attacks. Continue Reading
-
Definition
02 Jul 2025
What is SIEM (security information and event management)?
SIEM (security information and event management) is software that helps organizations detect, analyze, and respond to security threats by collecting and correlating security event data from across the IT environment in real time. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Linda Rosencrance
-
News
02 Jul 2025
Dutch study uncovers cognitive biases undermining cyber security board decisions
Dutch research reveals how cognitive biases can lead to catastrophic security decisions Continue Reading
By- Kim Loohuis