compliance

How cyber security professionals are leveraging AWS tools

With millions of businesses now using Amazon Web Services (AWS) for their cloud computing needs, it’s become a vital consideration for IT security teams and professionals. As such, AWS offers a broad range of cyber security tools to secure AWS-based tech stacks. They cover areas such as data privacy, access management, configuration management, threat detection,…

How cyber security professionals are leveraging AWS tools Read More »

Rethinking secure comms: Are encrypted platforms still enough?

In today’s constantly changing cyber landscape, answering the question “what does best practice now look like?” is far from simple. While emerging technologies and AI-driven security tools continue to make the headlines and become the topics of discussion, the real pivot point for modern security lies not just in the technological advancements but in context,…

Rethinking secure comms: Are encrypted platforms still enough? Read More »

AI should be used to improve boardroom efficiency

According to the Corporate Governance Institute, despite the rapid roll-out of artificial intelligence (AI) to assist with the day-to-day running of companies, senior leaders are reluctant to utilise this technology to enhance their own efficiency and performance.  A study from Deloitte recently reported that 45% of boards do not include AI on their agendas. The…

AI should be used to improve boardroom efficiency Read More »

Preparing for AI: The CISO’s role in security, ethics and compliance

As generative AI (GenAI) tools become embedded in the fabric of enterprise operations, they bring transformative promise, but also considerable risk. For CISOs, the challenge lies in facilitating innovation while securing data, maintaining compliance across borders, and preparing for the unpredictable nature of large language models and AI agents. The stakes are high; a compromised…

Preparing for AI: The CISO’s role in security, ethics and compliance Read More »

Gmail ‘bubble’ encryption may be an S/MIME killer, says Google

Google is this week unveiling an enhanced client-side encryption (CSE) standard across its widely-used Gmail service – which marks its 21st birthday on 1 April – that it hopes may render the long-in-the-tooth Secure/Multipurpose Internet Mail Extensions (S/MIME) standard for end-to-end encrypted email (E2EE) obsolete once and for all. S/MIME is used for public-key encryption…

Gmail ‘bubble’ encryption may be an S/MIME killer, says Google Read More »

Secure software procurement in 2025: A call for accountability

The software security landscape is at an interesting juncture. As Jen Easterly, the former director of the Cybersecurity and Infrastructure Security Agency (CISA), pointed out, there is a lesson to be drawn from the automotive industry of the 1960s. Its approach to improving car safety by building better designs – including seatbelts, crumple zones, and…

Secure software procurement in 2025: A call for accountability Read More »

Tech companies brace after UK demands back door access to Apple cloud

Technology companies are bracing themselves for more attacks on encryption after the UK government issued an order requiring Apple to create a back door to allow security officials access to content uploaded on the cloud by any Apple phone or computer user world-wide. The government has used powers under UK surveillance laws to issue a…

Tech companies brace after UK demands back door access to Apple cloud Read More »

UK government under fire over public sector guidance on using overseas clouds

The government stands accused of sending mixed messages about its commitment to positioning the UK as a technology superpower, after publishing guidance that will pave the way for more public sector bodies to host their workloads and applications in overseas cloud environments. The Department for Science, Innovation and Technology’s (DSIT’s) overseas data guidance dropped on…

UK government under fire over public sector guidance on using overseas clouds Read More »

Apple: British techies to advise on “devastating” UK global crypto power grab

An obscure British government committee is to be asked this month to advise Home Secretary Yvette Cooper whether to go ahead with government demands that Apple provide British agents with a secret backdoor to break into the companies iCloud Advanced Data Protection system, enabling British spies to secretly copy and read users’ private data.   …

Apple: British techies to advise on “devastating” UK global crypto power grab Read More »

Top 10 data and ethics stories of 2024

In 2024, Computer Weekly’s data and ethics coverage continued to focus on the various ethical issues associated with the development and deployment of data-driven systems, particularly artificial intelligence (AI). This included reports on the copyright issues associated with generative AI (GenAI) tools, the environmental impacts of AI, the invasive tracking tools in place across the…

Top 10 data and ethics stories of 2024 Read More »

Shopping Cart
Scroll to Top