Computer

How cyber security professionals are leveraging AWS tools

With millions of businesses now using Amazon Web Services (AWS) for their cloud computing needs, it’s become a vital consideration for IT security teams and professionals. As such, AWS offers a broad range of cyber security tools to secure AWS-based tech stacks. They cover areas such as data privacy, access management, configuration management, threat detection,…

How cyber security professionals are leveraging AWS tools Read More »

Infosecurity 2025: NCA cyber intelligence head spells out trends

Will Lyne, head of cyber intelligence at the National Crime Agency, is speaking at this week’s Infosecurity Europe conference about cyber criminal trends. Ransomware, and other varieties of cyber attack on the public, are, he said, becoming commoditised beyond the traditional provenance of Russian-speaking expert coders. Lyne has worked in law enforcement for over 15…

Infosecurity 2025: NCA cyber intelligence head spells out trends Read More »

Understanding of ‘black box’ IT systems will reduce Post Office scandal-like risk

Another Post Office scandal could be avoided if leaders in public bodies understand the “black box” IT systems that run their organisations and encourage a “speak up” culture, according to a Parliamentary report. In its latest report, Recognising and responding to early warning signs in public sector bodies, the Committee on Standards in Public Life…

Understanding of ‘black box’ IT systems will reduce Post Office scandal-like risk Read More »

Inside Amazon’s robot-powered warehouse

Thank you for joining! Access your Pro+ Content below. 1 April 2025 Inside Amazon’s robot-powered warehouse Share this item with your network: In this week’s Computer Weekly, we go behind the scenes at Amazon’s robot-powered Swindon warehouse to see how AI and humans are working together. We examine the state of open source licensing and…

Inside Amazon’s robot-powered warehouse Read More »

Apple devices are at ‘most risk’ in UK following government ‘backdoor’ order

Users of Apple devices in the UK are “at the most risk in the world” of being hacked, following a secret government order requiring the tech company to allow ‘backdoor’ access to its users’ encrypted data, the House of Lords heard on Monday 31 March.Liberal peer Paul Strasburger pressed the government to answer questions about…

Apple devices are at ‘most risk’ in UK following government ‘backdoor’ order Read More »

Scottish support group for Post Office scandal victims launched

A newly launched campaign group is calling on former subpostmasters in Scotland to come forward if they were affected by the Post Office’s Horizon scandal. The group, known as the Scottish Postmasters for Justice and Redress, will be officially launch on 2 April 2025 at the Scottish Parliament by former subpostmaster Rab Thomson, who had…

Scottish support group for Post Office scandal victims launched Read More »

Interview: Ray McCann, Loan Charge independent review lead

The government set out plans in the Autumn Budget 2024 to commission another independent review of the Loan Charge policy that – in its words – will “help bring the matter to a close for those affected whilst ensuring fairness for all taxpayers”. This description was seized on by contractors in scope of the policy…

Interview: Ray McCann, Loan Charge independent review lead Read More »

Post Office Capture and Ecco+ users asked to make contact with Scottish statutory body

The Scottish Criminal Cases Review Commission (SCCRC) is attempting to contact any former subpostmasters that could have been prosecuted for unexplained losses on the Post Office’s pre-Horizon Capture software. There are former subpostmasters that, like Horizon users, could have been convicted of crimes based on data from these systems. Since the Post Office Horizon scandal…

Post Office Capture and Ecco+ users asked to make contact with Scottish statutory body Read More »

Gmail ‘bubble’ encryption may be an S/MIME killer, says Google

Google is this week unveiling an enhanced client-side encryption (CSE) standard across its widely-used Gmail service – which marks its 21st birthday on 1 April – that it hopes may render the long-in-the-tooth Secure/Multipurpose Internet Mail Extensions (S/MIME) standard for end-to-end encrypted email (E2EE) obsolete once and for all. S/MIME is used for public-key encryption…

Gmail ‘bubble’ encryption may be an S/MIME killer, says Google Read More »

Interview: Tomer Cohen, chief product officer, LinkedIn

As LinkedIn’s chief product officer (CPO), Tomer Cohen oversees the teams responsible for product management, user experience and design, and customer operations. His journey to his C-suite role came after admiring the company from afar. Cohen moved to Silicon Valley in 2008 from Israel to study at Stanford University. He attended a lecture discussing the…

Interview: Tomer Cohen, chief product officer, LinkedIn Read More »

Shopping Cart
Scroll to Top