US cyber intel sharing law set for temporary extension

The US’ CISA 2015 cyber intelligence sharing law that lapsed just over a month ago amid a wider shutdown, will receive a temporary lease of life should attempts to... Read more »

Microsoft users warned over privilege elevation flaw

An elevation of privilege vulnerability in Windows Kernel tops the list of issues to address in the latest monthly Patch Tuesday update. Read more »

German healthcare aims to replace faxes and phones with secure messaging

Germany’s digital health agency, Gematik, has turned to open source for secure messaging services that will link patients, doctors and pharmacies Read more »

Who is really accountable for the online safety gap?

There has a flurry of regulatory activity on online safety around the world with no consensus on the best approach. How should companies and governments respond? Read more »

Popular LLMs dangerously vulnerable to iterative attacks, says Cisco

Cisco researchers probed some of the most widely used public GenAI LLMs and found many of them were dangerously susceptible to so-called multi-turn cyber attacks producing undesirable outputs Read more »

City of London deploys SASE to future-proof public infrastructure

Managed services provider to deliver an end-to-end networking connectivity offering, encompassing what is said to be a UK-first enterprise secure access service edge roll-out for public services Read more »

Resilience for resilience: Managing burnout among cyber leaders

The Computer Weekly Security Think Tank considers the burdens and responsibilities that accompany the role of chief information security officer, and share guidance on how to navigate a challenging... Read more »

How low code can give agentic AI guide rails for the enterprise

Low code providers and their ethos could lend momentum and security to the enterprise adoption of agentic AI Read more »

We need to build psychological readiness into cyber security

The Computer Weekly Security Think Tank considers the burdens and responsibilities that accompany the role of chief information security officer, and share guidance on how to navigate a challenging... Read more »

CISO burnout: A crisis of expectation and isolation

The Computer Weekly Security Think Tank considers the burdens and responsibilities that accompany the role of chief information security officer, and share guidance on how to navigate a challenging... Read more »
Subscribe to our Newsletter