Lloyds banking app ‘glitch’ shows transactions of strangers /This rise of the splinternet? Data sovereignty risks and responses /Vulnerability reports: Increase in quantity, decrease in quality? /AI at Rimini Street: A Computer Weekly Downtime Upload podcast /The UK government’s digital identity scheme: Dystopian nightmare or modernised public services? /Enormous AI growth zone datacentre gets planning approval /Met Office ‘supercomputing as a service’ one year old /UK government announces package to get more women in tech /Iran war a melting pot for other cyber threats /Cyber industry welcomes women, but challenges persist /Salesforce tracks possible ShinyHunters campaign targeting its users /Oracle cost-cutting points to AI infrastructure gamble /Confidence in AI-powered cyber must be earned, not assumed /Strong security balances consolidation and best-of-breed capabilities /Child rapist could have profiled victims through unaudited access to NHS databases /CISOs on alert: Strengthening cyber resilience amid geopolitical tensions in the Middle East /Labour scarcity is forcing IT leaders to rethink automation economics /Welsh government boosts funding for cyber education /Microsoft patches zero-days in .NET and SQL Server /Met Police to ‘trial’ handheld facial recognition tech /
Lloyds banking app ‘glitch’ shows transactions of strangers /This rise of the splinternet? Data sovereignty risks and responses /Vulnerability reports: Increase in quantity, decrease in quality? /AI at Rimini Street: A Computer Weekly Downtime Upload podcast /The UK government’s digital identity scheme: Dystopian nightmare or modernised public services? /Enormous AI growth zone datacentre gets planning approval /Met Office ‘supercomputing as a service’ one year old /UK government announces package to get more women in tech /Iran war a melting pot for other cyber threats /Cyber industry welcomes women, but challenges persist /Salesforce tracks possible ShinyHunters campaign targeting its users /Oracle cost-cutting points to AI infrastructure gamble /Confidence in AI-powered cyber must be earned, not assumed /Strong security balances consolidation and best-of-breed capabilities /Child rapist could have profiled victims through unaudited access to NHS databases /CISOs on alert: Strengthening cyber resilience amid geopolitical tensions in the Middle East /Labour scarcity is forcing IT leaders to rethink automation economics /Welsh government boosts funding for cyber education /Microsoft patches zero-days in .NET and SQL Server /Met Police to ‘trial’ handheld facial recognition tech /