Sponsor of the Day:
Jerkmate
https://www.computerweekly.com/opinion/Bridging-the-SLA-gap-A-guide-to-managing-cloud-provider-risk
Bridging the SLA gap: A guide to managing cloud provider risk | Computer Weekly
The Computer Weekly Security Think Tank considers how security leaders can help assure access to the new and innovative cloud tech while minimising risk and...
risk computer weeklymanaging cloudbridgingslagap
https://www.computerweekly.com/news/366641815/Ordnance-Survey-works-with-Snowflake-to-tackle-flood-risk
Ordnance Survey works with Snowflake to tackle flood risk | Computer Weekly
AI-based tool developed with Snowflake improves policymakers’ understanding of properties at risk of flooding.
risk computer weeklyordnance surveyworkssnowflaketackle
https://www.computerweekly.com/feature/Is-Digital-ID-worth-the-risk
Is digital ID worth the risk? | Computer Weekly
The UK government’s recently announced Digital ID aims to curb the prospect of work for illegal migrants, along with claiming several benefits for UK citizens...
risk computer weeklydigital idworth
https://www.computerweekly.com/news/366596200/Growth-in-nude-image-sharing-heightens-cyber-abuse-risk
Growth in nude image sharing heightens cyber abuse risk | Computer Weekly
The normalisation of sharing self-created intimate content with others is putting great numbers of people at risk of online abuse, says Kaspersky.
risk computer weeklynude imagegrowthsharingheightens
https://www.computerweekly.com/resources/IT-risk-management/page/10
IT risk management | News, analysis, and information from Computer Weekly | Page 10
Read the latest stories about IT risk management and the associated legislation, regulation and compliance issues.
risk management newscomputer weeklyanalysisinformation10
https://www.computerweekly.com/news/366639069/Artificial-intelligence-creeping-into-high-risk-stock-trading
Artificial intelligence ‘creeping into’ high-risk stock trading | Computer Weekly
Growing reliance on artificial intelligence is encroaching into the stock market, finds research
artificial intelligencehigh riskstock tradingcomputer weekly
https://www.computerweekly.com/news/366614420/Dutch-critical-infrastructure-at-risk-despite-high-leadership-confidence
Dutch critical infrastructure at risk despite high leadership confidence | Computer Weekly
Stark paradox in Dutch cybersecurity landscape has business leaders expressing high confidence in their IT infrastructure as cyber attacks rise.
critical infrastructurerisk despitecomputer weeklydutchhigh
https://www.computerweekly.com/feature/Edge-AI-Business-cost-risk-and-control
Edge AI: Business cost, risk and control | Computer Weekly
Right now, rather than asking whether or not to adopt edge artificial intelligence, the crucial question for most companies is how to do so without creating...
edge aibusiness costcontrol computerriskweekly
https://www.computerweekly.com/news/366641058/NCSC-warns-high-risk-individuals-of-Signal-and-WhatsApp-social-engineering-attacks
NCSC warns high-risk individuals of Signal and WhatsApp social engineering attacks | Computer Weekly
NCSC advises on countermeasures for high-risk individuals over phishing attacks on encrypted messaging services, such as Signal, WhatsApp and Facebook...
social engineering attacksncsc warnshigh riskcomputer weeklyindividuals
https://www.computerweekly.com/news/366631421/Heightened-global-risk-pushes-interest-in-data-sovereignty
Heightened global risk pushes interest in data sovereignty | Computer Weekly
Survey finds all those questioned have looked at data location, with most recognising the need to plan for data sovereignty or risk severe damage to reputation...
sovereignty computer weeklyglobal riskheightenedpushesinterest
https://www.computerweekly.com/news/366605734/Popular-Microsoft-apps-for-Mac-at-risk-of-code-injection-attacks
Popular Microsoft apps for Mac at risk of code injection attacks | Computer Weekly
Researchers at Cisco Talos turn up evidence suggesting that Microsoft apps running on the Apple macOS operating system are not as secure as they seem
attacks computer weeklymicrosoft appscode injectionpopularmac
https://www.computerweekly.com/opinion/Cyber-leaders-must-make-better-use-of-risk-experts
Cyber leaders must make better use of risk experts | Computer Weekly
The Computer Weekly Security Think Tank considers how security leaders can help assure access to the new and innovative cloud tech while minimising risk and...
make better usecyber leadersrisk expertscomputer weeklymust