Cyber teams on alert as React2Shell exploitation spreads /Interview: Paul Neville, director of digital, data and technology, The Pensions Regulator /Edinburgh Airport grounds flights due to IT issue affecting air traffic control provider /Cloudflare fixes second outage in a month /From trust to turbulence: Cyber's road ahead in 2026 /NCC supporting London councils gripped by cyber attacks /Constrained budgets left security teams short-handed in 2025 /Home Office launches police facial recognition consultation /In an AI-first world, the future of cyber security is its workforce /Western coalition supplying tech to Ukraine prepared for long war /Fujitsu police contract ‘complicates’ Post Office investigation /UK government pledges to rewrite Computer Misuse Act /NCSC and BT block a billion dangerous clicks /UK national security strategy failing to account for online world /Interview: Florence Mottay, global CISO, Zalando /Low-code challenges: A Computer Weekly Downtime Upload podcast /Post Office finally investigates Horizon defect, but investigator slams comms strategy /AWS CEO Garman pitches ‘billions of agents’ as enterprise AI future /UK prosecution of alleged Chinese spies was ‘shambolic’ says Parliamentary committee /Strategic shift pays off as Okta bids to ease agentic AI risk /
Cyber teams on alert as React2Shell exploitation spreads /Interview: Paul Neville, director of digital, data and technology, The Pensions Regulator /Edinburgh Airport grounds flights due to IT issue affecting air traffic control provider /Cloudflare fixes second outage in a month /From trust to turbulence: Cyber's road ahead in 2026 /NCC supporting London councils gripped by cyber attacks /Constrained budgets left security teams short-handed in 2025 /Home Office launches police facial recognition consultation /In an AI-first world, the future of cyber security is its workforce /Western coalition supplying tech to Ukraine prepared for long war /Fujitsu police contract ‘complicates’ Post Office investigation /UK government pledges to rewrite Computer Misuse Act /NCSC and BT block a billion dangerous clicks /UK national security strategy failing to account for online world /Interview: Florence Mottay, global CISO, Zalando /Low-code challenges: A Computer Weekly Downtime Upload podcast /Post Office finally investigates Horizon defect, but investigator slams comms strategy /AWS CEO Garman pitches ‘billions of agents’ as enterprise AI future /UK prosecution of alleged Chinese spies was ‘shambolic’ says Parliamentary committee /Strategic shift pays off as Okta bids to ease agentic AI risk /