Phil Goldstein is a former web editor of the CDW family of tech magazines and a veteran technology journalist. He lives in Washington, D.C., with his wife and their animals: a dog named Brenna and two ...
As we prepare to close out 2025, the Computer Weekly Security Think Tank panel looks back at the past year, and ahead to 2026 ...
Cybersecurity in 2026 will be defined by AI-driven attacks, ransomware escalation, CMMC enforcement, and the rise of NIST as ...
No brand is immune to cybersecurity breaches, but certain practices can mitigate them better than others. Drawing from tried and tested cybersecurity policies and actions taken by different CCTV ...
As we prepare to close out 2025, the Computer Weekly Security Think Tank panel looks back at the past year, and ahead to 2026 ...
In the modern digital landscape, cybersecurity isn’t just a technical challenge – it’s a business imperative. At the heart of cybersecurity is identity security – the principle that the right people ...
The Ministry of Communications has mandated major smartphone brands to pre-install the state-owned Sanchar Saathi app. Here's ...
Our Privacy, Cyber & Data Strategy Team highlights the increasingly specific cybersecurity controls identified by regulators, explains why these enhanced ...
In exactly two years, the Cyber Resilience Act will come into force. But what cyber resilience means and how to achieve it is still unclear to many.
Cybersecurity Analytics involves aggregating data to collect evidence, build timelines, and analyze capabilities to design a proactive cybersecurity strategy that detects, analyzes, and mitigates ...
A single, unified approach to security may be the answer to the complex challenge of managing myriad tools and systems. As new vulnerabilities have emerged, so have a rush of new point solutions ...