<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel>
        <copyright>Copyright TechTarget - All rights reserved</copyright>
        <description>ComputerWeekly’s best articles of the day</description>
        <docs>https://cyber.law.harvard.edu/rss/rss.html</docs>
        <generator>Techtarget Feed Generator</generator>
        <language>en</language>
        <lastBuildDate>Mon, 27 Apr 2026 07:44:49 GMT</lastBuildDate>
        <link>https://www.computerweekly.com</link>
        <managingEditor>editor@computerweekly.com</managingEditor>
        <item>
            <body>&lt;p&gt;Security leaders should be turning &lt;a href="https://www.computerweekly.com/opinion/Confidence-in-AI-powered-cyber-must-be-earned-not-assumed" target="_blank" rel="noopener"&gt;offensive artificial intelligence (AI) cyber tools&lt;/a&gt; on their own systems before threat actors do, exploiting the innate defenders’ advantage to attain the high ground and increase their chances of withstanding a cyber attack.&lt;/p&gt; 
&lt;p&gt;So says Yinon Costica, co-founder of &lt;a href="https://www.wiz.io/" target="_blank" rel="noopener"&gt;Google-owned Wiz&lt;/a&gt;, who, speaking at &lt;a href="https://cloud.google.com/blog/topics/google-cloud-next/welcome-to-google-cloud-next26" target="_blank" rel="noopener"&gt;Google Cloud Next in Las Vegas&lt;/a&gt;, argued that defenders can win against attackers by using AI to exploit an advantage that may not appear obvious at first glance, that of context.&lt;/p&gt; 
&lt;p&gt;“The same AI model can obviously produce very different results based on the context that we feed into it,” he said. “Now, attackers hopefully have much less context about us, while as defenders we do have a lot of context about our environments that we can share with the model.&lt;/p&gt; 
&lt;p&gt;“If, as defenders, we take the first movers’ advantage and we use the AI against ourselves, with the context we have, we actually stand a chance to win … But we need to act fast,” said Costica.&lt;/p&gt; 
&lt;p&gt;“We need to start using AI against ourselves as much as possible, whether it’s to scan attack surfaces, scan code, scan anything, in order to be the first one to see the results and not to wait for the bad guys to do it before us.”&lt;/p&gt; 
&lt;p&gt;As speed becomes ever more of the essence in cyber security, Costica conceded that this would be a challenge for defenders – but noted that the tools to do this are rapidly becoming available. To try to help, Wiz unveiled three new &lt;a href="https://www.techtarget.com/searchenterpriseai/definition/AI-agents" target="_blank" rel="noopener"&gt;AI agents&lt;/a&gt; at Google Cloud Next – red, green and blue – which are named for the human cyber teams they are designed to help.&lt;/p&gt; 
&lt;p&gt;“What agents allow us to do is really get to the next level of acceleration [and] automation of security work,” said Costica.&lt;/p&gt; 
&lt;div class="extra-info"&gt;
 &lt;div class="extra-info-inner"&gt;
  &lt;h3 class="splash-heading"&gt;Read more from Google Cloud Next&lt;/h3&gt; 
  &lt;ul class="default-list"&gt; 
   &lt;li&gt;Attendees at Google Cloud Next in Las Vegas are backing AI all the way to the bank. But as AI turns up in everything, everywhere, all at once, we’re going to need to get a lot stricter &lt;a href="https://www.computerweekly.com/opinion/Google-Cloud-Next-Its-time-to-create-value-not-slop-from-the-AI-boom" target="_blank" rel="noopener"&gt;about what we use it for&lt;/a&gt;.&lt;/li&gt; 
   &lt;li&gt;With more AI agents moving to production, Google Cloud is targeting governance, multi-cloud data architecture and purpose-built silicon to help enterprises &lt;a href="https://www.computerweekly.com/news/366641999/Google-launches-Gemini-Agent-Platform-eighth-generation-TPUs" target="_blank" rel="noopener"&gt;orchestrate agentic workflows&lt;/a&gt;.&lt;/li&gt; 
   &lt;li&gt;Blue chips will expand use of Gemini Enterprise AI agents on a revamped platform, but how far its appeal will extend beyond the Google Cloud user base &lt;a href="https://www.techtarget.com/searchitoperations/news/366642097/Merck-Home-Depot-tap-Gemini-Enterprise-for-AI-agent-development" target="_blank" rel="noopener"&gt;remains to be seen&lt;/a&gt;.&lt;/li&gt; 
  &lt;/ul&gt;
 &lt;/div&gt;
&lt;/div&gt; 
&lt;p&gt;The red agent is designed to assist red team penetration testing work by probing deep into its owners’ IT estate, identifying potential exposures, such as &lt;a href="https://www.computerweekly.com/news/366618596/DeepSeek-API-chat-log-exposure-a-rookie-cyber-error" target="_blank" rel="noopener"&gt;application programming interfaces&lt;/a&gt;, end-of-life &lt;a href="https://www.computerweekly.com/news/366641403/Russian-cyber-spies-targeting-consumer-Soho-routers" target="_blank" rel="noopener"&gt;edge networking kit&lt;/a&gt; or operational technology (OT) assets, and runs penetration tests on them. The green agent follows on by automating the triage process, something that can take ages for humans. Finally, the blue agent acts as a detective, doing the investigative work that can also be a lengthy process for human teams.&lt;/p&gt; 
&lt;p&gt;“These three agents together form a layer that is autonomous and automated,” said Costica. “It’s not revolutionary in that it aligns closely to how security teams have been working for many years, but now it allows each team to automate their workflows.&lt;/p&gt; 
&lt;p&gt;“It’s like living in the future in the eyes of security teams because it means that from the moment they find a risk, they can automate the process to find who owns it and deliver the code fix to complete and redeploy to production.”&lt;/p&gt; 
&lt;p&gt;A little over a month on from the closure of the $32bn acquisition of Wiz – Google’s largest purchase to date – the two organisations reaffirmed their commitment to providing a unified security platform, retaining Wiz’s brand, that will enhance the speed with which customers detect, prevent and respond to threats, especially emerging ones created using AI.&lt;/p&gt; 
&lt;p&gt;The duo also claim their combined capability will accelerate adoption of multi-cloud security and spur more confidence in innovation around cloud and AI. Wiz’s products are also to continue to be made available across other platforms, including Amazon Web Services (AWS), Microsoft Azure and Oracle Cloud. It also announced support for Databricks and agent studios such as AWS Agentcore, Microsoft Azure Copilot Studio and Salesforce Agentforce, as well as the Gemini Enterprise Agent Platform, and continues to support security ecosystems with integrations to the outer layer of the cloud, including Google Cloud Apigee, Cloudflare AI Security for Apps, and the Vercel platform.&lt;/p&gt; 
&lt;p&gt;Behind the scenes, Wiz has also updated how it integrates security detections from Wiz Defend with Google Security Operations and Mandiant Threat Defence to make life easier for human analysts.&lt;/p&gt; 
&lt;p&gt;And it announced new capabilities to secure the AI-native deployment cycle. These include scanning vibe coded applications for issues; AI-generated code scanning and vulnerability remediation; agent-based remediation allowing teams to automate remediation workflows; and an AI bill of materials to keep on top of the use of shadow AI for coding.&lt;/p&gt;</body>
            <description>At Google Cloud Next, Wiz co-founder Yinon Costica called on security defenders to use AI to steal a march on threat actors, and launched agentic capabilities for cyber teams</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/Hero%20Images/Robot-AI-books-learning-Adobe.jpg</image>
            <link>https://www.computerweekly.com/news/366642436/Wiz-founder-Hack-yourself-with-AI-before-the-bad-guys-do</link>
            <pubDate>Fri, 24 Apr 2026 15:15:00 GMT</pubDate>
            <title>Wiz founder: Hack yourself with AI, before the bad guys do</title>
        </item>
        <item>
            <body>&lt;p&gt;BT and mobile provider EE have now blocked over a billion clicks to malicious websites using intelligence supplied by the UK’s &lt;a href="https://www.computerweekly.com/news/366642156/NCSC-heralds-end-of-passwords-for-consumers-and-pushes-secure-passkeys"&gt;National Cyber Security Centre&lt;/a&gt; (NCSC), according to figures disclosed today.&lt;/p&gt; 
&lt;p&gt;The NCSC’s Share and Defend programme, launched last year, protects 46 million mobile phone users and 12 million fixed line internet subscribers from websites that could deliver malicious code, malware or phishing attacks, the NCSC said.&lt;/p&gt; 
&lt;p&gt;It has allowed BT to head off “early stage cyber attacks” and attempts by its customers to access scam websites.&lt;/p&gt; 
&lt;p&gt;The programme provides telecoms companies with streams of alerts about malicious websites, giving telcos and internet companies the option to block access to the most severe risks to its customers.&lt;/p&gt; 
&lt;p&gt;Claimed to be the most extensive in the world, Share and Defend provides alerts to BT, EE and VodafoneThree.&lt;/p&gt; 
&lt;p&gt;Other partners include broadband company PXC, which provides wholesale broadband and network services.&lt;/p&gt; 
&lt;p&gt;The NCSC said it is “engaging” with other companies to achieve wider coverage and looking to bring new partners into the scheme.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Threat feeds"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Threat feeds&lt;/h2&gt;
 &lt;p&gt;Share and Defend provides telcos with alerts from threat feeds, some of which are private to the NCSC, with others provided by businesses, and the Cyber Defence Alliance, a group for the finance sector.&lt;/p&gt;
 &lt;p&gt;Other alerts are generated by take-down notices issued to remove malicious content from the internet, and from websites identified as being linked to phishing sites reported by the public.&lt;/p&gt;
 &lt;p&gt;Organisations signed up to the programme are able to protect their customers from accessing malicious content, but can choose which sites to block based on their own risk analysis.&lt;/p&gt;
 &lt;p&gt;The programme provides threat data from the NCSC-developed Protective Domain Name Service, run by Cloudflare and Accenture. The service is capable of preventing access to malicious web domains when they are looked up on the Domain Name System used to navigate the internet.&lt;/p&gt;
 &lt;p&gt;It also takes feeds from the NCSC’s takedown service – run in conjunction with cyber security company Netcraft – which blocks and removes websites linked to spam and phishing attacks that could damage the reputation of government services.&lt;/p&gt;
 &lt;p&gt;The Share and Defend service is also used by Jsic, a not-for-profit organisation, which builds and maintains the Janet network, used by education and research organisations.&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Read more from CyberUK 2026&lt;/h3&gt; 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366641875/CYBERUK-26-UK-lagging-on-legal-protections-for-cyber-pros"&gt;CyberUK 2026 – UK lagging on legal protections for cyber pros&lt;/a&gt;: Ahead of this year’s CyberUK conference, the CyberUp Campaign for reform of the UK’s hacking laws proposes a four-pillar framework that would protect cyber professionals from prosecution.&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366642032/Nation-states-responsible-for-nationally-significant-cyber-attacks-against-UK-says-NCSC-chief"&gt;Nation states responsible for ‘nationally significant’ cyber attacks against UK, says NCSC chief&lt;/a&gt;: The UK is facing four nationally significant cyber attacks a week, the majority from hostile states, NCSC chief, Richard Horne, warns at the CyberUK conference.&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366641790/UK-to-build-national-cyber-shield-to-protect-against-AI-cyber-threats"&gt;UK to build ‘national cyber shield’ to protect against AI cyber threats&lt;/a&gt;: Security minister Dan Jarvis calls for artificial intelligence companies to work with government to develop AI-driven cyber defences.&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366642156/NCSC-heralds-end-of-passwords-for-consumers-and-pushes-secure-passkeys"&gt;NCSC heralds end of passwords for consumers and pushes secure passkeys&lt;/a&gt;: UK National Cyber Security Centre is urging consumers to replace passwords and two-factor authentication with passkeys, following a technical study that shows they are more secure and easier to use.&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366641986/Chinese-hackers-using-compromised-networks-to-spy-on-Western-companies-says-Five-Eyes"&gt;Chinese hackers using compromised networks to spy on Western companies, says Five Eyes&lt;/a&gt; - Companies urged to take countermeasures as Chinese hacking groups use networks of infected home and office devices ‘at scale’ to evade security monitoring systems.&lt;/li&gt; 
   &lt;/ul&gt;
  &lt;/div&gt;
 &lt;/div&gt;
 &lt;ul type="square" class="default-list"&gt;&lt;/ul&gt;
&lt;/section&gt;</body>
            <description>NCSC’s Share and Defend scheme has seen BT block over a billion clicks through to malicious websites</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/Hero%20Images/cyber-security-attack-virus-malware-Skorzewiak-adobe.jpg</image>
            <link>https://www.computerweekly.com/news/366642433/BT-has-now-blocked-over-a-billion-clicks-to-malicious-websites-says-NCSC</link>
            <pubDate>Fri, 24 Apr 2026 11:30:00 GMT</pubDate>
            <title>BT has now blocked over a billion clicks to malicious websites, says NCSC</title>
        </item>
        <item>
            <body>&lt;p data-end="5614" data-start="5350"&gt;Organizations use digital signatures when an agreement needs more than convenience. They use them when a workflow requires &lt;a href="https://www.techtarget.com/searchcontentmanagement/answer/E-signature-vs-digital-signature-Whats-the-difference"&gt;stronger signer verification&lt;/a&gt;, tamper evidence and a better evidentiary trail than a basic electronic signature provides.&lt;/p&gt; 
&lt;p data-end="5871" data-start="5616"&gt;That distinction matters because not every document needs the same level of trust. Routine approvals may only need a simple e-signature, while regulated, high-value or dispute-sensitive transactions often benefit from certificate-based digital signatures.&lt;/p&gt; 
&lt;p data-end="6126" data-start="5873"&gt;In practice, the goal is to match the signing method to the risk. The right question is not whether a business can sign electronically. It is whether the transaction needs stronger identity assurance, document integrity controls and compliance support.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Digital signatures vs. e-signatures"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Digital signatures vs. e-signatures&lt;/h2&gt;
 &lt;p&gt;Organizations must understand the &lt;a href="https://www.techtarget.com/searchcontentmanagement/answer/E-signature-vs-digital-signature-Whats-the-difference"&gt;difference between digital signatures and e-signatures&lt;/a&gt; so they can implement a level of security that meets their needs.&lt;/p&gt;
 &lt;p&gt;An e-signature is a broad term that includes any signature a user sends electronically. Some e-signatures, such as those retail stores use for small transactions, don't require identity verification. However, other types, such as digital signatures, involve a strict authentication process.&lt;/p&gt;
 &lt;p&gt;In the U.S., the E-SIGN Act gives &lt;a href="https://www.techtarget.com/searchcontentmanagement/answer/Are-electronic-signatures-legally-binding"&gt;electronic signatures legal standing &lt;/a&gt;when key conditions are met, but organizations still use digital signatures when they need stronger identity assurance and tamper evidence. In the EU, trust-service frameworks make those assurance levels even more explicit.&lt;/p&gt;
 &lt;p&gt;Digital signatures rely on &lt;a href="https://www.techtarget.com/searchsecurity/definition/public-key"&gt;public key cryptography&lt;/a&gt; and &lt;a href="https://www.techtarget.com/searchsecurity/definition/public-key-certificate"&gt;digital certificates&lt;/a&gt; to verify authenticity and detect tampering. In a typical workflow, the system creates a hash of the document and signs that hash with the sender's private key. The recipient then uses the corresponding public key and certificate to verify the signature and confirm that the document has not been altered since it was signed.&lt;/p&gt;
 &lt;p&gt;To create a digital signature, organizations typically use an&lt;a href="https://www.techtarget.com/searchcontentmanagement/tip/Top-e-signature-software-providers"&gt; e-signature system&lt;/a&gt;. E-signature systems offer digital signature capabilities, but they can also streamline workflows. For example, they can send reminder notifications to late signatories and assign roles to specific individuals.&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;When to use a digital signature instead of a basic e-signature&lt;/h3&gt; 
   &lt;p&gt;Use a basic e-signature when speed and convenience are the priority and the workflow does not require higher assurance. Use a digital signature when the organization needs certificate-backed signer verification, tamper evidence and a stronger audit trail. In practice, the choice depends on transaction risk, compliance requirements and the evidentiary burden if the agreement is challenged later.&lt;/p&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="What are digital signatures used for?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What are digital signatures used for?&lt;/h2&gt;
 &lt;p&gt;Organizations can use digital signatures anywhere a signature is required, but they usually reserve them for transactions where stronger trust, signer verification and document integrity matter most. Common examples include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Real estate purchase and sale agreements&lt;/li&gt; 
  &lt;li&gt;Sales contracts&lt;/li&gt; 
  &lt;li&gt;Insurance agreements&lt;/li&gt; 
  &lt;li&gt;Tax documents and forms&lt;/li&gt; 
  &lt;li&gt;Construction change orders&lt;/li&gt; 
  &lt;li&gt;Clinical trials&lt;/li&gt; 
  &lt;li&gt;Loans&lt;/li&gt; 
  &lt;li&gt;Mortgages&lt;/li&gt; 
  &lt;li&gt;Leases&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/uw4aTvRDHB4?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.computerweekly.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="How digital signatures work"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How digital signatures work&lt;/h2&gt;
 &lt;p&gt;Digital signatures rely on digital certificates that trust service providers issue to signers. These providers are legal entities that use processes and tools in accordance with a national authority, such as the U.S. government or EU, to verify e-signatures' authenticity.&lt;/p&gt;
 &lt;p&gt;"The trust service provider verifies the identity of the signer prior to the issuance of the digital certificate using various mechanisms, [such as] near-field communication, automated video-based identity documents and biometric verification," Manaila said.&lt;/p&gt;
 &lt;p&gt;After the trust service provider verifies the signer's identity, it issues the digital certificate in the cloud. It stores the required cryptographic keys on a hardware security module (&lt;a href="https://www.techtarget.com/searchsecurity/definition/hardware-security-module-HSM"&gt;HSM&lt;/a&gt;) and protects it with two-factor authentication (2FA). These security measures let people sign documents and get digital certificates from any type of platform, device or smartphone, Manaila said.&lt;/p&gt;
 &lt;p&gt;Some countries issue electronic identification cards that store the owner's biometric data, such as their fingerprint or facial structure, on a chip. Citizens and organizations can use these cards to prove their identity online and quickly obtain a digital certificate.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.computerweekly.com/rms/onlineimages/how_digital_signatures_work-f.png"&gt;
  &lt;img data-src="https://www.computerweekly.com/rms/onlineimages/how_digital_signatures_work-f_mobile.png" class="lazy" data-srcset="https://www.computerweekly.com/rms/onlineimages/how_digital_signatures_work-f_mobile.png 960w,https://www.computerweekly.com/rms/onlineimages/how_digital_signatures_work-f.png 1280w" alt="Diagram showing the digital-signature workflow from document hashing and certificate-backed signing to signature verification and downstream processing." height="260" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;The digital-signature process uses certificates, private/public keys and document hashes to verify signer identity, detect tampering and support downstream workflows.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="How cloud affected the digital signature landscape"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How cloud affected the digital signature landscape&lt;/h2&gt;
 &lt;p&gt;Before the proliferation of cloud services, organizations relied on physical devices, such as &lt;a href="https://www.techtarget.com/searchsecurity/definition/security-token"&gt;security tokens&lt;/a&gt; or smart cards, to protect their digital certificates with an HSM. This traditional approach posed implementation challenges. For example, the approach isn't user-friendly because it requires users to carry a physical device, Manaila said.&lt;/p&gt;
 &lt;p&gt;Cloud tools, on the other hand, store the cryptographic keys on the cloud provider's HSM so organizations don't need to track physical tokens or replace them over time. Cloud products are also more scalable and require no physical maintenance costs.&lt;/p&gt;
 &lt;p&gt;The digital signature landscape changed after the CSC standardized remote, cloud-based digital signatures with its open source API. This technology offers the following benefits:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Generates remote digital signatures across desktop, web and mobile devices.&lt;/li&gt; 
  &lt;li&gt;Protects legally binding signatures with 2FA.&lt;/li&gt; 
  &lt;li&gt;Integrates with various &lt;a href="https://www.techtarget.com/searcherp/definition/ERP-enterprise-resource-planning"&gt;ERP&lt;/a&gt; and &lt;a href="https://www.techtarget.com/searchcontentmanagement/feature/How-to-choose-the-right-document-management-system"&gt;digital transaction management systems&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;Reduces IT governance costs.&lt;/li&gt; 
  &lt;li&gt;Ensures compliance with e-signature laws in the U.S. and EU, such as the &lt;a href="https://ico.org.uk/for-organisations/guide-to-eidas/what-is-the-eidas-regulation" target="_blank" rel="noopener"&gt;Electronic Identification, Authentication and Trust Services Regulation&lt;/a&gt;.
   &lt;blockquote class="main-article-pullquote"&gt;
    &lt;div class="main-article-pullquote-inner"&gt;
     &lt;figure&gt;
      The right question is not whether a business can sign electronically. It is whether the transaction needs stronger identity assurance, document integrity controls and compliance support.
     &lt;/figure&gt;
     &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
    &lt;/div&gt;
   &lt;/blockquote&gt;&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;ul class="default-list"&gt;&lt;/ul&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Security benefits of digital signatures"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Security benefits of digital signatures&lt;/h2&gt;
 &lt;p&gt;Digital signature technology can help organizations prevent bad actors from tampering with important transactions. Security benefits include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Links signer's identity to the signature.&lt;/li&gt; 
  &lt;li&gt;Makes the signer legally responsible for their actions.&lt;/li&gt; 
  &lt;li&gt;Securely stores the digital certificate's cryptographic keys on a certified HSM and protects them with 2FA.&lt;/li&gt; 
  &lt;li&gt;Offers &lt;a href="https://www.techtarget.com/searchsecurity/definition/access-control"&gt;access control&lt;/a&gt; to strengthen security.&lt;/li&gt; 
  &lt;li&gt;Can prove a signature's authenticity in court.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Digital signatures add assurance, but they also add process and training overhead. That is why organizations should treat them as a fit-for-purpose control: use them where the business needs higher trust, stronger evidence or stricter compliance, and use simpler e-signatures where speed and convenience matter more.&lt;/p&gt;
 &lt;p&gt;&lt;strong&gt;Editor's note:&lt;/strong&gt; &lt;em&gt;This article was originally published in 2023 and was updated in 2026 to reflect current digital-signature workflows, legal context and enterprise use cases. &lt;/em&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Digital signatures help organizations verify signer identity and detect tampering, but teams should choose them only when a transaction needs stronger trust, evidence and compliance controls</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/check_g530502390.jpg</image>
            <link>https://www.techtarget.com/searchcontentmanagement/tip/How-do-digital-signatures-work</link>
            <pubDate>Fri, 24 Apr 2026 10:13:00 GMT</pubDate>
            <title>How do digital signatures work?</title>
        </item>
        <item>
            <body>&lt;p&gt;Medical data belonging to half a million British citizens has been offered for sale on a Chinese website following a security breach at health information database UK Biobank.&lt;/p&gt; 
&lt;p&gt;Technology minister Ian Murray said that data obtained from UK Biobank had been advertised for sale by several sellers on Alibaba e-commerce platforms in China, in what he called an “unacceptable abuse”.&lt;/p&gt; 
&lt;p&gt;UK Biobank, a non-profit charity, collects medical data provided by volunteers and shares it with researchers around the world to further medical research in cancer, heart disease and ways of predicting dementia.&lt;/p&gt; 
&lt;p&gt;The charity informed the UK government on Monday that it had identified anonymised data from its volunteers for sale by three sellers on Alibaba, including at least one listing that appeared to offer anonymised data from its 500,000 volunteers.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Unacceptable abuse of data"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Unacceptable abuse of data&lt;/h2&gt;
 &lt;p&gt;“This has been an unacceptable abuse of the UK Biobank charity’s data and an abuse of the trust that participants rightly expect when sharing their data for research purposes,” Murray said in a &lt;a href="https://www.gov.uk/government/speeches/minister-of-state-statement-to-the-house-of-commons-23-april-2026"&gt;statement to Parliament&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;UK Biobank has assured its volunteers that the data contained no participants’ names, addresses, contact details, or telephone numbers. The charity does not believe that any of the data was sold.&lt;/p&gt;
 &lt;p&gt;UK Biobank said it had now revoked access to research institutions identified as the source of the breach of its UK data cloud.&lt;/p&gt;
 &lt;p&gt;Murray said the UK government had worked quickly with Biobank, the Chinese government and Alibaba to take down the listings offering the data.&lt;/p&gt;
 &lt;p&gt;“We have asked the Biobank charity to pause further access to its data until they have put in place a technical solution to prevent data from its current platform from being downloaded in this way again,” he said.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Biobank will improve security"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Biobank will improve security&lt;/h2&gt;
 &lt;p&gt;Rory Collins, chief executive of Biobank, told volunteers in a &lt;a href="https://www.ukbiobank.ac.uk/news/a-message-to-our-participants-uk-biobank-data-security-update/"&gt;statement&lt;/a&gt; that personally identifiable information (PII) was safe and that it would put additional security measures in place to prevent the incident from happening again.&lt;/p&gt;
 &lt;p&gt;He said that researchers go through a rigorous access review process and institutions sign a contract committing to keeping data secure before they are given access to Biobank.&lt;/p&gt;
 &lt;p&gt;“This is a clear breach of the contract signed by these academic institutions, and they, along with the individuals involved, have had their access suspended,” he added.&lt;/p&gt;
 &lt;p&gt;Biobank has temporarily suspended all access to its UK cloud-based research platform, and plans to introduce a limit on the size of files that can be taken off the platform. It will also monitor files exported from the platform for suspicious behaviour.&lt;/p&gt;
 &lt;p&gt;The charity said it was developing an automated checking system to prevent de-identified data from being taken off its research platform, while still allowing scientists to conduct research. The system will be in place by the end of the year.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="UK government to issue guidance"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;UK government to issue guidance&lt;/h2&gt;
 &lt;p&gt;Murray said the government would soon be issuing guidance on controlling data from research studies, and urged businesses and charities to ensure their systems and data-sharing processes are as secure as possible.&lt;/p&gt;
 &lt;p&gt;The charity has reported the incident to the Information Commissioner’s Office (ICO).&lt;/p&gt;
 &lt;p&gt;An ICO spokesperson said: “People’s medical data is highly sensitive information. Not only do people expect it to be handled carefully and securely, organisations also have a responsibility under the law. UK Biobank has made us aware of an incident, and we are making enquiries.”&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;What companies should do&lt;/h3&gt; 
   &lt;p&gt;All organisations should map and “baseline” their edge device traffic, especially VPN and remote access connections. They should adopt dynamic threat feed filtering that includes known covert network indicators.&lt;/p&gt; 
   &lt;p&gt;Potential victims of Chinese infiltration should implement two-factor authentication for remote access and, where possible, apply zero-trust controls, IP allow lists and machine certificate verification.&lt;/p&gt; 
   &lt;p&gt;Larger or high-risk entities should consider active hunting of suspicious traffic from home office devices or traffic from the internet of things, geographic profiling, and machine learning-based anomaly detection.&lt;/p&gt; 
   &lt;p style="text-align: right;"&gt;&lt;em&gt;Source NCSC&lt;/em&gt;&lt;/p&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/section&gt;</body>
            <description>Biobank operator is taking steps to improve security after biological, health and lifestyle information from its database was offered for sale on a Chinese website</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/Hero%20Images/healthcare-medical-statistics-stethoscope-adobe.jpeg</image>
            <link>https://www.computerweekly.com/news/366642041/Medical-data-about-half-a-million-Britains-on-sale-in-China-after-Biobank-breach</link>
            <pubDate>Thu, 23 Apr 2026 10:59:00 GMT</pubDate>
            <title>Medical data of half a million Britons on sale in China after Biobank breach</title>
        </item>
        <item>
            <body>&lt;p&gt;China-linked hackers are using networks of vulnerable &lt;a href="https://www.techtarget.com/iotagenda/Ultimate-IoT-implementation-guide-for-businesses"&gt;internet-connected devices&lt;/a&gt;, including home routers, printers and smart devices, as cover to mount espionage and hacking operations.&lt;/p&gt; 
&lt;p&gt;The technique is now used by the majority of China-linked hackers as a way to obscure hacking and espionage attacks launched against organisations in the West.&lt;/p&gt; 
&lt;p&gt;The UK’s National Cyber Security Centre (NCSC) and national agencies in nine other countries have warned today that Chinese-linked groups are now leveraging networks of infected devices “at scale” to target critical sectors globally and steal sensitive data.&lt;/p&gt; 
&lt;p&gt;According to an advisory issued by the Five Eyes intelligence-sharing alliance – comprising the UK, the US, Canada, Australia and New Zealand –&amp;nbsp;and 10 other countries, Chinese groups are exploiting security vulnerabilities in unpatched internet devices to create networks to use as a staging post to launch further attacks.&lt;/p&gt; 
&lt;p&gt;“We know that China’s intelligence and military agencies now display an eye-watering level of sophistication in their cyber operations,” said &lt;a href="https://www.computerweekly.com/news/366642032/Nation-states-responsible-for-nationally-significant-cyber-attacks-against-UK-says-NCSC-chief"&gt;NCSC chief Richard Horne&lt;/a&gt; in a speech at its &lt;a href="https://www.cyberuk.uk/"&gt;CyberUK conference in Glasgow&lt;/a&gt;.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Covert networks hide ‘indicators of compromise’"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Covert networks hide ‘indicators of compromise’&lt;/h2&gt;
 &lt;p&gt;The agencies warn that the Chinese tactics are making it difficult for organisations to detect and attribute malicious attacks on their computer networks using traditional “indicators of compromise”.&lt;/p&gt;
 &lt;p&gt;Chinese groups, for example, could use a UK-based infected device as a staging post to hack into a UK-based company, meaning that blocking non-UK IP addresses no longer provides a defence for overseas attacks.&lt;/p&gt;
 &lt;p&gt;They advise companies to adopt “adaptive, intelligence-driven measures” to better mitigate the risks, including monitoring traffic from internet-connected devices, virtual private networks (VPNs) and remote access devices to identify suspicious traffic.&lt;/p&gt;
 &lt;p&gt;Chinese-linked groups are able to evade detection by exploiting low-cost networks of infected devices that can rapidly be reconfigured so that traditional static IP block lists are no longer effective.&lt;/p&gt;
 &lt;p&gt;The networks are used for each phase of a cyber attack, from reconnaissance and malware delivery, to command and control and data exfiltration against targets of espionage and offensive cyber operations, according to the advisory.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Covert networks behind major hacking operations"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Covert networks behind major hacking operations&lt;/h2&gt;
 &lt;p&gt;Covert networks of compromised devices have been used by the Chinese state-sponsored group Volt Typhoon to pre-position for future attacks on &lt;a href="https://www.computerweekly.com/news/366626193/Long-range-drones-to-fly-across-UKs-critical-national-infrastructure"&gt;critical national infrastructure (CNI)&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;The group has &lt;a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-038a?utm_source=UK_NCSC&amp;amp;utm_medium=press_release&amp;amp;utm_campaign=VT_020724"&gt;targeted communications, energy, transport and water services in the US&lt;/a&gt;, and has been able to maintain covert access to critical IT systems for five years or more.&lt;/p&gt;
 &lt;p&gt;It used a network of vulnerable Cisco and NetGear routers, which were no longer supported by the manufacturers and were no longer receiving updates of security patches.&lt;/p&gt;
 &lt;p&gt;Another Chinese group, &lt;a href="https://www.computerweekly.com/news/366611295/NCSC-exposes-Chinese-company-running-malicious-Mirai-botnet"&gt;Flax Typhoon&lt;/a&gt;, has used a covert network of 260,000 compromised devices, including routers, firewalls, webcams and CCTV cameras, to conduct cyber espionage against targets in multiple countries.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Hacking as a service"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Hacking as a service&lt;/h2&gt;
 &lt;p&gt;Chinese hacking groups have a choice of covert networks, each with potentially hundreds of thousands of endpoints, which frequently change, making it more difficult for companies targeted to block attacks, according to the advisory.&lt;/p&gt;
 &lt;p&gt;Chinese information security companies have maintained networks of infected devices, available as a service for Chinese-linked hacking groups.&lt;/p&gt;
 &lt;p&gt;Chinese company Integrity Technology Group controlled a network known as &lt;a href="https://www.techtarget.com/searchsecurity/news/366611357/FBI-disrupts-another-Chinese-state-sponsored-botnet"&gt;Raptor Train&lt;/a&gt;, which infected more than 200,000 devices worldwide in 2024.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Companies advised to take countermeasures"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Companies advised to take countermeasures&lt;/h2&gt;
 &lt;p&gt;The NCSC advises companies to map internet-connected devices in their organisation and corporate VPNs, so they can understand which traffic is legitimate.&lt;/p&gt;
 &lt;p&gt;They should also introduce &lt;a href="https://www.techtarget.com/searchsecurity/definition/multifactor-authentication-MFA"&gt;multifactor authentication (MFA)&lt;/a&gt; when employees use remote connections to dial into business networks.&lt;/p&gt;
 &lt;p&gt;Larger organisations can profile incoming connections based on operating systems, time zones, and the organisation’s systems configurations to identify legitimate traffic.&lt;/p&gt;
 &lt;p&gt;The Five Eyes and the NCSC advise the most at-risk organisations to actively track &lt;a href="https://www.computerweekly.com/news/366583712/Chinese-APT-suspected-of-Ministry-of-Defence-hack"&gt;Chinese advanced persistent threats (APTs)&lt;/a&gt;, using threat reports supplied by the NCSC to create dynamic block lists and rules to detect incoming threats.&lt;/p&gt;
 &lt;p&gt;“In recent years, we have seen a deliberate shift in cyber groups based in China utilising these networks to hide their malicious activity in an attempt to avoid accountability,” said Paul Chichester, NCSC director of operations. “We call on organisations to act now to better defend their critical assets.”&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Read more from CyberUK 2026&lt;/h3&gt; 
   &lt;ul type="square" class="default-list"&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366641875/CYBERUK-26-UK-lagging-on-legal-protections-for-cyber-pros"&gt;CyberUK 2026 – UK lagging on legal protections for cyber pros&lt;/a&gt;: Ahead of this year’s CyberUK conference, the CyberUp Campaign for reform of the UK’s hacking laws proposes a four-pillar framework that would protect cyber professionals from prosecution.&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366642032/Nation-states-responsible-for-nationally-significant-cyber-attacks-against-UK-says-NCSC-chief"&gt;Nation states responsible for ‘nationally significant’ cyber attacks against UK, says NCSC chief&lt;/a&gt;: The UK is facing four nationally significant cyber attacks a week, the majority from hostile states, NCSC chief, Richard Horne, warns at the CyberUK conference.&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366641790/UK-to-build-national-cyber-shield-to-protect-against-AI-cyber-threats"&gt;UK to build ‘national cyber shield’ to protect against AI cyber threats&lt;/a&gt;: Security minister Dan Jarvis calls for artificial intelligence companies to work with government to develop AI-driven cyber defences.&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366642156/NCSC-heralds-end-of-passwords-for-consumers-and-pushes-secure-passkeys"&gt;NCSC heralds end of passwords for consumers and pushes secure passkeys&lt;/a&gt;: UK National Cyber Security Centre is urging consumers to replace passwords and two-factor authentication with passkeys, following a technical study that shows they are more secure and easier to use.&lt;/li&gt; 
   &lt;/ul&gt;
  &lt;/div&gt;
 &lt;/div&gt;
 &lt;ul type="square" class="default-list"&gt;&lt;/ul&gt;
&lt;/section&gt;</body>
            <description>Companies urged to take countermeasures as Chinese hacking groups use networks of infected home and office devices ‘at scale’ to evade security monitoring systems</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/Hero%20Images/china-flag-fotolia.jpg</image>
            <link>https://www.computerweekly.com/news/366641986/Chinese-hackers-using-compromised-networks-to-spy-on-Western-companies-says-Five-Eyes</link>
            <pubDate>Thu, 23 Apr 2026 07:15:00 GMT</pubDate>
            <title>Chinese hackers using compromised networks to spy on Western companies, says Five Eyes</title>
        </item>
        <item>
            <body>&lt;p&gt;Consumers are being urged to replace passwords with passkeys as a simpler, more secure method of accessing online services.&lt;/p&gt; 
&lt;p&gt;The National Cyber Security Centre (NCSC), part of the signals intelligence agency GCHQ, said today that it would no longer recommend that individuals use passwords for logging on where passkeys are available as an alternative.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://www.techtarget.com/whatis/feature/Passkey-vs-password-What-is-the-difference"&gt;Passkeys&lt;/a&gt;, which are securely stored on people’s phones, computers, or in third-party credential managers, are quicker and easier to use than passwords and offer stronger security.&lt;/p&gt; 
&lt;p&gt;The NCSC’s recommendation follows a technical study that shows passkeys are at least as secure – and generally more secure – than a password combined with two-factor authentication, such as an authorisation code sent by SMS.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Resilience against phishing"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Resilience against phishing&lt;/h2&gt;
 &lt;p&gt;The agency claims that a move to passkeys would boost the UK’s resilience to phishing attacks and other hacking attempts, the majority of which rely on criminals stealing or compromising login details.&lt;/p&gt;
 &lt;p&gt;The UK government &lt;a href="https://www.computerweekly.com/news/366623776/UK-government-websites-to-replace-passwords-with-secure-passkeys"&gt;announced last year&lt;/a&gt; that it would roll out passkey technology for digital services as an alternative to current SMS-based verification systems, which incur additional costs for sending SMS messages.&lt;/p&gt;
 &lt;p&gt;The NHS became one of the first government organisations in the world to use passkeys to give patients secure access to hospital and pharmacy websites.&lt;/p&gt;
 &lt;p&gt;Online service providers, including Google, eBay and PayPal, also support passkeys. According to Google, over 50% of active Google users in the UK have a registered passkey – the highest uptake. Microsoft is also introducing passkeys for Hotmail.&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Read more from CyberUK 2026&lt;/h3&gt; 
   &lt;ul type="square" class="default-list"&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366641875/CYBERUK-26-UK-lagging-on-legal-protections-for-cyber-pros"&gt;CyberUK ’26: UK lagging on legal protections for cyber pros&lt;/a&gt;: Ahead of next week's CyberUK conference, the CyberUp Campaign for reform of the UK's hacking laws proposes a four-pillar framework that would protect cyber professionals from prosecution&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366642032/Nation-states-responsible-for-nationally-significant-cyber-attacks-against-UK-says-NCSC-chief"&gt;Nation states responsible for ‘nationally significant’ cyber attacks against UK, says NCSC chief&lt;/a&gt;: The UK is facing four nationally significant cyber attacks a week, the majority from hostile states, NCSC chief, Richard Horne, will warn at the CyberUK conference.&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366641790/UK-to-build-national-cyber-shield-to-protect-against-AI-cyber-threats"&gt;UK to build ‘national cyber shield’ to protect against AI cyber threats&lt;/a&gt;: Security minister Dan Jarvis calls for artificial intelligence companies to work with government to develop AI-driven cyber defences&lt;/li&gt; 
   &lt;/ul&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Better security than 2FA"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Better security than 2FA&lt;/h2&gt;
 &lt;p&gt;Passkeys offer a greater level of security than passwords and SMS two-factor authentication (2FA), both of which can be compromised by hackers.&lt;/p&gt;
 &lt;p&gt;They allow people to log into websites securely, using their own mobile phones, tablets or laptops to verify their identity by entering a PIN or using facial recognition.&lt;/p&gt;
 &lt;p&gt;The use of passwords with two-factor authentication for SMS can be vulnerable to “SIM swapping” attacks, where criminals allocate a victim’s phone number to a phone SIM card to intercept authentication keys.&lt;/p&gt;
 &lt;p&gt;The NCSC said that it stopped short of endorsing passkeys last year because there were still key implementation challenges.&lt;/p&gt;
 &lt;p&gt;However, it said that progress with the technology over the past year, including the ability to move passkeys between Android and Apple phones, has now made the technology viable.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Passkeys not yet recommended for business"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Passkeys not yet recommended for business&lt;/h2&gt;
 &lt;p&gt;The centre said it can now recommend passkey technology to the public as a more secure and user-friendly login method, and to businesses as the default authentication option for consumers.&lt;/p&gt;
 &lt;p&gt;The NCSC is not yet recommending &lt;a href="https://www.techtarget.com/searchsecurity/tip/How-to-roll-out-an-enterprise-passkey-deployment"&gt;passkeys for business applications&lt;/a&gt;, which will take longer to phase in. Many organisations rely on old IT systems that do not support passkeys or two-factor authentication.&lt;/p&gt;
 &lt;p&gt;The NCSC said that where services do not support passkeys, it advises consumers to create strong passwords and use two-factor authentication.&lt;/p&gt;
 &lt;p&gt;Jonathon Ellison, director for national resilience at the NCSC, said moving to passkeys would accelerate the UK’s resilience against cyber attacks.&lt;/p&gt;
 &lt;p&gt;“The headaches that remembering passwords have caused us for decades no longer need to be a part of logging in, where users migrate to passkeys – they are a user-friendly alternative, which provides stronger overall resilience,” he said.&lt;/p&gt;
 &lt;p&gt;Phasing out passwords will be gradual, with the first step being for people to become comfortable with using passkeys. Big banks are expected to phase in the technology over the next three to five years.&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;How passkeys work&lt;/h3&gt; 
   &lt;p&gt;When people sign up for accounts using passkeys, their device creates a private key, which remains on the device, and a public key, which is stored by the service they wish to access.&lt;/p&gt; 
   &lt;p&gt;The device will prove to the website that it has the correct private key when the owner signs into a service, without disclosing the private key to the service provider.&lt;/p&gt; 
   &lt;p&gt;Passkeys are designed to synchronise across different devices, so a passkey stored on an iPhone would be automatically shared with the owner’s iPad.&lt;/p&gt; 
   &lt;p&gt;If a person loses a device and does not have a copy of the passkey on a second device, they will be able to recover it by going through an account recovery process.&lt;/p&gt; 
   &lt;p&gt;Unlike passwords, passkeys are cryptographically generated and do not need to be changed regularly to remain secure.&lt;/p&gt; 
   &lt;p&gt;They are stored in a “secure enclave” on phones and computers, which means they cannot be accessed if the device is compromised or lost.&lt;/p&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/section&gt;</body>
            <description>UK National Cyber Security Centre is urging consumers to replace passwords and two-factor authentication with passkeys, following a technical study that shows they are more secure and easier to use</description>
            <image>https://cdn.ttgtmedia.com/visuals/German/article/easy-password-adobe.jpg</image>
            <link>https://www.computerweekly.com/news/366642156/NCSC-heralds-end-of-passwords-for-consumers-and-pushes-secure-passkeys</link>
            <pubDate>Wed, 22 Apr 2026 19:01:00 GMT</pubDate>
            <title>NCSC heralds end of passwords for consumers and pushes secure passkeys</title>
        </item>
        <item>
            <body>&lt;p&gt;Critical local infrastructure that supports council services, social care services and local transport in the UK is falling through the gaps in government and business planning for cyber resilience, claims &lt;a title="https://www.linkedin.com/in/jonathannicholaslee/" href="https://url.us.m.mimecastprotect.com/s/UP5yCjRvnlfAGlgGMhWfPTmiUW4?domain=urldefense.com"&gt;Jonathan Lee&lt;/a&gt;, director of cyber strategy at cyber security company TrendAI.&lt;/p&gt; 
&lt;p&gt;In an interview with Computer Weekly, Lee says that municipal areas, such as London or Greater Manchester, could be at risk from multiple cyber attacks that could damage local infrastructure, causing escalating problems for residents that could add up to severe disruption.&lt;/p&gt; 
&lt;p&gt;“We need to be thinking about what would happen if multiple attacks happened at the same time across the city region – and the human impact of not being able to do your job properly, not being able to travel around and not being able to deliver public services,” he says.&lt;/p&gt; 
&lt;p&gt;The &lt;a href="https://www.computerweekly.com/news/366634283/IT-services-companies-and-datacentres-face-regulation-as-cyber-security-bill-reaches-Parliament"&gt;Cyber Security and Resilience Bill (CSRB)&lt;/a&gt;, which is currently going through Parliament, aims to ensure that critical national services, such as healthcare, water, transport and energy, are protected against cyber attacks that cost the economy billions of pounds a year. But local infrastructure has been relatively neglected, claims Lee.&lt;/p&gt; 
&lt;p&gt;The National Cyber Security Centre’s (NCSC) &lt;a href="https://www.computerweekly.com/news/366628426/NCSC-updates-CNI-Cyber-Assessment-Framework"&gt;Cyber Assurance Framework&lt;/a&gt;, for example, aims to help operators of critical national infrastructure (CNI) demonstrate a base level of cyber security preparedness – but it is not mandatory, and not every organisation that should implement it is implementing it.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Whole of society risk"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Whole of society risk&lt;/h2&gt;
 &lt;p&gt;“We need to be more stringent in making sure that people are taking this seriously and are looking not just at their own organisation, but are looking at the whole of society risk,” says Lee.&lt;/p&gt;
 &lt;p&gt;Attacks on public services, such as council-run social care, can have a catastrophic, knock-on effect on the NHS and patient care, he adds.&lt;/p&gt;
 &lt;p&gt;There is a need for more “top-down” advice for regional infrastructure providers, from organisations such as the NCSC, which is not as well known as it could be among the companies and public sector bodies that provide local infrastructure.&lt;/p&gt;
 &lt;p&gt;“The message has got to be diffused down into local levels to ensure that a consistent message is spread out, and that can also be through industry partners. That is something I feel quite strongly about,” says Lee.&lt;/p&gt;
 &lt;p&gt;The &lt;a href="https://www.computerweekly.com/news/366641782/Cyber-Essentials-closes-the-MFA-loophole-but-leaves-some-organisations-adrift"&gt;Cyber Essentials programme&lt;/a&gt;, which has been updated to include new requirements for organisations to use multifactor authentication (MFA), and requirements for cloud providers to patch vulnerabilities within 14 days, has helped build resilience, but only for organisations that choose to adhere to it.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Keeping the resilience score"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Keeping the resilience score&lt;/h2&gt;
 &lt;p&gt;The UK government is also intending to publish a &lt;a href="https://www.computerweekly.com/news/366638753/UK-government-must-get-its-hands-dirty-on-security-report-says"&gt;Cyber Action Plan&lt;/a&gt; in the coming months, which will guide organisations to get basic security right and improve their cyber security over time.&lt;/p&gt;
 &lt;p&gt;Although there is no shortage of initiatives and action plans, there is a danger that many of these plans will be left on a shelf.&lt;/p&gt;
 &lt;p&gt;One approach is for organisations to rate themselves on a scorecard for cyber resilience, on a scale of, say, 1 to 100, and to report their progress back to board-level directors.&lt;/p&gt;
 &lt;p&gt;“We need a mechanism to measure how impactful these interventions are, whether it be things like the Cyber Assessment Framework, Cyber Essentials or legislation,” says Lee.&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Read more about cyber resilience&lt;/h3&gt; 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;&lt;a href="For%20business%20leaders,%20if%20your%20security%20strategy%20for%202026%20still%20revolves%20around%20keeping%20attackers%20out,%20you%20might%20already%20be%20behind."&gt;Cyber resilience will define winners and losers in 2026&lt;/a&gt;: For business leaders, if your security strategy for 2026 still revolves around keeping attackers out, you might already be behind.&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/opinion/Are-we-mistaking-regulation-for-resilience"&gt;Are we mistaking regulation for resilience&lt;/a&gt;? We have a growing number of cyber compliance regulations, yet our country’s cyber resilience remains fragile. What is going wrong?&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/opinion/How-CISOs-can-build-a-truly-unified-and-resilient-security-platform"&gt;How CISOs can build a truly unified and resilient security platform&lt;/a&gt;: The Security Think Tank looks at platformisation, considering questions such as how CISOs can distinguish between a truly integrated platform and integration theatre, and how to protect unified platforms.&lt;/li&gt; 
   &lt;/ul&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/section&gt;</body>
            <description>Jonathan Lee, director of cyber strategy at Trend AI, argues for more focus on local and municipal cyber resilience</description>
            <image>https://cdn.ttgtmedia.com/visuals/LeMagIT/hero_article/Hero-Danger-by-InfiniteFlow-Adobe-10.jpg</image>
            <link>https://www.computerweekly.com/news/366641946/Interview-Critical-local-infrastructure-is-missing-link-in-cyber-resilience</link>
            <pubDate>Wed, 22 Apr 2026 11:02:00 GMT</pubDate>
            <title>Interview: Critical local infrastructure is missing link in UK cyber resilience</title>
        </item>
        <item>
            <body>&lt;p&gt;The UK aims to build “national scale” cyber defence capabilities to respond to growing threats from hostile states and artificial intelligence (AI)-powered attacks.&lt;/p&gt; 
&lt;p&gt;Security minister Dan Jarvis said today that defending against “&lt;a href="https://www.computerweekly.com/news/366641789/A-tsunami-of-flaws-When-frontier-AI-and-Patch-Tuesday-collide"&gt;frontier AI&lt;/a&gt;” will require a national effort from government and businesses.&lt;/p&gt; 
&lt;p&gt;He said the government was “laying the groundwork” for a national capability, which has been dubbed the “national cyber shield”, to protect the UK against cyber threats, and&amp;nbsp;called for AI companies to work directly with the government to develop AI to defend against automated cyber attacks.&lt;/p&gt; 
&lt;p&gt;The government’s vision is to develop defensive AI technology that has the capability to identify and repair security vulnerabilities in software at machine speed. “Make no mistake, this is a generational endeavour, and it will test the absolute limits of our engineering and innovation,” Jarvis said in a speech in Glasgow.&lt;/p&gt; 
&lt;p&gt;He was speaking following Anthropic’s decision to delay its Claude Mythos AI model from public release &lt;a href="https://www.computerweekly.com/news/366641789/A-tsunami-of-flaws-When-frontier-AI-and-Patch-Tuesday-collide"&gt;after the technology uncovered thousands of previously known security vulnerabilities&lt;/a&gt; across commonly used software applications.&lt;/p&gt; 
&lt;p&gt;Mythos had uncovered “critical flaws that had gone unnoticed by human experts and automatic tools for over two decades”, said Jarvis.&lt;/p&gt; 
&lt;p&gt;He said that protecting Critical National Infrastructure will require a “fundamentally different approach” in the age of AI. “We will not secure the central pillars of the UK state simply by purchasing off-the-shelf vendor solutions,” said Jarvis.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Cyber attacks more sophisticated"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Cyber attacks more sophisticated&lt;/h2&gt;
 &lt;p&gt;Jarvis said the nature of warfare had changed, and that attacks on British systems were increasing in “volume, sophistication and in ambition”.&lt;/p&gt;
 &lt;p&gt;Hostile states have “worked out that the most effective way is not to confront us directly, but to quietly hollow us out”, he said.&lt;/p&gt;
 &lt;p&gt;The National Cyber Security Centre (NCSC), part of GCHQ, handled over 200 nationally significant incidents last year, double that of the year before. &lt;a href="https://www.computerweekly.com/news/366642032/Nation-states-responsible-for-nationally-significant-cyber-attacks-against-UK-says-NCSC-chief"&gt;The majority are attacks from hostile nation states&lt;/a&gt;, including Russia, Iran and China.&lt;/p&gt;
 &lt;p&gt;“That number tells me the frontline isn’t coming – it’s here,” said Jarvis. “The cyber security of British business is a matter of national security.”&lt;/p&gt;
 &lt;p&gt;Hostile states were attacking logistics systems used to move goods, and were compromising high street business – a reference to the &lt;a href="https://www.computerweekly.com/feature/One-year-on-from-the-MS-cyber-attack-What-did-we-learn"&gt;debilitating cyber attacks against Marks &amp;amp; Spencer and Co-op&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;The &lt;a href="https://www.computerweekly.com/news/366634441/Jaguar-Land-Rover-cyber-attack-costs-firm-485m-in-its-quarter"&gt;cyber attack against Jaguar Land Rover&lt;/a&gt;, had it been caused by an old-school physical attack, “would have been the equivalent of hundreds of masked criminals turning up to dealerships across the country breaking glass, smashing up computers and driving cars right off the forecourt”.&lt;/p&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="Business needs to step up"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Business needs to step up&lt;/h2&gt;
 &lt;p&gt;Companies are most at risk from cyber attacks, not because attackers exploit vulnerabilities, but because companies have failed to keep their systems up to date, or to deploy base-line security measures such as multi-factor authentication.&lt;/p&gt;
 &lt;p&gt;Jarvis said that while government can set standards, share intelligence and provide guidance, it was no substitute for businesses ensuring basic cyber security hygiene.&lt;/p&gt;
 &lt;p&gt;“Basic cyber hygiene is no longer optional, but the baseline – the absolute minimum we should expect of any serious organisation operating in the modern economy,” he said.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Cyber Resilience Pledge"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Cyber Resilience Pledge&lt;/h2&gt;
 &lt;p&gt;Jarvis said the government would be inviting organisations to sign a Cyber Resilience Pledge.&lt;/p&gt;
 &lt;p&gt;Businesses will be invited to make a “public commitment” to investors, their customers and supply chains to make cyber security a board-level responsibility.&lt;/p&gt;
 &lt;p&gt;They will also be urged to commit to meeting basic security standards through the NCSC’s Cyber Essentials programme.&lt;/p&gt;
 &lt;p&gt;The pledge will accompany the government’s National Cyber Action Plan – a national strategy for cyber security – to be published in the summer.&lt;/p&gt;
 &lt;p&gt;“The plan will demonstrate how we will tackle the growing threat, how we will strengthen our collective resilience, and how we will harness the opportunity for our world-leading cyber sector to secure the UK’s economic growth for years to come,” said Jarvis.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="More funding for small business"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;More funding for small business&lt;/h2&gt;
 &lt;p&gt;The security minister said the government was making £90m of investment to strengthen cyber resilience, to provide “practical targeted support” to small and medium-sized businesses.&lt;/p&gt;
 &lt;p&gt;It will be distributed over the next three years through existing schemes run by the Department for Science, Innovation and Technology and the National Cyber Security Centre.&lt;/p&gt;
 &lt;p&gt;Cyber security minister Baroness Lloyd said the government had written to the CEOs and chairs of over 180 of the UK’s leading businesses to encourage as many as possible to sign up to the pledge ahead of a formal launch later this year.&lt;/p&gt;
 &lt;p&gt;“The cyber threat facing UK businesses is serious, growing and evolving fast,” she said. “AI is giving attackers capabilities that would have seemed extraordinary just a year ago, and no organisation can afford to be complacent.”&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Read more from CyberUK 2026&lt;/h3&gt; 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366641875/CYBERUK-26-UK-lagging-on-legal-protections-for-cyber-pros"&gt;CyberUK ’26: UK lagging on legal protections for cyber pros&lt;/a&gt;: Ahead of next week's CyberUK conference, the CyberUp Campaign for reform of the UK's hacking laws proposes a four-pillar framework that would protect cyber professionals from prosecution&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366642032/Nation-states-responsible-for-nationally-significant-cyber-attacks-against-UK-says-NCSC-chief"&gt;Nation states responsible for ‘nationally significant’ cyber attacks against UK, says NCSC chief&lt;/a&gt;: The UK is facing four nationally significant cyber attacks a week, the majority from hostile states, NCSC chief, Richard Horne, will warn at the CyberUK conference.&lt;/li&gt; 
   &lt;/ul&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/section&gt;</body>
            <description>Security minister Dan Jarvis calls for artificial intelligence companies to work with government to develop AI-driven cyber defences</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/Hero%20Images/IT-security-cyber-defence-fotolia.jpg</image>
            <link>https://www.computerweekly.com/news/366641790/UK-to-build-national-cyber-shield-to-protect-against-AI-cyber-threats</link>
            <pubDate>Wed, 22 Apr 2026 10:45:00 GMT</pubDate>
            <title>UK to build ‘national cyber shield’ to protect against AI cyber threats</title>
        </item>
        <item>
            <body>&lt;p&gt;Microsoft’s regular monthly round of vulnerability fixes dropped &lt;a href="https://www.computerweekly.com/news/366641679/April-Patch-Tuesday-brings-zero-days-in-Defender-SharePoint-Server" target="_blank" rel="noopener"&gt;as scheduled on Tuesday 14 April&lt;/a&gt;, containing a handful of zero-days and critical updates for security teams to pore over. So far, so normal.&lt;/p&gt; 
&lt;p&gt;But this month’s Patch Tuesday was rather more notable then many other recent updates because it was, by some margin, the second-largest update in history by volume, comprising over 160 distinct flaws – &lt;a href="https://www.computerweekly.com/news/366632872/Patch-Tuesday-Windows-10-end-of-life-pain-for-IT-departments" target="_blank" rel="noopener"&gt;October 2025 saw 175&lt;/a&gt; – and rising to nearly 250 once third-party and Chromium updates were taken into account.&lt;/p&gt; 
&lt;p&gt;Almost immediately, commentators rushed to invoke the unavoidable spectre of artificial intelligence (AI). Vulnerability expert and regular Patch Tuesday commentator Dustin Childs, of TrendAI’s Zero Day Initiative, was among them.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://www.zerodayinitiative.com/blog/2026/4/14/the-april-2026-security-update-review" target="_blank" rel="noopener"&gt;In his regular write-up&lt;/a&gt;, he described the update as “monstrous” in size, and went on to suggest that growth in the use of AI tools to uncover software vulnerabilities at scale may be behind the sudden jump.&lt;/p&gt; 
&lt;p&gt;And this may well be a big part of what is going on, agrees Chris Goettl, vice-president of product management for software products at &lt;a href="https://www.ivanti.com/" target="_blank" rel="noopener"&gt;Ivanti&lt;/a&gt;, which has just made significant enhancements to its Neurons patch management platform.&lt;/p&gt; 
&lt;p&gt;Setting the scene, Goettl explains: “The lead up to Patch Tuesday has been interesting. We had a Google Chrome zero-day, &lt;a href="http://nvd.nist.gov/vuln/detail/CVE-2026-5281" target="_blank" rel="noopener"&gt;CVE-2026-5281&lt;/a&gt;, that was patched on 1 April, an Adobe Acrobat Reader zero-day, &lt;a href="https://helpx.adobe.com/security/products/acrobat/apsb26-43.html" target="_blank" rel="noopener"&gt;CVE-2026-34621&lt;/a&gt;, late in the day on Friday 10 April, and several older CVEs that were added to the Cisa Kev list yesterday [13 April]. All of this amidst a lot of industry buzz about Anthropic Mythos and &lt;a href="https://www.anthropic.com/glasswing"&gt;Project Glasswing&lt;/a&gt;.”&lt;/p&gt; 
&lt;p&gt;Launched amid much fanfare earlier in April, Project Glasswing is a new Anthropic initiative built around an in-development frontier AI model, Claude Mythos Preview, which its progenitors say can both discover zero-day flaws and develop exploits for them.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Critical vulnerabilities"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Critical vulnerabilities&lt;/h2&gt;
 &lt;p&gt;Such is Mythos’s power – Anthropic claims to have discovered “thousands” of critical vulnerabilities, some of which have been hiding in plain sight for years – that a wraparound Project Glasswing has been created to limit access to the potentially dangerous model to a select group of tech companies, or at least to give them a head start on fixing the flaws before Mythos becomes more widely available.&lt;/p&gt;
 &lt;p&gt;These include Amazon Web Services (AWS), Apple, Broadcom, Cisco, CrowdStrike, Google, Microsoft, Nvidia and Palo Alto Networks.&lt;/p&gt;
 &lt;p&gt;Mythos and Project Glasswing were only made public earlier this month – far too recently to have had much impact on the Patch Tuesday update. And according to analysis of recently disclosed vulnerabilities &lt;a href="https://www.vulncheck.com/blog/anthropic-glasswing-cves" target="_blank" rel="noopener"&gt;conducted by VulnCheck&lt;/a&gt;, only 75 mention Anthropic and only one is directly attributable to Glasswing.&lt;/p&gt;
 &lt;p&gt;Therefore, it’s reasonable and accurate to say the correlation between its release and the spike in Patch Tuesday disclosures is a hypothetical one for now.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Fast-moving timeline"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Fast-moving timeline&lt;/h2&gt;
 &lt;p&gt;However, things are moving fast, and given the timeline is advancing at pace, the conversation needs to happen today. &lt;a href="https://www.computerweekly.com/news/366641649/UK-businesses-must-face-up-to-AI-threat-says-government" target="_blank" rel="noopener"&gt;Indeed, in an open letter published on 15 April&lt;/a&gt;, business secretary Liz Kendall urged UK business leaders to “plan accordingly” as frontier models become more adept.&lt;/p&gt;
 &lt;p&gt;“The scenarios that Mythos enables aren’t routine,” says Doc McConnell, head of policy at &lt;a href="https://finitestate.io/" target="_blank" rel="noopener"&gt;Finite State&lt;/a&gt; and a former Cybersecurity and Infrastructure Security Agency (Cisa) branch chief and White House advisor. “AI is a ratchet wrench for cyber security – it only goes in one direction: faster. It enables security teams to respond to incidents more quickly, but it also increases the volume and severity of those incidents.&lt;/p&gt;
 &lt;p&gt;“Sure, the basics still apply – building security into the product lifecycle, accelerating the patch cycle, making sure that cyber security is central to your company’s risk management and long-term strategy. What’s changed is that the traditional advice to “do the basics, but faster” is no longer sufficient … Regardless of how skilled your technical team, humans simply can’t go fast enough to keep up with AI.”&lt;/p&gt;
 &lt;p&gt;While McConnell applauds Anthropic and its Project Glasswing squad for their approach, he says it would be wise to assume that if Anthropic is being noisy and responsible about this, someone else is being quiet, and irresponsible.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="How will Mythos be used?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How will Mythos be used?&lt;/h2&gt;
 &lt;p&gt;Goettl at Ivanti says: “Most of the discussions around Mythos have been focused on where it will be used and the ramifications, [and] finding exploitable flaws in code can be a powerful tool for good when used by the vendor writing the code before it is released.&lt;/p&gt;
 &lt;p&gt;“However, it will also be used by researchers and threat actors to find flaws in code that is already released, and that is where my speculation is directed,” he says.&lt;/p&gt;
 &lt;p&gt;Goettl invites us to consider the knock-on effects of a frontier model like Mythos and what it means for software companies.&lt;/p&gt;
 &lt;p&gt;In the immediate future, he says, large tech firms will use it to release more secure code. But at the same time, both legit security researchers and threat actors will be adopting more robust AI models to identify exploitable flaws.&lt;/p&gt;
 &lt;p&gt;“This will result in more coordinated disclosures – good – zero-day exploits – bad – and n-day exploits – bad,” says Goettl. “All of this will result in more frequent, and more importantly, urgent software updates.&lt;/p&gt;
 &lt;p&gt;“Many organisations currently struggle to keep up with priority updates resolving exploited vulnerabilities when they occur outside of their normal monthly maintenance. [For example], I suspect most organisations were not aware of the Adobe Acrobat zero-day exploit &lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" target="_blank" rel="noopener"&gt;until the Cisa Kev update&lt;/a&gt;&amp;nbsp;… This means that threat actors had another two to three days of free reign to exploit CVE-2026-34621 before most organisations became aware,” says Goettl.&lt;/p&gt;
 &lt;p&gt;Given browser security updates are weekly occurrences these days, and many other business applications in regular use release updates on a continuous cadence and not a set monthly date, it isn’t hard to see that a good number of exploits are going to, a) make a mockery out of organisations’ maintenance schedules and, b) do it a lot. Of course, it’s not possible to say if this will be a doubling, trebling or quadrupling of vulnerabilities, but it probably is safe to say that the increase will be noticeable and will likely exacerbate the challenges security leaders already see around patch management.&lt;/p&gt;
&lt;/section&gt;        
&lt;section class="section main-article-chapter" data-menu-title="Next steps"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Next steps&lt;/h2&gt;
 &lt;p&gt;What’s the solution? Goettl believes security leaders need to make a step change in mindset, and maturity, defining their risk appetite and risk posture, which if done effectively, can make remediation activities much more clear cut.&lt;/p&gt;
 &lt;p&gt;This, he argues, should go alongside a technical evolution in which traditional vulnerability assessment and intelligence services become better integrated into a broader ecosystem where they marry up with asset visibility or systems of record. This hybrid approach can help refine the process of determining if things need to be addressed right away, or if they can wait for regular maintenance activities. This stack should be integrated with an autonomous endpoint management (AEM) platform, adds Goettl, to speed remediation.&lt;/p&gt;
 &lt;p&gt;Meanwhile, Finite State’s McConnell lays out three steps the industry itself should be considering.&lt;/p&gt;
 &lt;p&gt;“Security has to move to the very beginning of the product lifecycle,” he says. “If you’re waiting until a CVE drops to find out whether your product is affected, you’re already behind. Binary analysis and software composition analysis need to happen continuously from the very first stages of design and development – not as a ‘final check’ when the features are final and the release is scheduled.&lt;/p&gt;
 &lt;p&gt;“Second, security needs to keep pace with product development, even as companies accelerate development with AI. That means a real-time SBOM, with automated reachability analysis for new vulnerabilities so that they can confidently prioritise the fixes that matter most.&lt;/p&gt;
 &lt;p&gt;“Finally, companies need to understand that even in a capable security environment, incidents will still happen.” says McConnell. “When they do, defenders need to match attacker speed. That means an automated vulnerability and incident response capability that can triage, communicate and coordinate remediation across a product portfolio without relying on manual investigation at each step.&amp;nbsp;&lt;/p&gt;
 &lt;p&gt;“Companies need to act on this immediately: make it the top topic at your next board meeting. If you don’t have this capability today, partner with a company that does.”&lt;/p&gt;
&lt;/section&gt;        
&lt;section class="section main-article-chapter" data-menu-title="Could frontier models be good for cyber?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Could frontier models be good for cyber?&lt;/h2&gt;
 &lt;p&gt;Could this leap forward in the bug-hunting capabilities of frontier models like Mythos ultimately prove to be beneficial for cyber security? Richard Horne, CEO of the UK’s National Cyber Security Centre (NCSC), certainly seems to think so.&lt;/p&gt;
 &lt;p&gt;In an article first published &lt;a href="https://www.ft.com/content/9469b567-0f86-4c6f-9ce3-a2a28e4f7cad" target="_blank" rel="noopener"&gt;as a letter to &lt;em&gt;The &lt;/em&gt;&lt;/a&gt;&lt;i&gt;&lt;a href="https://www.ft.com/content/9469b567-0f86-4c6f-9ce3-a2a28e4f7cad" target="_blank" rel="noopener"&gt;Financial Times&lt;/a&gt;&lt;/i&gt;, Horne says there is a path towards the industry using AI appropriately to find and fix flaws, but the road ahead is paved with risks.&lt;/p&gt;
 &lt;p&gt;“In the immediate term, we will increasingly see AI exposing those organisations that have not taken appropriate steps to safeguard their cyber security,” says Horne.&lt;/p&gt;
 &lt;p&gt;“AI will make it easier, faster and cheaper to discover and exploit weaknesses that previously required more time, skill or resource for attackers to identify. And the pressure on organisations to patch systems quickly will only grow more acute.&lt;/p&gt;
 &lt;p&gt;“That’s why it is more essential than ever that organisations ensure they are following established good practices, set out by the NCSC, to raise their security baseline.”&lt;/p&gt;
 &lt;p&gt;For Horne, this includes reducing “unnecessary” exposure to attacks, rapid application of updates, and monitoring for and responding to malicious activity. These technical actions, he says, will have to be championed by all leaders and board-level executives at organisations if they are to have a positive impact.&lt;/p&gt;
 &lt;p&gt;This includes reducing unnecessary exposure to attack, applying security updates rapidly, as well as monitoring for, and quickly responding to, malicious activity detected.&lt;/p&gt;
 &lt;p&gt;These are technical actions, but they must be championed by all leaders and board members at organisations to have a positive impact. Cyber risk is business risk.&lt;/p&gt;
 &lt;p&gt;“As our society navigates these fast-evolving capabilities, the NCSC will stay focused on its mission to protect the UK from cyber threats, working alongside industry and wider government, and we will continue advising on the risks and opportunities,” says Horne.&lt;/p&gt;
 &lt;p&gt;“By getting the fundamentals right and carefully adopting frontier AI models for good, network defenders can retain an advantage and help keep the UK safe online.”&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Read more about Anthropic Mythos&lt;/h3&gt; 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;Technology secretary Liz Kendall urges Britain’s business community to sit up and pay attention to emerging AI threats, following the debut of&amp;nbsp;&lt;a rel="noopener" target="_blank" href="https://www.computerweekly.com/news/366641563/UK-financial-regulators-rush-to-assess-risks-of-Anthropic-AI-model"&gt;Anthropic’s new frontier model, Mythos&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;Banks called in by regulators as latest artificial intelligence model identifies&amp;nbsp;&lt;a rel="noopener" target="_blank" href="https://www.computerweekly.com/news/366641563/UK-financial-regulators-rush-to-assess-risks-of-Anthropic-AI-model"&gt;thousands of software vulnerabilities&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;In a new report from the Cloud Security Alliance, experts warn of an AI vulnerability storm triggered by &lt;a rel="noopener" target="_blank" href="https://www.darkreading.com/cloud-security/csa-cisos-prepare-post-mythos-exploit-storm"&gt;the introduction of Anthropic’s Claude Mythos&lt;/a&gt; (Dark Reading).&lt;/li&gt; 
    &lt;li&gt;Letting probabilistic AI models autonomously operate inside production networks creates real safety and auditability issues, and that core security validation still needs deterministic guardrails. &lt;a href="https://www.computerweekly.com/opinion/Anthropics-Mythos-raises-the-stakes-for-security-validation" target="_blank" rel="noopener"&gt;And Anthropic just raised the stakes&lt;/a&gt;.&lt;/li&gt; 
   &lt;/ul&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/section&gt;</body>
            <description>Microsoft’s April Patch Tuesday drop was the second-largest in history, falling just shy of an October 2025 record. What is behind the spike in vulnerability disclosures, and is there a connection to Anthropic’s bug-hunting Claude Mythos AI model?</description>
            <image>https://cdn.ttgtmedia.com/visuals/German/article/cloud-service-outage-adobe.jpg</image>
            <link>https://www.computerweekly.com/news/366641789/A-tsunami-of-flaws-When-frontier-AI-and-Patch-Tuesday-collide</link>
            <pubDate>Wed, 22 Apr 2026 06:15:00 GMT</pubDate>
            <title>A tsunami of flaws: When frontier AI and Patch Tuesday collide</title>
        </item>
        <item>
            <body>&lt;p&gt;The UK is facing a “perfect storm” in cyber security as attacks driven by hostile states, combined with advances in artificial intelligence (AI), create new risks to UK infrastructure, the head of the UK’s National Cyber Security Centre (NCSC) will warn on Tuesday.&lt;/p&gt; 
&lt;p&gt;Hostile nation states are now directly or indirectly responsible for the majority of &lt;a href="https://www.computerweekly.com/news/366632664/NCSC-calls-for-action-after-rise-in-nationally-significant-cyber-incidents"&gt;“nationally significant” cyber security attacks&lt;/a&gt; against the UK which run at an average of four per week, &lt;a href="https://www.computerweekly.com/news/366616635/NCSC-boss-calls-for-sustained-vigilance-in-an-aggressive-world"&gt;Richard Horne, CEO of the NCSC&lt;/a&gt;, is expected to say.&lt;/p&gt; 
&lt;p&gt;A combination of technological change and rising geopolitical tension is creating “tumultuous uncertainty”, as well as opportunities in cyber security, he is expected to say at the &lt;a href="https://www.cyberuk.uk/"&gt;NCSC’s CyberUK conference in Glasgow&lt;/a&gt;.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Lessons from the battlefield"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Lessons from the battlefield&lt;/h2&gt;
 &lt;p&gt;Russia is taking cyber lessons learned during the war in Ukraine and is deploying “tactics and techniques honed in conflict” against western states, including the UK, Horne will tell conference attendees.&lt;/p&gt;
 &lt;p&gt;That has led to sustained “hybrid” attacks, which incorporate physical and cyber disruption, targeting the UK and Europe.&lt;/p&gt;
 &lt;p&gt;China’s intelligence and military agencies are capable of an “eye-watering level of sophistication” in offensive cyber operations.&lt;/p&gt;
 &lt;p&gt;The Chinese hacking group Volt Typhoon has targeted multiple operators of critical national infrastructure (CNI) in Asia and across the US, as it pre-positions for future attacks, which &lt;a href="https://www.computerweekly.com/news/366640484/UK-Cyber-Monitoring-Centre-plans-expansion-in-US-amid-risk-of-Category-5-attack"&gt;could rank among the most severe&lt;/a&gt; experienced to date, Computer Weekly has previously reported.&lt;/p&gt;
 &lt;p&gt;And Iran is “almost certainly” using cyber activity to support the repression of people in Britain who are seen as threats to the Iranian regime.&lt;/p&gt;
 &lt;p&gt;Iranian state-linked hackers were also identified as being &lt;a href="https://www.computerweekly.com/news/366640448/Cisa-tells-US-organisations-to-harden-endpoint-management-after-Stryker-attack"&gt;behind the cyber attack on the US medical technology firm, Stryker&lt;/a&gt;, in March.&lt;/p&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="Cyber is an integral part of conflict"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Cyber is an integral part of conflict&lt;/h2&gt;
 &lt;p&gt;Horne is expected to warn that cyber attacks are now an integral part of conflict, and as much a part of modern warfare as drones and missiles.&lt;/p&gt;
 &lt;p&gt;Groups linked to Russian military and intelligence services were behind a series of &lt;a href="https://www.computerweekly.com/news/366638859/Russias-cyber-attacks-on-Polish-utilities-draws-NCSC-alert"&gt;cyber attacks on Poland’s energy infrastructure&lt;/a&gt; in December 2025, for example.&lt;/p&gt;
 &lt;p&gt;They targeted two combined heat and &lt;a href="https://www.gov.pl/web/primeminister/poland-stops-cyberattacks-on-energy-infrastructure"&gt;power plants and an energy management system&lt;/a&gt; for renewable energy.&lt;/p&gt;
 &lt;p&gt;“Russia is taking the cyber lessons it has learnt in a theatre of war and is moving them beyond the battlefield,” he will say.&lt;/p&gt;
 &lt;p&gt;Cyber security has become “integral to conflict” and will become a new “home front."&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Ransomware without the ransom"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Ransomware without the ransom&lt;/h2&gt;
 &lt;p&gt;In the event of conflict, or near conflict, the UK would likely face cyber attacks “at scale” that would cause similar disruption to ransomware attacks, but without the possibility of recovering data by paying a ransom.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.computerweekly.com/news/366634441/Jaguar-Land-Rover-cyber-attack-costs-firm-485m-in-its-quarter"&gt;Ransomware attacks on Jaguar Land Rover&lt;/a&gt; cost the UK an estimated £1.9bn, while &lt;a href="https://www.computerweekly.com/news/366626336/MS-Co-op-attacks-a-Category-2-cyber-hurricane-say-UK-experts"&gt;attacks on Marks &amp;amp; Spencer and the Co-op&lt;/a&gt; had estimated costs of between £270m and £440m, according to the &lt;a href="https://www.computerweekly.com/news/366640484/UK-Cyber-Monitoring-Centre-plans-expansion-in-US-amid-risk-of-Category-5-attack"&gt;UK Cyber Monitoring Centre&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;Horne will say that defending against such attacks will require every organisation to make cyber security part of their corporate mission and to “build defence in-depth” so that they can remain operational following a successful attack.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Risks from Mythos and frontier AI"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Risks from Mythos and frontier AI&lt;/h2&gt;
 &lt;p&gt;Anthropic’s AI model, &lt;a href="https://www.computerweekly.com/news/366641763/Bank-cyber-teams-on-red-alert-as-Anthropic-promises-them-Mythos-next-week"&gt;Mythos&lt;/a&gt;, has exposed widespread security vulnerabilities in legacy software that could be exploited by malicious attackers if they became known.&lt;/p&gt;
 &lt;p&gt;Horne will warn that such “frontier AI” will quickly show where the fundamentals of cyber security need to be addressed.&lt;/p&gt;
 &lt;p&gt;It will expose poor quality code shipped by software suppliers with significant vulnerabilities, organisations that are not patching their IT systems quickly or widely enough, and those that &lt;a href="https://www.computerweekly.com/news/366638959/CIOs-discuss-friction-between-legacy-IT-and-innovation"&gt;fail to replace outdated legacy computer systems&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;But Horne is expected to argue that there is an opportunity for AI to be a net positive for cyber defence.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Cyber security in space"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Cyber security in space&lt;/h2&gt;
 &lt;p&gt;In the near future, organisations will need to expand cyber security to protect energy systems, production lines, robotics, space-based communications and autonomous AI agents.&lt;/p&gt;
 &lt;p&gt;Technology that is physically integrated into the human body, including medical devices, will also need to be protected.&lt;/p&gt;
 &lt;p&gt;Defending against cyber attacks requires a “cultural shift”, and for cyber security and resilience to be seen as a strategic investment, rather than a cost.&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Read more about nation-state attacks&lt;/h3&gt; 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366639713/NCSC-No-increase-in-cyber-threat-from-Iran-but-be-prepared"&gt;NCSC: No increase in cyber threat from Iran, but be prepared&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366641058/NCSC-warns-high-risk-individuals-of-Signal-and-WhatsApp-social-engineering-attacks"&gt;NCSC warns high-risk individuals of Signal and WhatsApp social engineering attacks&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366632664/NCSC-calls-for-action-after-rise-in-nationally-significant-cyber-incidents"&gt;NCSC calls for action after rise in ‘nationally significant’ cyber incidents&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366632649/China-responsible-for-rising-cyber-attacks-says-NCSC"&gt;NCSC: China responsible for rising cyber attacks&lt;/a&gt;.&lt;/li&gt; 
   &lt;/ul&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/section&gt;</body>
            <description>The UK is facing four nationally significant cyber attacks a week, the majority from hostile states, NCSC chief, Richard Horne, will warn at the CyberUK conference</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/Hero%20Images/War-Missiles-Weapons-adobe.jpg</image>
            <link>https://www.computerweekly.com/news/366642032/Nation-states-responsible-for-nationally-significant-cyber-attacks-against-UK-says-NCSC-chief</link>
            <pubDate>Tue, 21 Apr 2026 17:30:00 GMT</pubDate>
            <title>Nation states responsible for ‘nationally significant’ cyber attacks against UK, says NCSC chief</title>
        </item>
        <item>
            <body>&lt;p&gt;A security team recently walked me through a scenario that illustrates exactly why the industry's current obsession with autonomous AI is so risky. They had used an agentic tool to uncover a complex attack path that started with a small foothold and ended in a critical exposure. It was a clear win for discovery. They remediated the gaps and restricted access, expecting the issue to be closed.&lt;/p&gt; 
&lt;p&gt;The trouble started when they went back to prove the fix. Because the tool was driven by a &lt;a href="https://www.geeksforgeeks.org/artificial-intelligence/ai-for-geeks-week2/" target="_blank" rel="noopener"&gt;probabilistic model&lt;/a&gt; designed to explore and pivot like a human, it didn't take the same path twice. When the original path didn't show up, the team couldn't tell if the hole was plugged or if the system had simply chosen a different route. That kind of unnecessary doubt is the hidden tax of the push toward total autonomy.&lt;/p&gt; 
&lt;p&gt;That doubt, in a single environment, is the manageable version of the problem. Earlier in April Anthropic demonstrated what it looks like when the attacker is an AI. &lt;a href="https://www.computerweekly.com/news/366641763/Bank-cyber-teams-on-red-alert-as-Anthropic-promises-them-Mythos-next-week" target="_blank" rel="noopener"&gt;Claude Mythos&lt;/a&gt; autonomously discovered and chained zero-day vulnerabilities across major operating systems, producing working exploits in hours. That would have taken elite researchers weeks. Anthropic withheld public release for good reason, but the implication is already here: disclosure now equals weaponisation.&lt;/p&gt; 
&lt;p&gt;That puts a sharper point on a question security teams were already wrestling with: namely, how do you validate your defences when the threat keeps changing? How do you know your security controls work and remediate whatever falls short, before these gaps are exploited?&lt;/p&gt; 
&lt;p&gt;Security validation has always depended on predictability. If you know how attackers operate, you can test your defenses against those methods and know where you stand – that's the difference between knowing your defenses work and hoping they do. Historically, attacker behavior followed well-documented patterns and techniques, which is what made that testing reliable. AI is beginning to change that predictability, giving attackers the ability to reason about novel paths at machine speed. But even before novel attacks become routine, AI already offers attackers a more immediate advantage: the ability to execute known techniques at a scale no human team can match, covering more of the attack surface faster than the environment changes.&lt;/p&gt; 
&lt;p&gt;Defenders are responding in kind and agentic security tools are gaining traction. The most meaningful risks today rarely come from an unpatched server. They come from the connective tissue of the enterprise, where lateral paths are created by service accounts, trust relationships or a set of permissions that made sense once but no longer do. Systems that can piece these together get us closer to how real attacks happen.&lt;/p&gt; 
&lt;div class="extra-info"&gt;
 &lt;div class="extra-info-inner"&gt;
  &lt;h3 class="splash-heading"&gt;Read more about Anthropic Mythos&lt;/h3&gt; 
  &lt;ul class="default-list"&gt; 
   &lt;li&gt;Technology secretary Liz Kendall urges Britain’s business community to sit up and pay attention to emerging AI threats, following the debut of &lt;a href="https://www.computerweekly.com/news/366641563/UK-financial-regulators-rush-to-assess-risks-of-Anthropic-AI-model" target="_blank" rel="noopener"&gt;Anthropic’s new frontier model, Mythos&lt;/a&gt;.&lt;/li&gt; 
   &lt;li&gt;Banks called in by regulators as latest artificial intelligence model identifies &lt;a href="https://www.computerweekly.com/news/366641563/UK-financial-regulators-rush-to-assess-risks-of-Anthropic-AI-model" target="_blank" rel="noopener"&gt;thousands of software vulnerabilities&lt;/a&gt;.&lt;/li&gt; 
   &lt;li&gt;In a new report from the Cloud Security Alliance (CSA), experts warn of an AI vulnerability storm triggered by &lt;a href="https://www.darkreading.com/cloud-security/csa-cisos-prepare-post-mythos-exploit-storm" target="_blank" rel="noopener"&gt;the introduction of Anthropic's Claude Mythos&lt;/a&gt; (Dark Reading)&lt;/li&gt; 
  &lt;/ul&gt;
 &lt;/div&gt;
&lt;/div&gt; 
&lt;p&gt;But this shift introduces a fundamental conflict between exploration and validation. Agentic systems are designed to explore, not to repeat. In cyber security, that is what makes them effective for discovery, but it is also what makes them a liability for remediation. They can tell you what could happen, but not whether something has actually been fixed.&lt;/p&gt; 
&lt;p&gt;Answering that requires deterministic execution. It means executing the same techniques, with the same conditions, in a strictly repeatable way. It is not about a variation or a similar route. It is about the exact same sequence so the outcome can be compared directly. Without that, you are operating on assumption, not confidence.&lt;/p&gt; 
&lt;p&gt;The real challenge is meeting user expectations for safety and accountability. People now want systems that behave like agents working on their behalf, but they also expect the vendors building those systems to take responsibility for the outcomes. If a probabilistic model makes a mistake in a live production environment, the customer holds the vendor accountable, not the model provider.&lt;/p&gt; 
&lt;p&gt;What is emerging is a two engine architecture where agentic techniques and deterministic execution work together. Agentic layers handle discovery, surfacing compound exposures that emerge from how systems interact over time rather than from any single misconfiguration. Deterministic engines then take those findings and execute them in a controlled, repeatable way so security teams can verify a fix is real and not just unobserved. Neither layer is sufficient on its own. Discovery without verification leaves you with exactly the doubt problem I opened with. Verification without discovery leaves you testing what you already know, which is not where the real risk lives.&lt;/p&gt; 
&lt;p&gt;The industry will keep moving toward more autonomous systems. Mythos confirmed that the trajectory is right, and that the pace just accelerated. But for security leaders, the core requirement has not changed. You need to know a threat has been neutralised, not just that it has not shown up recently. Teams running continuous validation are already ahead. But ahead just got redefined. When an adversary can reason about novel attack paths and produce working exploits at machine speed, confidence comes from verification – not from the absence of a finding.&lt;/p&gt; 
&lt;p&gt;&lt;em&gt;Amitai Ratzon is CEO at &lt;a href="https://pentera.io/" target="_blank" rel="noopener"&gt;Pentera&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</body>
            <description>Letting probabilistic AI models autonomously operate inside production networks creates real safety and auditability issues, and that core security validation still needs deterministic guardrails. And Anthropic just raised the stakes.</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/Hero%20Images/chess-strategy-game-intelligence-1-adobe.jpeg</image>
            <link>https://www.computerweekly.com/opinion/Anthropics-Mythos-raises-the-stakes-for-security-validation</link>
            <pubDate>Tue, 21 Apr 2026 13:59:00 GMT</pubDate>
            <title>Anthropic's Mythos raises the stakes for security validation</title>
        </item>
        <item>
            <body>&lt;p&gt;&lt;a href="https://www.sans.org/" target="_blank" rel="noopener"&gt;The Sans Institute&lt;/a&gt;, one of the world’s pre-eminent cyber security certification and training bodies, is to play a key role in the annual &lt;a href="https://ccdcoe.org/" target="_blank" rel="noopener"&gt;Nato Cooperative Cyber Defence Centre of Excellence&lt;/a&gt; (CCDCOE) Locked Shields exercise, held in Tallinn, Estonia, through the provision of a fully functional power generation system that participating teams will attempt to defend during the game.&lt;/p&gt; 
&lt;p&gt;This year marks the 16th running of the Locked Shields live fire security defence exercise, which unites &lt;a href="https://www.techtarget.com/searchsecurity/tip/Red-team-vs-blue-team-vs-purple-team-Whats-the-difference" target="_blank" rel="noopener"&gt;blue teams&lt;/a&gt; from across Nato’s 32 member states, as well as other allies and observers.&lt;/p&gt; 
&lt;p&gt;This year, however, Sans has been entrusted with the task of building a genuine, operational cyber range, as opposed to creating a simulation. It is using real &lt;a href="https://www.techtarget.com/whatis/definition/industrial-control-system-ICS" target="_blank" rel="noopener"&gt;industrial control systems&lt;/a&gt; (ICSs) and physical equipment that 16 teams of defenders will have to protect while under live cyber attack, with the decisions they make having an immediate physical impact on a national-scale power grid.&lt;/p&gt; 
&lt;p&gt;Nato and Sans said the aim of the game is to close the gap between sandboxed, classroom-based cyber security training and real-world operational readiness, which, amid the cyber dimension to the energy crisis precipitated by the &lt;a href="https://www.computerweekly.com/news/366639901/Iran-war-a-melting-pot-for-other-cyber-threats" target="_blank" rel="noopener"&gt;war in Iran&lt;/a&gt;&amp;nbsp;and &lt;a href="https://www.computerweekly.com/news/366638859/Russias-cyber-attacks-on-Polish-utilities-draws-NCSC-alert" target="_blank" rel="noopener"&gt;spillover from the ongoing war in Ukraine&lt;/a&gt;, has never been more important.&lt;/p&gt; 
&lt;p&gt;“We are putting teams in an environment where cyber decisions directly impact physical operations,” said Felix Schallock, who leads the initiative at the Sans Institute. “If you lose visibility, if you lose control, the power generation can be affected. That’s the reality operators face every day. That’s what we’re training for.”&lt;/p&gt; 
&lt;p&gt;Nato CCDCOE director Tõnis Saar added: “Locked Shields is a technically advanced exercise that challenges participants to defend the critical infrastructure systems modern societies depend on. As much of this critical infrastructure is owned and operated by the private sector, strong public-private collaboration is essential. Industry partners such as Sans Institute play a vital role in making the exercise as realistic and impactful as possible.”&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Hybrid architecture"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Hybrid architecture&lt;/h2&gt;
 &lt;p&gt;The Sans Institute’s cyber range comprises close to 70 physical ICS devices, with programmable logic controllers (PLCs), human-machine interfaces (HMIs), operator and engineering workstations, 100 virtual machines (VMs) and interconnected systems within the wider CCDCOE environment, all supported by live network infrastructure, the whole forming a &lt;a href="https://www.computerweekly.com/news/366623862/New-security-paradigm-needed-for-IT-OT-convergence" target="_blank" rel="noopener"&gt;hybrid information and operational technology&lt;/a&gt; (IT/OT) architecture.&lt;/p&gt;
 &lt;p&gt;During the exercise, blue teamers will be set the task of defending the “energy provider” while coming under sustained attack from opposing red teams.&lt;/p&gt;
 &lt;p&gt;The goal is to effectively demonstrate how maintaining a reliable generation system isn’t some metric on a scorecard, but rather the core mission, so success will entail more than just spotting and arresting threats – it will also demand operational discipline, maintaining uninterrupted power generation, preserving comms between IT and OT networks, guaranteeing visibility and control of ICS technology, and avoiding any destabilising disruptions.&lt;/p&gt;
 &lt;blockquote class="main-article-pullquote"&gt;
  &lt;div class="main-article-pullquote-inner"&gt;
   &lt;figure&gt;
    The people defending our critical infrastructure deserve training that takes the threat as seriously as they do
   &lt;/figure&gt;
   &lt;figcaption&gt;
    &lt;strong&gt;James Lyne, Sans Institute&lt;/strong&gt;
   &lt;/figcaption&gt;
   &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/blockquote&gt;
 &lt;p&gt;Actions will be visible, rippling through the systems in real time, so participants won’t just see alerts, they will see turbines being throttled, breakers being opened or closed, and generation capacity being affected. As such, failure will be immediate and visible – missteps will degrade system performance, disrupt or halt power generation, or simulate national-level consequences.&lt;/p&gt;
 &lt;p&gt;Tim Conway, Sans Institute fellow and ICS curriculum lead, explained: “We’re showing teams how to defend infrastructure that can’t simply be rebooted or patched on the fly. You have to think like an operator, not just a defender. That mindset shift is what makes this environment so powerful.”&lt;/p&gt;
 &lt;p&gt;Sans Institute CEO James Lyne expressed great pride in what the Sans team has built for Locked Shields this year. “The scenarios these critical initiatives prepare for are playing out in the world – national espionage, cyber integrated to kinetic attacks and warfare, and retaliation attacks,” he said.&lt;/p&gt;
 &lt;p&gt;“Throw in AI or machine speed attackers and the need for defenders to adapt, and you have the most disruptive period in cyber security in 20 years. We are privileged to help our allies be ready and continuously improving to secure the future. The people defending our critical infrastructure deserve training that takes the threat as seriously as they do,” he added.&lt;/p&gt;
 &lt;p&gt;Schallock said the exercise was about preparing teams for protecting the systems that matter most. “Cyber security training must reflect the environment defenders are protecting. We’re not just teaching cyber security, we’re showing how to defend a nation’s infrastructure when it counts.”&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Read more about CNI and ICS security&lt;/h3&gt; 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;Regulation has superseded cyber threats as the main driver of cyber security spending, and AI has made its debut for attack and defence, &lt;a href="https://www.computerweekly.com/news/366640469/AI-makes-debut-in-Bridewell-cyber-security-in-CNI-report" target="_blank" rel="noopener"&gt;according to a CNI-focused report from Bridewell&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;Monitoring an ICS environment isn’t that different from monitoring a traditional IT environment, but there are &lt;a href="https://www.techtarget.com/searchsecurity/feature/Reinforce-industrial-control-system-security-with-ICS-monitoring" target="_blank" rel="noopener"&gt;some considerations to keep in mind&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;Updates to the NCSC’s Cyber Assessment Framework are designed to help providers of critical services better &lt;a href="https://www.computerweekly.com/news/366628426/NCSC-updates-CNI-Cyber-Assessment-Framework" target="_blank" rel="noopener"&gt;manage their risk profiles&lt;/a&gt;.&lt;/li&gt; 
   &lt;/ul&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/section&gt;</body>
            <description>Cyber training body the Sans Institute is preparing live power generation IT and OT systems for Nato’s annual Locked Shields blue team exercise, which this year appears more relevant than ever</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/HeroImages/energy-power-electricity-pylons-bizioti-adobe.jpg</image>
            <link>https://www.computerweekly.com/news/366642012/Sans-Institute-preps-live-systems-for-Nato-cyber-exercise</link>
            <pubDate>Tue, 21 Apr 2026 10:30:00 GMT</pubDate>
            <title>Sans Institute preps live systems for Nato cyber exercise</title>
        </item>
        <item>
            <body>&lt;p&gt;&lt;a href="https://www.computerweekly.com/news/366622847/Cyber-attack-downs-systems-at-Marks-Spencer" target="_blank" rel="noopener"&gt;The cyber attack on M&amp;amp;S last year&lt;/a&gt; marked a turning point for resilience in the retail sector. One year on, knowing how to avoid the next incident is no longer the priority and being ready for when it happens is key.&lt;/p&gt; 
&lt;p&gt;Retail continues to be targeted at pace, and for good reason. The sector holds vast volumes of high-value customer data, operates across complex and often opaque supply chains, and has a near-zero tolerance for downtime. In an industry where customer experience is everything, cyber incidents are no longer just technical disruptions – but material business events that can define customer and stakeholder trust.&lt;/p&gt; 
&lt;p&gt;The new digital reality for retailers is no longer whether they are attacked, but how prepared they are to respond and return to business-as-usual operations as quickly as possible; to survive and thrive.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Third-party risk is now the frontline"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Third-party risk is now the frontline&lt;/h2&gt;
 &lt;p&gt;From logistics providers to payment platforms and SaaS vendors, modern retail depends on a web of third-party relationships. Retailers are ecosystems of interconnectedness that has become a critical vulnerability.&lt;/p&gt;
 &lt;p&gt;A single compromised supplier can provide attackers with the foothold they need further up the supply chain. In many cases, it’s not the retailer’s own defences that fail, but those of a partner enjoying data sharing access but with less mature cyber controls. &lt;a href="https://www.bbc.co.uk/news/articles/c93x16zkl9do" target="_blank" rel="noopener"&gt;The fallout of the M&amp;amp;S attack hit sales and profits heavily&lt;/a&gt;, which stands as a stark reminder for any sector that security posture is only as strong as your weakest link.&lt;/p&gt;
 &lt;p&gt;This is where many organisations still fall short. Supplier assurance is often treated as a compliance exercise, focused on periodic questionnaires and tick-box reviews, rather than a continuous, risk-based process. But attackers don’t operate on annual cycles. They exploit gaps in real time.&lt;/p&gt;
 &lt;p&gt;Retailers must move towards ongoing visibility across their supply chain, understanding not just who their partners are, but how they access systems, what data they handle, and where the real points of exposure lie.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="The extended risk to customers"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;The extended risk to customers&lt;/h2&gt;
 &lt;p&gt;One of the most persistent misconceptions following a cyber incident is that the risk ends when the breach is contained but, in reality, their problems have only just begun. The long road to recovery for retail can cost millions.&lt;/p&gt;
 &lt;p&gt;And attackers rarely stop at initial access, but reuse stolen data, sell it on the dark web, and leverage it to launch highly targeted phishing and social engineering campaigns. Even seemingly low-risk information, such as names, email addresses and phone numbers can be enough to target customers with convincing scams.&lt;/p&gt;
 &lt;p&gt;This shifts the responsibility for retailers – it is no longer sufficient to simply advise customers to “stay vigilant.” Post-breach, organisations have an extended duty of care. This includes monitoring for downstream threats, communicating clearly and proactively helping customers identify and avoid scams that may arise from the incident. In an environment where trust is fragile, how a retailer supports its customers after a breach can matter just as much as how it prevents one.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="From awareness to secure by design"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;From awareness to secure by design&lt;/h2&gt;
 &lt;p&gt;If the past year has shown anything, it’s that awareness alone is not enough. The industry has spent years talking about cyber risk, now it must &lt;a href="https://www.techtarget.com/whatis/definition/security-by-design" target="_blank" rel="noopener"&gt;embed security into the fabric&lt;/a&gt; of how retail businesses are designed and operated.&lt;/p&gt;
 &lt;p&gt;That starts with the fundamentals that are most often exploited: identity security, access controls, phishing resistance, help desk processes, and full visibility across both cloud and on-premises environments. These are not new challenges, but they’re still a consistent target for a reason - because they are often inconsistently implemented. The introduction of AI to streamline operational processes has opened up new attack vectors that need to be understood and mitigated.&lt;/p&gt;
 &lt;p&gt;Beyond that, organisations need a clear understanding of their most critical data and services. Where is sensitive information stored? Who can access it? What would the operational and customer impact be if it were exposed or unavailable?&lt;/p&gt;
 &lt;p&gt;Crucially, resilience must be built over time and in depth. Every incident, near miss, or attempted intrusion should strengthen defences by feeding into better detection, faster response and more effective prevention. Security is not a fixed state; it is a continuous process of learning and adaptation.&lt;/p&gt;
 &lt;p&gt;And preparation cannot be theoretical; retailers must simulate incidents, test response plans, run exercises, and verify that backups actually work, to build the essential muscle memory within teams. Being ready for how you respond is often the difference between weeks and months of recovery time.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="A cultural shift at the top"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;A cultural shift at the top&lt;/h2&gt;
 &lt;p&gt;Technology alone will not solve this challenge but real progress requires a shift in accountability and culture.&lt;/p&gt;
 &lt;p&gt;Training employees to recognise phishing attempts and follow best practices is essential, but it is not sufficient. Cyber readiness must be owned at the highest levels of the organisation.&lt;/p&gt;
 &lt;p&gt;If cyber risk is business risk, then it should be treated with the same rigour as financial performance. Boards should be measured not just on growth and profitability, but on their preparedness to withstand and respond to cyber incidents. Regulators are increasingly placing the responsibility for cyber incidents on CEOs and boardrooms. This means leaders need to ask more challenging questions, demand clearer visibility and ensure that cyber resilience is embedded into strategic decision-making.&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Read more about retail technology&lt;/h3&gt; 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;A year on from the Marks &amp;amp; Spencer cyber attack, we look back at the incident, consider the lessons learned and ask if the retail sector is &lt;a href="https://www.computerweekly.com/feature/One-year-on-from-the-MS-cyber-attack-What-did-we-learn" target="_blank" rel="noopener"&gt;any more secure today&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;Dave’s Hot Chicken provides rare ‘greenfield’ tech development opportunity for Azzurri Group, says tech director Jim Hingston, amid rumours of an &lt;a href="https://www.computerweekly.com/feature/Hot-property-Azzurri-Groups-chicken-chain-and-the-greenfield-tech-opportunity" target="_blank" rel="noopener"&gt;imminent sale of the US-themed food chain&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;Some 90% of retailers planning to boost spending on artificial intelligence to optimise e-commerce operations, as new research identifies &lt;a href="https://www.computerweekly.com/feature/Delivery-comms-intelligent-fulfilment-and-AIs-growing-influence" target="_blank" rel="noopener"&gt;different AI shopper personas&lt;/a&gt;.&lt;/li&gt; 
   &lt;/ul&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Redesigning retail for disruption"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Redesigning retail for disruption&lt;/h2&gt;
 &lt;p&gt;One year on from the&amp;nbsp;M&amp;amp;S&amp;nbsp;cyber attack, the lesson is to rethink how retail organisations operate in an environment where disruption is inevitable. The future of cyber security lies in anticipation, where businesses are building secure-by-design operations that assume compromise, minimise impact, and recover quickly without losing customer trust.&lt;/p&gt;
 &lt;p&gt;The retailers that succeed will be those that can take a hit and keep trading, keep communicating, and keep protecting their customers without missing a beat.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Chris Brown is senior vice president and UK and Ireland market leader at &lt;a href="https://www.nccgroup.com/" target="_blank" rel="noopener"&gt;NCC Group.&lt;/a&gt;&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>The cyber attack on M&amp;S last year marked a turning point for resilience in the retail sector. One year on, knowing how to avoid the next incident is no longer the priority and being ready for when it happens is key.</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/Hero%20Images/retail-supermarket-vegetables-IrinaSokolovskaya-adobe.jpg</image>
            <link>https://www.computerweekly.com/opinion/MS-one-year-on-turning-anticipation-into-secure-by-design</link>
            <pubDate>Tue, 21 Apr 2026 10:15:00 GMT</pubDate>
            <title>M&amp;S one year on: turning anticipation into secure by design</title>
        </item>
        <item>
            <body>&lt;p&gt;Privacy is not a modern invention; it is part of the human condition of trust, dissent, and intimacy. Every society has developed ways to communicate beyond the reach of power: whispered conversations, sealed letters, coded language.&lt;/p&gt; 
&lt;p&gt;The need to keep secrets is equally as important among the powerful – governments, more so than individuals, have jealously guarded their own secrets, even as they seek to uncover the secrets of others. What is new is neither the need nor desire for private communication but the current power of the observer.&lt;/p&gt; 
&lt;p&gt;We now live in what some have termed a “golden age of &lt;a href="https://www.computerweekly.com/news/366636284/Top-10-surveillance-journalism-and-encryption-stories-of-2025"&gt;surveillance&lt;/a&gt;,” in which governments, &lt;a href="https://www.computerweekly.com/feature/Facebooks-privacy-U-turn-how-Zuckerberg-backtracked-on-promises-to-protect-personal-data"&gt;corporations&lt;/a&gt;, and &lt;a href="https://www.computerweekly.com/news/366637759/Saudi-Arabia-ordered-to-pay-3m-to-UK-dissident-targeted-with-Pegasus-spyware"&gt;adversaries&lt;/a&gt; possess the technical capability to monitor human interaction at unprecedented scale. In this era of pervasive digital connectivity, most digital interactions leave a permanent, searchable trace, and the need to protect sensitive information has become critical.&lt;/p&gt; 
&lt;p&gt;End-to-end encryption (E2EE) is therefore not a technical abstraction or ideological indulgence; it is the most effective defence against unauthorized access to private communications in a fully networked world. As digital communication continues to evolve, the risks of interception scale with it.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Why E2EE matters"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Why E2EE matters&lt;/h2&gt;
 &lt;p&gt;E2EE preserves data confidentiality by masking data from unauthorised users and ensuring that only the intended recipients, with a decryption key, can access the data. Using cryptography, E2EE transforms readable plaintext into unreadable ciphertext on the sender’s device, keeps it encrypted during transmission, and decrypts it back into its original form only when it reaches its destination and is decoded with the correct key. It is widely used by governments and corporations and is becoming increasingly common among individual users, reflecting its status as the prevailing standard for data security and privacy.&lt;/p&gt;
 &lt;p&gt;The most common use of E2EE is for secure communications on mobile and &lt;a href="https://www.computerweekly.com/news/366633894/European-governments-opt-for-open-source-alternatives-to-Big-Tech-encrypted-communications"&gt;online messaging services&lt;/a&gt;. It is also widely used by &lt;a href="https://www.techtarget.com/searchsecurity/tip/Are-password-managers-safe-for-enterprise-use"&gt;password managers&lt;/a&gt; to protect users’ passwords; for data storage purposes to ensure that data is protected when it is stored and when it is transmitted between devices or to the cloud; and for &lt;a href="https://www.techtarget.com/searchsecurity/tip/8-secure-file-transfer-services-for-the-enterprise"&gt;file-sharing&lt;/a&gt; purposes, including peer-to-peer file sharing, &lt;a href="https://www.techtarget.com/searchstorage/tip/Ways-to-ensure-regulatory-compliance-in-cloud-storage"&gt;encrypted cloud storage&lt;/a&gt;, and specialised file transfer services.&lt;/p&gt;
 &lt;p&gt;Using E2EE means that no one else, including the service provider facilitating the communications, has access to the unencrypted data without consent. If it were to be intercepted, the data would appear to third parties as random, unintelligible characters.&lt;/p&gt;
 &lt;p&gt;As the service provider facilitating the communications does not have access to the unencrypted data due to E2EE, it is unable to provide it to any third party. That includes governments and &lt;a href="https://www.computerweekly.com/news/366618230/Europol-seeks-evidence-of-encryption-on-crime-enforcement-as-it-steps-up-pressure-on-Big-Tech"&gt;law enforcement agencies that criticize E2EE as an obstacle to investigations&lt;/a&gt; while at the same time relying on and demanding the strongest available encryption to protect their own systems. Thus, the debate over E2EE is not about balancing privacy and security. It is about whether governments can demand systemic insecurity while insisting on absolute security for themselves.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="The risks of 'exceptional access'"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;The risks of 'exceptional access'&lt;/h2&gt;
 &lt;p&gt;“&lt;a href="https://www.computerweekly.com/news/366640462/Technology-accelerating-crime-boosts-case-for-national-police-service-says-NCA-chief"&gt;Exceptional access&lt;/a&gt;” is the term used to describe the mechanism for enabling government access to encrypted communications. Different governments take different approaches to the methods they use to seek exceptional access. While the intentions behind exceptional access may be noble, facilitating such mechanisms in E2EE communications can create more problems than it seeks to solve.&lt;/p&gt;
 &lt;p&gt;The creation of government-mandated security vulnerabilities, commonly known as &lt;a href="https://www.computerweekly.com/news/366632159/Home-Office-issues-new-back-door-order-over-Apple-encryption"&gt;backdoors&lt;/a&gt;, into E2EE services jeopardizes the security and privacy of global communications. Once a backdoor is built, no one can guarantee that only the authorised third party will have access to it. &lt;a href="https://www.computerweekly.com/news/366619614/Apple-withdraws-encrypted-iCloud-storage-from-UK-after-government-demands-back-door-access"&gt;Malicious actors will try to use such backdoors&lt;/a&gt; to enter and decrypt communications that are intended to be secure on the endpoints and only accessible to the sender and recipients. It is for this reason that the &lt;a href="https://www.computerweekly.com/news/366619614/Apple-withdraws-encrypted-iCloud-storage-from-UK-after-government-demands-back-door-access"&gt;world’s leading providers have avowed publicly never to do so&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;Third-party exceptional access mechanisms in which a copy of a user’s decryption keys are held by a “trusted” third party for potential future use by the government are at present fraught with insurmountable technological and security issues. Industry, backed by the vast majority of relevant experts, is saying that it’s simply not possible to have E2EE where a third party holds a key. It defeats E2EE’s central premise and is a deliberate breach of the security guarantee that E2EE provides.&lt;/p&gt;
 &lt;p&gt;Any kind of repository where providers are forced to store the keys would become a treasure trove of a target for attackers – especially so for sophisticated state actors who, as we have repeatedly seen, are adept at breaking into worldwide telecommunications networks and critical infrastructure.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Why encryption is not an existential threat to law enforcement"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Why encryption is not an existential threat to law enforcement&lt;/h2&gt;
 &lt;p&gt;In any event, governments have for decades warned of the existential threat posed by encryption and on the grim possibility of “going dark.” But they have not gone dark, and there exist other means by which governments can get valuable data. Metadata remains available. Enhanced investigative means and other investigative tools are ever evolving and becoming more sophisticated.&lt;/p&gt;
 &lt;p&gt;Governments should be careful about what they wish for. In seeking to fetter E2EE, they may drive the very actors whose data they most need away from mainstream providers, most of whom have long-standing collaborative relationships with law enforcement. In doing so, they will lose the ability to gain the data they can still obtain notwithstanding the use of E2EE – or, worse, they will undermine the very technology on which they also rely.&lt;/p&gt;
 &lt;p&gt;At this stage of technological development,&lt;i&gt; &lt;/i&gt;there exists no meaningful way to grant governments “exceptional access” to encrypted communications without deliberately engineering systemic vulnerability into the digital infrastructure on which billions of people, institutions, and governments themselves depend.&lt;/p&gt;
 &lt;p&gt;Once such vulnerabilities exist, they cannot be confined to the well-intentioned or the lawful; they become available to hostile states, criminal actors, and anyone capable of exploiting them. The consensus among technologists and security experts is unequivocal: E2EE either works for everyone, or it is broken for everyone. Governments may continue to warn of impending darkness, but the greater danger lies in demanding insecurity by design – an outcome that would fundamentally undermine trust, resilience, and the security of the global communications ecosystem.&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Governments may continue to look for ways to restrict end-to-end encryption, but the greater danger lies in demanding insecurity by design that would undermining trust, resilience, and the security of the global communications ecosystem.</description>
            <image>https://cdn.ttgtmedia.com/visuals/LeMagIT/hero_article/Security-data-protection.jpg</image>
            <link>https://www.computerweekly.com/opinion/Privacy-power-and-encryption-Why-end-to-end-security-matters</link>
            <pubDate>Mon, 20 Apr 2026 05:50:00 GMT</pubDate>
            <title>Privacy, power, and encryption: why end-to-end security matters</title>
        </item>
        <item>
            <body>&lt;p&gt;A recent Computer Weekly article posed a question that has hung over UK government technology for decades: &lt;a href="https://www.computerweekly.com/news/366640072/The-UK-governments-digital-identity-scheme-Dystopian-nightmare-or-modernised-public-services"&gt;is digital identity a dystopian nightmare&lt;/a&gt; or the route to modernised public services?&lt;/p&gt; 
&lt;p&gt;The article invoked the Rashomon Effect - the idea that we're all watching the same policy from different angles and nobody can agree on what's actually happening.&lt;/p&gt; 
&lt;p&gt;It was right. But there's a way to stop arguing about the ending and start writing it with evidence. Trial digital identity somewhere first, applying the government’s mantra of “&lt;a href="https://www.computerweekly.com/news/366617000/Government-launches-100m-innovation-fund-for-public-service-reform"&gt;test and learn&lt;/a&gt;”.&lt;/p&gt; 
&lt;p&gt;Not in a Whitehall sandbox. Not in a PowerPoint simulation. In a real place, with real people, where you can measure what happens and, crucially, what doesn't.&lt;/p&gt; 
&lt;p&gt;The Isle of Wight is that place.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="The problem with national rollout"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;The problem with national rollout&lt;/h2&gt;
 &lt;p&gt;When Darren Jones, the &lt;a href="https://www.computerweekly.com/news/366633478/Cabinet-Office-pinches-digital-ID-responsibility-from-GDS"&gt;Cabinet Office minister in charge of digital identity policy&lt;/a&gt;, launched the government's &lt;a href="https://www.computerweekly.com/news/366639956/Whitehall-launches-digital-ID-consultation"&gt;digital ID consultation&lt;/a&gt; on 10 March, he promised the public could interact with government services as easily as streaming on Netflix.&lt;/p&gt;
 &lt;p&gt;It's a fine ambition. But the consultation also revealed a familiar pattern - policy designed in Westminster, debated in the abstract, and destined to be rolled out nationally before anyone knows whether it works.&lt;/p&gt;
 &lt;blockquote class="main-article-pullquote"&gt;
  &lt;div class="main-article-pullquote-inner"&gt;
   &lt;figure&gt;
    The Isle of Wight's value as a policy testbed extends well beyond digital identity, although digital ID makes for the most compelling starting point precisely because it is so contested
   &lt;/figure&gt;
   &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/blockquote&gt;
 &lt;p&gt;We've been here before. &lt;a href="https://www.computerweekly.com/news/252498143/Government-bids-final-goodbye-to-Govuk-Verify"&gt;Gov.uk Verify&lt;/a&gt; launched in 2013 as the answer to digital identity. It was buried a few years later having consumed £220m and &lt;a href="https://www.computerweekly.com/blog/Computer-Weekly-Editors-Blog/Zombified-Govuk-Verify-is-officially-dead-so-whats-next"&gt;delivered precious little&lt;/a&gt;. The political scars from that failure, and from Tony Blair's ID card debacle before it, are exactly why three million people signed a petition against the current proposals before the consultation even opened.&lt;/p&gt;
 &lt;p&gt;The government says it has learned. The app will be built in-house by the Government Digital Service. There will be no central database. The National Cyber Security Centre will be involved from the start. The legislation will enshrine its voluntary nature. These are sensible commitments. But they're still promises, not proof.&lt;/p&gt;
 &lt;p&gt;What if there were a way to turn those promises into evidence?&lt;/p&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="A controlled environment for a contested policy"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;A controlled environment for a contested policy&lt;/h2&gt;
 &lt;p&gt;The Isle of Wight provides an ideal controlled environment. It functions as a naturally closed system. It is surrounded by water, connected to the mainland by three ferry gateways where every person, vehicle, and item of freight can be tracked. It has one local authority, a defined NHS footprint, and a population of 140,000 - large enough to be statistically meaningful, small enough to manage.&lt;/p&gt;
 &lt;p&gt;For a policy as sensitive as digital identity, this matters enormously.&lt;/p&gt;
 &lt;p&gt;The critics worry about function creep, about a surveillance infrastructure being built by stealth, about data leaking to law enforcement or foreign tech companies. The supporters argue it will save billions and transform public services. Both sides are speculating, because neither has evidence. A controlled trial on the island would generate that evidence for the first time.&lt;/p&gt;
 &lt;p&gt;It would also help clarify the role of private and public sectors. There’s a growing marketplace of digital identity service providers certified against the government’s statutory digital verification services trust framework. Some providers already offer high assurance services such as digital right to work checks. Working through the question of what the public sector should do and what the private sector should do will be key to avoiding the problems of earlier failed initiatives like Gov.uk Verify.&lt;/p&gt;
 &lt;p&gt;Imagine a voluntary digital ID pilot on the Isle of Wight. Residents who opt in could choose from a range of certified digital ID providers, including the &lt;a href="https://www.computerweekly.com/news/366618312/Government-to-launch-Govuk-Wallet"&gt;Gov.uk Wallet&lt;/a&gt; prototype, to access local health services through the Island's NHS Trust, renew ferry-related travel passes, verify their identity for benefits, or interact with the council.&lt;/p&gt;
 &lt;p&gt;Every transaction would be measurable. Adoption rates, drop-off points, accessibility barriers, security incidents, public sentiment, all captured in a bounded environment where the data isn't contaminated by a thousand confounding variables.&lt;/p&gt;
 &lt;p&gt;If it works, the government has proof, not rhetoric, to take to the sceptics. If it doesn't, it has failed cheaply and learned before committing the nation to a multibillion-pound programme.&lt;/p&gt;
&lt;/section&gt;        
&lt;section class="section main-article-chapter" data-menu-title="More than digital ID"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;More than digital ID&lt;/h2&gt;
 &lt;p&gt;This is not just about one application. The Isle of Wight's value as a policy testbed extends well beyond digital identity, although digital ID makes for the most compelling starting point precisely because it is so contested.&lt;/p&gt;
 &lt;p&gt;The island's demographics are roughly 15 years ahead of the UK average on the ageing curve. What happens there with healthcare, social care, and pension-age employment is a preview of what the rest of Britain will face by 2040. The island already carries an invisible surcharge on the cost of living or an "island tax" driven by ferry costs that inflates the price of everything from groceries to building materials, making it an ideal environment for trialling cost-of-living interventions, even more so in the light of the war in Iran.&lt;/p&gt;
 &lt;p&gt;A cross-departmental policy testbed on the Isle of Wight could trial fare caps and public-utility ferry models for the Department for Transport; a revised Index of Multiple Deprivation formula that accounts for geographic isolation for the Treasury; AI-driven remote diagnostics for the Department of Health; mobility credits for the Department for Work and Pensions; and teacher recruitment incentives for the Department for Education. All running simultaneously, all measurable, all in a single bounded geography.&lt;/p&gt;
 &lt;p&gt;Layered on top, a digital twin of the island, fed by real-time data from the ferry gateways and local services, could allow policymakers to model interventions before they go live. The digital ID infrastructure becomes the connective tissue - the secure front door through which residents access trials and through which the government collects the data it needs to evaluate outcomes.&lt;/p&gt;
 &lt;p&gt;This is what Jones' ambition of "government by app" looks like when you actually test it before you ship it, in exactly the same way that clinical trials are used in the pharmaceutical industry.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="The political opportunity"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;The political opportunity&lt;/h2&gt;
 &lt;p&gt;Computer Weekly’s article ended by handing the decision to the public. That's fair. But the public is being asked to choose between two hypothetical futures with no evidence for either. That isn't informed consent, it's a leap of faith.&lt;/p&gt;
 &lt;p&gt;A live trial on the Isle of Wight changes the terms of the debate entirely. It moves digital identity from political football to policy experiment. It gives the government something it has never had with digital ID - a proof of concept in the real world, with real people, generating real data.&lt;/p&gt;
 &lt;p&gt;The consultation is open. A people's panel is being assembled. But consultations collect opinions. Trials collect evidence. If the government is serious about building public trust in digital identity, it should do both and the Isle of Wight is the obvious place to start.&lt;/p&gt;
 &lt;p&gt;The island has spent decades being treated as a problem to be solved. It's time to recognise it as the country's most valuable policy asset.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;James Findlay is a former CTO/CIO in the UK government. He is the author of the Isle of Wight Living Lab proposal, which advocates for the island's designation as a Special Policy Zone for cross-departmental government trials.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Jerry Fishenden is a seasoned CTO/CIO and author of &lt;a href="https://www.amazon.co.uk/dp/B0F2MXPSM5"&gt;Fracture: The collision between technology and democracy - and how we fix it.&lt;/a&gt;&lt;/i&gt;&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Read more about the government's digital identity scheme&lt;/h3&gt; 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366637124/What-will-happen-with-Starmers-digital-ID-scheme-in-2026"&gt;What will happen with Starmer’s digital ID scheme in 2026?&lt;/a&gt; Last year, the UK government announced ambitious plans for a national digital identity scheme, but will 2026 lead to more disenchantment or new excitement?&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366636254/MPs-maul-digital-ID-plans-in-parliamentary-debate"&gt;MPs maul digital ID plans in Parliamentary debate&lt;/a&gt; - MPs brand the government’s digital ID plans ‘un-British’ and ‘an attack on civil liberties’ during debate on the controversial policy.&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/opinion/How-digital-identity-will-empower-people-and-drive-economic-growth"&gt;How digital identity will empower people and drive economic growth&lt;/a&gt; - The government has finally plotted out the future of digital identity in the UK in a way that makes sense for private sector, public sector, and citizens. Now let's make it happen.&lt;/li&gt; 
   &lt;/ul&gt;
  &lt;/div&gt;
 &lt;/div&gt;
 &lt;p&gt;&lt;a href="https://www.amazon.co.uk/dp/B0F2MXPSM5"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>As heated debate rises around the UK government's plans for a national digital identity scheme - why not try it out to see if it works, in a well-defined, real-life environment with real people involved</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/Hero%20Images/Isle-of-Wight-England-2-adobe.jpg</image>
            <link>https://www.computerweekly.com/opinion/Dont-debate-digital-ID-trial-it-the-Isle-of-Wight-could-settle-the-argument</link>
            <pubDate>Mon, 20 Apr 2026 04:00:00 GMT</pubDate>
            <title>Don't debate digital ID, trial it - the Isle of Wight could settle the argument</title>
        </item>
        <item>
            <body>&lt;p&gt;The US &lt;a href="https://www.nist.gov/" target="_blank" rel="noopener"&gt;National Institute for Standards and Technology&lt;/a&gt; (NIST) is in the process of changing the way it handles common vulnerabilities and exposures (CVEs) listed in the &lt;a href="https://nvd.nist.gov/" target="_blank" rel="noopener"&gt;National Vulnerability Database&lt;/a&gt; (NVD) in the face of a rapidly changing threat environment.&lt;/p&gt; 
&lt;p&gt;Previously, the NVD programme aimed to analyse all &lt;a href="https://www.techtarget.com/searchsecurity/definition/Common-Vulnerabilities-and-Exposures-CVE" target="_blank" rel="noopener"&gt;CVEs&lt;/a&gt; received, adding details such as severity scores and affected product lists to help cyber teams prioritise and mitigate relevant vulnerabilities. It terms this process “enrichment”.&lt;/p&gt; 
&lt;p&gt;However, going forward, it will enrich only those CVEs that meet a predefined set of criteria – those flaws that don’t meet this bar will still be listed but will be marked as lower priority issues.&lt;/p&gt; 
&lt;p&gt;“This change is driven by &lt;a href="https://www.computerweekly.com/news/366638949/CVE-volumes-may-plausibly-reach-100000-this-year" target="_blank" rel="noopener"&gt;a surge in CVE submissions&lt;/a&gt;, which increased 263% between 2020 and 2025. We don’t expect this trend to let up anytime soon. Submissions during the first three months of 2026 are nearly one-third higher than the same period last year,” NIST said in a statement.&lt;/p&gt; 
&lt;p&gt;“We are working faster than ever. We enriched nearly 42,000 CVEs in 2025 – 45% more than any prior year. But this increased productivity is not enough to keep up with growing submissions. Therefore, we are instituting a new approach.”&lt;/p&gt; 
&lt;p&gt;The authority hopes that these changes will enable it to stabilise its programme and buy some time to help it develop new automated systems and workflow enhancements.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="From comprehensive to selective CVE enrichment"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;From comprehensive to selective CVE enrichment&lt;/h2&gt;
 &lt;p&gt;&lt;a href="https://nvd.nist.gov/general/cve-process" target="_blank" rel="noopener"&gt;The new criteria&lt;/a&gt; came into effect on Wednesday 15 April, with the following CVEs prioritised:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Those that the US government’s Cybersecurity and Infrastructure Security Agency (Cisa) has added to its &lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" target="_blank" rel="noopener"&gt;Known Exploited Vulnerabilities&lt;/a&gt; (Kev) catalogue;&lt;/li&gt; 
  &lt;li&gt;Those appearing in software used within the US government;&lt;/li&gt; 
  &lt;li&gt;Those for critical software &lt;a href="https://www.nist.gov/system/files/documents/2026/04/15/EO%2014028%20Critical%20FINAL.pdf" target="_blank" rel="noopener"&gt;as defined by president Biden’s Executive Order 14028&lt;/a&gt;, issued in October 2021.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;“This will allow us to focus on CVEs with the greatest potential for widespread impact. While CVEs that do not meet these criteria may have a significant impact on affected systems, they generally do not present the same level of systemic risk as those in the prioritised categories,” said NIST.&lt;/p&gt;
 &lt;p&gt;The organisation acknowledged that the new criteria may not catch every potentially high-impact flaw, so users will be able to request reviews of lower priority CVEs for enrichment.&lt;/p&gt;
 &lt;p&gt;At the same time, NIST will no longer routinely provide a separate severity score for CVEs that have already been assigned one by the CVE Numbering Authority – firms such as Microsoft, etc – that submitted it. It said this was an effort to reduce duplication of effort and better focus its resources, although users are also able to request reviews of specific CVEs if wanted.&lt;/p&gt;
 &lt;p&gt;NIST is also changing how it goes about reanalysing enriched CVEs that have been modified after enrichment. Previously, it had reanalysed all modified flaws, but it will now only do so if it becomes aware of a modification that materially impacts its enrichment data. Again, a user-requested review system will be put in place.&lt;/p&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="Tackling the backlog of unenriched CVEs"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Tackling the backlog of unenriched CVEs&lt;/h2&gt;
 &lt;p&gt;In relation to a significant backlog of unenriched CVEs that started to develop two years ago, NIST stated that it has not been able to clear this down, and so all backlogged CVEs with an NVD publish date before 1 March 2026 will be moved into the “Not Scheduled” category. CVEs falling into this bucket will be considered for enrichment provided they meet the new prioritisation criteria.&lt;/p&gt;
 &lt;p&gt;Finally, NIST is updating CVE status labels and descriptions, and making changes to the NVD Dashboard to accurately report these.&lt;/p&gt;
 &lt;p&gt;The organisation said it was making big changes that would affect everyday users; however, it reiterated that adopting a risk-based approach was necessary to manage the surge in submissions and buy it time to build new systems that will ensure the sustainability of its offering going forward.&lt;/p&gt;
 &lt;p&gt;Danis Calderone, principal and chief technology officer at &lt;a href="https://suzulabs.com/" target="_blank" rel="noopener"&gt;Suzu Labs&lt;/a&gt;, said NIST had probably taken the right decision.&lt;/p&gt;
 &lt;p&gt;“An overhaul was certainly needed and probably inevitable given the volume of new CVE submissions, and we suspect that AI-assisted discovery is probably already pushing that number higher. After all, &lt;a href="https://www.computerweekly.com/news/366641679/April-Patch-Tuesday-brings-zero-days-in-Defender-SharePoint-Server"&gt;Microsoft just had its second-largest Patch Tuesday ever&lt;/a&gt;, and even ZDI says their incoming submissions have tripled thanks to AI tools,” said Calderone.&lt;/p&gt;
 &lt;p&gt;“We are excited to see NIST making Kev the top priority tier. That is the right call and something we’ve been doing with our clients for some time now, so we’re very happy to see that becoming the official model.”&lt;/p&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="Concerns about scoring gaps"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Concerns about scoring gaps&lt;/h2&gt;
 &lt;p&gt;However, Calderone criticised some perceived gaps in NIST’s new methodology, specifically the ending of CVE scoring when the submitting authority has already scored it.&lt;/p&gt;
 &lt;p&gt;“That sounds efficient until you remember that the submitting authority is often the vendor, and vendors don’t always get their own bugs right,” he said. “We just went through this with F5. A recent BIG-IP vulnerability was scored 8.7 HIGH as a denial-of-service issue for five months before it got reclassified as a 9.8 RCE. For organisations using CVSS to drive patching priority, that miscategorisation meant the real risk sat in the wrong queue for five months while attackers were already exploiting it.”&lt;/p&gt;
 &lt;p&gt;He added: “The other thing missing here is that NIST addressed the processing volume problem but didn’t touch the scoring methodology. CVSS still scores vulnerabilities in isolation. It doesn’t model chainability, where an attacker combines a medium-severity information disclosure with a medium-severity privilege escalation and ends up with critical impact. Neither bug scores as urgent on its own, but together they give you full system compromise.”&lt;/p&gt;
 &lt;p&gt;Calderone said that for security leaders who have relied on NVD as their go-to for vulnerability context, the time was nigh to build their own prioritisation stack. This could incorporate data from Cisa’s Kev catalogue, &lt;a href="https://www.first.org/epss/" target="_blank" rel="noopener"&gt;Exploit Prediction Scoring System&lt;/a&gt; (EPSS) information, and their organisation’s own environmental context.&lt;/p&gt;
 &lt;p&gt;“The days of waiting for NIST to tell you what matters are over,” he remarked.&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Read more about patching and vulnerability mitigation&lt;/h3&gt; 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;Artificial intelligence supplier Anthropic promises UK banks the opportunity to review its Mythos AI model, which has already revealed &lt;a href="https://www.computerweekly.com/news/366641763/Bank-cyber-teams-on-red-alert-as-Anthropic-promises-them-Mythos-next-week" target="_blank" rel="noopener"&gt;thousands of security flaws&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;Microsoft’s latest Patch Tuesday update may be one of the largest in history, &lt;a href="https://www.computerweekly.com/news/366641679/April-Patch-Tuesday-brings-zero-days-in-Defender-SharePoint-Server" target="_blank" rel="noopener"&gt;with more than 160 issues in scope&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;These 12 tools approach patching from different perspectives. Understanding their various approaches &lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/12-best-patch-management-software-and-tools" target="_blank" rel="noopener"&gt;can help you find the right product for your needs&lt;/a&gt;.&lt;/li&gt; 
   &lt;/ul&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/section&gt;</body>
            <description>NIST announces big changes to the way it categorises and manages CVEs, which are set to have a big impact on how organisations manage patching and remediation</description>
            <image>https://cdn.ttgtmedia.com/visuals/German/article/priorities-brainstorming-anaylse-plan-adobe.jpg</image>
            <link>https://www.computerweekly.com/news/366641916/Surging-CVE-disclosures-force-NIST-to-shake-up-workflows</link>
            <pubDate>Fri, 17 Apr 2026 15:19:00 GMT</pubDate>
            <title>Surging CVE disclosures force NIST to shake up workflows</title>
        </item>
        <item>
            <body>&lt;p&gt;A North Korean social engineering campaign targeting MacOS users tricked its victims into manually executing malicious files by impersonating a software update and led to the theft of credentials, crypto assets and personal data, &lt;a href="https://www.microsoft.com/en-us/security/blog/2026/04/16/dissecting-sapphire-sleets-macos-intrusion-from-lure-to-compromise/" target="_blank" rel="noopener"&gt;according to Microsoft’s Threat Intelligence unit, MSTIC&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;In a report published this week, MSTIC exposed the campaign – run by a threat actor tracked as &lt;a href="https://www.microsoft.com/en-us/security/blog/2026/04/01/mitigating-the-axios-npm-supply-chain-compromise/#who-is-sapphire-sleet"&gt;Sapphire Sleet&lt;/a&gt; – which highlights how convincing user prompts and trusted system tools are still a highly valuable tool for attackers of all stripes.&lt;/p&gt; 
&lt;p&gt;This particular campaign, said MSTIC, demonstrated some new combinations of MacOS-focused techniques that, though not novel in and of themselves, come as something of a surprise from a threat actor like Sapphire Sleet.&lt;/p&gt; 
&lt;p&gt;MSTIC explained how the group is now shifting attack execution away from the exploitation of software vulnerabilities and &lt;a href="https://www.techtarget.com/searchsecurity/definition/social-engineering" target="_blank" rel="noopener"&gt;into a “user-initiated” context&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;Crucially for Sapphire Sleet, this enables its attack chain to move ahead beyond the oversight of MacOS’s onboard protections, such as Transparency, Consent and Control (TCC), Gatekeeper, quarantine enforcement, and notarisation checks.&lt;/p&gt; 
&lt;p&gt;“Sapphire Sleet achieves a highly reliable infection chain that lowers operational friction and increases the likelihood of successful compromise – posing an elevated risk to organisations and individuals involved in cryptocurrency, digital assets, finance and similar high‑value targets that Sapphire Sleet is known to target,” said the MSTIC team.&lt;/p&gt; 
&lt;p&gt;“After discovering the threat, Microsoft shared details of this activity with Apple as part of our responsible disclosure process.”&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="A danger to financial services"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;A danger to financial services&lt;/h2&gt;
 &lt;p&gt;Backed by the isolated, reclusive and destitute regime in Pyongyang, Sapphire Sleet has been operational since about March 2020, and is suspected to have links to &lt;a href="https://www.techtarget.com/searchsecurity/news/366619872/FBI-Lazarus-Group-behind-15-billion-ByBit-heist" target="_blank" rel="noopener"&gt;the rather more notorious Lazarus operation&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;According to MSTIC, it specialises in targeting the financial services sector, including venture capital firms and organisations involved in blockchain and cryptocurrency. Its prime motivation is to loot its victims’ crypto wallets to generate revenue for its paymasters, and to steal intellectual property (IP) and tech secrets related to blockchain and crypto trading.&lt;/p&gt;
 &lt;p&gt;Sapphire Sleet is a North Korean state actor active since at least March 2020 that primarily targets the finance sector, including cryptocurrency, venture capital and blockchain organisations. The primary motivation of this actor is to steal cryptocurrency wallets to generate revenue, and target technology or intellectual property related to cryptocurrency trading and blockchain platforms.&lt;/p&gt;
 &lt;p&gt;In this campaign, its playbook saw the group run fake recruitment profiles on professional networking and social media sites, through which selected targets were roped into conversations about job opportunities. “Successful” candidates were then invited to a technical interview during which they were directed to install Sapphire Sleet’s malware, disguised as a software developer kit (SDK) update for the Zoom videoconferencing tool.&lt;/p&gt;
 &lt;p&gt;The file, &lt;i&gt;Zoom SDK Update.scpt&lt;/i&gt; was a compiled AppleScript that opened by default in MacOS Script Editor, a trusted Apple application that can execute arbitrary shell commands. Victims were lured into a false sense of security with large blocks of decoy upgrade instructions that mimicked a routine software update. Beneath this text was inserted thousands of blank lines to push the malicious script beyond the immediately scrollable view – a crude but effective technique.&lt;/p&gt;
 &lt;p&gt;The script then launched a command to launch a trusted Apple-signed process to reinforce the appearance of a genuine update. Following this, it executed its malicious payload, retrieving threat actor-controlled content via curl, and passing it back to be run. This content also took the form of an AppleScript so that it could again launch in Script Editor to initiate delivery of the final payload – the attack orchestrator – for system reconnaissance and other operations.&lt;/p&gt;
 &lt;p&gt;Data exfiltrated by Sapphire Sleet during these attacks is known to have included Apple notes data, crypto wallet data, browser data and keychain information, and Telegram credentials and session data, among other things.&lt;/p&gt;
&lt;/section&gt;        
&lt;section class="section main-article-chapter" data-menu-title="Next steps"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Next steps&lt;/h2&gt;
 &lt;p&gt;Behind the scenes, Apple has already implemented platform-level protections to detect and block Sapphire Sleet’s infrastructure and malwares, and deployed browsing protections in Safari. It has also issued new signatures to detect and block the malwares associated with the campaign, which should already have been received by devices running MacOS.&lt;/p&gt;
 &lt;p&gt;MSTIC advised organisations that may be at risk of falling victim to this – or similar – campaigns, should conduct user education on threats emanating from social media and external platforms, especially outreach that seems to require they download software or virtual meeting tools, or execute terminal demands.&lt;/p&gt;
 &lt;p&gt;Security teams may also wish to consider blocking or restricting the execution of compiled AppleScript files and unsigned Mach-O binaries downloaded from the internet. Any such files downloaded from external sources should of course be rigorously inspected and verified. It may also be wise to limit or at least audit the use of curl, particularly when piped to interpreters.&lt;/p&gt;
 &lt;p&gt;Defenders should also monitor for unauthorised modifications to the MacOS TCC database, a feature of this campaign, and audit LaunchDaemon and LaunchAgent installations.&lt;/p&gt;
 &lt;p&gt;MSTIC also advised organisations and users to be cautious when copying and pasting sensitive data related to cryptocurrency, such as wallet addresses or credentials, to check and verify the pasted content matches the intended source, and to protect crypto wallets and rotate any browser-stored credentials.&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Read more about social engineering&lt;/h3&gt; 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;NCSC advises on countermeasures for high-risk individuals over phishing attacks on encrypted messaging services, &lt;a href="https://www.computerweekly.com/news/366641058/NCSC-warns-high-risk-individuals-of-Signal-and-WhatsApp-social-engineering-attacks" target="_blank" rel="noopener"&gt;such as Signal, WhatsApp and Facebook Messenger.&lt;/a&gt;&lt;/li&gt; 
    &lt;li&gt;Computer Weekly gets under the skin of an ongoing wave of ShinyHunters cyber attacks orchestrated via social engineering &lt;a href="https://www.computerweekly.com/feature/ShinyHunters-Salesforce-cyber-attacks-explained-What-you-need-to-know" target="_blank" rel="noopener"&gt;against Salesforce users&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;Organisations and employees must both do their part to prevent and avoid social engineering attacks. &lt;a href="https://www.techtarget.com/searchsecurity/tip/How-to-avoid-and-prevent-social-engineering-attacks" target="_blank" rel="noopener"&gt;A combination of security controls, policies, procedures and training is necessary&lt;/a&gt;.&lt;/li&gt; 
   &lt;/ul&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/section&gt;</body>
            <description>A MacOS-focused social engineering campaign orchestrated by North Korea-based threat actor Sapphire Sleet has been exposed by Microsoft’s Threat Intelligence Unit</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/Hero%20Images/cyber-security-network-lock-adobe.jpeg</image>
            <link>https://www.computerweekly.com/news/366641953/North-Korean-social-engineering-campaign-targets-macOS-users</link>
            <pubDate>Fri, 17 Apr 2026 14:13:00 GMT</pubDate>
            <title>North Korean social engineering campaign targets MacOS users</title>
        </item>
        <item>
            <body>&lt;p&gt;After establishing a robotics ecosystem, leading innovators from Norway’s capital are calling for more open access to risk capital so that they can take the next step in advancing technology.&lt;/p&gt; 
&lt;p&gt;When it comes to tech startup success, Norway’s credentials are unique when compared to counterparts in Stockholm, Copenhagen, Gothenburg or even Helsinki. Over time, Oslo’s strong industrial and maritime traditions have transitioned to focus on business agility and tech disruption.&lt;/p&gt; 
&lt;p&gt;In turn, academic institutions and startup incubators have looked to capture the momentum, fostering a wave of budding entrepreneurs and innovators. The final ingredient to this mix has been an inherent drive to target tech towards societal good.&lt;/p&gt; 
&lt;p&gt;The culmination of all the above, through the lens of robotics, is a host of businesses applying automation to industrial, ethical and social challenges.&lt;/p&gt; 
&lt;p&gt;“The tech culture here is pragmatic,” says &lt;a href="https://www.linkedin.com/in/knut-sandven-31859a3/"&gt;Knut Sandven, CEO and co-founder of Soniar&lt;/a&gt;. “We test things early, we talk to users and we think long-term. It’s a good fit for robotics, which is all about systems integration, reliability and safety.”&lt;/p&gt; 
&lt;p&gt;Sonair fits quite purposefully into the ethical, societal category when it comes to robotics development, with a chief aim of helping robots and humans to coexist more safely.&lt;/p&gt; 
&lt;p&gt;Sandven pinpoints the overarching strengths and weaknesses that shape Oslo’s robotics’ cohort at present: “The country and city are still underdogs in robotics, for sure. But we punch above our weight in deep tech, especially in sensors, autonomy and embedded systems. Our strength lies in turning complex technologies into practical, industrial-grade solutions.”&lt;/p&gt; 
&lt;p&gt;Another company helping to land that punch – albeit from the other, more industrial angle – is agricultural enabler, Saga Robotics. &lt;a href="https://www.linkedin.com/in/lars-grimstad-841737293/"&gt;CTO and co-founder Lars Grimstad&lt;/a&gt; agrees with Sandven’s summary of this rising sector machine: “The &lt;a href="https://www.techtarget.com/searchenterpriseai/news/366640672/How-simulations-and-digital-twins-are-advancing-robotics"&gt;robotics community&lt;/a&gt; is fairly small, but there are still a lot of cool and innovative companies. Most people here are comfortable around technology, digital skill levels are high and the receptivity across sectors to new solutions suits the Norway-robotics crossover.”&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Scaling to safety"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Scaling to safety&lt;/h2&gt;
 &lt;p&gt;Sonair was founded in 2022 as a spin-out from cutting-edge research in ultrasound and signal processing. Merging roots from medical and offshore backgrounds, early developments culminated in May 2024 through the launch of the company’s first 3D ultrasonic sensor for mobile robots operating in human environments.&lt;/p&gt;
 &lt;p&gt;“Then, in the summer of 2025, we launched ADAR commercially,” Sandven says. “ADAR is the world’s first compact, soon-to-be-certified 3D safety sensor based on ultrasound in air. It gives robots a new kind of spatial awareness, using sound instead of light, and performs reliably even in complex, unpredictable spaces like warehouses, hospitals or airports.”&lt;/p&gt;
 &lt;p&gt;Again, this blending of industrial application through the safety and reliability lens was a seamless evolution, aided by Norwegian innovation.&lt;/p&gt;
 &lt;p&gt;“ADAR gives robots the ability to see in 3D using sound. It acts like a virtual safety shield, helping machines detect people, objects and obstacles in real time with a wide field of view,” adds Sanden.&lt;/p&gt;
 &lt;p&gt;This matters because robots increasingly operate in public spaces and traditional safety sensors weren’t built for this level of scale.&lt;/p&gt;
 &lt;p&gt;“I’d say robotics is no longer novel, but robot safety at this scale still is,” says Sanden. “There’s a wave of automation coming in warehouses, healthcare and logistics, and safety is the bottleneck. Everyone’s looking for ways to reduce risks without compromising performance. That’s where we come in.”&lt;/p&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="From novel to normal"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;From novel to normal&lt;/h2&gt;
 &lt;p&gt;Alongside warehouses, healthcare and logistics, another identified area for robotic intervention is in &lt;a href="https://www.techtarget.com/searchenterpriseai/feature/AI-examples-that-can-be-used-effectively-in-agriculture"&gt;agriculture&lt;/a&gt;, where Saga Robotics is thriving. Just like Sonair, however, it has been on a journey through other realms and developments to reach this particular application.&lt;/p&gt;
 &lt;p&gt;Grimstad tells Computer Weekly: “We are a spin-out of a research group at the Norwegian University of Life Sciences, just outside Oslo. We started the company in 2016 after working on the technology for a couple of years in academia. Our goal was always to get our robots out to growers, but for the first few years we were mainly making agricultural robots for universities and research institutions, while at the same time working on our core technology.&lt;/p&gt;
 &lt;p&gt;“In 2020, we got investors onboard and started focusing on selling to growers. Today, our autonomous robots operate in strawberry and wine grapes across the UK and US, while Norwegian growers are also very open to the technology.”&lt;/p&gt;
 &lt;blockquote class="main-article-pullquote"&gt;
  &lt;div class="main-article-pullquote-inner"&gt;
   &lt;figure&gt;
    Norway is producing more robotics and autonomy startups than ever before, and with the right global partnerships, we can absolutely lead in this next era
   &lt;/figure&gt;
   &lt;figcaption&gt;
    &lt;strong&gt;Knut Sandven, Soniar&lt;/strong&gt;
   &lt;/figcaption&gt;
   &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/blockquote&gt;
 &lt;p&gt;Saga Robotics’ proposition focuses on providing timely, regular UVC light, reducing the need for chemicals during the growing process. The company then shares critical data to inform more strategic business decisions.&lt;/p&gt;
 &lt;p&gt;Grimstad echoes Sandven in detailing the “novel” nature of this kind of application at such a broad scale: “Certainly, on farms it’s novel, but through the past couple of years, it has been taking greater and greater steps towards normal.&lt;/p&gt;
 &lt;p&gt;“Some of our competitors aim to automate the traditional tractor, which can make a lot of sense, but at Saga our focus has been on the new approaches that robotics enable. We have put a lot of effort into making sure the autonomy is robust and uptime is high, and that the fleet is easy to use.”&lt;/p&gt;
&lt;/section&gt;        
&lt;section class="section main-article-chapter" data-menu-title="A key node in Europe’s robotics landscape"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;A key node in Europe’s robotics landscape&lt;/h2&gt;
 &lt;p&gt;Robotics technologies more generally are becoming more and more innovative each year, making Oslo’s exposure to – and utilisation of – them an inevitability. The acceptance of new tech is there. The desire to channel new tech to both industrial and social uses is there.&lt;/p&gt;
 &lt;p&gt;Perhaps the only element left with room for improvement – and that would take the sector to the next level – is access to capital.&lt;/p&gt;
 &lt;p&gt;Grimstad says: “Access to risk capital and scaling funding isn’t great here. And that’s a shame, because we want to create an environment that will support the cool and &lt;a href="https://www.computerweekly.com/news/366639921/NEURA-Robotics-accelerates-next-generation-physical-AI"&gt;innovative robotics&lt;/a&gt; companies looking to grow.&lt;/p&gt;
 &lt;p&gt;“Agriculture serves as a good example of what can be achieved when the mission and innovation is supported properly. For a decade, self-driving agricultural robots have been said to be ‘about two years away’. Now, they are actually here, generating real value for growers. The market is ready, and there will be countless others like it.”&lt;/p&gt;
 &lt;p&gt;Sandven agrees: “What’s missing is volume – both in terms of capital and market access. But that is changing. Norway is producing more robotics and autonomy startups than ever before, and with the right global partnerships, we can absolutely lead in this next era.&lt;/p&gt;
 &lt;p&gt;“We want to help start a wave of robot builders that move faster, take on bolder use cases and scale safely. In the next three-to-five years, we can then expect Norway to become a key node in Europe’s robotics innovation landscape. Not the largest, but one of the most technically credible.”&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Read more about robotics&lt;/h3&gt; 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366636818/CES-2026-Qualcomm-expands-IEIoT-portfolio"&gt;CES 2026: Qualcomm expands IE‑IoT portfolio&lt;/a&gt;: Edge AI technology made available for developers, enterprises and OEMs, integrating chipsets, software distribution and tools to scales across verticals.&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366639389/DOCOMO-Keio-University-claim-5G-robot-teleoperation-first"&gt;Docomo, Keio University claim 5G robot teleoperation first&lt;/a&gt;: Japan’s leading mobile operator and global research institute for haptics announce what they call world's first stable, high-fidelity robot via commercial 5G using low-latency slicing.&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/feature/AI-XR-digital-twins-set-to-transform-robotics"&gt;AI, XR, digital twins set to transform robotics&lt;/a&gt;: The availability of advanced sensors, artificial intelligence, digital twins, XR and robotics has changed technology-driven markets. We look at how the intersection of these technologies will create commercial opportunities.&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/feature/AI-and-digital-twins-to-serve-increasingly-complex-robot-management"&gt;AI and digital twins to serve increasingly complex robot management&lt;/a&gt;: Proliferating fleets of robots, diffusion of humanoids, and the emerging robot class of androids will increase complexities of robot management in the future. AI and digital twins will become increasingly important.&lt;/li&gt; 
   &lt;/ul&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/section&gt;</body>
            <description>The Norwegian capital’s leading innovators have got the ecosystem up and running, and are now calling for greater access to risk capital to take it to the next level</description>
            <image>https://cdn.ttgtmedia.com/visuals/German/Ai-KI-robot-with-machine-Summit-Art-Creations-Adobe.jpg</image>
            <link>https://www.computerweekly.com/feature/Oslos-robots-arent-yet-taking-over-but-are-already-punching-above-their-weight</link>
            <pubDate>Fri, 17 Apr 2026 08:42:00 GMT</pubDate>
            <title>Oslo’s robots aren’t yet taking over, but are already punching above their weight</title>
        </item>
        <item>
            <body>&lt;p&gt;Artificial intelligence (AI) companies focused on supercomputing and drug discovery are among the first cohort of startups to get money and computing resources from the UK government’s £500m Sovereign AI unit, which was &lt;a href="https://www.computerweekly.com/news/366641682/UK-governments-50m-sovereign-AI-fund-bids-to-commercialise-research"&gt;officially launched on 16 April&lt;/a&gt; at the King’s Cross headquarters of self-driving car company Wayve.&lt;/p&gt; 
&lt;p&gt;The government’s stated intention is that “by backing [startups] early, the UK is keeping expertise, decision making and economic value at home – and reducing reliance on a small number of foreign tech giants for critical AI that matter for our economic prosperity and national security”.&lt;/p&gt; 
&lt;p&gt;Technology secretary&lt;b&gt; &lt;/b&gt;Liz Kendall said in support of the fund: “Sovereign AI is unlike anything government has ever done before. Its unique approach will help to break down the barriers that have too often held back British enterprise and innovation. This is how we ensure Britain’s economic prosperity and national security in the modern age.&lt;/p&gt; 
&lt;p&gt;“My message to British founders and innovators is clear – we will ensure you never have to choose between your ambition and your home, because Britain will give you both.”&lt;/p&gt; 
&lt;p&gt;Rachel Reeves, chancellor of the exchequer, said: “We have the right economic plan – backing business so the technologies of the future are invented, built and deployed here in Britain.&lt;/p&gt; 
&lt;p&gt;“A thriving domestic AI sector is one of my three big choices for the economy, and by supporting strategic national champions we can ensure internationally competitive companies start, scale and stay here in Britain.”&lt;/p&gt; 
&lt;p&gt;The Department for Science, Innovation and Technology (DSIT)&amp;nbsp;has said the fund has made its first compute allocations through the &lt;a href="https://www.computerweekly.com/news/366627724/UK-government-plans-to-ramp-up-sovereign-computer-capacity"&gt;AI Research Resource (AIRR)&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;The six recipients are in the fields of biological foundation models, world simulation, sovereign inference infrastructure, agentic AI, engineering biology and AI for national security.&lt;/p&gt; 
&lt;p&gt;Alongside the compute, the fund has agreed Right of First Refusal (ROFR) investment options with some of the recipients, according to DSIT. This is said to create a creating “pathway from early support to follow-on funding”. The fund will continue, said DSIT, to assess applications for compute said to be worth tens of millions of pounds to British startups over the course of this year.&lt;/p&gt; 
&lt;p&gt;The DSIT statement maintains that the UK has ingredients needed for success: “Top talent, stability, leading institutions, world-class universities and a culture of entrepreneurialism. Sovereign AI is the government betting on Britain to succeed, so our country can shape the AI revolution. This is ultimately how we unlock this technology’s potential for building a stronger and more prosperous society.”&lt;/p&gt; 
&lt;p&gt;It added that the funding unit will operate like a venture capital entity, backed by the state: “It will invest directly in the UK’s most promising AI startups, help them scale quickly, and give them the support they need to compete with the best in the world.”&lt;/p&gt; 
&lt;p&gt;Sovereign AI’s first equity investment will be in an AI infrastructure startup Callosum, while six more startups will get access to supercomputing capacity.&lt;/p&gt; 
&lt;p&gt;Danyal Akarca, founder of Callosum, said: “There’s a fundamental shift underway in how AI systems are built and run. The future of compute is heterogeneous, and making that complexity usable is the next frontier. The UK already understands where this is heading, and with its depth of talent across universities and labs like DeepMind, it is the natural place to build Callosum”, which he described as an “orchestration platform that allows models and chips to work together as one system”.&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/p&gt; 
&lt;p&gt;The other companies supported are Prima Mente, Cosine, Cursive, Doubleword, Twig Bio and Odyssey.&lt;/p&gt; 
&lt;p&gt;Ravi Solanki, co-founder of Prima Mente, said: “Our deep research collaborations with Oxford, Imperial and Edinburgh are a testament to the UK’s world-class strength in the life sciences. The combination with world-class compute infrastructure from the Sovereign AI Fund has made the UK the right place to work at the frontier of AI and the life sciences.”&lt;/p&gt; 
&lt;p&gt;Prima Mente is said to use AI to decode the “languages of biology – from DNA sequence to gene expression and epigenetic regulation – to better understand and tackle brain diseases such as Alzheimer’s and Parkinson’s”.&lt;/p&gt; 
&lt;p&gt;Cosine develops advanced models and coding agents for defence, national security and regulated industries where foreign-built AI is inadmissible.&lt;/p&gt; 
&lt;p&gt;The companies supported by the fund are said to benefit from fully funded access to the UK’s largest AI supercomputers, with up to 1 million GPU hours available per startup. Each company getting investment will get visa decisions within a working day, plus access to an initial 10 cost-free visas.&lt;/p&gt; 
&lt;p&gt;They will get “hands-on government support: help navigating access to data, early procurement opportunities, independent product validation and routes into new approaches to regulation”.&lt;/p&gt; 
&lt;p&gt;Sovereign AI is also currently in discussions with around 30 firms over potential AIRR access, according to DSIT.&lt;/p&gt; 
&lt;p&gt;James Wise, a venture capitalist and chair of the Sovereign AI Unit, said: “AI as a technology could be transformational for both our wealth and security. Britain has the foundations be a global AI leader in many fields, with a unique and enviable mix of talent, capital and infrastructure which make this country the natural home for world-leading innovation. Now, through Sovereign AI, we can use the state’s unique capabilities to double down on these strengths, backing Britain’s founders to scale here in the UK and globally.”&lt;/p&gt; 
&lt;p&gt;Alex Kendall, CEO of &lt;a href="https://cse.google.com/cse?cx=000538068201538516906:yfye0gb_e3i"&gt;Wayve&lt;/a&gt;, said: “As a business that has successfully grown and launched in the UK, we’re thrilled to support the launch of the Sovereign AI Unit, which will help support emerging companies, attract talent and ultimately ensure UK AI champions can compete on the global stage. We’re excited to see the next generation of British AI companies benefit from the funding opportunities available and join us in supporting the UK’s expanding AI ecosystem.”&lt;/p&gt; 
&lt;div class="extra-info"&gt;
 &lt;div class="extra-info-inner"&gt;
  &lt;h3 class="splash-heading"&gt;Read more about UK government AI and technology ventures&lt;/h3&gt; 
  &lt;ul class="default-list"&gt; 
   &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366641682/UK-governments-50m-sovereign-AI-fund-bids-to-commercialise-research"&gt;UK government’s £500m sovereign AI fund&lt;/a&gt; bids to commercialise research.&lt;/li&gt; 
   &lt;li&gt;The &lt;a href="https://www.computerweekly.com/news/366628066/The-UK-governments-AI-Growth-Zones-strategy-Everything-you-need-to-know"&gt;UK government’s AI growth zones strategy&lt;/a&gt;: Everything you need to know.&lt;/li&gt; 
   &lt;li&gt;Kendall names &lt;a href="https://www.computerweekly.com/news/366638556/Kendall-names-Barnsley-as-UKs-first-tech-town"&gt;Barnsley as UK’s first tech town&lt;/a&gt;.&lt;/li&gt; 
   &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366636163/Google-DeepMind-partners-with-UK-government-to-deliver-AI"&gt;Google DeepMind partners with UK government&lt;/a&gt; to deliver AI.&lt;/li&gt; 
   &lt;li&gt;UK’s AI plan of action &lt;a href="https://www.computerweekly.com/news/366636810/UKs-AI-plan-of-action-needs-to-shift-into-overdrive"&gt;needs to shift into overdrive&lt;/a&gt;.&lt;/li&gt; 
  &lt;/ul&gt;
 &lt;/div&gt;
&lt;/div&gt;</body>
            <description>The UK government’s £500m Sovereign AI fund announces first cohort of startups backed to boost economic growth and national security</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/HeroImages/London-Westminster-Houses-of-Parliament-exflow-adobe.jpg</image>
            <link>https://www.computerweekly.com/news/366641874/UKs-Sovereign-AI-supports-supercomputing-and-drug-discovery-AI-startups</link>
            <pubDate>Thu, 16 Apr 2026 13:30:00 GMT</pubDate>
            <title>UK’s Sovereign AI supports supercomputing and drug discovery AI startups</title>
        </item>
        <item>
            <body>&lt;p&gt;The increasingly long-in-the-tooth &lt;a href="https://www.legislation.gov.uk/ukpga/1990/18/contents" target="_blank" rel="noopener"&gt;Computer Misuse Act&lt;/a&gt; (CMA) of 1990 remains an albatross around the neck of British cyber security professionals, and even though the UK government &lt;a href="https://www.computerweekly.com/news/366635624/UK-government-pledges-to-rewrite-Computer-Misuse-Act" target="_blank" rel="noopener"&gt;committed last December&lt;/a&gt; to reforming it, every minute of delay is holding back the nation’s security innovation, resilience, talent and ability to defend itself against cyber attacks, campaigners have warned.&lt;/p&gt; 
&lt;p&gt;Ahead of the National Cyber Security Centre’s (NCSC’s) upcoming &lt;a href="https://www.cyberuk.uk/" target="_blank" rel="noopener"&gt;CyberUK&lt;/a&gt; conference in Glasgow, the &lt;a href="https://www.cyberupcampaign.com/" target="_blank" rel="noopener"&gt;CyberUp Campaign&lt;/a&gt; for reform of the Computer Misuse Act (CMA) has published a report, &lt;i&gt;Protections for cyber researchers: How the UK is being left behind&lt;/i&gt;, to maintain pressure on Westminster.&lt;/p&gt; 
&lt;p&gt;The CMA defines the vague offence of unauthorised access to a computer, which the campaigners want changed because it was written 35 years ago and fails to account for the development of the cyber security profession, and the fact that in the course of their day-to-day work, cyber professionals may sometimes need to hack into other systems.&lt;/p&gt; 
&lt;p&gt;“Cyber attacks are growing in scale, sophistication and severity, with a devastating impact on infrastructure, businesses and charities,” said a CyberUp campaign spokesperson.&lt;/p&gt; 
&lt;p&gt;“While other countries have moved to refresh their cyber laws in response, the UK’s Computer Misuse Act hasn’t been updated since before the modern internet – hardly the best platform for accelerating our defences into the next decade.”&lt;/p&gt; 
&lt;p&gt;The group’s report highlights how other nations – Australia, Belgium, France, Germany, Hong Kong, Malta, Portugal and the US – have already secured legal protections for cyber professionals that enable them to go about their business without fear of prosecution.&lt;/p&gt; 
&lt;p&gt;In Portugal – Britain’s oldest formal ally under a treaty dating back to the 14th century – the government last year published &lt;a target="_blank" href="https://diariodarepublica.pt/dr/detalhe/decreto-lei/125-2025-962603401" rel="noopener"&gt;Decreto-Lei 125/2025&lt;/a&gt;, implementing the European Union (EU) Network and Information Systems (NIS2) Directive and revising the country’s cyber crime law to ensure that ethical hackers and professional cyber security practitioners working in good faith are both recognised and protected.&lt;/p&gt; 
&lt;p&gt;Portgual’s laws now accept that some elements of cyber work may have to happen without explicit permission or involve unanticipated technical overreach that has a legitimate purpose.&lt;/p&gt; 
&lt;p&gt;As such, Portugal says security work undertaken in good faith won’t be punished as long as the researcher fulfils a set of conditions. For example, they can act only to find vulnerabilities, and these must be reported immediately, they must avoid taking harmful actions, like conducting distributed denial of service (DDoS) attacks or installing malware, and they must respect the integrity of any data they may find or access and delete it within 10 days once the issue is addressed.&lt;/p&gt; 
&lt;p&gt;CyberUp said Portugal’s example demonstrates how cyber crime laws can be modernised to legally protect research carried out in the public interest.&lt;/p&gt; 
&lt;p&gt;“Portugal has demonstrated how to modernise their equivalent law through cyber legislation,” the spokesperson said. “We urge the government to follow this example and act swiftly through the Cyber Security and Resilience Bill to achieve meaningful reform, or risk lagging even further behind our peers.”&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Defence Framework"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Defence Framework&lt;/h2&gt;
 &lt;p&gt;Working with cyber security experts and legal advisors, the CyberUp campaign has developed its own Defence Framework that would allow cyber professionals to present a statutory defence in court as long as they adhere to four core principles:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Harm versus benefit: The benefits of the activity must outweigh the potential harms;&lt;/li&gt; 
  &lt;li&gt;Proportionality: Cyber professionals must take all reasonable steps to minimise the risks of their activity;&lt;/li&gt; 
  &lt;li&gt;Intent: They must act honestly, sincerely and clearly direct themselves towards improving security;&lt;/li&gt; 
  &lt;li&gt;Competence: Their qualifications and professional memberships should demonstrate they are suitably equipped to perform cyber security work.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;The campaigners say this framework will bring clarity and confidence to the security sector, enabling cyber professionals to run essential research tasks without fear of criminal prosecution, helping organisations operate to recognised legal standards, and enabling a more open and collaborative relationship between the cyber sector and the UK government.&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Timeline: Computer Misuse Act reform&lt;/h3&gt; 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;&lt;strong&gt;January 2020:&lt;/strong&gt;&amp;nbsp;A group of campaigners says the Computer Misuse Act 1990 risks criminalising cyber security professionals and&amp;nbsp;&lt;a href="https://www.computerweekly.com/news/252477141/Computer-Misuse-Act-crying-out-for-reform"&gt;needs reforming&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;&lt;strong&gt;June 2020:&lt;/strong&gt;&amp;nbsp;The CyberUp coalition writes to Boris Johnson to urge him to reform&amp;nbsp;&lt;a href="https://www.computerweekly.com/news/252485276/Out-of-date-security-laws-leave-UK-plc-at-risk-during-pandemic"&gt;the UK’s 30-year-old cyber crime laws&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;&lt;strong&gt;November 2020:&lt;/strong&gt;&amp;nbsp;CyberUp, a group of campaigners who want to reform the Computer Misuse Act, finds 80% of security professionals are concerned that they may be prosecuted&amp;nbsp;&lt;a href="https://www.computerweekly.com/news/252492416/Security-pros-fear-prosecution-under-outdated-UK-laws"&gt;just for doing their jobs&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;&lt;strong&gt;May 2021:&lt;/strong&gt;&amp;nbsp;Home secretary Priti Patel announces plans to explore reforming the Computer Misuse Act as calls mount for the 31-year-old law to be updated&amp;nbsp;&lt;a href="https://www.computerweekly.com/news/252500572/Government-to-reform-Computer-Misuse-Act"&gt;to reflect the changed online world&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;&lt;strong&gt;June 2022:&lt;/strong&gt;&amp;nbsp;A cross-party group in the House of Lords has proposed an amendment to the Product Security and Telecommunications Infrastructure Bill that would address concerns about security researchers or ethical hackers being prosecuted&amp;nbsp;&lt;a href="https://www.computerweekly.com/news/252521716/Lords-move-to-protect-cyber-researchers-from-prosecution" target="_blank" rel="noopener"&gt;in the course of their work&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;&lt;strong&gt;August 2022:&lt;/strong&gt;&amp;nbsp;A study produced by the CyberUp Campaign reveals broad alignment among security professionals on questions around the Computer Misuse Act, which it hopes will give confidence to policymakers&amp;nbsp;&lt;a href="https://www.computerweekly.com/news/252523826/Report-reveals-consensus-around-Computer-Misuse-Act-reform" target="_blank" rel="noopener"&gt;as they explore its reform&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;&lt;strong&gt;September 2022:&lt;/strong&gt;&amp;nbsp;The CyberUp coalition, a campaign to reform the Computer Misuse Act, has called on Liz Truss to push ahead with needed changes to protect cyber professionals&amp;nbsp;&lt;a href="https://www.computerweekly.com/news/252524622/Campaigners-call-on-Truss-to-change-UKs-archaic-hacking-laws" target="_blank" rel="noopener"&gt;from potential prosecution&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;&lt;strong&gt;January 2023:&lt;/strong&gt;&amp;nbsp;Cyber accreditation association Crest International lends its support to the CyberUp Campaign for&amp;nbsp;&lt;a href="https://www.computerweekly.com/news/252529245/Crest-throws-support-behind-CyberUp-CMA-reform-campaign" target="_blank" rel="noopener"&gt;reform to the Computer Misuse Act 1990&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;&lt;strong&gt;February 2023:&lt;/strong&gt; Westminster opens a consultation on proposed reforms to the Computer Misuse Act 1990, but campaigners who want the law changed to protect cyber professionals&amp;nbsp;&lt;a href="https://www.computerweekly.com/news/365530632/Campaigners-lament-lack-of-movement-on-Computer-Misuse-Act-reform" target="_blank" rel="noopener"&gt;have been left disappointed&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;&lt;strong&gt;March 2023:&lt;/strong&gt;&amp;nbsp;The deadline for submissions to the government’s consultation on reform of the Computer Misuse Act is fast approaching, and cyber professionals need to make their voices heard,&amp;nbsp;&lt;a href="https://www.computerweekly.com/news/365533941/Ethical-hackers-urged-to-respond-to-Computer-Misuse-Act-reform-proposals" target="_blank" rel="noopener"&gt;say Bugcrowd’s ethical hackers&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;&lt;strong&gt;November 2023:&lt;/strong&gt;&amp;nbsp;A group of activists who want to reform the UK’s computer misuse laws to protect bona fide cyber professionals from prosecution have been left&amp;nbsp;&lt;a href="https://www.computerweekly.com/news/366558652/Kings-Speech-misses-the-mark-on-cyber-law-reform-says-campaign" target="_blank" rel="noopener"&gt;frustrated by a lack of legislative progress&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;J&lt;strong&gt;uly 2024:&lt;/strong&gt;&amp;nbsp;In the Cyber Security and Resilience Bill introduced in the King’s Speech, the UK’s new government pledges to give regulators more teeth to ensure compliance with security best practice&amp;nbsp;&lt;a href="https://www.computerweekly.com/news/366595211/UK-Cyber-Bill-teases-mandatory-ransomware-reporting" target="_blank" rel="noopener"&gt;and to mandate incident reporting&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;J&lt;strong&gt;uly 2024:&lt;/strong&gt;&amp;nbsp;The CyberUp Campaign for reform of the 1990 Computer Misuse Act launches an industry survey inviting cyber experts to share their views on how the outdated law&amp;nbsp;&lt;a rel="noopener" target="_blank" href="https://www.computerweekly.com/news/366595211/UK-Cyber-Bill-teases-mandatory-ransomware-reporting"&gt;hinders legitimate work&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;&lt;strong&gt;December 2024:&lt;/strong&gt;&amp;nbsp;An amendment to the proposed Data (Access and Use) Bill that will right a 35-year-old wrong and protect security professionals from criminalisation&amp;nbsp;&lt;a href="https://www.computerweekly.com/news/366617262/Computer-Misuse-Act-reform-gains-traction-in-Parliament" target="_blank" rel="noopener"&gt;is to be debated at Westminster&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;&lt;strong&gt;December 2024:&lt;/strong&gt;&amp;nbsp;Amendments to the Data Bill that would have given the UK cyber industry a boost by updating restrictive elements of the Computer Misuse Act have failed to progress&amp;nbsp;&lt;a rel="noopener" target="_blank" href="https://www.computerweekly.com/news/366617109/Latest-attempt-to-override-UKs-outdated-hacking-law-stalls"&gt;beyond a Lords committee&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;&lt;strong&gt;January 2025:&lt;/strong&gt;&amp;nbsp;Science minister Patrick Vallance rejects proposed amendments to the Computer Misuse Act, arguing that they could create&amp;nbsp;&lt;a href="https://www.computerweekly.com/news/366618521/Vallance-rejects-latest-charge-to-reform-UK-hacking-laws" target="_blank" rel="noopener"&gt;a loophole for cyber criminals to exploit&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;&lt;strong&gt;May 2025:&amp;nbsp;&lt;/strong&gt;Britain’s outdated hacking laws are leaving the UK’s cyber practitioners hamstrung and afraid. Security professional Simon Whittaker reveals how he nearly ran afoul of the Computer Misuse Act,&amp;nbsp;&lt;a rel="noopener" target="_blank" href="https://www.computerweekly.com/news/366623789/Why-we-must-reform-the-Computer-Misuse-Act-A-cyber-pro-speaks-out"&gt;and why he’s speaking out for reform&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;&lt;strong&gt;December 2025: &lt;/strong&gt;Campaigners celebrate as security minister Dan Jarvis commits to amending the outdated Computer Misuse Act &lt;a href="https://www.computerweekly.com/news/366635624/UK-government-pledges-to-rewrite-Computer-Misuse-Act" target="_blank" rel="noopener"&gt;to protect security professionals from prosecution&lt;/a&gt;.&lt;/li&gt; 
   &lt;/ul&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/section&gt;</body>
            <description>Ahead of next week’s CyberUK conference, the CyberUp Campaign for reform of the UK’s hacking laws urges the government to keep focus and proposes a four-pillar framework that would protect cyber professionals from prosecution</description>
            <image>https://cdn.ttgtmedia.com/rms/German/ethical-hacking-woman-adobe.jpg</image>
            <link>https://www.computerweekly.com/news/366641875/CYBERUK-26-UK-lagging-on-legal-protections-for-cyber-pros</link>
            <pubDate>Thu, 16 Apr 2026 12:13:00 GMT</pubDate>
            <title>CyberUK 2026: UK lagging on legal protections for cyber pros</title>
        </item>
        <title>ComputerWeekly.com</title>
        <ttl>60</ttl>
        <webMaster>editor@computerweekly.com</webMaster>
    </channel>
</rss>
