<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel>
        <copyright>Copyright TechTarget - All rights reserved</copyright>
        <description>ComputerWeekly’s best articles of the day</description>
        <docs>https://cyber.law.harvard.edu/rss/rss.html</docs>
        <generator>Techtarget Feed Generator</generator>
        <language>en</language>
        <lastBuildDate>Sat, 25 Apr 2026 06:35:41 GMT</lastBuildDate>
        <link>https://www.computerweekly.com</link>
        <managingEditor>editor@computerweekly.com</managingEditor>
        <item>
            <body>&lt;p&gt;Security leaders should be turning &lt;a href="https://www.computerweekly.com/opinion/Confidence-in-AI-powered-cyber-must-be-earned-not-assumed" target="_blank" rel="noopener"&gt;offensive AI cyber tools&lt;/a&gt; on their own systems before threat actors do, exploiting the innate defenders’ advantage to attain the high ground and increase their chances of withstanding a cyber attack.&lt;/p&gt; 
&lt;p&gt;So says Yinon Costica, co-founder of &lt;a href="https://www.wiz.io/" target="_blank" rel="noopener"&gt;Google-owned Wiz&lt;/a&gt;, who, speaking at &lt;a href="https://cloud.google.com/blog/topics/google-cloud-next/welcome-to-google-cloud-next26" target="_blank" rel="noopener"&gt;Google Cloud Next in Las Vegas&lt;/a&gt;, argued that defenders can win against attackers by using AI to exploit an advantage that may not appear obvious at first glance, that of context.&lt;/p&gt; 
&lt;p&gt;“The same AI model can obviously produce very different results based on the context that we feed into it,” said Costica. “Now, attackers hopefully have much less context about us while as defenders we do have a lot of context about our environments that we can share with the model.&lt;/p&gt; 
&lt;p&gt;“If, as defenders, we take the first movers’ advantage and we use the AI against ourselves, with the context we have, we actually stand a chance to win…. But we need to act fast,” he said.&lt;/p&gt; 
&lt;p&gt;“We need to start using AI against ourselves as much as possible, whether it’s to scan attack surfaces, scan code, scan anything, in order to be the first one to see the results and not to wait for the bad guys to do it before us.”&lt;/p&gt; 
&lt;p&gt;As speed becomes ever more of the essence in cyber security, Costica conceded that this would be a challenge for defenders – but noted that the tools to do this are rapidly becoming available. To try to help, Wiz unveiled three new &lt;a href="https://www.techtarget.com/searchenterpriseai/definition/AI-agents" target="_blank" rel="noopener"&gt;AI agents&lt;/a&gt; at Google Cloud Next – red, green and blue – which are named for the human cyber teams they are designed to help.&lt;/p&gt; 
&lt;p&gt;“What agents allow us to do is really to get to the next level of acceleration [and] automation of security work,” said Costica.&lt;/p&gt; 
&lt;p&gt;The red agent is designed to assist red team penetration testing work by probing deep into its owners’ IT estate, identifying potential exposures, such as &lt;a href="https://www.computerweekly.com/news/366618596/DeepSeek-API-chat-log-exposure-a-rookie-cyber-error" target="_blank" rel="noopener"&gt;application programming interfaces&lt;/a&gt; (APIs), end-of-life &lt;a href="https://www.computerweekly.com/news/366641403/Russian-cyber-spies-targeting-consumer-Soho-routers" target="_blank" rel="noopener"&gt;edge networking kit&lt;/a&gt; or operational technology (OT) assets, and runs penetration tests on them. The green agent follows on by automating the triage process, something that can take ages for humans. Finally, the blue agent acts as a detective, doing the investigative work that can also be a lengthy process for human teams.&lt;/p&gt; 
&lt;p&gt;“These three agents together form a layer that is autonomous and automated. Its not revolutionary in that it aligns closely to how security teams have been working for many years, but now it allows each team to automate their workflows,” said Costica.&lt;/p&gt; 
&lt;p&gt;“It’s like living in the future in the eyes of security teams because it means that from the moment they find a risk, they can automate the process to find who owns it and deliver the code fix to complete and redeploy to production.”&lt;/p&gt; 
&lt;p&gt;A little over a month on from the closure of the $32bn acquisition of Wiz – Google’s largest purchase to date – the two organisations reaffirmed their commitment to providing a unified security platform, retaining Wiz’s brand, that will enhance the speed with which customers detect, prevent and respond to threats, especially emerging ones created using AI.&lt;/p&gt; 
&lt;p&gt;They duo also claim their combined capability will accelerate adoption of multicloud security and spur more confidence in innovation around cloud and AI. Wiz’s products are also to continue to be made available across other platforms, including Amazon Web Services (AWS), Microsoft Azure and Oracle Cloud. It also announced support for Databricks and agent studios like AWS Agentcore, Microsoft Azure Copilot Studio, and Salesforce Agentforce, as well as Gemini Enterprise Agent Platform of course, and continues &amp;nbsp;to support security ecosystems with integrations to the outer layer of the cloud, including Google Cloud Apigee, Cloudflare AI Security for Apps, and the Vercel platform.&lt;/p&gt; 
&lt;p&gt;Behind the scenes, Wiz has also updated how it integrates security detections from Wiz Defend with Google Security Operations and Mandiant Threat Defence to make life easier for human analysts.&lt;/p&gt; 
&lt;p&gt;And it announced new capabilities to secure the AI-native deployment cycle. These include scanning vibe coded applications for issues; AI-generated code scanning and vulnerability remediation; agent-based remediation allowing teams to automate remediation workflows; and an AI bill of materials (AI-BOM) to keep on top of the use of shadow AI for coding.&lt;/p&gt; 
&lt;div class="extra-info"&gt;
 &lt;div class="extra-info-inner"&gt;
  &lt;h3 class="splash-heading"&gt;Read more from Google Cloud Next&lt;/h3&gt; 
  &lt;ul class="default-list"&gt; 
   &lt;li&gt;Attendees at Google Cloud Next in Las Vegas are backing AI all the way to the bank. But as AI turns up in everything, everywhere, all at once, we’re going to need to get a lot stricter &lt;a href="https://www.computerweekly.com/opinion/Google-Cloud-Next-Its-time-to-create-value-not-slop-from-the-AI-boom" target="_blank" rel="noopener"&gt;about what we use it for&lt;/a&gt;.&lt;/li&gt; 
   &lt;li&gt;With more AI agents moving to production, Google Cloud is targeting governance, multi-cloud data architecture and purpose-built silicon to help enterprises &lt;a href="https://www.computerweekly.com/news/366641999/Google-launches-Gemini-Agent-Platform-eighth-generation-TPUs" target="_blank" rel="noopener"&gt;orchestrate agentic workflows&lt;/a&gt;.&lt;/li&gt; 
   &lt;li&gt;Blue chips will expand use of Gemini Enterprise AI agents on a revamped platform, but how far its appeal will extend beyond the Google Cloud user base &lt;a href="https://www.techtarget.com/searchitoperations/news/366642097/Merck-Home-Depot-tap-Gemini-Enterprise-for-AI-agent-development" target="_blank" rel="noopener"&gt;remains to be seen&lt;/a&gt;.&lt;/li&gt; 
  &lt;/ul&gt;
 &lt;/div&gt;
&lt;/div&gt;</body>
            <description>At Google Cloud Next, Wiz co-founder Yinon Costica called on security defenders to use AI to steal a march on threat actors, and launched new agentic capabiltiies for cyber teams.</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/Hero%20Images/Robot-AI-books-learning-Adobe.jpg</image>
            <link>https://www.computerweekly.com/news/366642436/Wiz-founder-Hack-yourself-with-AI-before-the-bad-guys-do</link>
            <pubDate>Fri, 24 Apr 2026 15:15:00 GMT</pubDate>
            <title>Wiz founder: Hack yourself with AI, before the bad guys do</title>
        </item>
        <item>
            <body>&lt;p&gt;With huge crowds set to descend on London for the city’s iconic marathon this weekend, IT services provider Tata Consultancy Services (TCS), in partnership with Neurun, has launched a map-based tool powered by artificial intelligence (AI) to help participants and spectators navigate the event.&lt;/p&gt; 
&lt;p&gt;&lt;a title="https://url.us.m.mimecastprotect.com/s/tB5bCpYRz0uyyvxKpcPfBTGmYLh?domain=runconcierge.ai" href="https://url.us.m.mimecastprotect.com/s/tB5bCpYRz0uyyvxKpcPfBTGmYLh?domain=runconcierge.ai"&gt;TCS RunConcierge&lt;/a&gt; is said to act as a “digital brain” for the London Marathon, bringing together official guidance, route support and course information in real time – a useful tool for this mass participation event, which saw more than 56,000 runners cross the finish line in 2025 and hundreds of thousands of spectators lining the 26.2-mile route.&lt;/p&gt; 
&lt;p&gt;Powered by Google Gemini, the platform is designed to deliver instant and reliable guidance for users, whether that be runners seeking information about start line logistics or the location of drinks stops – which will be very much needed with wall-to-wall sunshine forecast on the day – or supporters wishing to locate the best spot from which to cheer on participants or travel as quickly as possible between viewing points.&lt;/p&gt; 
&lt;p&gt;Users can see their current location on the map, ask for directions to key event destinations and access pre-loaded routes with direct links to Google Maps navigation. The tool also suggests personalised follow-up questions and features voice activation to enable hands-free use on the move. And with 60 languages supported, visitors from all over the world will be able to benefit from the event guidance.&lt;/p&gt; 
&lt;p&gt;For runners specifically, the immersive 3D map includes an elevation tracker, which could help them plan their strategy.&lt;/p&gt; 
&lt;p&gt;The partnership between TCS and Neurun is said to be built on a foundation of continuous innovation. New back-end capabilities include a self-serve admin portal that allows event organisers to manage RunConcierge independently, as well as a unique internal AI agent that tests the platform to help maintain content quality and identify improvements&lt;/p&gt; 
&lt;p&gt;Vinay Singhvi, head of UK and Ireland at Tata Consultancy Services, described the London Marathon as a monumental event, for which its goal is to use technology to make the experience as seamless and enjoyable as possible.&lt;/p&gt; 
&lt;p&gt;“Our partnership with Neurun allows us to innovate at pace, and the enhanced TCS RunConcierge is a prime example of how we are using AI to solve complex logistical challenges, providing runners and spectators with a trusted companion for the moments that matter most,” he said.&lt;/p&gt; 
&lt;p&gt;Neurun founder Cade Netscher said its partnership with TCS had been instrumental in developing the RunConcierge tool for the world’s most prestigious marathons, with previous successful deployments at the Sydney and New York City events.&lt;/p&gt; 
&lt;p&gt;“For London, we’ve integrated the latest AI advancements to create our most powerful and user-friendly version yet. We are excited to see how it helps thousands of people enjoy a more connected and stress-free marathon weekend,” he said.&lt;/p&gt; 
&lt;p&gt;Separately, in a demonstration of digital healthcare technology in action, &lt;a href="https://www.computerweekly.com/news/366642040/Digital-twin-of-athletes-heart-to-demonstrate-future-of-healthcare"&gt;TCS has created a digital twin of a para-athlete’s heart&lt;/a&gt;, which uses sensors and AI to monitor her heart during training sessions.&lt;/p&gt; 
&lt;p&gt;The para-athlete, Milly Pickles, is aiming to complete the London Marathon in under four-and-a-half hours next year, and is harnessing digital healthtech to reach her goal.&lt;/p&gt;</body>
            <description>TCS has launched an artificial intelligence-powered digital mapping tool to help runners and spectators lessen the stress and find the fun during the 2026 London Marathon</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/HeroImages/TCS-London-Marathon-2025-Getty-single-use-only.jpg</image>
            <link>https://www.computerweekly.com/news/366642377/London-Marathon-runners-get-AI-to-go-the-extra-mile</link>
            <pubDate>Fri, 24 Apr 2026 13:00:00 GMT</pubDate>
            <title>London Marathon runners get AI to go the extra mile</title>
        </item>
        <item>
            <body>&lt;p&gt;BT and mobile provider EE have now blocked over a billion clicks to malicious websites using intelligence supplied by the UK’s &lt;a href="https://www.computerweekly.com/news/366642156/NCSC-heralds-end-of-passwords-for-consumers-and-pushes-secure-passkeys"&gt;National Cyber Security Centre&lt;/a&gt; (NCSC), according to figures disclosed today.&lt;/p&gt; 
&lt;p&gt;The NCSC’s Share and Defend programme, launched last year, protects 46 million mobile phone users and 12 million fixed line internet subscribers from websites that could deliver malicious code, malware or phishing attacks, the NCSC said.&lt;/p&gt; 
&lt;p&gt;It has allowed BT to head off “early stage cyber attacks” and attempts by its customers to access scam websites.&lt;/p&gt; 
&lt;p&gt;The programme provides telecoms companies with streams of alerts about malicious websites, giving telcos and internet companies the option to block access to the most severe risks to its customers.&lt;/p&gt; 
&lt;p&gt;Claimed to be the most extensive in the world, Share and Defend provides alerts to BT, EE and VodafoneThree.&lt;/p&gt; 
&lt;p&gt;Other partners include broadband company PXC, which provides wholesale broadband and network services.&lt;/p&gt; 
&lt;p&gt;The NCSC said it is “engaging” with other companies to achieve wider coverage and looking to bring new partners into the scheme.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Threat feeds"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Threat feeds&lt;/h2&gt;
 &lt;p&gt;Share and Defend provides telcos with alerts from threat feeds, some of which are private to the NCSC, with others provided by businesses, and the Cyber Defence Alliance, a group for the finance sector.&lt;/p&gt;
 &lt;p&gt;Other alerts are generated by take-down notices issued to remove malicious content from the internet, and from websites identified as being linked to phishing sites reported by the public.&lt;/p&gt;
 &lt;p&gt;Organisations signed up to the programme are able to protect their customers from accessing malicious content, but can choose which sites to block based on their own risk analysis.&lt;/p&gt;
 &lt;p&gt;The programme provides threat data from the NCSC-developed Protective Domain Name Service, run by Cloudflare and Accenture. The service is capable of preventing access to malicious web domains when they are looked up on the Domain Name System used to navigate the internet.&lt;/p&gt;
 &lt;p&gt;It also takes feeds from the NCSC’s takedown service – run in conjunction with cyber security company Netcraft – which blocks and removes websites linked to spam and phishing attacks that could damage the reputation of government services.&lt;/p&gt;
 &lt;p&gt;The Share and Defend service is also used by Jsic, a not-for-profit organisation, which builds and maintains the Janet network, used by education and research organisations.&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Read more from CyberUK 2026&lt;/h3&gt; 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366641875/CYBERUK-26-UK-lagging-on-legal-protections-for-cyber-pros"&gt;CyberUK 2026 – UK lagging on legal protections for cyber pros&lt;/a&gt;: Ahead of this year’s CyberUK conference, the CyberUp Campaign for reform of the UK’s hacking laws proposes a four-pillar framework that would protect cyber professionals from prosecution.&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366642032/Nation-states-responsible-for-nationally-significant-cyber-attacks-against-UK-says-NCSC-chief"&gt;Nation states responsible for ‘nationally significant’ cyber attacks against UK, says NCSC chief&lt;/a&gt;: The UK is facing four nationally significant cyber attacks a week, the majority from hostile states, NCSC chief, Richard Horne, warns at the CyberUK conference.&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366641790/UK-to-build-national-cyber-shield-to-protect-against-AI-cyber-threats"&gt;UK to build ‘national cyber shield’ to protect against AI cyber threats&lt;/a&gt;: Security minister Dan Jarvis calls for artificial intelligence companies to work with government to develop AI-driven cyber defences.&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366642156/NCSC-heralds-end-of-passwords-for-consumers-and-pushes-secure-passkeys"&gt;NCSC heralds end of passwords for consumers and pushes secure passkeys&lt;/a&gt;: UK National Cyber Security Centre is urging consumers to replace passwords and two-factor authentication with passkeys, following a technical study that shows they are more secure and easier to use.&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366641986/Chinese-hackers-using-compromised-networks-to-spy-on-Western-companies-says-Five-Eyes"&gt;Chinese hackers using compromised networks to spy on Western companies, says Five Eyes&lt;/a&gt; - Companies urged to take countermeasures as Chinese hacking groups use networks of infected home and office devices ‘at scale’ to evade security monitoring systems.&lt;/li&gt; 
   &lt;/ul&gt;
  &lt;/div&gt;
 &lt;/div&gt;
 &lt;ul type="square" class="default-list"&gt;&lt;/ul&gt;
&lt;/section&gt;</body>
            <description>NCSC’s Share and Defend scheme has seen BT block over a billion clicks through to malicious websites</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/Hero%20Images/cyber-security-attack-virus-malware-Skorzewiak-adobe.jpg</image>
            <link>https://www.computerweekly.com/news/366642433/BT-has-now-blocked-over-a-billion-clicks-to-malicious-websites-says-NCSC</link>
            <pubDate>Fri, 24 Apr 2026 11:30:00 GMT</pubDate>
            <title>BT has now blocked over a billion clicks to malicious websites, says NCSC</title>
        </item>
        <item>
            <body>&lt;p&gt;Cisco has advanced its journey into quantum networks by unveiling Universal Quantum Switch, a working prototype designed to connect quantum systems from different suppliers.&lt;/p&gt; 
&lt;p&gt;For some time, Cisco – with a number of partners – has been working on &lt;a href="https://www.computerweekly.com/news/366632022/Cisco-unveils-software-to-accelerate-quantum-networks"&gt;distributed quantum networks&lt;/a&gt;&amp;nbsp;that it believes could lay the groundwork towards a quantum computing internet defined by quantum computers, sensors and communication in the late 2030s.&lt;/p&gt; 
&lt;p&gt;Explaining the background to the launch, Cisco said current quantum computers are powerful but limited, operating at hundreds of qubits when real-world applications in healthcare, financial services and aerospace will need millions to achieve unheard-of speeds and technological breakthroughs. The company believes networking and connectivity are central to bridging that gap. The quantum future will not be built by any one company or any one technology. It will be built by connecting them all.&lt;/p&gt; 
&lt;p&gt;Specifically regarding the new technology, Cisco suggested that attempting to connect billions of people and tens of billions of devices with direct cables would be unmanageable, and that the internet became possible because classical switches could connect all of those endpoints through a shared, scalable network.&lt;/p&gt; 
&lt;p&gt;Yet given &lt;a href="https://www.computerweekly.com/news/366637028/Singapore-and-Japan-team-up-on-quantum-computing"&gt;quantum computers&lt;/a&gt; encode information in different ways, until now, no switch could accept and translate between all major encoding modalities without destroying the quantum information in the process.&lt;/p&gt; 
&lt;p&gt;The &lt;a href="https://research.cisco.com/quantum"&gt;Universal Quantum Switch&lt;/a&gt; is designed to address this challenge for the first time, routing quantum information while preserving it at room temperature, on existing telecom fibre, with a Cisco-patented conversion engine that translates between encoding modalities at input and output.&lt;/p&gt; 
&lt;p&gt;When two quantum computers need to share information, the Universal Quantum Switch does the same thing for quantum: accepts the signal in whatever modality it arrives, translates it into a common language for routing, and delivers it in the format the receiving system needs, without losing any quantum information along the way.&lt;/p&gt; 
&lt;div class="extra-info"&gt;
 &lt;div class="extra-info-inner"&gt;
  &lt;h3 class="splash-heading"&gt;Read more about quantum networks&lt;/h3&gt; 
  &lt;ul class="default-list"&gt; 
   &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366636697/BT-UKs-next-phase-of-quantum-progress-hinges-on-network-build"&gt;BT: UK’s next phase of quantum progress hinges on network build&lt;/a&gt;: UK’s leading network provider reflects on the country’s quantum progress to date, and proposes what needs to happen next as funding and focus shift towards delivery.&lt;/li&gt; 
   &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366641832/AK-Travel-journeys-with-Colt-for-global-quantum-safe-network"&gt;A&amp;amp;K Travel journeys with Colt for global quantum-safe network&lt;/a&gt;: Travel giant chooses services arm of digital infrastructure provider to build out its global connectivity network based on quantum-safe encryption systems&amp;nbsp;that operate without distance limitations.&lt;/li&gt; 
   &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366634683/IBM-Cisco-light-up-quantum-networking-collaboration"&gt;IBM and Cisco light up quantum networking collaboration&lt;/a&gt;: Firms collaborate to design a connected network of large-scale, fault-tolerant quantum computers, laying the groundwork for a quantum computing internet.&lt;/li&gt; 
   &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366639275/Cisco-Qunnect-claim-quantum-first-with-datacentre-connectivity"&gt;Cisco, Qunnect claim quantum first with datacentre connectivity&lt;/a&gt;: IT and networking giant collaborates with scalable quantum networks firm for what is said to be a successful demonstration of quantum networking connecting a datacentre to two research facilities in New York City.&lt;/li&gt; 
  &lt;/ul&gt;
 &lt;/div&gt;
&lt;/div&gt; 
&lt;p&gt;In addition, the technology is regarded as a critical milestone in quantum networking that addresses one of the most fundamental barriers to building a quantum network.&lt;/p&gt; 
&lt;p&gt;A Cisco-patented conversion engine at the heart of the quantum switch is said to allow the output modality to match an input or be an entirely different one, enabling the quantum switch to connect and translate between quantum systems that were never designed to talk to each other, a critical capability for building quantum networks that work across different suppliers and technologies.&lt;/p&gt; 
&lt;p&gt;Furthermore, it is designed to support all major quantum encoding modalities used to carry information. These include: polarisation, the orientation of light waves; the timing of light pulses (time-bin); frequency-bin, the colour or frequency of light; and the physical or spatial path. To date, the quantum switch has been experimentally validated with polarisation encoding. Support for time-bin and frequency-bin is built into the design and represents the next step in Cisco’s ongoing validation process.&lt;/p&gt; 
&lt;p&gt;Proof-of-concept experiments – using Cisco’s own entanglement source and single-photon detectors – are said to have found quantum information preserved through conversion in the switch with less than 4% degradation in quantum state fidelity and entanglement. This means maintaining the coherence that quantum networks require to function.&lt;/p&gt; 
&lt;p&gt;The tests also showed sub nano-second electro-optic switching, reconfiguring connections in as little as one nanosecond, and that the process is energy efficient, consuming less than one milliwatt of power.&lt;/p&gt; 
&lt;p&gt;As a working research prototype, Cisco sees the switch as a proof point in accelerating its full-stack quantum networking programme. It is designed to route quantum information between systems while preserving it, with a Cisco-patented conversion engine that translates between all encoding and entanglement modalities at input and output.&lt;/p&gt; 
&lt;p&gt;“Reaching this milestone is a pivotal moment for our quantum programme and a testament to the transformative potential of quantum networking,” said Vijoy Pandey, senior vice-president and general manager of Outshift, Cisco’s &lt;a href="https://outshift.cisco.com/"&gt;emerging technologies and incubation group&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;“We’ve long recognised that connecting quantum systems is the key to achieving true scalability, and now we’ve taken a critical step toward making that vision a reality. While this is a significant achievement, it’s just the beginning. The road ahead is long, yet the impact of what we are building – and what is still to come – will be nothing short of profound.”&lt;/p&gt;</body>
            <description>Research prototype designed to connect quantum systems from different suppliers, in all major encoding modalities, at room temperature, over standard telecom fibre</description>
            <image>https://cdn.ttgtmedia.com/visuals/German/article/quantum-computing-1-adobe.jpg</image>
            <link>https://www.computerweekly.com/news/366642353/Cisco-advances-path-to-quantum-network-with-universal-switch</link>
            <pubDate>Fri, 24 Apr 2026 10:45:00 GMT</pubDate>
            <title>Cisco advances path to quantum network with universal switch</title>
        </item>
        <item>
            <body>&lt;p&gt;All enterprises want flexibility in networking setups, particularly with connected devices, but without the right guardrails, automation and orchestration, they could be creating increased risk. To counter this in internet of things (IoT) deployments, Eseye has unveiled SGP.32 capabilities in its AnyNet+ embedded subscriber identity module (eSIM) and Infinity Connectivity Management platform.&lt;/p&gt; 
&lt;p&gt;Created by the GSMA, the industry body responsible for mobile communication standards,&amp;nbsp;&lt;a href="https://www.gsma.com/solutions-and-impact/technologies/esim/wp-content/uploads/2024/04/SGP.32-v1.1.0.pdf"&gt;SGP.32&amp;nbsp;is a global, next-generation eSIM standard&lt;/a&gt; for remote SIM provisioning (RSP) in IoT devices – especially those with no user interface. It is designed to enable the large-scale, hands-off management of eSIM profiles, making it easier to deploy and operate IoT without physical access. It also makes it easier to remotely manage IoT device connections, particularly constrained endpoints.&lt;/p&gt; 
&lt;p&gt;While eSIM technology has been available for consumer devices, managing these digital SIM profiles in IoT devices comes with unique challenges. For example, many IoT devices lack a user interface, making manual SIM management impractical. SGP.32 &lt;a href="https://www.computerweekly.com/news/366624911/Major-shift-predicted-for-IoT-connection-strategies"&gt;addresses such limitations&lt;/a&gt; and builds on existing eSIM technology, introducing a more efficient way to remotely manage IoT connectivity. It is intended to allow SIM profiles to be managed remotely through a centralised platform, enabling automated updates and provisioning – even for devices without user interfaces or located in hard-to-reach areas.&lt;/p&gt; 
&lt;p&gt;The SGP.32 standard introduces the eSIM Orchestrator (eSO) role, which manages profile lifecycle, network selection, compliance and unified billing.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="SGP.32 not an instant IoT connectivity fix"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;SGP.32 not an instant IoT connectivity fix&lt;/h2&gt;
 &lt;p&gt;Yet even so, &lt;a href="https://www.eseye.com/adopting-sgp-32-what-enterprises-need-to-know/"&gt;an Eseye research paper&lt;/a&gt; has warned that SGP.32 is not a “magic wand” that instantly solves all multi-country IoT connectivity challenges. Commercial contracts, back-end processes, regulatory compliance and operational management of connectivity remain essential considerations.&lt;/p&gt;
 &lt;p&gt;And while SGP.32 defines how profiles are delivered, resilience is not built into the specification alone. Uptime, network fallback behaviour, multi-network continuity and operational guardrails remain critical to success in real-world IoT environments.&lt;/p&gt;
 &lt;p&gt;The key considerations identified by Eseye for enterprises utilising SGP.32 are:&amp;nbsp;&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;SGP.32 is particularly well-suited to constrained IoT devices, such as those without SMS capability or using lightweight protocols like LwM2M or CoAP;&lt;/li&gt; 
  &lt;li&gt;Enterprises should prioritise partners with proven, end‑to‑end experience across multiple remote SIM provisioning models;&lt;/li&gt; 
  &lt;li&gt;Remote SIM provisioning is most effective when used strategically;&lt;/li&gt; 
  &lt;li&gt;A unified orchestration and intelligence layer;&lt;/li&gt; 
  &lt;li&gt;Migration between SGP.02, SGP.22 and SGP.32 be approached as a managed transition.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;By combining remote SIM provisioning with multi-IMSI, intelligent fallback, and managed connectivity orchestration within the&amp;nbsp;&lt;a href="https://www.eseye.com/iot-solutions/anynet-iot-sim-card/"&gt;AnyNet+ eSIM&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://www.eseye.com/iot-solutions/iot-connectivity-management-platform/"&gt;Infinity Connectivity Management Platform&lt;/a&gt;, Eseye said it can enable enterprises to deploy and scale IoT globally with greater resilience, control and continuity, and stop devices dropping offline in the real world.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Delivering control and choice from a single interface"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Delivering control and choice from a single interface&lt;/h2&gt;
 &lt;p&gt;Eseye’s solution is attributed with giving enterprises unified control and choice across all RSP models (SGP.02, SGP.22 and SGP.32) from a single interface for more practical, resilient global IoT connectivity management.&lt;/p&gt;
 &lt;p&gt;The Eseye Infinity platform provides a single pane of glass for orchestration, analytics and control&lt;b&gt; &lt;/b&gt;across global deployments. Furthermore, Eseye addresses eSO by combining SGP.32 with its proven multi-IMSI capability, bootstrap connectivity with managed services and network orchestration, helping enterprises avoid disruption and maintain continuity across complex, long-lived deployments.&lt;/p&gt;
 &lt;p&gt;The wider eSIM orchestration platform supports a broad ecosystem of RSP providers, including leading suppliers such as Thales, Idemia and Kigen, reflecting a supplier-agnostic approach to global IoT connectivity.&lt;/p&gt;
 &lt;p&gt;Eseye’s managed service model is also intended to provide expert guidance, migration support and connectivity orchestration to help enterprises integrate SGP.32 alongside existing solutions, such as multi-IMSI and SGP.02, throughout their IoT connectivity journey. This approach is said to ensure enterprises benefit from SGP.32, where appropriate, while maintaining resilience, regulatory compliance (including data sovereignty) and operational simplicity.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="DIY approach can be complex and risky"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;DIY approach can be complex and risky&lt;/h2&gt;
 &lt;p&gt;It is also constructed to address the growing concerns of a “DIY” approach to SGP.32, which can quickly become operationally complex and present significant risks of devices being disconnected. That is, without a unified and fully managed orchestration layer, SGP.32 shifts critical technical and commercial complexity onto the enterprise, forcing them to handle ongoing technical configuration and commercial agreement changes that can ultimately leave devices stranded in the field with no way to reconnect.&lt;/p&gt;
 &lt;p&gt;The net result, according to Eseye, is that customers benefit from global coverage across 800+ networks in 190 countries, delivering near 100% connectivity uptime resilience, robust regulatory compliance, support for high-performance IoT use cases and a proven track record of over 1,000 successful IoT project deployments.&amp;nbsp;&lt;/p&gt;
 &lt;p&gt;“SGP.32 is an important step forward for IoT, but true resilience depends on how it’s implemented. By integrating SGP.32 into our Infinity platform and AnyNet+ eSIM, Eseye delivers multi‑network continuity, fallback and orchestration guardrails, so enterprises get the resilience they need without having to become connectivity experts or effectively run their own MVNO,” remarked Eseye’s chief technology officer and co-founder, Ian Marsden.&lt;/p&gt;
 &lt;p&gt;“However, the industry should be careful not to confuse remote provisioning with operational resilience. Giving customers a red button to switch networks without the right guardrails may sound empowering, but in practice, it can increase risk, complexity and the chances of self-inflicted outages. The real opportunity is to give enterprises the best of both worlds – the flexibility of remote provisioning with the operational guardrails, automation and expertise needed to protect uptime at a global scale.”&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Read more about IoT and SGP.32&lt;/h3&gt; 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366624911/Major-shift-predicted-for-IoT-connection-strategies"&gt;Major shift predicted for IoT connection strategies&lt;/a&gt;: Arrival of SGP.32 eSIM standard, as well as regulations and evolving industry dynamics, seen as transforming the market for cellular-based IoT connectivity, including emergence of orchestrator role.&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366639358/Aeris-Verizon-Business-aim-to-simplify-global-IoT-expansion"&gt;Aeris, Verizon Business aim to simplify global IoT expansion&lt;/a&gt;: Wireless IoT provider announces inbound internet of things connectivity relationship with US operator to simplify how multinational enterprises deploy and manage IoT at scale.&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366637630/Platforms-must-adapt-to-IoT-demand-to-support-eSim-growth"&gt;Platforms must adapt to IoT demand to support eSIM growth&lt;/a&gt;: Research on embedded subscriber identity module markets reveal rapid growth and shifting consumer attitudes, with sustained growth especially in internet of things use cases.&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366640346/Telenor-IoT-expands-global-connectivity-with-launch-of-global-APN"&gt;Telenor IoT expands global connectivity with launch of global APN&lt;/a&gt;: Internet of things division of leading Nordic telco aims to simplify global IoT deployments by enabling companies to use&amp;nbsp;a single access point name across all regions.&lt;/li&gt; 
   &lt;/ul&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/section&gt;</body>
            <description>Internet of things connectivity provider combines SGP.32 remote provisioning with multi-IMSI, intelligent fallback and managed eSIM orchestration to ensure resilient global IoT connectivity</description>
            <image>https://cdn.ttgtmedia.com/visuals/German/article/industrial-IoT-2-adobe.jpg</image>
            <link>https://www.computerweekly.com/news/366642413/Eseye-boosts-global-IoT-resilience-with-SGP32-eSIM-orchestration</link>
            <pubDate>Fri, 24 Apr 2026 10:19:00 GMT</pubDate>
            <title>Eseye boosts global IoT resilience with SGP.32 eSIM orchestration</title>
        </item>
        <item>
            <body>&lt;p&gt;&lt;a href="https://www.rendernetworks.com/"&gt;Render Networks&lt;/a&gt; has announced $20m AUD in private equity growth funding alongside the acquisition of GIS software firm mPower Innovations, and extended its system of execution to electric infrastructure.&lt;/p&gt; 
&lt;p&gt;The funding round comes from existing shareholders, advised by &lt;a href="https://blackkite.partners/"&gt;Black Kite Partners&lt;/a&gt;, and Render says it marks a “decisive step” in its evolution from field-first execution leader to the end-to-end system of execution for critical infrastructure. Combined with the mPower acquisition, Render’s investments span the entire asset lifecycle through design-deployment operations and lifecycle management, for both telecom and electric utilities.&lt;/p&gt; 
&lt;p&gt;Render says the moment for infrastructure is happening now, with the buildout of critical infrastructure entering its most capital-intensive era in a generation. It noted that that artificial intelligence (AI) and hyperscaler datacentres are creating cascading, interdependent demand, from fibre broadband through to the power grid that sustains them. In addition, it said that utilities must deploy capital smarter and faster while managing greater complexity and maintaining full auditability across every asset, at a scale existing execution systems were never designed to handle.&lt;/p&gt; 
&lt;p&gt;Render cited a study from &lt;a href="https://powerlines.org/"&gt;consumer education group PowerLines&lt;/a&gt; showing that the US electric sector alone faces a $1.4tn investment cycle through 2030, driven by AI load growth, the accelerating shift to renewables, and grid resilience mandates.&lt;/p&gt; 
&lt;p&gt;Over the past 18 months, Render Networks has built and validated its system of execution across the telco sector, enabling large-scale fibre to the home, long haul and datacentre expansion.&lt;/p&gt; 
&lt;p&gt;The funding is intended to accelerate Render Networks’ AI-first product roadmap, anchored in two platforms – geospatial foundation Esri ArcGIS and AI infrastructure ClearWay on Databricks – which are said to be built for the scale of modern infrastructure.&lt;/p&gt; 
&lt;p&gt;With the former,&lt;b&gt; &lt;/b&gt;Render is transitioning its spatial engine to Esri’s ArcGIS, the geospatial platform for electric, utility and connectivity infrastructure. Design, execution and operations will now all be grounded in a single, consistent geospatial model – and mPower’s existing Esri-native architecture validates this approach and accelerates the transition.&lt;/p&gt; 
&lt;div class="extra-info"&gt;
 &lt;div class="extra-info-inner"&gt;
  &lt;h3 class="splash-heading"&gt;Read more about critical infrastructure&lt;/h3&gt; 
  &lt;ul class="default-list"&gt; 
   &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366639976/Render-Networks-unveils-synchronised-agentic-critical-infrastructure-architecture"&gt;Render Networks unveils synchronised agentic critical infrastructure&lt;/a&gt;: Critical infrastructure execution and intelligence software provider unveils agentic AI architecture designed for dynamic, scalable execution at infrastructure operators and constructors.&lt;/li&gt; 
   &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366638864/Cisco-shapes-up-for-delivery-of-critical-infrastructure-in-the-AI-era"&gt;Cisco shapes up for delivery of critical infrastructure in the AI era&lt;/a&gt;: Annual European expo reveals what IT and networking behemoth claims will be a leap forward in AI adoption, with new products encompassing switches, optics, agentic operations and SASE.&lt;/li&gt; 
   &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366640692/Zayo-provides-critical-connectivity-infrastructure-for-AI-cloud-datacentres"&gt;Zayo provides critical connectivity infrastructure for AI, cloud datacentres&lt;/a&gt;: Enterprise network provider deploys connectivity infrastructure to one of the UK’s largest AI cloud datacentre campuses to support up to 720 MW of AI-ready infrastructure.&lt;/li&gt; 
   &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366632062/3bn-opportunity-in-digital-network-upgrade-of-UK-critical-infrastructure"&gt;£3bn opportunity in digital network upgrade of UK critical infrastructure&lt;/a&gt;: Study from BT highlights multibillion-pound net benefit that could be unlocked by upgrading critical services to digital platform.&lt;/li&gt; 
  &lt;/ul&gt;
 &lt;/div&gt;
&lt;/div&gt; 
&lt;p&gt;In terms of AI infrastructure, Render Networks says it will continue to advance ClearWay, its agentic AI architecture built on Databricks as the foundation for its data and AI platform. The plan is to move beyond static analysis to a federated system of governed agents capable of validating, approving and acting on work in real time.&lt;/p&gt; 
&lt;p&gt;From a financial perspective, Render said that in private markets, as capital accelerates into hyperscaler and edge datacentre development, its unified system will now deliver the risk mitigation and execution visibility required across interdependent critical infrastructure, protecting capital deployment and compressing time to revenue.&lt;/p&gt; 
&lt;p&gt;“Render has built something rare – an execution platform that actually reflects what happens in the field,” said Adrian Kerley of &lt;a href="https://blackkite.partners/"&gt;Black Kite Partners&lt;/a&gt;. “As infrastructure spending accelerates across both broadband and electric, the market needs a solution that can deliver verified, auditable outcomes at scale.”&lt;/p&gt; 
&lt;p&gt;The acquisition of &lt;a href="https://www.mpowerinnovations.com/"&gt;mPower Innovations&lt;/a&gt; is designed to complete the Render Networks portfolio, enabling operators and build partners to deploy capital with precision and speed at a moment of massive industrial AI and datacentre demand.&lt;/p&gt; 
&lt;p&gt;CEO of mPower Jason Brown and founder Greg Calcari will continue at Render in senior leadership roles, and mPower’s software services reach across design, asset management, outage management, interactive voice response and data analytics, enabling Render Networks to address the full infrastructure asset lifecycle.&lt;/p&gt; 
&lt;p&gt;“Reliability starts with a shared operational truth,” said Brown. “By joining Render Networks, operators and builders can manage and deploy critical infrastructure with complete accuracy rooted in what is actually happening in the field – not what was planned on paper. Our customers can move forward with confidence and speed, knowing their system of execution reflects verified field reality.”&lt;/p&gt; 
&lt;p&gt;With CEO Stephen Rose now heading into his second year, and following the finance and acquisition, Render believes its management has now anchored growth with a clear mandate: ensure every asset deployed has the best possible return on capital and ensure the entire deployment lifecycle is verifiable, visible and ready to perform for decades. That platform serves as the foundation on which to build a system of execution to address the full asset lifecycle for both electric and telco sectors.&lt;/p&gt; 
&lt;p&gt;“Billions of dollars are moving into infrastructure deployment in the next five years, and the demand on infrastructure leaders leaves no margin for error,” said Rose. “Our existing shareholders are doubling down on what we’ve built and the market we’re moving into. With mPower, we extend our system of execution across both sectors, ensuring every asset is rapidly monetised, and the entire asset and deployment lifecycle is verifiable, visible and de-risked.”&lt;/p&gt;</body>
            <description>Critical infrastructure software platform provider gains fresh capital to accelerate sector and portfolio expansion</description>
            <image>https://cdn.ttgtmedia.com/visuals/German/article/IT-infrastructure-1-adobe.jpg</image>
            <link>https://www.computerweekly.com/news/366642018/Capital-injection-acquisition-further-Render-Networks-in-critical-infrastructure</link>
            <pubDate>Fri, 24 Apr 2026 04:45:00 GMT</pubDate>
            <title>Capital injection, acquisition further Render Networks in critical infrastructure</title>
        </item>
        <item>
            <body>&lt;p&gt;If there was any doubt, AI mania was on full display at &lt;a href="https://www.googlecloudevents.com/next-vegas" target="_blank" rel="noopener"&gt;Google Cloud Next&lt;/a&gt; in Las Vegas this week, but history shows us that when humans start getting manic about things, it doesn’t always work out great.&lt;/p&gt; 
&lt;p&gt;Lately, I’ve seen a few commentators bringing up the horrible story of &lt;a href="https://www.britannica.com/story/radium-girls-the-women-who-fought-for-their-lives-in-a-killer-workplace" target="_blank" rel="noopener"&gt;the radium girls&lt;/a&gt; to try to make this point. Have you ever heard of them? They were factory workers of the 1920s hired to paint watch faces with newfangled luminous paint containing deadly radium.&lt;/p&gt; 
&lt;p&gt;The camel hair paintbrushes the workers used lost their shape after a few brush strokes so they were encouraged to reshape the brushes by licking the tips. Many of the workers also used the paint as lipstick or nail polish, because why not?&lt;/p&gt; 
&lt;p&gt;This did not go well for anybody involved. &lt;a href="https://www.npr.org/2014/12/28/373510029/saved-by-a-bad-taste-one-of-the-last-radium-girls-dies-at-107" target="_blank" rel="noopener"&gt;Many radium girls experienced dental issues&lt;/a&gt;, lost teeth, and suffered oral lesions and ulcers. Others developed anaemia and necrosis of the jaw. Some experienced disruption to their menstrual cycles or were even rendered sterile.&lt;/p&gt; 
&lt;p&gt;At least 50 women died prematurely as a result.&lt;/p&gt; 
&lt;p&gt;This wasn’t the only misuse of radium. In a short-lived mania for the radioactive metal – &lt;a href="https://www.nobelprize.org/prizes/themes/marie-and-pierre-curie-and-the-discovery-of-polonium-and-radium/" target="_blank" rel="noopener"&gt;first discovered by Marie and Pierre Curie in 1898&lt;/a&gt; – humans also put it in toothpaste, hair cream, and a medicinal tonic drink called Radithor. Doctors even used it to try to treat cancer.&lt;/p&gt; 
&lt;p&gt;AI is manifestly not a radioactive element but there are clear parallels between its widespread application and the reckless use of radium a century ago. And I believe there is a warning here for us, or a lesson if we care to hear it; we need to figure AI out before we do something really dumb.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Put your hands in the air, the use cases aren’t there"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Put your hands in the air, the use cases aren’t there&lt;/h2&gt;
 &lt;p&gt;Just look at the application of AI to the ‘creation’ of art and music and other forms of self-expression. Here, take-up has become so pervasive that the well of human creativity, perhaps our most awesome trait, is rapidly being poisoned with &lt;a href="https://www.techtarget.com/searchcio/feature/AI-Slop-The-hidden-enterprise-risk-CIOs-cant-ignore" target="_blank" rel="noopener"&gt;utter slop&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;As a case in point, ahead of the opening keynote at Google Cloud Next, 32,000 humans and a handful of AIs were treated to a Google Gemini-enhanced DJ set accompanied by AI-generated visuals created by the complex ‘art’ of waving your hands about in midair.&lt;/p&gt;
 &lt;p&gt;To be fair to the performers, the results were quite impressive and the audience was bopping along.&lt;/p&gt;
 &lt;p&gt;But it’s worth a sidenote that Italian DJ Robert Miles created his breakthrough 1995 track &lt;a href="https://www.youtube.com/watch?v=DvyCbevQbtI" target="_blank" rel="noopener"&gt;&lt;i&gt;Children &lt;/i&gt;&lt;/a&gt;using nothing more than a Korg 01/W FD synthesiser, its 16’ Piano patch, and his own skill.&lt;/p&gt;
 &lt;p&gt;My point is that &lt;i&gt;Children &lt;/i&gt;remains an iconic piece of genre-defining ‘90s dance music, but nobody in the Google audience will be able to hum today’s set in 30 years’ time.&lt;/p&gt;
 &lt;p&gt;Next, in a demonstration of the power of Google’s Gemini Agent Platform – &lt;a href="https://www.computerweekly.com/news/366641999/Google-launches-Gemini-Agent-Platform-eighth-generation-TPUs" target="_blank" rel="noopener"&gt;officially unveiled at the show&lt;/a&gt; – Google Cloud’s Erica Chuong, manager for applied AI forward deployed engineering, designed a ground-up interior design campaign for a fictional furniture company that had found itself lumbered with dead stock that nobody wants.&lt;/p&gt;
 &lt;p&gt;Analysing current ‘modern organic’ interior design trends the agent designed a campaign for Chuong where relevant dead stock was repriced to undercut the competition and created a series of videos showing off its flair for interior design.&lt;/p&gt;
 &lt;p&gt;Unfortunately for the agent the result was a banal and unimaginative sofa and coffee table combo dominated by dull neutral tones and devoid of personality. It would have looked okay in a Travelodge lobby.&lt;/p&gt;
 &lt;p&gt;In a world where interior design trends are being dictated by consumers asking their AI assistants about the latest interior design trends while interior designers ask their AI agents what interior design trends consumers are into, you may be wondering how any new information about interior design trends gets into this loop. If you find out how, please let someone at Computer Weekly know.&lt;/p&gt;
 &lt;p&gt;But at this point, the AI cat is not only out of the bag, it’s on top of your living room shelves knocking over your good wine glasses. Three quarters of Google Cloud customers already leverage Google’s AI, says CEO Thomas Kurian. “You have moved beyond the pilot, the experimental phase is behind us and now the real challenge begins,” he told the audience.&lt;/p&gt;
 &lt;p&gt;Moving AI into production of course needs a unified stack and happily for Google Cloud, right on cue, here comes a Google-branded one. As Google iterates its tensor processing units (TPUs) at an ever-increasing pace, it also comes with a whole new chipset, TPU 8i to support inference and TPU 8t to run training.&lt;/p&gt;
 &lt;p&gt;Lest his existence be forgot during the love-in, Kurian’s boss, Google and Alphabet CEO Sundar Pichai, appeared on a big screen to tell everyone how glad he was that they were in Las Vegas even though he hadn't made the trip himself, and revealed just how much money – almost two hundred billion dollars – Google will spend on capex investment in innovation this year, a good portion of it to the cloud unit and much of it supporting AI.&lt;/p&gt;
 &lt;p&gt;“We are more on the front foot than ever before,” remarked Pichai. “We are moving in a bold and responsible way.”&lt;/p&gt;
 &lt;p&gt;So if that’s true, where are the bold and responsible use cases? Do they even exist? Or are they just the usual conference waffle? I went looking.&lt;/p&gt;
&lt;/section&gt;               
&lt;section class="section main-article-chapter" data-menu-title="Resident agents"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Resident agents&lt;/h2&gt;
 &lt;p&gt;&lt;i&gt;Resident Evil&lt;/i&gt; developer &lt;a href="https://www.capcom.com/" target="_blank" rel="noopener"&gt;Capcom&lt;/a&gt; says it is using Google Cloud to enhance its videogame development processes, not by taking over the creativity but by enabling creatives to be creative.&lt;/p&gt;
 &lt;p&gt;A big challenge for videogame developers is playtesting their products prior to release, and as their properties grow in scale – many now encompass vast digital worlds with unthinkable numbers of permutations – the strain on developers has ramped up, big time, leading to a phenomena known as defensive development.&lt;/p&gt;
 &lt;p&gt;Defensive development is a situation where the cost of making technical changes to an in-progress project gets so high that the human engineers feel pressurised to prioritise maintenance over innovation. In gaming this often occurs late in the production cycle, leading to problems with titles being released that seem, well, unfinished in some way.&lt;/p&gt;
 &lt;p&gt;It’s not an issue that’s unique to companies like Capcom, though. Take the manufacturing sector, where facility managers might see similar challenges when trying to simulate how a hardware update will work within their current procedures, or in retail, where logistics experts must navigate dynamic data reserves when trying to optimise supply chains without disrupting their current inventory systems.&lt;/p&gt;
 &lt;p&gt;Working with Google Cloud, Capcom has now launched an in-house agentic platform that not only relieves some of this burden but also serves as a blueprint for where AI &lt;i&gt;might&lt;/i&gt; be used better in the creative sector, and others.&amp;nbsp;&lt;/p&gt;
 &lt;p&gt;It describes its approach as a multimodal workbench, and at its core, it comprises a small group of distinct agents that optimise the playtesting process using vision and reasoning to understand the intent of a system.&lt;/p&gt;
 &lt;p&gt;The first of these, the visual inspection agent, uses Gemini Vision to look at the screen through near-human eyes, working out what is an intentional design choice and what is a technical failure.&lt;/p&gt;
 &lt;p&gt;The second, the predictive agent, pores over historical data to work out where a system might break next and directs a mini army of test bots to ‘swarm’ high-risk areas, rather than testing randomly.&lt;/p&gt;
 &lt;p&gt;The third, the institutional knowledge agent, enables new team members, human ones, to learn how their colleagues or predecessors worked similar problems before, preserving decades of expertise – three of them in the case of the &lt;i&gt;Resident Evil&lt;/i&gt; franchise.&lt;/p&gt;
 &lt;p&gt;The fourth, the data inefficiency agent, spots inefficiencies within datasets to optimise overall game performance. Developers can query it to help summarise complex technical logs and make more advanced data more widely available to their teams.&lt;/p&gt;
 &lt;p&gt;Collectively, Capcom’s agents are now running for 30,000 human hours every month and the firm’s developers say they now feel empowered to focus on higher value creative tasks, while Google Cloud, for its part, says that many of the tasks the agents are performing have applications in many other industries.&lt;/p&gt;
&lt;/section&gt;            
&lt;section class="section main-article-chapter" data-menu-title="Citi Sky lines up"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Citi Sky lines up&lt;/h2&gt;
 &lt;p&gt;Elsewhere, &lt;a href="https://www.citigroup.com/global/businesses/wealth" target="_blank" rel="noopener"&gt;Citi Wealth&lt;/a&gt;, the wealth management arm of Citibank parent Citigroup, unveiled an AI team member called Citi Sky, which it says will help reshape how its clients access market insights, act on potential opportunities, and work with their human financial advisors. Bilingual in English and Spanish, in time it will be integrated into Citi Wealth’s platforms – although in the US only for now.&lt;/p&gt;
 &lt;p&gt;Citi head of wealth, Andy Sieg, said that for decades, managing your financial life has meant navigating calls, meetings, and more recently apps. With the new agentic service, you simply ask and then act. It’s a shift from interface to intelligence and transactions to outcomes, he says, with a universal question at the centre: am I financially okay?&lt;/p&gt;
 &lt;p&gt;Citi Sky will answer this question in real time, marrying insight and execution simply and clearly – not replacing human advisors, but extending their reach and deepening their impact. In fact, Citi Wealth plans to hire advisors in the years ahead.&lt;/p&gt;
 &lt;p&gt;For Citi Wealth as a business, Sieg says the goal is to unlock massive scale and apply basically unlimited cognitive resources to its clients. “And the real need that we’ve met … is creating a relationship that can evoke the same kind of trust, we believe, that clients have with their human financial advisors,” he says.&lt;/p&gt;
 &lt;p&gt;Citi Wealth invoked Google’s full AI stack to build Sky, from Google Cloud infrastructure to Google DeepMind and, of course, Gemini models running on Gemini Enterprise Agent Platform. It worked closely with both teams to incorporate DeepMind’s real-time avatar technology and Gemini’s live application programming interface (API) to solve challenges around providing low-latency audio and video conversations.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="A plea for rational thinking"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;A plea for rational thinking&lt;/h2&gt;
 &lt;p&gt;I must acknowledge that Google Cloud’s customer stories are carefully curated by its communications teams – not every customer wants to talk, some will be forbidden from doing so, even more are still shivering on the edge of the pool with their inflatable armbands on, too scared to jump in.&lt;/p&gt;
 &lt;p&gt;And to be blunt, some customers will be at the deep end doing really stupid things with AI that will blow up in their faces.&lt;/p&gt;
 &lt;p&gt;But in the examples of Capcom and Citi Wealth – and others that would have pushed the word count unreasonably high – I think there is some hope.&lt;/p&gt;
 &lt;p&gt;With forethought – not even very much of it – and a rational head, we can turn AI loose on both the small challenges we face in our daily lives, and the grand challenges we face collectively.&lt;/p&gt;
 &lt;p&gt;But to do this we need to resist the advances of the snake oil salesmen, the charmers and grifters, and &lt;i&gt;especially&lt;/i&gt; the tech bros who want to disrupt something that doesn’t need disrupting, like the habit of art, for the sake of making themselves richer.&lt;/p&gt;
 &lt;p&gt;And I fear we may be running out of time to do so.&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Read more about AI&lt;/h3&gt; 
   &lt;ul type="disc" class="default-list"&gt; 
    &lt;li&gt;Yet more billions are being spent on agentic AI, despite warnings of its potentially extreme fallibility. Just who are governments serving when they &lt;a target="_blank" href="https://www.computerweekly.com/opinion/Is-AI-our-agent-or-are-our-governments-becoming-agents-for-AI" rel="noopener"&gt;spout the messaging of Big Tech companies? &lt;/a&gt;&lt;/li&gt; 
    &lt;li&gt;The UK government’s £500m Sovereign AI fund announces first cohort of startups backed to boost economic growth &lt;a target="_blank" href="https://www.computerweekly.com/news/366641874/UKs-Sovereign-AI-supports-supercomputing-and-drug-discovery-AI-startups" rel="noopener"&gt;and national security&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;With research showing the use of AI may temporarily reduce productivity, Cloudera’s Vini Cardoso urges businesses to adopt an organisation-wide platform approach &lt;a target="_blank" href="https://www.computerweekly.com/news/366639906/What-it-takes-to-succeed-with-AI" rel="noopener"&gt;driven by measurable value and trusted data&lt;/a&gt;.&lt;/li&gt; 
   &lt;/ul&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/section&gt;</body>
            <description>Attendees at Google Cloud Next in Las Vegas are backing AI all the way to the bank. But as AI turns up in everything, everywhere, all at once, we’re going to need to get a lot stricter about what we use it for.</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/Hero%20Images/technology-digital-ai-robot-adobe.jpeg</image>
            <link>https://www.computerweekly.com/opinion/Google-Cloud-Next-Its-time-to-create-value-not-slop-from-the-AI-boom</link>
            <pubDate>Thu, 23 Apr 2026 12:51:00 GMT</pubDate>
            <title>Google Cloud Next: It’s time to create value, not slop, from the AI boom</title>
        </item>
        <item>
            <body>&lt;p&gt;For decades, engineering teams treated code like a vintage Ferrari – expensive to build, painstakingly maintained and too precious to ever throw away. Every line represented a significant investment of human capital and time, and has led to a culture where code was cherished and its longevity was a marker of success.&lt;/p&gt; 
&lt;p&gt;But at the AWS Summit in London this week, Ryan Cormack, principal engineer at online used car marketplace Motorway, consigned that philosophy to the scrapyard. In the age of &lt;a href="https://www.computerweekly.com/resources/Software-development-tools"&gt;agentic artificial intelligence (AI-)driven software development&lt;/a&gt;, he says, engineering teams can become more productive and are able to build, revise and maintain code at speeds previously unthinkable.&lt;/p&gt; 
&lt;p&gt;In this article, we look at Motorway’s radical shift from manual coding to an AI-first development pipeline powered by AWS Kiro. Cormack talks about how the company achieved a 4x increase in engineering output, &lt;a href="https://www.computerweekly.com/news/366640859/Advancing-to-the-next-frontier-of-AI"&gt;the challenges that come&lt;/a&gt; with the ability to produce more code, why the future of software development lies in treating code as disposable, and the core benefits of codifying organisational culture into AI steering files.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="The mindset shift: Disposability vs polish"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;The mindset shift: Disposability vs polish&lt;/h2&gt;
 &lt;p&gt;The most profound change at Motorway is speed of delivery but also a psychological break from the past. Historically, writing code was a “time-expensive process”, Cormack says, adding: “We wanted to have code that was so good that we could cherish it for years to come, because we had invested so much time into making it.”&lt;/p&gt;
 &lt;p&gt;But since starting to use Kiro – &lt;a href="https://www.computerweekly.com/blog/CW-Developer-Network/AWS-launches-Kiro-IDE-for-real-agentic-development-at-scale"&gt;AWS’s agentic AI-capable IDE&lt;/a&gt; – that mindset became a bottleneck. “We shifted away from, ‘We need the most well-polished code for every line we write, all the time’, because we can rewrite it again tomorrow at a speed that’s never been possible before,” says Cormack.&lt;/p&gt;
 &lt;p&gt;This has led to a strategy of “evaluation over production”. Motorway now generates vast amounts of code – a million lines a month – much of which may never reach a customer, says Cormack. Instead, it is used to test and evaluate multiple different ways to solve a problem before committing to it.&amp;nbsp;&lt;/p&gt;
 &lt;p&gt;The lesson for other organisations is clear. Don’t aim for a perfect first pass. Use AI to cycle through iterations, then use human expertise to refine exactly what you want from the options the AI helps provide.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Managing the ‘volume crisis’: Rigour over speed"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Managing the ‘volume crisis’: Rigour over speed&lt;/h2&gt;
 &lt;p&gt;While &lt;a href="https://www.computerweekly.com/blog/CW-Developer-Network/When-AI-workflows-generate-vulnerabilities-too-fast-for-developers"&gt;a 4x increase in output&lt;/a&gt; sounds like an engineering dream, it creates a real “review bottleneck”. If you write 400% more code but maintain 100% manual review processes, the system collapses. To combat this, Motorway hollowed out the “manual middle” of the development process and moved human energy to the ends of the process – namely, the spec and the review.&lt;/p&gt;
 &lt;p&gt;“We find ourselves spending more time planning code and the whole process up front, and a little bit more time reviewing what comes out,” Cormack says. “But we lose all this time in the middle where we previously had to manually write all the code.”&lt;/p&gt;
 &lt;p&gt;To ensure AI doesn’t just produce any code but “Motorway code”, the team utilises “steering files”. These files augment the AI’s system prompts with the company’s specific DNA. They are specific to Kiro and are markdown documents that contain instructions, standards and preferences to guide the AI behaviour and coding style.&amp;nbsp;&lt;/p&gt;
 &lt;p&gt;They include, for example, naming conventions that standardise how application programming interfaces (APIs) are labelled across Motorway’s 7,500-dealer network, and design patterns that enforce specific software architectures.&lt;/p&gt;
 &lt;p&gt;By injecting these rules via the AI, generated code looks and feels like it was written by a veteran Motorway engineer.&amp;nbsp;&lt;/p&gt;
 &lt;p&gt;And AI isn’t just used for the build; it’s used for the full lifecycle. “We need to use AI to help us debug, analyse, understand, and evaluate systems as they run,” Cormack adds, noting that agents now monitor logs and metrics to help humans manage a massive fleet of services.&lt;/p&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="The ‘Kiro’ engine and model agnosticism"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;The ‘Kiro’ engine and model agnosticism&lt;/h2&gt;
 &lt;p&gt;A critical component of Motorway’s success is that Kiro acts as an agentic loop rather than just a simple “autocomplete” tool.&amp;nbsp;&lt;/p&gt;
 &lt;p&gt;“Kiro knows how our CI pipelines work,” says Cormack. “It knows how our infrastructure is code-driven and it knows how our internal applications work together. It’s able to help guide us every step of the way.&lt;/p&gt;
 &lt;p&gt;“We’re using Kiro across our full software development lifecycle. Our product and UX teams can ship real prototypes into our customers’ hands quicker than we’ve ever been able to before. What would take weeks now takes hours.”&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Motorway’s top tips for AI integration&lt;/h3&gt; 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;Don’t automate in isolation: If your code volume increases 4x, your testing and monitoring must scale at the same rate, or you are simply building a larger pile of bugs.&lt;/li&gt; 
    &lt;li&gt;Codify your culture: Use steering files to ensure AI follows your specific organisational standards.&lt;/li&gt; 
    &lt;li&gt;Align the roadmap: AI speed means UX and product teams must be in lock-step. “What would take weeks now takes hours,” Cormack says, citing how UX teams now ship car-profiling prototypes directly into customers’ hands almost instantly.&lt;/li&gt; 
   &lt;/ul&gt;
  &lt;/div&gt;
 &lt;/div&gt;
 &lt;p&gt;His team can leverage its model agnosticism too. Cormack explained they aren’t locked into a single LLM: “We use Kiro with Claude’s latest Opus 4.7 model, we use it with some of the open weight models, things like Meta’s Llama models ... we’re able to selectively pick the LLM that we know is going to be able to best perform the specific task.”&lt;/p&gt;
 &lt;p&gt;This flexibility helps to mitigate the risk of hallucinations. Motorway relies on a spec-driven approach where the AI must think through the problem and generate a technical design before writing a single line.&lt;/p&gt;
 &lt;p&gt;“It will help us write automated tests that are able to prove that each of these points has been accurately done,” Cormack says. This means the AI provides its own proof of work before a human ever touches it.&lt;/p&gt;
&lt;/section&gt;        
&lt;section class="section main-article-chapter" data-menu-title="Legacy transition from Heroku to AWS"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Legacy transition from Heroku to AWS&lt;/h2&gt;
 &lt;p&gt;Motorway wasn’t always this agile. The company was “born in the cloud”, on Heroku, which Cormack acknowledges was “great for scaling and getting going”. But as the company grew, it hit friction points.&lt;/p&gt;
 &lt;p&gt;The transition to AWS was driven by a need for “flexibility, adaptability, and scalability”, says Cormack, who views their Kiro-enabled AI-first pipeline as the ultimate tool for such transitions.&amp;nbsp;&lt;/p&gt;
 &lt;p&gt;If he were to do things all over again, Cormack says he would “adopt this model of thinking much earlier on”. The ability to use AI to map migration logic and service dependencies would have saved months of manual effort during the move off their legacy platform, he believes.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Lessons for the boardroom"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Lessons for the boardroom&lt;/h2&gt;
 &lt;p&gt;For organisations that want to replicate Motorway’s 250% increase in deployment frequency, Cormack warns against automating the grind of coding without also automating the rigour of testing.&lt;/p&gt;
 &lt;p&gt;“If you try to build just by writing code faster, it doesn’t solve the problems,” he says. “I don’t think our customers necessarily want code; they want features and functionality.”&lt;/p&gt;
 &lt;p&gt;The winners of the AI era won’t be the ones who write the most code, but the ones who build the most rigorous frameworks to manage its disposability.&amp;nbsp;&lt;/p&gt;
 &lt;p&gt;As Cormack says: “Kiro’s now writing over a million lines of code for us every single month. So, before we start any new piece of work, our engineering team chooses Kiro to help understand exactly what it is that we want to build.&lt;/p&gt;
 &lt;p&gt;“The rigour at the start of this process helps enable the precision we want in our engineering at the end. So, every piece of work that we do starts with a spec, understanding the intent of what it is that we’re building and why.”&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Read more about AI and software development&lt;/h3&gt; 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366638839/Half-of-Googles-software-development-now-AI-generated"&gt;Half of Google’s software development now AI-generated&lt;/a&gt;: In a bid to free up budget to spend on artificial intelligence infrastructure, Google parent Alphabet is using AI to improve operational efficiency.&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366639364/How-AI-code-generation-is-pushing-DevSecOps-to-machine-speed"&gt;How AI code generation is pushing DevSecOps to machine speed&lt;/a&gt;: Organisations should adopt shared platforms and automated governance to keep pace with the growing use of generative AI tools that are helping developers produce code at unprecedented volumes.&lt;/li&gt; 
   &lt;/ul&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/section&gt;</body>
            <description>We talk to Ryan Cormack of used car marketplace Motorway about how AI-driven development increases the speed and productivity of engineering and the challenges it brings</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/Hero%20Images/Fotolia-cars.jpg</image>
            <link>https://www.computerweekly.com/feature/AI-drives-software-productivity-and-challenges-for-Motorway</link>
            <pubDate>Thu, 23 Apr 2026 11:56:00 GMT</pubDate>
            <title>AI drives software productivity – and challenges – for Motorway</title>
        </item>
        <item>
            <body>&lt;p&gt;The 5G mobile market is moving beyond its initial land-grab phase and into a period shaped more by network quality, architectural maturity and service differentiation, according to a study from the Global mobile Suppliers Association (GSA).&lt;/p&gt; 
&lt;p&gt;The &lt;em&gt;&lt;a href="https://url.us.m.mimecastprotect.com/s/ZZ-JCG6Y9jfq0zL5li7hjTB4iu3?domain=gsacom.com/"&gt;State of the market&lt;/a&gt;&lt;/em&gt;&amp;nbsp;report – from the industry association representing companies in the global mobile ecosystem engaged in the supply of infrastructure, semiconductors, test equipment, devices, applications and support services – was based on market data taken up until the end of March 2026.&lt;/p&gt; 
&lt;p&gt;Among the key findings of the research was the underlying dynamic that global 5G expansion is still advancing, but the story is no longer just about adding more launches to the map, and the more meaningful story is how it is broadening.&lt;/p&gt; 
&lt;p&gt;It reported that 392 operators have now launched 5G networks, up 14% from March 2025, reflecting 44% of total LTE and 5G networks. Spectrum was found to remain as the essential enabler of the next phase of 5G growth, and beyond that, 6G.&lt;/p&gt; 
&lt;p&gt;Indeed, the study showed that over the past year, 11 5G auctions have been completed across the world, for an average price of $663.4m. And as of the end of March 2026, there were 4,256 announced 5G devices in the market, up 24% from last year. In comparison, total LTE devices totalled 29,024.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://www.computerweekly.com/news/366639259/Global-5G-standalone-dynamic-shifts-from-coverage-to-capability"&gt;5G Standalone&lt;/a&gt; was becoming the clearest marker of market maturity. Some 95 operators had launched a 5G Standalone service, highlighting a growth of 42% since the first quarter of 2025. Development of &lt;a href="https://www.computerweekly.com/news/366623050/T-Mobile-rolls-out-5G-Advanced-across-US"&gt;5G Advanced&lt;/a&gt; networks was seen to still be at an early stage, but the GSA stressed that its growth rate makes it one of the clearest signals of where the market is heading next. In total, 35 operators are investing in 5G Advanced, an increase of 71% since 2025. Of these operators and providers, 11 have launched a service.&lt;/p&gt; 
&lt;p&gt;Looking at one of the key use cases of 5G networks, one the industry has long held to offer future prosperity, the study found that private mobile networks continue to demonstrate that 5G’s opportunity extends well beyond public consumer services. The manufacturing vertical is a strong adopter of mobile private networks, with 374 identified customer deployments, followed by the education and academic research sector, with 169 customers deploying it.&lt;/p&gt; 
&lt;div class="extra-info"&gt;
 &lt;div class="extra-info-inner"&gt;
  &lt;h3 class="splash-heading"&gt;Read more about 5G&lt;/h3&gt; 
  &lt;ul class="default-list"&gt; 
   &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366640730/Proptivity-Telehouse-team-for-reliable-indoor-4G-5G-in-London-workplaces"&gt;Proptivity, Telehouse team for reliable indoor 4G, 5G in London workplaces&lt;/a&gt;: Datacentre service provider and indoor mobile infrastructure firm look to address connectivity blind spot inside modern office buildings, enabling scalable indoor 4G, 5G across London workplaces via neutral host provider.&lt;/li&gt; 
   &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366641384/Turkey-launches-nationwide-5G-services-with-ambitious-domestic-production-targets"&gt;Turkey launches nationwide 5G services with ambitious domestic production targets&lt;/a&gt;: Country’s three mobile operators go live across all 81 provinces following $2.95bn spectrum auction, with government mandating 60% local content requirements.&lt;/li&gt; 
   &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366641461/XCOM-RAN-intros-end-to-end-private-5G-for-physical-AI"&gt;XCOM RAN intros end-to-end private 5G for physical AI&lt;/a&gt;: Next-generation private 5G technology provider unveils plans to expands spectrum and partners for global reach of dedicated wireless networks.&lt;/li&gt; 
   &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366639116/Italian-Navy-sets-sail-with-Ericsson-5G"&gt;Italian Navy sets sail with Ericsson 5G&lt;/a&gt;: Project sees long-range 5G Standalone data communication at sea successfully demonstrated, with on-board connectivity and naval vessel systems tested in real day and night operations.&lt;/li&gt; 
  &lt;/ul&gt;
 &lt;/div&gt;
&lt;/div&gt; 
&lt;p&gt;Yet despite the prospects from private 5G, the GSA’s report identified &lt;a href="https://www.computerweekly.com/news/366632142/5G-enabled-FWA-CPE-shipments-form-majority-in-4-out-of-7-global-regions"&gt;Fixed Wireless Access&lt;/a&gt; (FWA) as one of 5G’s strongest and most visible commercial success stories. The study found 394 operators who have launched a 5G fixed wireless service, with another 29 investing in the technology, an increase of 59% since June 2025.&lt;/p&gt; 
&lt;p&gt;The report also tracked the rapid growth of satellite-enabled mobile connectivity, which it said is moving from experiment to early commercial reality. Some 97 operators are investing in satellite-to-cell phone connectivity, and eight available chipsets are compatible with the technology.&lt;/p&gt; 
&lt;p&gt;Commenting on the study’s findings, Joe Barrett, president of the GSA, said: “The global 5G market is entering a more selective and strategic phase of development … This shift is most clearly visible in 5G Standalone, which now underpins much of the industry’s next wave of innovation, including 5G RedCap, network slicing and more advanced enterprise offers … These trends all point to a market that is no longer defined simply by how many 5G networks exist, but by what those networks are becoming.&lt;/p&gt; 
&lt;p&gt;“5G in 2026 will be shaped by standalone adoption, ecosystem readiness and the ability of operators to translate technical capability into commercial value.”&lt;/p&gt;</body>
            <description>Research finds 5G market no longer defined simply by how many 5G networks exist, but by what those networks are becoming, shaped by ability of operators to translate technical capability into commercial value</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/HeroImages/T-Mobile-5G-Advanced-mast-PR-hero.jpg</image>
            <link>https://www.computerweekly.com/news/366641991/5G-market-enters-selective-and-strategic-phase-of-development</link>
            <pubDate>Thu, 23 Apr 2026 11:15:00 GMT</pubDate>
            <title>5G market enters selective and strategic phase of development</title>
        </item>
        <item>
            <body>&lt;p&gt;Medical data belonging to half a million British citizens has been offered for sale on a Chinese website following a security breach at health information database UK Biobank.&lt;/p&gt; 
&lt;p&gt;Technology minister Ian Murray said that data obtained from UK Biobank had been advertised for sale by several sellers on Alibaba e-commerce platforms in China, in what he called an “unacceptable abuse”.&lt;/p&gt; 
&lt;p&gt;UK Biobank, a non-profit charity, collects medical data provided by volunteers and shares it with researchers around the world to further medical research in cancer, heart disease and ways of predicting dementia.&lt;/p&gt; 
&lt;p&gt;The charity informed the UK government on Monday that it had identified anonymised data from its volunteers for sale by three sellers on Alibaba, including at least one listing that appeared to offer anonymised data from its 500,000 volunteers.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Unacceptable abuse of data"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Unacceptable abuse of data&lt;/h2&gt;
 &lt;p&gt;“This has been an unacceptable abuse of the UK Biobank charity’s data and an abuse of the trust that participants rightly expect when sharing their data for research purposes,” Murray said in a &lt;a href="https://www.gov.uk/government/speeches/minister-of-state-statement-to-the-house-of-commons-23-april-2026"&gt;statement to Parliament&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;UK Biobank has assured its volunteers that the data contained no participants’ names, addresses, contact details, or telephone numbers. The charity does not believe that any of the data was sold.&lt;/p&gt;
 &lt;p&gt;UK Biobank said it had now revoked access to research institutions identified as the source of the breach of its UK data cloud.&lt;/p&gt;
 &lt;p&gt;Murray said the UK government had worked quickly with Biobank, the Chinese government and Alibaba to take down the listings offering the data.&lt;/p&gt;
 &lt;p&gt;“We have asked the Biobank charity to pause further access to its data until they have put in place a technical solution to prevent data from its current platform from being downloaded in this way again,” he said.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Biobank will improve security"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Biobank will improve security&lt;/h2&gt;
 &lt;p&gt;Rory Collins, chief executive of Biobank, told volunteers in a &lt;a href="https://www.ukbiobank.ac.uk/news/a-message-to-our-participants-uk-biobank-data-security-update/"&gt;statement&lt;/a&gt; that personally identifiable information (PII) was safe and that it would put additional security measures in place to prevent the incident from happening again.&lt;/p&gt;
 &lt;p&gt;He said that researchers go through a rigorous access review process and institutions sign a contract committing to keeping data secure before they are given access to Biobank.&lt;/p&gt;
 &lt;p&gt;“This is a clear breach of the contract signed by these academic institutions, and they, along with the individuals involved, have had their access suspended,” he added.&lt;/p&gt;
 &lt;p&gt;Biobank has temporarily suspended all access to its UK cloud-based research platform, and plans to introduce a limit on the size of files that can be taken off the platform. It will also monitor files exported from the platform for suspicious behaviour.&lt;/p&gt;
 &lt;p&gt;The charity said it was developing an automated checking system to prevent de-identified data from being taken off its research platform, while still allowing scientists to conduct research. The system will be in place by the end of the year.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="UK government to issue guidance"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;UK government to issue guidance&lt;/h2&gt;
 &lt;p&gt;Murray said the government would soon be issuing guidance on controlling data from research studies, and urged businesses and charities to ensure their systems and data-sharing processes are as secure as possible.&lt;/p&gt;
 &lt;p&gt;The charity has reported the incident to the Information Commissioner’s Office (ICO).&lt;/p&gt;
 &lt;p&gt;An ICO spokesperson said: “People’s medical data is highly sensitive information. Not only do people expect it to be handled carefully and securely, organisations also have a responsibility under the law. UK Biobank has made us aware of an incident, and we are making enquiries.”&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;What companies should do&lt;/h3&gt; 
   &lt;p&gt;All organisations should map and “baseline” their edge device traffic, especially VPN and remote access connections. They should adopt dynamic threat feed filtering that includes known covert network indicators.&lt;/p&gt; 
   &lt;p&gt;Potential victims of Chinese infiltration should implement two-factor authentication for remote access and, where possible, apply zero-trust controls, IP allow lists and machine certificate verification.&lt;/p&gt; 
   &lt;p&gt;Larger or high-risk entities should consider active hunting of suspicious traffic from home office devices or traffic from the internet of things, geographic profiling, and machine learning-based anomaly detection.&lt;/p&gt; 
   &lt;p style="text-align: right;"&gt;&lt;em&gt;Source NCSC&lt;/em&gt;&lt;/p&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/section&gt;</body>
            <description>Biobank operator is taking steps to improve security after biological, health and lifestyle information from its database was offered for sale on a Chinese website</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/Hero%20Images/healthcare-medical-statistics-stethoscope-adobe.jpeg</image>
            <link>https://www.computerweekly.com/news/366642041/Medical-data-about-half-a-million-Britains-on-sale-in-China-after-Biobank-breach</link>
            <pubDate>Thu, 23 Apr 2026 10:59:00 GMT</pubDate>
            <title>Medical data of half a million Britons on sale in China after Biobank breach</title>
        </item>
        <item>
            <body>&lt;p&gt;With reliable mobile connectivity still a major issue inside modern office buildings – particularly as energy-efficient materials block signal and user expectations remain high – connectivity infrastructure-as-a-service (IaaS) provider Freshwave has launched 5G on Omni to offer businesses “assured” indoor 5G connectivity from all the mobile network operators (MNOs).&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://freshwavegroup.com/"&gt;Freshwave&lt;/a&gt; said that its mission is to invest expertise and capital to assure connectivity, bringing mobile operators, central and local government, and real estate providers to work together in new ways. It added that it has connected some of the biggest, most challenging wireless environments in the UK, including several central London boroughs and more than 2,000 buildings.&lt;/p&gt; 
&lt;p&gt;At launch in June 2024, the company’s Omni Network was described as a world&amp;nbsp;first, offering 4G mobile connectivity indoors from all the UK mobile network operators via a combined &lt;a href="https://www.computerweekly.com/news/366639791/O2-makes-major-5G-expansion-deploys-small-cells-to-boost-Bath-capacity"&gt;small cell unit&lt;/a&gt;. It boasts more than six million square feet of real estate live or in-build.&lt;/p&gt; 
&lt;p&gt;Omni Network was previously only available on &lt;a href="https://www.andrew.com/onecell/"&gt;Andrew Onecell&lt;/a&gt;, but the solution is now multi-supplier, being available using &lt;a href="https://www.ericsson.com/en/portfolio/networks/ericsson-radio-system/radio/small-cells/indoor/radio-dots"&gt;Ericsson Radio Dot&lt;/a&gt; technology which is seeing use in the new 5G on Omni offer.&lt;/p&gt; 
&lt;p&gt;In another claimed first and the next stage in the evolution of the Omni Network, &lt;a href="https://freshwavegroup.com/omni-network/"&gt;5G on Omni&lt;/a&gt; is designed to deliver 4G/5G connectivity indoors from all the UK MNOs – EE, O2, and VodafoneThree – via the Ericsson’s Radio Dot System, extending the 5G carrier-grade mobile coverage to more spaces than ever before.&lt;b&gt; &lt;/b&gt;&lt;/p&gt; 
&lt;p&gt;Aiming to address the aforementioned issue whereby building materials can potentially block mobile signals from reaching indoors, Freshwave said its dedicated multi-operator in-building mobile system can ensures everyone inside has the mobile connectivity they need, no matter which network they’re on.&lt;/p&gt; 
&lt;p&gt;Connecting securely to the MNOs’ networks, 5G on Omni is configured and controlled by Freshwave’s engineers via the company’s datacentre as a fully managed service. For organisations whose connectivity needs are met by 4G today, 5G on Omni provides a simple software upgrade path to 5G when required.&lt;/p&gt; 
&lt;p&gt;In addition, the company said that 5G on Omni uses up to 50% less energy than a &lt;a href="https://www.computerweekly.com/news/366639043/Silverstone-takes-mobile-connectivity-to-full-throttle"&gt;traditional distributed antenna system (DAS),&lt;/a&gt; is faster and more cost effective to deploy with less cabling, and needs less space in the comms room.&lt;/p&gt; 
&lt;p&gt;Remarking upon the launch and its objectives, Simon Frumkin, Freshwave’s CEO, said: “After a world-first with Omni Network, I’m delighted we’re now able to offer our customers another first with 5G on Omni. It’s the next stage of assured indoor mobile connectivity, bringing all the operators indoors on 5G via small cells.&lt;/p&gt; 
&lt;p&gt;“Indoor connectivity is an essential productivity driver, as evidenced by our &lt;em&gt;Mobile connectivity ROI index&lt;/em&gt; which found that the UK could gain £70bn of added value by eliminating mobile signal not-spots indoors. 5G on Omni represents an important step forward for indoor connectivity in the UK. We’re grateful to all the UK mobile operators and to our technology partner Ericsson for their collaboration in making this possible.”&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Luca Orsini, head of Ericsson North Europe, added: “We’re thrilled to have collaborated with neutral host provider Freshwave to deliver 5G from all UK mobile operators on the Ericsson Radio Dot for the very first time. It highlights how shared indoor infrastructure can accelerate high-quality 5G coverage and capacity at a lower total cost of ownership than legacy solutions, ensuring organisations and users benefit from seamless connectivity regardless of their mobile provider.”&lt;/p&gt; 
&lt;p&gt;The service is also available via a pay-as-you-occupy model, which allows landlords to pay to cover shared areas in a building, while giving tenants the ability to contract directly with Freshwave to join the in-building system as and when they move in.&lt;/p&gt; 
&lt;p&gt;Freshwave claims 5G on Omni is already seeing strong demand and that it is in the process of deploying it at several other customer sites this year across sectors including financial services, luxury goods brands and a global fast moving consumer goods company. One of the early adopters of the service has been flexible office provider &lt;a href="https://www.workspace.co.uk/workspaces/the-record-hall"&gt;Workspace’s Record Hall site&lt;/a&gt; in central London, bringing 4G/5G mobile signal from all the MNOs to the offices and workshops there.&lt;/p&gt; 
&lt;p&gt;“Good connectivity should be something our SME customers don’t have to think about,” said Chris Boultwood, head of technology at Workspace. “With 5G on Omni from Freshwave now live at Record Hall, our customers can rely on seamless mobile coverage throughout the building, whichever network they use.”&lt;/p&gt; 
&lt;div class="extra-info"&gt;
 &lt;div class="extra-info-inner"&gt;
  &lt;h3 class="splash-heading"&gt;Read more about indoor connectivity&lt;/h3&gt; 
  &lt;ul class="default-list"&gt; 
   &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366640730/Proptivity-Telehouse-team-for-reliable-indoor-4G-5G-in-London-workplaces"&gt;Proptivity, Telehouse team for reliable indoor 4G, 5G in London workplaces&lt;/a&gt;: Datacentre service provider and indoor mobile infrastructure firm look to address connectivity blind spot inside modern office buildings, enabling scalable indoor 4G, 5G across London workplaces via neutral host provider.&lt;/li&gt; 
   &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366641102/Wilson-Connectivity-Autonomous-Systems-team-for-in-building-wireless-service"&gt;Wilson Connectivity, Autonomous Systems team for in-building wireless service&lt;/a&gt;: Joint development brings AI-ready, automated monitoring and real-time service assurance to indoor distributed antenna system and private network deployments.&lt;/li&gt; 
   &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366634171/10-World-Trade-office-tower-boosts-connectivity-with-indoor-5G-solution"&gt;World Trade office tower boosts connectivity with indoor 5G service&lt;/a&gt;: Investors, real estate firm and tech provider deliver small-cell based neutral host network at premier commercial building to provide high-capacity, multi-operator indoor coverage with scalable, sustainable performance.&lt;/li&gt; 
   &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366632113/Boldyn-Networks-enhances-5G-fan-experience-at-AO-Arena"&gt;Boldyn&amp;nbsp;Networks enhances 5G fan experience at AO Arena&lt;/a&gt;: UK neutral host network provider engaged to deliver advanced 5G connectivity at sports arena in Manchester, one of the UK’s busiest entertainment venues and one of the largest indoor sporting homes in Europe.&lt;/li&gt; 
  &lt;/ul&gt;
 &lt;/div&gt;
&lt;/div&gt;</body>
            <description>In a claimed UK market first, a service powered by Ericsson’s Radio Dot System will offer all-operator 4G/5G signal indoors, with central London location already live</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/Hero%20Images/5G-mobile-network-speed-adobe.jpeg</image>
            <link>https://www.computerweekly.com/news/366642095/Freshwave-claims-next-evolution-of-5G-indoor-mobile</link>
            <pubDate>Thu, 23 Apr 2026 10:45:00 GMT</pubDate>
            <title>Freshwave claims next evolution of 5G indoor mobile</title>
        </item>
        <item>
            <body>&lt;p&gt;For airlines to run critical operations on networks that are set up and run for them, removing the complexity and cost of managing connectivity themselves, air industry tech firm SITA has launched a new network solution designed to support the demands of complex airport and transport environments.&lt;/p&gt; 
&lt;p&gt;With around 2,500 customers, &lt;a href="https://www.sita.aero/"&gt;SITA&lt;/a&gt; technology supports more than 1,000 airports and more than 19,600 aircraft worldwide. The company said that it also helps more than 70 governments “strike the balance between secure borders and seamless journeys” and connects 45-50% of the industry’s data exchange to enable complex global networks to operate smoothly and reliably.&lt;/p&gt; 
&lt;p&gt;As part of the latter aim, the SITA Campus Network, powered by &lt;a href="https://www.hpe.com/uk/en/solutions/networking.html"&gt;HPE Aruba Networking&lt;/a&gt;, aims to offer a &lt;a href="https://www.sita.aero/solutions/sita-communications-and-data-exchange/sita-lan-management/sita-campus-network/"&gt;managed network service&lt;/a&gt; covering more than 150 countries wherein SITA takes care of the design, procurement, shipping, installation, configuration and support for all devices involved. Boasting a low total cost of ownership (TCO), SITA is proposing “one of the most competitive” fully managed local area network/wireless local area network (LAN/WLAN) available in the industry.&lt;/p&gt; 
&lt;p&gt;Explaining the rationale for the launch, SITA noted that managing networks across multiple locations, devices and suppliers is complex and costly. Furthermore, it said that when networks are fragmented, performance suffers and disruptions can spread quickly.&lt;/p&gt; 
&lt;p&gt;SITA Campus Network is attributed with being able to remove this burden by delivering a fully managed network across wired and wireless environments. The campus network is claimed to combine “robust” connectivity with centralised, cloud-based management to ensure consistent, reliable performance across &lt;a href="https://www.computerweekly.com/news/366538215/NTT-NARS-claim-mission-critical-comms-breakthrough-at-Narita-International-Airport"&gt;airport campuses and other large transport hubs.&lt;/a&gt;&lt;/p&gt; 
&lt;p&gt;Designed for high-density environments such as terminals, hangars and airline operations centres, the solution is said to support large volumes of users and devices without compromising performance, even during peak demand. By integrating HPE technology into its managed service, SITA’s customers get a network that is centrally operated by SITA while retaining the flexibility to use different technologies and vendors.&lt;/p&gt; 
&lt;p&gt;Available in more than 145 countries, with 24/7 operational support, SITA assured that by reducing the need for costly hardware and simplifying operations the network lowers both upfront investment and ongoing costs. Its pay-as-you-go model allows customers to scale usage up or down based on demand, with rapid deployment across locations.&lt;/p&gt; 
&lt;p&gt;This is said to reduce the need for on-site support, spare equipment and recurring training, freeing up IT teams to focus on higher-value activities. Where needed, the campus network connects to &lt;a href="https://www.computerweekly.com/news/366632694/SITA-unveils-next-gen-fibre-optic-comms-for-data-intensive-airports"&gt;SITA’s global wide-area network services&lt;/a&gt;. This connectivity links more than 600 airports worldwide.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://www.computerweekly.com/news/366641094/Marvell-scales-up-networking-to-extend-Nvidia-AI-ecosystem"&gt;As is the norm with other leading networking solutions&lt;/a&gt;, the&amp;nbsp;SITA Campus Network uses AI to improve visibility across the network, detect issues earlier and automate troubleshooting, helping reduce downtime. It also provides centralised management, allowing infrastructure and devices to be monitored and controlled across both on-site systems and remote environments.&lt;/p&gt; 
&lt;p&gt;Martin Smillie SITA senior vice-president of communications and data exchange, said integrating diverse systems and devices across airport environments is becoming more complex as operations become more connected: “At the same time, expectations on performance, resilience and security continue to rise. With SITA Campus Network powered by Aruba, we take on that complexity. We deliver a network that is set up, run and continuously optimised, so our customers can focus on keeping operations moving while maintaining control across increasingly demanding environments.”&lt;/p&gt; 
&lt;p&gt;Sujai Hajela, executive vice-president and general manager for enterprise campus and branch at HPE, added: “Airports and airlines have to support thousands of staff, passengers and mission critical systems across terminals, gates and airside areas – and any network issue shows up immediately as delays and frustration.&lt;/p&gt; 
&lt;p&gt;“SITA Campus Network powered by HPE Aruba Networking is built on our secure, AI-native technology to deliver a self-driving network that spots and fixes problems in real time, often before anyone notices, so operations keep moving and passengers stay connected.”&lt;/p&gt; 
&lt;div class="extra-info"&gt;
 &lt;div class="extra-info-inner"&gt;
  &lt;h3 class="splash-heading"&gt;Read more about airport connectivity&lt;/h3&gt; 
  &lt;ul class="default-list"&gt; 
   &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366627736/Enhanced-mobile-connectivity-takes-flight-at-Manchester-Airport"&gt;Enhanced mobile connectivity takes flight at Manchester Airport&lt;/a&gt;: Passengers to UK’s third busiest airport now served by enhanced indoor wireless network coverage and capacity, especially when the outdoor signal from cell towers doesn’t effectively penetrate into buildings.&lt;/li&gt; 
   &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366573413/Traveller-experience-takes-off-at-Houston-Airports-with-HPE-Aruba-mobility"&gt;Traveller experience takes off at Houston Airports with HPE Aruba mobility&lt;/a&gt;: One of North America’s largest public airport systems modernises connectivity with Wi-Fi 6E and networking infrastructure to boost quality of passenger experience and contribute to sustainability goals.&lt;/li&gt; 
   &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366624977/Satellite-connectivity-service-keeps-airports-online"&gt;Satellite connectivity service keeps airports online&lt;/a&gt;: Air transport industry’s IT provider launches space-based comms system to deliver ‘reliable, secure communication’ in more than 130 countries, even during blackouts and emergencies.&lt;/li&gt; 
   &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366593934/SITA-gains-higher-altitude-for-connectivity-with-Heathrow-Airport"&gt;SITA gains higher altitude for connectivity with Heathrow Airport&lt;/a&gt;: Leading provider of IT to the air transport industry wins longest contract extension to date, with UK’s largest and Europe’s busiest airport to bolster network infrastructure services in expansive estate.&amp;nbsp;&lt;/li&gt; 
  &lt;/ul&gt;
 &lt;/div&gt;
&lt;/div&gt;</body>
            <description>Air transport industry technology provider taps networking giant to keep transport hubs connected and running smoothly, without the cost and effort of managing networks in-house</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/Hero%20Images/airport-passengers-travel-adobe.jpeg</image>
            <link>https://www.computerweekly.com/news/366642173/SITA-launches-campus-network-to-keep-airport-operations-connected</link>
            <pubDate>Thu, 23 Apr 2026 08:37:00 GMT</pubDate>
            <title>SITA launches campus network to keep airport operations connected</title>
        </item>
        <item>
            <body>&lt;p&gt;China-linked hackers are using networks of vulnerable &lt;a href="https://www.techtarget.com/iotagenda/Ultimate-IoT-implementation-guide-for-businesses"&gt;internet-connected devices&lt;/a&gt;, including home routers, printers and smart devices, as cover to mount espionage and hacking operations.&lt;/p&gt; 
&lt;p&gt;The technique is now used by the majority of China-linked hackers as a way to obscure hacking and espionage attacks launched against organisations in the West.&lt;/p&gt; 
&lt;p&gt;The UK’s National Cyber Security Centre (NCSC) and national agencies in nine other countries have warned today that Chinese-linked groups are now leveraging networks of infected devices “at scale” to target critical sectors globally and steal sensitive data.&lt;/p&gt; 
&lt;p&gt;According to an advisory issued by the Five Eyes intelligence-sharing alliance – comprising the UK, the US, Canada, Australia and New Zealand –&amp;nbsp;and 10 other countries, Chinese groups are exploiting security vulnerabilities in unpatched internet devices to create networks to use as a staging post to launch further attacks.&lt;/p&gt; 
&lt;p&gt;“We know that China’s intelligence and military agencies now display an eye-watering level of sophistication in their cyber operations,” said &lt;a href="https://www.computerweekly.com/news/366642032/Nation-states-responsible-for-nationally-significant-cyber-attacks-against-UK-says-NCSC-chief"&gt;NCSC chief Richard Horne&lt;/a&gt; in a speech at its &lt;a href="https://www.cyberuk.uk/"&gt;CyberUK conference in Glasgow&lt;/a&gt;.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Covert networks hide ‘indicators of compromise’"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Covert networks hide ‘indicators of compromise’&lt;/h2&gt;
 &lt;p&gt;The agencies warn that the Chinese tactics are making it difficult for organisations to detect and attribute malicious attacks on their computer networks using traditional “indicators of compromise”.&lt;/p&gt;
 &lt;p&gt;Chinese groups, for example, could use a UK-based infected device as a staging post to hack into a UK-based company, meaning that blocking non-UK IP addresses no longer provides a defence for overseas attacks.&lt;/p&gt;
 &lt;p&gt;They advise companies to adopt “adaptive, intelligence-driven measures” to better mitigate the risks, including monitoring traffic from internet-connected devices, virtual private networks (VPNs) and remote access devices to identify suspicious traffic.&lt;/p&gt;
 &lt;p&gt;Chinese-linked groups are able to evade detection by exploiting low-cost networks of infected devices that can rapidly be reconfigured so that traditional static IP block lists are no longer effective.&lt;/p&gt;
 &lt;p&gt;The networks are used for each phase of a cyber attack, from reconnaissance and malware delivery, to command and control and data exfiltration against targets of espionage and offensive cyber operations, according to the advisory.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Covert networks behind major hacking operations"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Covert networks behind major hacking operations&lt;/h2&gt;
 &lt;p&gt;Covert networks of compromised devices have been used by the Chinese state-sponsored group Volt Typhoon to pre-position for future attacks on &lt;a href="https://www.computerweekly.com/news/366626193/Long-range-drones-to-fly-across-UKs-critical-national-infrastructure"&gt;critical national infrastructure (CNI)&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;The group has &lt;a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-038a?utm_source=UK_NCSC&amp;amp;utm_medium=press_release&amp;amp;utm_campaign=VT_020724"&gt;targeted communications, energy, transport and water services in the US&lt;/a&gt;, and has been able to maintain covert access to critical IT systems for five years or more.&lt;/p&gt;
 &lt;p&gt;It used a network of vulnerable Cisco and NetGear routers, which were no longer supported by the manufacturers and were no longer receiving updates of security patches.&lt;/p&gt;
 &lt;p&gt;Another Chinese group, &lt;a href="https://www.computerweekly.com/news/366611295/NCSC-exposes-Chinese-company-running-malicious-Mirai-botnet"&gt;Flax Typhoon&lt;/a&gt;, has used a covert network of 260,000 compromised devices, including routers, firewalls, webcams and CCTV cameras, to conduct cyber espionage against targets in multiple countries.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Hacking as a service"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Hacking as a service&lt;/h2&gt;
 &lt;p&gt;Chinese hacking groups have a choice of covert networks, each with potentially hundreds of thousands of endpoints, which frequently change, making it more difficult for companies targeted to block attacks, according to the advisory.&lt;/p&gt;
 &lt;p&gt;Chinese information security companies have maintained networks of infected devices, available as a service for Chinese-linked hacking groups.&lt;/p&gt;
 &lt;p&gt;Chinese company Integrity Technology Group controlled a network known as &lt;a href="https://www.techtarget.com/searchsecurity/news/366611357/FBI-disrupts-another-Chinese-state-sponsored-botnet"&gt;Raptor Train&lt;/a&gt;, which infected more than 200,000 devices worldwide in 2024.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Companies advised to take countermeasures"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Companies advised to take countermeasures&lt;/h2&gt;
 &lt;p&gt;The NCSC advises companies to map internet-connected devices in their organisation and corporate VPNs, so they can understand which traffic is legitimate.&lt;/p&gt;
 &lt;p&gt;They should also introduce &lt;a href="https://www.techtarget.com/searchsecurity/definition/multifactor-authentication-MFA"&gt;multifactor authentication (MFA)&lt;/a&gt; when employees use remote connections to dial into business networks.&lt;/p&gt;
 &lt;p&gt;Larger organisations can profile incoming connections based on operating systems, time zones, and the organisation’s systems configurations to identify legitimate traffic.&lt;/p&gt;
 &lt;p&gt;The Five Eyes and the NCSC advise the most at-risk organisations to actively track &lt;a href="https://www.computerweekly.com/news/366583712/Chinese-APT-suspected-of-Ministry-of-Defence-hack"&gt;Chinese advanced persistent threats (APTs)&lt;/a&gt;, using threat reports supplied by the NCSC to create dynamic block lists and rules to detect incoming threats.&lt;/p&gt;
 &lt;p&gt;“In recent years, we have seen a deliberate shift in cyber groups based in China utilising these networks to hide their malicious activity in an attempt to avoid accountability,” said Paul Chichester, NCSC director of operations. “We call on organisations to act now to better defend their critical assets.”&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Read more from CyberUK 2026&lt;/h3&gt; 
   &lt;ul type="square" class="default-list"&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366641875/CYBERUK-26-UK-lagging-on-legal-protections-for-cyber-pros"&gt;CyberUK 2026 – UK lagging on legal protections for cyber pros&lt;/a&gt;: Ahead of this year’s CyberUK conference, the CyberUp Campaign for reform of the UK’s hacking laws proposes a four-pillar framework that would protect cyber professionals from prosecution.&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366642032/Nation-states-responsible-for-nationally-significant-cyber-attacks-against-UK-says-NCSC-chief"&gt;Nation states responsible for ‘nationally significant’ cyber attacks against UK, says NCSC chief&lt;/a&gt;: The UK is facing four nationally significant cyber attacks a week, the majority from hostile states, NCSC chief, Richard Horne, warns at the CyberUK conference.&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366641790/UK-to-build-national-cyber-shield-to-protect-against-AI-cyber-threats"&gt;UK to build ‘national cyber shield’ to protect against AI cyber threats&lt;/a&gt;: Security minister Dan Jarvis calls for artificial intelligence companies to work with government to develop AI-driven cyber defences.&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366642156/NCSC-heralds-end-of-passwords-for-consumers-and-pushes-secure-passkeys"&gt;NCSC heralds end of passwords for consumers and pushes secure passkeys&lt;/a&gt;: UK National Cyber Security Centre is urging consumers to replace passwords and two-factor authentication with passkeys, following a technical study that shows they are more secure and easier to use.&lt;/li&gt; 
   &lt;/ul&gt;
  &lt;/div&gt;
 &lt;/div&gt;
 &lt;ul type="square" class="default-list"&gt;&lt;/ul&gt;
&lt;/section&gt;</body>
            <description>Companies urged to take countermeasures as Chinese hacking groups use networks of infected home and office devices ‘at scale’ to evade security monitoring systems</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/Hero%20Images/china-flag-fotolia.jpg</image>
            <link>https://www.computerweekly.com/news/366641986/Chinese-hackers-using-compromised-networks-to-spy-on-Western-companies-says-Five-Eyes</link>
            <pubDate>Thu, 23 Apr 2026 07:15:00 GMT</pubDate>
            <title>Chinese hackers using compromised networks to spy on Western companies, says Five Eyes</title>
        </item>
        <item>
            <body>&lt;p&gt;The UK economy can unlock a £35bn productivity windfall, but only if businesses can bridge a widening “readiness gap” between basic and &lt;a href="https://www.computerweekly.com/resources/Artificial-intelligence-automation-and-robotics"&gt;advanced artificial intelligence (AI) use&lt;/a&gt;. That’s the core message of Amazon Web Services’s &lt;em&gt;Unlocking the UK’s AI potential&lt;/em&gt; report, unveiled this week at its AWS Summit event in London.&lt;/p&gt; 
&lt;p&gt;The research shows that while 64% of UK organisations have now adopted AI, the majority of users remain stalled at a rudimentary level. According to the report, a transition from basic tasks, such as document summarisation, to integration within core business processes could unlock £35bn in economic growth by 2030, a figure it said is roughly equivalent to the economy of Manchester.&lt;/p&gt; 
&lt;p&gt;That was the essence of views put across by Alison Kay, vice-president and managing director of AWS UK &amp;amp; Ireland, who addressed an audience of more than 20,000 in London on Wednesday. Kay said that while AI adoption is growing at a rate of one new UK business every 40 seconds, the depth of adoption often stalls at a basic level, with only 21% of organisations saying they feel prepared for advanced AI.&lt;/p&gt; 
&lt;p&gt;“AI is at a pivotal moment in the UK,” Kay said. “Organisations across the country are seeing tangible results from AI, from productivity gains to faster innovation. While this progress is encouraging to see, there’s still so much more to unlock, especially as we move from basic to advanced AI adoption.”&lt;/p&gt; 
&lt;p&gt;According to Kay, the AWS research shows that advanced AI users report efficiency gains of 68%, compared to just 40% among basic users: “Most organisations are still in the early stages of adoption, employing productivity, basic automation and experimentation. Our research shows that the UK could unlock £35bn of productivity gains by 2030 if basic adopters moved to advanced AI.”&lt;/p&gt; 
&lt;p&gt;However, this momentum is threatened by a critical &lt;a href="https://www.computerweekly.com/news/366637838/UK-government-signs-more-partners-to-boost-AI-skills-across-the-country"&gt;shortage of skills&lt;/a&gt;. Nearly half (49%) of UK organisations cited a lack of digital skills as a primary barrier to AI transformation, an increase from 46% last year. The “skills gap” has become so acute that businesses are now reporting an average eight-month wait to fill digital roles, with many prepared to pay a 41% salary premium for AI-literate talent.&lt;/p&gt; 
&lt;p&gt;Kay pointed to AWS’s commitment to the Skills to Job Tech Alliance, which aims to train 100,000 UK learners by 2030. She said the company has already helped 60,000 students and contributed to a government-backed goal of equipping 10 million workers with AI skills over the next four years.&lt;/p&gt; 
&lt;p&gt;The summit keynote also featured a technical deep-dive from Francesca Vasquez, AWS vice-president of professional services and agentic AI, who argued that the industry is moving from simple “inline completion” to autonomous “agentic AI”.&lt;/p&gt; 
&lt;p&gt;Vasquez showcased &lt;a href="https://www.computerweekly.com/blog/CW-Developer-Network/AWS-launches-Kiro-IDE-for-real-agentic-development-at-scale"&gt;Kiro, a Claude-powered AI agent-capable IDE&lt;/a&gt; designed to automate software engineering. Vasquez said AWS recently rebuilt the inference engine for its Bedrock AI platform using six engineers and AI agents in 76 days, a task it estimated would have required 40 engineers for a full year without agentic assistance.&lt;/p&gt; 
&lt;p&gt;Vasquez said: “Kiro gives developers structure and complete transparency. When you ask Kiro to build something, it thinks through the problem first. It gives you full user stories with acceptance criteria, technical design documents with architecture diagrams, sequence flows, discrete implementation tests, everything that you would normally spend hours documenting.”&lt;/p&gt; 
&lt;p&gt;The report also noted that 78% of businesses said they would be more likely to adopt AI if they saw the government lead by example. The report pointed to &lt;a href="https://www.gov.uk/government/publications/state-of-digital-government-review/state-of-digital-government-review"&gt;government research&lt;/a&gt; showing full digitisation of public services could realise more than £45bn per year in savings.&lt;/p&gt; 
&lt;p&gt;The report concludes that while the UK has the ingredients for leadership – including world-class research and a vibrant startup ecosystem – the transition to an AI-first economy requires a move away from “playing it safe”.&lt;/p&gt; 
&lt;p&gt;This means, it said, closing the digital skills gap by investing in training, public-private partnerships and AI literacy; helping organisations move from adoption to transformation; and scaling AI across public services so government leads by example. &lt;/p&gt; 
&lt;p&gt;AWS confirmed it is proceeding with an £8bn investment in UK datacentre infrastructure through 2028. This expansion is estimated to support 14,000 jobs annually and contribute £14bn to the UK’s GDP.&lt;/p&gt; 
&lt;div class="extra-info"&gt;
 &lt;div class="extra-info-inner"&gt;
  &lt;h3 class="splash-heading"&gt;Read more about AI&lt;/h3&gt; 
  &lt;ul class="default-list"&gt; 
   &lt;li&gt;&lt;a href="https://www.computerweekly.com/feature/Getting-started-with-agentic-AI"&gt;Getting started with agentic AI&lt;/a&gt;. We find out how organisations can take automation to the next level using agentic artificial intelligence.&amp;nbsp;&lt;/li&gt; 
   &lt;li&gt;&lt;a href="https://www.computerweekly.com/podcast/AI-skills-for-IT-pros-A-Computer-Weekly-Downtime-Upload-podcast"&gt;AI skills for IT pros: A Computer Weekly Downtime Upload podcast&lt;/a&gt;. Matt Stava, CEO and chairman of Spinnaker Support urges IT professionals to ‘retool’ their skillset.&lt;/li&gt; 
  &lt;/ul&gt;
 &lt;/div&gt;
&lt;/div&gt;</body>
            <description>The UK could unlock £35bn of productivity – equivalent to the economy of Manchester – if organisations can move from basic use of AI to productive, often agentic, modes of working</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/HeroImages/using-AI-agent-chatbot-Looker-Studio-adobe.jpg</image>
            <link>https://www.computerweekly.com/news/366641901/AI-adoption-is-rapid-but-many-stuck-at-basic-levels-says-AWS</link>
            <pubDate>Thu, 23 Apr 2026 05:30:00 GMT</pubDate>
            <title>AI adoption is rapid but many stuck at basic levels, says AWS</title>
        </item>
        <item>
            <body>&lt;p&gt;Consumers are being urged to replace passwords with passkeys as a simpler, more secure method of accessing online services.&lt;/p&gt; 
&lt;p&gt;The National Cyber Security Centre (NCSC), part of the signals intelligence agency GCHQ, said today that it would no longer recommend that individuals use passwords for logging on where passkeys are available as an alternative.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://www.techtarget.com/whatis/feature/Passkey-vs-password-What-is-the-difference"&gt;Passkeys&lt;/a&gt;, which are securely stored on people’s phones, computers, or in third-party credential managers, are quicker and easier to use than passwords and offer stronger security.&lt;/p&gt; 
&lt;p&gt;The NCSC’s recommendation follows a technical study that shows passkeys are at least as secure – and generally more secure – than a password combined with two-factor authentication, such as an authorisation code sent by SMS.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Resilience against phishing"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Resilience against phishing&lt;/h2&gt;
 &lt;p&gt;The agency claims that a move to passkeys would boost the UK’s resilience to phishing attacks and other hacking attempts, the majority of which rely on criminals stealing or compromising login details.&lt;/p&gt;
 &lt;p&gt;The UK government &lt;a href="https://www.computerweekly.com/news/366623776/UK-government-websites-to-replace-passwords-with-secure-passkeys"&gt;announced last year&lt;/a&gt; that it would roll out passkey technology for digital services as an alternative to current SMS-based verification systems, which incur additional costs for sending SMS messages.&lt;/p&gt;
 &lt;p&gt;The NHS became one of the first government organisations in the world to use passkeys to give patients secure access to hospital and pharmacy websites.&lt;/p&gt;
 &lt;p&gt;Online service providers, including Google, eBay and PayPal, also support passkeys. According to Google, over 50% of active Google users in the UK have a registered passkey – the highest uptake. Microsoft is also introducing passkeys for Hotmail.&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Read more from CyberUK 2026&lt;/h3&gt; 
   &lt;ul type="square" class="default-list"&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366641875/CYBERUK-26-UK-lagging-on-legal-protections-for-cyber-pros"&gt;CyberUK ’26: UK lagging on legal protections for cyber pros&lt;/a&gt;: Ahead of next week's CyberUK conference, the CyberUp Campaign for reform of the UK's hacking laws proposes a four-pillar framework that would protect cyber professionals from prosecution&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366642032/Nation-states-responsible-for-nationally-significant-cyber-attacks-against-UK-says-NCSC-chief"&gt;Nation states responsible for ‘nationally significant’ cyber attacks against UK, says NCSC chief&lt;/a&gt;: The UK is facing four nationally significant cyber attacks a week, the majority from hostile states, NCSC chief, Richard Horne, will warn at the CyberUK conference.&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366641790/UK-to-build-national-cyber-shield-to-protect-against-AI-cyber-threats"&gt;UK to build ‘national cyber shield’ to protect against AI cyber threats&lt;/a&gt;: Security minister Dan Jarvis calls for artificial intelligence companies to work with government to develop AI-driven cyber defences&lt;/li&gt; 
   &lt;/ul&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Better security than 2FA"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Better security than 2FA&lt;/h2&gt;
 &lt;p&gt;Passkeys offer a greater level of security than passwords and SMS two-factor authentication (2FA), both of which can be compromised by hackers.&lt;/p&gt;
 &lt;p&gt;They allow people to log into websites securely, using their own mobile phones, tablets or laptops to verify their identity by entering a PIN or using facial recognition.&lt;/p&gt;
 &lt;p&gt;The use of passwords with two-factor authentication for SMS can be vulnerable to “SIM swapping” attacks, where criminals allocate a victim’s phone number to a phone SIM card to intercept authentication keys.&lt;/p&gt;
 &lt;p&gt;The NCSC said that it stopped short of endorsing passkeys last year because there were still key implementation challenges.&lt;/p&gt;
 &lt;p&gt;However, it said that progress with the technology over the past year, including the ability to move passkeys between Android and Apple phones, has now made the technology viable.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Passkeys not yet recommended for business"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Passkeys not yet recommended for business&lt;/h2&gt;
 &lt;p&gt;The centre said it can now recommend passkey technology to the public as a more secure and user-friendly login method, and to businesses as the default authentication option for consumers.&lt;/p&gt;
 &lt;p&gt;The NCSC is not yet recommending &lt;a href="https://www.techtarget.com/searchsecurity/tip/How-to-roll-out-an-enterprise-passkey-deployment"&gt;passkeys for business applications&lt;/a&gt;, which will take longer to phase in. Many organisations rely on old IT systems that do not support passkeys or two-factor authentication.&lt;/p&gt;
 &lt;p&gt;The NCSC said that where services do not support passkeys, it advises consumers to create strong passwords and use two-factor authentication.&lt;/p&gt;
 &lt;p&gt;Jonathon Ellison, director for national resilience at the NCSC, said moving to passkeys would accelerate the UK’s resilience against cyber attacks.&lt;/p&gt;
 &lt;p&gt;“The headaches that remembering passwords have caused us for decades no longer need to be a part of logging in, where users migrate to passkeys – they are a user-friendly alternative, which provides stronger overall resilience,” he said.&lt;/p&gt;
 &lt;p&gt;Phasing out passwords will be gradual, with the first step being for people to become comfortable with using passkeys. Big banks are expected to phase in the technology over the next three to five years.&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;How passkeys work&lt;/h3&gt; 
   &lt;p&gt;When people sign up for accounts using passkeys, their device creates a private key, which remains on the device, and a public key, which is stored by the service they wish to access.&lt;/p&gt; 
   &lt;p&gt;The device will prove to the website that it has the correct private key when the owner signs into a service, without disclosing the private key to the service provider.&lt;/p&gt; 
   &lt;p&gt;Passkeys are designed to synchronise across different devices, so a passkey stored on an iPhone would be automatically shared with the owner’s iPad.&lt;/p&gt; 
   &lt;p&gt;If a person loses a device and does not have a copy of the passkey on a second device, they will be able to recover it by going through an account recovery process.&lt;/p&gt; 
   &lt;p&gt;Unlike passwords, passkeys are cryptographically generated and do not need to be changed regularly to remain secure.&lt;/p&gt; 
   &lt;p&gt;They are stored in a “secure enclave” on phones and computers, which means they cannot be accessed if the device is compromised or lost.&lt;/p&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/section&gt;</body>
            <description>UK National Cyber Security Centre is urging consumers to replace passwords and two-factor authentication with passkeys, following a technical study that shows they are more secure and easier to use</description>
            <image>https://cdn.ttgtmedia.com/visuals/German/article/easy-password-adobe.jpg</image>
            <link>https://www.computerweekly.com/news/366642156/NCSC-heralds-end-of-passwords-for-consumers-and-pushes-secure-passkeys</link>
            <pubDate>Wed, 22 Apr 2026 19:01:00 GMT</pubDate>
            <title>NCSC heralds end of passwords for consumers and pushes secure passkeys</title>
        </item>
        <item>
            <body>&lt;p&gt;Critical local infrastructure that supports council services, social care services and local transport in the UK is falling through the gaps in government and business planning for cyber resilience, claims &lt;a title="https://www.linkedin.com/in/jonathannicholaslee/" href="https://url.us.m.mimecastprotect.com/s/UP5yCjRvnlfAGlgGMhWfPTmiUW4?domain=urldefense.com"&gt;Jonathan Lee&lt;/a&gt;, director of cyber strategy at cyber security company TrendAI.&lt;/p&gt; 
&lt;p&gt;In an interview with Computer Weekly, Lee says that municipal areas, such as London or Greater Manchester, could be at risk from multiple cyber attacks that could damage local infrastructure, causing escalating problems for residents that could add up to severe disruption.&lt;/p&gt; 
&lt;p&gt;“We need to be thinking about what would happen if multiple attacks happened at the same time across the city region – and the human impact of not being able to do your job properly, not being able to travel around and not being able to deliver public services,” he says.&lt;/p&gt; 
&lt;p&gt;The &lt;a href="https://www.computerweekly.com/news/366634283/IT-services-companies-and-datacentres-face-regulation-as-cyber-security-bill-reaches-Parliament"&gt;Cyber Security and Resilience Bill (CSRB)&lt;/a&gt;, which is currently going through Parliament, aims to ensure that critical national services, such as healthcare, water, transport and energy, are protected against cyber attacks that cost the economy billions of pounds a year. But local infrastructure has been relatively neglected, claims Lee.&lt;/p&gt; 
&lt;p&gt;The National Cyber Security Centre’s (NCSC) &lt;a href="https://www.computerweekly.com/news/366628426/NCSC-updates-CNI-Cyber-Assessment-Framework"&gt;Cyber Assurance Framework&lt;/a&gt;, for example, aims to help operators of critical national infrastructure (CNI) demonstrate a base level of cyber security preparedness – but it is not mandatory, and not every organisation that should implement it is implementing it.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Whole of society risk"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Whole of society risk&lt;/h2&gt;
 &lt;p&gt;“We need to be more stringent in making sure that people are taking this seriously and are looking not just at their own organisation, but are looking at the whole of society risk,” says Lee.&lt;/p&gt;
 &lt;p&gt;Attacks on public services, such as council-run social care, can have a catastrophic, knock-on effect on the NHS and patient care, he adds.&lt;/p&gt;
 &lt;p&gt;There is a need for more “top-down” advice for regional infrastructure providers, from organisations such as the NCSC, which is not as well known as it could be among the companies and public sector bodies that provide local infrastructure.&lt;/p&gt;
 &lt;p&gt;“The message has got to be diffused down into local levels to ensure that a consistent message is spread out, and that can also be through industry partners. That is something I feel quite strongly about,” says Lee.&lt;/p&gt;
 &lt;p&gt;The &lt;a href="https://www.computerweekly.com/news/366641782/Cyber-Essentials-closes-the-MFA-loophole-but-leaves-some-organisations-adrift"&gt;Cyber Essentials programme&lt;/a&gt;, which has been updated to include new requirements for organisations to use multifactor authentication (MFA), and requirements for cloud providers to patch vulnerabilities within 14 days, has helped build resilience, but only for organisations that choose to adhere to it.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Keeping the resilience score"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Keeping the resilience score&lt;/h2&gt;
 &lt;p&gt;The UK government is also intending to publish a &lt;a href="https://www.computerweekly.com/news/366638753/UK-government-must-get-its-hands-dirty-on-security-report-says"&gt;Cyber Action Plan&lt;/a&gt; in the coming months, which will guide organisations to get basic security right and improve their cyber security over time.&lt;/p&gt;
 &lt;p&gt;Although there is no shortage of initiatives and action plans, there is a danger that many of these plans will be left on a shelf.&lt;/p&gt;
 &lt;p&gt;One approach is for organisations to rate themselves on a scorecard for cyber resilience, on a scale of, say, 1 to 100, and to report their progress back to board-level directors.&lt;/p&gt;
 &lt;p&gt;“We need a mechanism to measure how impactful these interventions are, whether it be things like the Cyber Assessment Framework, Cyber Essentials or legislation,” says Lee.&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Read more about cyber resilience&lt;/h3&gt; 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;&lt;a href="For%20business%20leaders,%20if%20your%20security%20strategy%20for%202026%20still%20revolves%20around%20keeping%20attackers%20out,%20you%20might%20already%20be%20behind."&gt;Cyber resilience will define winners and losers in 2026&lt;/a&gt;: For business leaders, if your security strategy for 2026 still revolves around keeping attackers out, you might already be behind.&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/opinion/Are-we-mistaking-regulation-for-resilience"&gt;Are we mistaking regulation for resilience&lt;/a&gt;? We have a growing number of cyber compliance regulations, yet our country’s cyber resilience remains fragile. What is going wrong?&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/opinion/How-CISOs-can-build-a-truly-unified-and-resilient-security-platform"&gt;How CISOs can build a truly unified and resilient security platform&lt;/a&gt;: The Security Think Tank looks at platformisation, considering questions such as how CISOs can distinguish between a truly integrated platform and integration theatre, and how to protect unified platforms.&lt;/li&gt; 
   &lt;/ul&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/section&gt;</body>
            <description>Jonathan Lee, director of cyber strategy at Trend AI, argues for more focus on local and municipal cyber resilience</description>
            <image>https://cdn.ttgtmedia.com/visuals/LeMagIT/hero_article/Hero-Danger-by-InfiniteFlow-Adobe-10.jpg</image>
            <link>https://www.computerweekly.com/news/366641946/Interview-Critical-local-infrastructure-is-missing-link-in-cyber-resilience</link>
            <pubDate>Wed, 22 Apr 2026 11:02:00 GMT</pubDate>
            <title>Interview: Critical local infrastructure is missing link in UK cyber resilience</title>
        </item>
        <item>
            <body>&lt;p&gt;The UK aims to build “national scale” cyber defence capabilities to respond to growing threats from hostile states and artificial intelligence (AI)-powered attacks.&lt;/p&gt; 
&lt;p&gt;Security minister Dan Jarvis said today that defending against “&lt;a href="https://www.computerweekly.com/news/366641789/A-tsunami-of-flaws-When-frontier-AI-and-Patch-Tuesday-collide"&gt;frontier AI&lt;/a&gt;” will require a national effort from government and businesses.&lt;/p&gt; 
&lt;p&gt;He said the government was “laying the groundwork” for a national capability, which has been dubbed the “national cyber shield”, to protect the UK against cyber threats, and&amp;nbsp;called for AI companies to work directly with the government to develop AI to defend against automated cyber attacks.&lt;/p&gt; 
&lt;p&gt;The government’s vision is to develop defensive AI technology that has the capability to identify and repair security vulnerabilities in software at machine speed. “Make no mistake, this is a generational endeavour, and it will test the absolute limits of our engineering and innovation,” Jarvis said in a speech in Glasgow.&lt;/p&gt; 
&lt;p&gt;He was speaking following Anthropic’s decision to delay its Claude Mythos AI model from public release &lt;a href="https://www.computerweekly.com/news/366641789/A-tsunami-of-flaws-When-frontier-AI-and-Patch-Tuesday-collide"&gt;after the technology uncovered thousands of previously known security vulnerabilities&lt;/a&gt; across commonly used software applications.&lt;/p&gt; 
&lt;p&gt;Mythos had uncovered “critical flaws that had gone unnoticed by human experts and automatic tools for over two decades”, said Jarvis.&lt;/p&gt; 
&lt;p&gt;He said that protecting Critical National Infrastructure will require a “fundamentally different approach” in the age of AI. “We will not secure the central pillars of the UK state simply by purchasing off-the-shelf vendor solutions,” said Jarvis.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Cyber attacks more sophisticated"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Cyber attacks more sophisticated&lt;/h2&gt;
 &lt;p&gt;Jarvis said the nature of warfare had changed, and that attacks on British systems were increasing in “volume, sophistication and in ambition”.&lt;/p&gt;
 &lt;p&gt;Hostile states have “worked out that the most effective way is not to confront us directly, but to quietly hollow us out”, he said.&lt;/p&gt;
 &lt;p&gt;The National Cyber Security Centre (NCSC), part of GCHQ, handled over 200 nationally significant incidents last year, double that of the year before. &lt;a href="https://www.computerweekly.com/news/366642032/Nation-states-responsible-for-nationally-significant-cyber-attacks-against-UK-says-NCSC-chief"&gt;The majority are attacks from hostile nation states&lt;/a&gt;, including Russia, Iran and China.&lt;/p&gt;
 &lt;p&gt;“That number tells me the frontline isn’t coming – it’s here,” said Jarvis. “The cyber security of British business is a matter of national security.”&lt;/p&gt;
 &lt;p&gt;Hostile states were attacking logistics systems used to move goods, and were compromising high street business – a reference to the &lt;a href="https://www.computerweekly.com/feature/One-year-on-from-the-MS-cyber-attack-What-did-we-learn"&gt;debilitating cyber attacks against Marks &amp;amp; Spencer and Co-op&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;The &lt;a href="https://www.computerweekly.com/news/366634441/Jaguar-Land-Rover-cyber-attack-costs-firm-485m-in-its-quarter"&gt;cyber attack against Jaguar Land Rover&lt;/a&gt;, had it been caused by an old-school physical attack, “would have been the equivalent of hundreds of masked criminals turning up to dealerships across the country breaking glass, smashing up computers and driving cars right off the forecourt”.&lt;/p&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="Business needs to step up"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Business needs to step up&lt;/h2&gt;
 &lt;p&gt;Companies are most at risk from cyber attacks, not because attackers exploit vulnerabilities, but because companies have failed to keep their systems up to date, or to deploy base-line security measures such as multi-factor authentication.&lt;/p&gt;
 &lt;p&gt;Jarvis said that while government can set standards, share intelligence and provide guidance, it was no substitute for businesses ensuring basic cyber security hygiene.&lt;/p&gt;
 &lt;p&gt;“Basic cyber hygiene is no longer optional, but the baseline – the absolute minimum we should expect of any serious organisation operating in the modern economy,” he said.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Cyber Resilience Pledge"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Cyber Resilience Pledge&lt;/h2&gt;
 &lt;p&gt;Jarvis said the government would be inviting organisations to sign a Cyber Resilience Pledge.&lt;/p&gt;
 &lt;p&gt;Businesses will be invited to make a “public commitment” to investors, their customers and supply chains to make cyber security a board-level responsibility.&lt;/p&gt;
 &lt;p&gt;They will also be urged to commit to meeting basic security standards through the NCSC’s Cyber Essentials programme.&lt;/p&gt;
 &lt;p&gt;The pledge will accompany the government’s National Cyber Action Plan – a national strategy for cyber security – to be published in the summer.&lt;/p&gt;
 &lt;p&gt;“The plan will demonstrate how we will tackle the growing threat, how we will strengthen our collective resilience, and how we will harness the opportunity for our world-leading cyber sector to secure the UK’s economic growth for years to come,” said Jarvis.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="More funding for small business"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;More funding for small business&lt;/h2&gt;
 &lt;p&gt;The security minister said the government was making £90m of investment to strengthen cyber resilience, to provide “practical targeted support” to small and medium-sized businesses.&lt;/p&gt;
 &lt;p&gt;It will be distributed over the next three years through existing schemes run by the Department for Science, Innovation and Technology and the National Cyber Security Centre.&lt;/p&gt;
 &lt;p&gt;Cyber security minister Baroness Lloyd said the government had written to the CEOs and chairs of over 180 of the UK’s leading businesses to encourage as many as possible to sign up to the pledge ahead of a formal launch later this year.&lt;/p&gt;
 &lt;p&gt;“The cyber threat facing UK businesses is serious, growing and evolving fast,” she said. “AI is giving attackers capabilities that would have seemed extraordinary just a year ago, and no organisation can afford to be complacent.”&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Read more from CyberUK 2026&lt;/h3&gt; 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366641875/CYBERUK-26-UK-lagging-on-legal-protections-for-cyber-pros"&gt;CyberUK ’26: UK lagging on legal protections for cyber pros&lt;/a&gt;: Ahead of next week's CyberUK conference, the CyberUp Campaign for reform of the UK's hacking laws proposes a four-pillar framework that would protect cyber professionals from prosecution&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366642032/Nation-states-responsible-for-nationally-significant-cyber-attacks-against-UK-says-NCSC-chief"&gt;Nation states responsible for ‘nationally significant’ cyber attacks against UK, says NCSC chief&lt;/a&gt;: The UK is facing four nationally significant cyber attacks a week, the majority from hostile states, NCSC chief, Richard Horne, will warn at the CyberUK conference.&lt;/li&gt; 
   &lt;/ul&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/section&gt;</body>
            <description>Security minister Dan Jarvis calls for artificial intelligence companies to work with government to develop AI-driven cyber defences</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/Hero%20Images/IT-security-cyber-defence-fotolia.jpg</image>
            <link>https://www.computerweekly.com/news/366641790/UK-to-build-national-cyber-shield-to-protect-against-AI-cyber-threats</link>
            <pubDate>Wed, 22 Apr 2026 10:45:00 GMT</pubDate>
            <title>UK to build ‘national cyber shield’ to protect against AI cyber threats</title>
        </item>
        <item>
            <body>&lt;p&gt;Lloyds Register has assessed using artificial intelligence &lt;a href="https://www.techtarget.com/searchenterpriseai/definition/machine-vision-computer-vision"&gt;(AI)-based navigation systems&lt;/a&gt; for shipping. The trial assessed the performance of the Orca AI navigation platform and looked at the role of AI in enhancing situational awareness and supporting &lt;a href="https://www.computerweekly.com/opinion/The-human-exception-in-AI-governance-Are-we-serious-or-just-ticking-boxes"&gt;human decision-making&lt;/a&gt; at sea.&lt;/p&gt; 
&lt;p&gt;“From a human factors’ perspective, it is not just about what the technology can do; it is about how effectively it supports the human operator,” said Stephanie McLay, team lead of human factors at Lloyds Register. “These workshops demonstrated how structured feedback and user-centred design can play a critical role in shaping safer and more usable AI-enabled navigation systems.”&lt;/p&gt; 
&lt;p&gt;Dipali Kuchekar, product manager for marine and offshore at Lloyds Register, said: “This significant project serves as an important reference point for data-driven system evaluations. It reflects our shared commitment to the adoption of novel technologies, at a time when decarbonisation and autonomy are becoming increasingly intertwined.”&lt;/p&gt; 
&lt;p&gt;The Orca AI SeaPod is a &lt;a href="https://www.computerweekly.com/podcast/AI-in-Pet-health-A-Computer-Weekly-Downtime-Upload-podcast"&gt;computer-vision device&lt;/a&gt; mounted on top of a ship’s bridge. It provides a fixed sensor head equipped with day and thermal cameras providing up to 360 field of view. According to its manufacturer, it also serves as a digital watchkeeper that identifies, classifies and estimates the distance to relevant objects in real time.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;The system is designed to detect close-range and low-signature targets that are not always visible on traditional systems. Orca AI SeaPod presents information centrally in the bridge console.&lt;/p&gt; 
&lt;p&gt;The evaluation was conducted on a feeder container ship sailing 828 nautical miles from the port of Gioia Tauro in Italy to Marsaxlokk, Malta, by way of Bar in Montenegro. The assessment included complex navigation in congested waters near ports, the Strait of Messina and the Marsaxlokk anchorage, as well as open-water sailing.&lt;/p&gt; 
&lt;p&gt;Lloyds Register ship performance specialist Han Beng Koe joined the vessel as the onboard assessor, providing real-time feedback on usability and performance while the system was evaluated against established navigation references.&lt;/p&gt; 
&lt;p&gt;Discussing the assessment, Koe said: “As the onboard assessor, I observed the demonstrated capabilities of AI-based computer vision within the operational environment. This provides a clear indication of the performance potential and scalable application of emerging technologies in maritime navigation systems.”&lt;/p&gt; 
&lt;p&gt;Dor Raviv, Orca AI CTO and co-founder, added: “What this trial shows is that AI-assisted navigation is no longer a future concept, it is already delivering measurable value in live operations. More than 1,200 vessels using Orca AI are evidence that earlier and more accurate detection leads to more-informed decisions on the bridge, which leads to safer navigation. Trials like this pave the way for broader AI adoption in our industry on the journey towards autonomous shipping.”&lt;/p&gt; 
&lt;p&gt;Alongside the AI, the assessment combined performance metrics with human factors to evaluate both detection accuracy and usability on the bridge. Lloyds Register said the testing has provided a framework for evaluating enhanced situational awareness systems, based on precision and recall metrics alongside crew feedback to reflect real-world usability. It said this framework aims to support shipowners, technology developers and regulators as AI becomes increasingly adopted in maritime operations.&lt;/p&gt; 
&lt;div class="extra-info"&gt;
 &lt;div class="extra-info-inner"&gt;
  &lt;h3 class="splash-heading"&gt;Read more about autonomous vehicles&lt;/h3&gt; 
  &lt;ul class="default-list"&gt; 
   &lt;li&gt;UK government &lt;a href="https://www.computerweekly.com/news/366641716/UK-government-accelerates-autonomous-vehicle-development-funding"&gt;accelerates autonomous vehicle&lt;/a&gt; development funding: Projects exploring how autonomous vehicles could benefit businesses and communities across the UK receive government backing as part of £150m CAM Pathfinder programme.&lt;/li&gt; 
   &lt;li&gt;Oxa gains more mileage from Nvidia for &lt;a href="https://www.computerweekly.com/news/366631434/Oxa-gains-more-mileage-from-NVIDIA-for-autonomous-vehicles"&gt;autonomous vehicles&lt;/a&gt;: UK-based autonomous vehicle systems provider looks to speed up its commercial roll-out in the $2tn industrial mobility automation market with use of advanced AI technology.&lt;/li&gt; 
  &lt;/ul&gt;
 &lt;/div&gt;
&lt;/div&gt;</body>
            <description>Lloyds Register assessment used a computer vision system to identify and categorise complex navigation scenarios, working in conjunction with human crew</description>
            <image>https://cdn.ttgtmedia.com/visuals/German/container-ship-disaster-adobe.jpg</image>
            <link>https://www.computerweekly.com/news/366642001/Lloyds-Register-evaluates-AI-based-nautical-navigation</link>
            <pubDate>Wed, 22 Apr 2026 10:41:00 GMT</pubDate>
            <title>Lloyds Register evaluates AI-based nautical navigation</title>
        </item>
        <item>
            <body>&lt;p&gt;A case seeking compensation for approximately 59,000 businesses and organisations using the &lt;a href="https://www.computerweekly.com/news/366628071/Microsoft-reports-massive-cloud-uptick-as-CMA-questions-licensing"&gt;Microsoft Windows Server&lt;/a&gt; operating system in non-Microsoft public clouds is going ahead.&lt;/p&gt; 
&lt;p&gt;The Competition Appeal Tribunal (CAT) has ruled to certify a £2bn legal action against Microsoft over its cloud computing and software practices. The collective action court case, brought by digital markets regulation expert Maria Luisa Stasi, accuses Microsoft of overcharging UK businesses and organisations that use its Windows Server on rival cloud services.&lt;/p&gt; 
&lt;p&gt;CAT dismissed Microsoft’s arguments against certification and granted a Collective Proceedings Order on an opt-out basis, allowing the case to head to trial.&lt;/p&gt; 
&lt;p&gt;Speaking to Computer Weekly at the end of last year, Stasi discussed Microsoft’s dominance. “Microsoft is dominant on some parts of the [IT infrastructure] stack and is using this power to impose things that otherwise will be difficult to accept for business users, and the reality is that they can do that because they limit choice for people,” she said.&lt;/p&gt; 
&lt;p&gt;“For years, Microsoft’s practices have had real financial impact on both public and private organisations. I’m now looking forward to preparing for trial and getting their money back on their behalf.”&lt;/p&gt; 
&lt;p&gt;In March this year, the UK &lt;a href="https://www.computerweekly.com/news/366626998/Law-professor-urges-CMA-to-take-swift-and-urgent-action-over-Microsoft-cloud-licensing"&gt;Competition and Markets Authority&lt;/a&gt; announced it would launch a Strategic Market Status investigation into Microsoft, probing its software licensing practices in the cloud market.&lt;/p&gt; 
&lt;p&gt;The class action from Stasi involves two aspects of &lt;a href="https://www.computerweekly.com/news/366630464/Court-to-decide-whether-it-is-lawful-for-enterprises-to-sell-unwanted-software-licenses"&gt;Microsoft licensing&lt;/a&gt;. The first is pricing abuse of Microsoft Service Provider License Agreement (SPLA) and concerns Microsoft charging wholesale prices for Windows Server under SPLAs that are higher than those for equivalent licences charged to Azure users.&lt;/p&gt; 
&lt;div class="extra-info"&gt;
 &lt;div class="extra-info-inner"&gt;
  &lt;h3 class="splash-heading"&gt;Read more about Microsoft licensing&lt;/h3&gt; 
  &lt;ul class="default-list"&gt; 
   &lt;li&gt;Competition in the cloud: Microsoft’s share of the global cloud infrastructure market is growing at a time when its customer recruitment and retention techniques are coming under increased &lt;a href="https://www.computerweekly.com/news/366570212/Competition-in-the-cloud-Microsofts-unfair-licensing-tactics-under-the-microscope"&gt;regulatory scrutiny&lt;/a&gt;.&lt;/li&gt; 
   &lt;li&gt;Meet the competition lawyer taking Microsoft to task over its &lt;a href="https://www.computerweekly.com/news/366635440/Interview-Meet-the-competition-lawyer-taking-Microsoft-to-task-over-its-cloud-licensing-tactics"&gt;cloud licensing tactics&lt;/a&gt;: Microsoft’s approach to cloud licensing has been labelled anti-competitive and cost-prohibitive to enterprises by regulators.&lt;/li&gt; 
  &lt;/ul&gt;
 &lt;/div&gt;
&lt;/div&gt; 
&lt;p&gt;The second is abuse of re-licensing, which is where Microsoft allows organisations with on-premise Windows Server licences to deploy the server operating system on Azure, without the need to pay re-licensing fees. This is not possible if the customer chooses to deploy Windows Server on a cloud service provider that is listed as approved by Microsoft. Re-Licensing Abuse operates by way of the Azure Hybrid Benefit which is granted to the holder of an on-premise licence.&lt;/p&gt; 
&lt;p&gt;“We are very pleased with the tribunal’s decision, including its confirmation that Dr Stasi’s action should proceed on an opt-out basis, as sought in her application,” said James Hain-Cole, partner at law firm Scott+Scott, which is leading on the case against Microsoft.&lt;/p&gt; 
&lt;p&gt;“Certification of this claim is a pivotal step in securing compensation for thousands of businesses and organisations,” he added. “The decision illustrates the importance of the regime for UK businesses who, like consumers, require and deserve the access to justice that it was designed to offer. Looking ahead to the trial, we are proud to be supporting Dr Stasi’s efforts to provide access to justice for those organisations that have suffered as a result of Microsoft’s anti-competitive practices, which remains the target of competition regulators around the world.”&lt;/p&gt; 
&lt;p&gt;In its ruling, the court dismissed Microsoft’s arguments and allowed the case to head to trial. It also concluded that the claim “comfortably crosses the hurdle of having a real prospect of success”.&lt;/p&gt;</body>
            <description>The Competition Appeal Tribunal has allowed the unfair licensing case against Microsoft to go ahead</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/HeroImages/money-pounds-banknotes-cash-RZ-adobe.jpg</image>
            <link>https://www.computerweekly.com/news/366641951/Microsoft-faces-court-battle-in-2bn-Windows-Server-class-action</link>
            <pubDate>Wed, 22 Apr 2026 09:45:00 GMT</pubDate>
            <title>Microsoft faces court battle in £2bn Windows Server class action</title>
        </item>
        <item>
            <body>&lt;p&gt;Looking to develop a highly secure future‑ready infrastructure that can support global digital connectivity as it operates some of the most remote and operationally complex travel experiences in the world, A&amp;amp;K Travel Group (AKTG) has selected Colt Technology Services to deliver a global network for its core business and portfolio of premier travel brands.&lt;/p&gt; 
&lt;p&gt;Beginning life in 1962, &lt;a href="https://www.abercrombiekent.com/about-us"&gt;AKTG&lt;/a&gt; is a global lifestyle and travel company that describes itself as setting the standard for “refined and personalised travel experiences worldwide”. The group encompasses premier travel brands including Abercrombie &amp;amp; Kent, Crystal, Cox &amp;amp; Kings and Ecoventura, alongside strategic investments in other travel companies. The group has an international support system of more than 2,500 staff in 60 offices across 35 countries, having a presence in all seven continents. The company’s “guardian angels” provide 24/7 support.&lt;/p&gt; 
&lt;p&gt;A&amp;amp;K Travel Group operates some of the most remote and operationally complex travel experiences in the world, from expedition ships and river vessels to safari camps and global offices. Delivering those experiences, it said, requires secure, resilient connectivity that performs consistently across continents and environments.&lt;/p&gt; 
&lt;p&gt;AKTG has taxed Colt with building out its global connectivity network – which includes quantum-safe encryption from &lt;a href="https://arqitgroup.com/"&gt;Arqit&lt;/a&gt; – to provide agile, quantum-safe security solutions that operate without distance limitations, across any location worldwide. This foundation is designed to provide AKTG with a resilient, interconnected global network architecture on which it can run its business and keep customers, employees and travel partners in more than 100 countries connected.&lt;/p&gt; 
&lt;p&gt;Part of the project will see Colt team up with Arqit to deploy a quantum-secure &lt;a href="https://www.computerweekly.com/news/366635495/SASE-SD-WAN-evolve-as-enterprises-prioritise-unified-network-security"&gt;wide-area network (WAN)&lt;/a&gt; to help protect AKTG from the future risk presented by quantum computers, including the threat presented by “harvest now, decrypt later”.&lt;/p&gt; 
&lt;p&gt;AKTG will also use the Colt infrastructure to help redefine the way audiences interact with its brands, supporting its commitment to providing “seamless”, immersive digital experiences with easier access to travel information; improved “inspiration” and content discovery; and new digital tools for creating tailor-made journeys. Colt’s network is seen as essential in underpinning fast, secure, low-latency connectivity for AKTG, ensuring “exceptional” service in locations ranging from remote landscapes to major cities.&lt;/p&gt; 
&lt;p&gt;“As our digital ecosystem continues to evolve, protecting our data, our communications and ultimately our guests is a strategic priority,” said Fabio Agostini, CIO of A&amp;amp;K Travel Group. “&lt;a href="https://www.colt.net/"&gt;Colt’s global infrastructure&lt;/a&gt; provides the robust network foundation we need, and through its integration with Arqit’s quantum-safe encryption technology, we are proactively strengthening our security posture against future threats.&lt;/p&gt; 
&lt;p&gt;“This is not simply a network upgrade. It is an investment in future-ready infrastructure that supports our global operations today while preparing us for the next generation of cyber security challenges.”&lt;/p&gt; 
&lt;p&gt;Colt Technology Services chief operating officer Buddy Bayer added: “Abercrombie &amp;amp; Kent is a brand synonymous with unforgettable tailor-made journeys, from stargazing in the Serengeti to navigating the Nile by riverboat. Delivering a seamless digital experience is now just as essential as delivering those memorable moments. With Colt’s world-class digital infrastructure and Arqit partnering with Colt to safeguard the network against tomorrow’s threats, A&amp;amp;K Travel Group can stay focused on what defines it: bringing its mission of ‘life, well-travelled’ to every guest, everywhere.”&lt;/p&gt; 
&lt;p&gt;Andy Leaver, CEO of Arqit, said: “Arqit is proud to be supporting Colt as they lead the way in building a global quantum-safe network for AKTG. Its forward thinking enables AKTG to ensure high-performing secure connectivity from now into the &lt;a href="https://www.computerweekly.com/news/366633476/Singapore-unveils-efforts-to-govern-agentic-AI-prepare-for-post-quantum-era"&gt;post-quantum era&lt;/a&gt;.”&lt;/p&gt; 
&lt;div class="extra-info"&gt;
 &lt;div class="extra-info-inner"&gt;
  &lt;h3 class="splash-heading"&gt;Read more about wide-area networks&lt;/h3&gt; 
  &lt;ul class="default-list"&gt; 
   &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366634553/Qatar-Airways-checks-in-SD-WAN-to-take-operations-to-higher-altitude"&gt;Qatar Airways checks in SD-WAN to take operations to higher altitude&lt;/a&gt;: MENA airline’s worldwide roll-out of airline technology provider’s software-defined wide-area network claimed to set a benchmark for aviation connectivity and performance.&lt;/li&gt; 
   &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366635495/SASE-SD-WAN-evolve-as-enterprises-prioritise-unified-network-security"&gt;SASE, SD-WAN evolve as enterprises prioritise unified network security&lt;/a&gt;: Research confirms trend that software-defined wide-area network implementations are increasingly tied to security, with the continual rise of cyber security incidents worldwide only accelerating this dynamic.&lt;/li&gt; 
   &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366632181/Zen-Internet-launches-Meraki-to-deliver-SD-WAN-portfolio"&gt;Zen Internet launches Meraki to deliver SD-WAN portfolio&lt;/a&gt;: Zen Internet introduces software-defined wide-area network offer to address needs of businesses as IT budgets come under increasing under pressure while cyber threats rise.&lt;/li&gt; 
   &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366628091/Sunswift-gears-up-for-wireless-WAN-for-World-Solar-Challenge-racing"&gt;Sunswift gears up for wireless WAN for World Solar Challenge racing&lt;/a&gt;: &lt;a href="https://www.techtarget.com/contributor/Joe-OHalloran"&gt;&lt;/a&gt;Comms tech provider’s 4G, 5G systems working to deliver uninterrupted connectivity for the upcoming solar car race events in Australia, combining 5G and satellite connectivity through intelligent link bonding.&lt;/li&gt; 
  &lt;/ul&gt;
 &lt;/div&gt;
&lt;/div&gt;</body>
            <description>Travel giant chooses services arm of digital infrastructure provider to build out its global connectivity network based on quantum-safe encryption systems that operate without distance limitations</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/Hero%20Images/Beach-holiday-vacation-relax-adobe.jpg</image>
            <link>https://www.computerweekly.com/news/366641832/AK-Travel-journeys-with-Colt-for-global-quantum-safe-network</link>
            <pubDate>Wed, 22 Apr 2026 09:36:00 GMT</pubDate>
            <title>A&amp;K Travel journeys with Colt for global quantum-safe network</title>
        </item>
        <title>ComputerWeekly.com</title>
        <ttl>60</ttl>
        <webMaster>editor@computerweekly.com</webMaster>
    </channel>
</rss>
