<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel>
        <copyright>Copyright TechTarget - All rights reserved</copyright>
        <description>ComputerWeekly’s best articles of the day</description>
        <docs>https://cyber.law.harvard.edu/rss/rss.html</docs>
        <generator>Techtarget Feed Generator</generator>
        <language>en</language>
        <lastBuildDate>Thu, 09 Apr 2026 20:30:17 GMT</lastBuildDate>
        <link>https://www.computerweekly.com</link>
        <managingEditor>editor@computerweekly.com</managingEditor>
        <item>
            <body>&lt;p&gt;The financial data of just under 140 members of the UK &lt;a href="https://www.civilservicepensionscheme.org.uk/memberhub/" target="_blank" rel="noopener"&gt;Civil Service Pension Scheme&lt;/a&gt; (CSPS) has been exposed following a data breach affecting its online portal, which is overseen by &lt;a href="https://www.capita.com/" target="_blank" rel="noopener"&gt;Capita&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;According to the outsourcer, the issue led to scheme members being able to view personal annual benefit statements (ABSs) that were not their own. Capita pulled the ABS functionality to investigate and remediate the issue, and at the time of writing, it remains offline.&lt;/p&gt; 
&lt;p&gt;Computer Weekly understands all affected members of the pension scheme were contacted on 3 April – those who have not received any message at this stage were not impacted and do not need to take any further action.&lt;/p&gt; 
&lt;p&gt;A Capita spokesperson said: “We are aware of an issue that occurred on the CSPS member portal for around 35 minutes on 30 March 2026, affecting the accuracy of a small number of annual benefit statements generated in this period.&lt;/p&gt; 
&lt;p&gt;“This was identified quickly, ABS functionality was immediately suspended, and a full investigation undertaken,” they said. “We sincerely apologise for this issue and any concerns you may have. We take the protection of members’ personal data extremely seriously.”&lt;/p&gt; 
&lt;p&gt;A Cabinet Office spokesperson added: “We are aware of the incident and take the issue extremely seriously. While only a very small number of members were affected, we are working with Capita to establish the facts and ensure appropriate measures are taken. We will consider further action as required.”&lt;/p&gt; 
&lt;p&gt;Dominic Hook, national officer at the &lt;a href="https://www.unitetheunion.org/" target="_blank" rel="noopener"&gt;Unite&lt;/a&gt; union, said: “Once again, Capita has proved itself to be totally unfit to manage the pensions of millions of public sector workers. This latest in a litany of extremely serious failures by Capita shows why the government’s manifesto promise to reverse outsourcing is more important than ever. Ministers need to keep that promise by bringing the CSPS back in-house.”&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Pension crisis"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Pension crisis&lt;/h2&gt;
 &lt;p&gt;Though minor in its scope, the breach at the CSPS comes amid serious ongoing issues with Capita’s administration of the scheme, which it took over in December 2025 under a seven-year, £239m contract over which the Public Accounts Committee had already &lt;a href="https://www.computerweekly.com/news/366633358/Capita-rubbishes-Public-Accounts-Committee-report-claims" target="_blank" rel="noopener"&gt;raised significant concerns&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;During this transition, it emerged that Capita had inherited a “significant volume” of outstanding work, including almost 90,000 work-in-progress cases and &lt;a href="https://www.computerweekly.com/news/366639026/Thousands-of-unread-emails-and-20-million-database-errors-cause-civil-service-pension-hardship" target="_blank" rel="noopener"&gt;15,000 emails that had never been read&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.computerweekly.com/news/366640779/Capita-left-to-deal-with13000-civil-service-pension-cases-over-a-year-old" target="_blank" rel="noopener"&gt;At the end of March&lt;/a&gt;, Richard Holroyd, who leads Capita’s public services unit, told MPs the firm was making progress on addressing its backlog, saying it has cleared and closed 145,000 open cases since December.&lt;/p&gt;
 &lt;p&gt;“Whilst challenges remain, we’re seeing progress and expect services to improve in the coming months,” he said, suggesting that normal service levels could be resumed by June.&lt;/p&gt;
 &lt;p&gt;However, the remedial work needed to get the CSPS back in good order has led to missed payments for pensioners, among other problems. Computer Weekly recently reported the story of a former civil servant of 40 years standing – with no other source of income – &lt;a href="https://www.computerweekly.com/news/366639686/Civil-service-veteran-incandescent-as-wait-for-pension-hits-four-months-amid-outsourcing-mess" target="_blank" rel="noopener"&gt;who had not received any payments for four months&lt;/a&gt;.&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Read more about data breaches&lt;/h3&gt; 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;Details of over 70 million customers of US sportswear giant Under Armour were leaked following a supposed ransomware attack &lt;a href="https://www.computerweekly.com/news/366637595/Sportswear-firm-Under-Armour-falls-victim-to-data-breach" target="_blank" rel="noopener"&gt;by the Everest gang&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;A consistent barrage of small healthcare data breaches defined 2025, rather than the high-impact breaches &lt;a href="https://www.techtarget.com/healthtechsecurity/news/366637268/2025-Double-the-breaches-but-less-patient-data-compromised" target="_blank" rel="noopener"&gt;that dominated prior years&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;Synnovis, the pathology lab services provider hit by a Qilin ransomware attack in 2024, is notifying its NHS partners that their patient data was compromised, &lt;a href="https://www.computerweekly.com/news/366634454/Synnovis-to-notify-NHS-of-data-breach-after-nearly-18-months" target="_blank" rel="noopener"&gt;following a lengthy investigation&lt;/a&gt;.&lt;/li&gt; 
   &lt;/ul&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/section&gt;</body>
            <description>A data breach affecting 138 members of the Civil Service Pension Scheme piles pressure on the service’s administrator, Capita, amid ongoing issues</description>
            <image>https://cdn.ttgtmedia.com/visuals/German/article/data-leak-breach-2-adobe.jpg</image>
            <link>https://www.computerweekly.com/news/366641501/Capitas-troubled-Civil-Service-Pension-Scheme-hit-by-data-breach</link>
            <pubDate>Wed, 08 Apr 2026 12:42:00 GMT</pubDate>
            <title>Capita’s troubled Civil Service Pension Scheme hit by data breach</title>
        </item>
        <item>
            <body>&lt;p&gt;The UK’s &lt;a href="https://www.ncsc.gov.uk/news/apt28-exploit-routers-to-enable-dns-hijacking-operations" target="_blank" rel="noopener"&gt;National Cyber Security Centre&lt;/a&gt; (NCSC) and &lt;a href="https://www.microsoft.com/en-us/security/blog/2026/04/07/soho-router-compromise-leads-to-dns-hijacking-and-adversary-in-the-middle-attacks/" target="_blank" rel="noopener"&gt;Microsoft&lt;/a&gt; have exposed an extensive &lt;a href="https://www.techtarget.com/searchnetworking/tutorial/How-to-optimize-DNS-for-reliable-business-operations" target="_blank" rel="noopener"&gt;Domain Name System&lt;/a&gt; (DNS) hijacking campaign against vulnerable consumer and small and home office (Soho) broadband routers conducted by the Russian cyber intelligence services.&lt;/p&gt; 
&lt;p&gt;Orchestrated by APT28 or Forest Blizzard – &lt;a href="https://www.computerweekly.com/news/366627547/NCSC-exposes-Fancy-Bears-Authentic-Antics-malware-attacks" target="_blank" rel="noopener"&gt;more widely known as Fancy Bear&lt;/a&gt; – the operations saw the threat actor alter the settings of compromised devices to reroute internet traffic through malicious servers they held.&lt;/p&gt; 
&lt;p&gt;In this way, Fancy Bear was able to steal data such as login credentials, passwords and access tokens from personal web and email services belonging to their victims in a so-called adversary-in-the-middle (AiTM) attack.&lt;/p&gt; 
&lt;p&gt;The NCSC said the campaign was likely opportunistic, with Fancy Bear having cast a wide net to ensnare as many victims as possible. By targeting &lt;a href="https://www.computerweekly.com/news/252523313/DrayTek-patches-SOHO-router-bug-that-left-thousands-exposed" target="_blank" rel="noopener"&gt;insecure home and small office equipment&lt;/a&gt;, Fancy Bear took advantage of less closely monitored or managed assets to pivot into larger enterprise environments or targets of interest to Russian intelligence.&lt;/p&gt; 
&lt;p&gt;Indeed, Microsoft said it had identified over 200 organisations and 5,000 consumer devices impacted since the campaign began in August 2025.&lt;/p&gt; 
&lt;p&gt;“This activity demonstrates how exploited vulnerabilities in widely used network devices can be leveraged by sophisticated hostile actors,” said NCSC operations director Paul Chichester.&lt;/p&gt; 
&lt;p&gt;“We strongly encourage organisations and network defenders to familiarise themselves with the techniques described in the advisory and to follow the mitigation advice. The NCSC will continue to expose Russian malicious cyber activity and provide practical guidance to help protect UK networks.”&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Routers on trial"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Routers on trial&lt;/h2&gt;
 &lt;p&gt;The exposure of Fancy Bear’s latest campaign comes amid a fierce debate on the other side of the Atlantic following the Federal Communications Commission’s (FCC’s) implementation of &lt;a href="https://www.computerweekly.com/news/366640628/US-government-bans-imported-routers-raising-tough-questions" target="_blank" rel="noopener"&gt;tight restrictions on routers built outside the US&lt;/a&gt; – which in effect means virtually every commercially available router.&lt;/p&gt;
 &lt;p&gt;The US’s decision was framed on the basis that such hardware poses an unacceptable risk to the country’s national security and that of its citizens and residents.&lt;/p&gt;
 &lt;p&gt;However, it has been criticised on the basis that while it eases fears over the potential for other governments – such as China – to interfere with networking hardware produced in their factories, it does not address the fact that security vulnerabilities such as those exploited by Fancy Bear will still exist regardless of where they were manufactured.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.computerweekly.com/opinion/Banning-routers-wont-fix-whats-already-broken" target="_blank" rel="noopener"&gt;Writing in Computer Weekly&lt;/a&gt;, Forescout vice-president of security intelligence Rik Ferguson said routers present highly attractive footholds for attackers because they sit at the network edge, generally face the public internet, and are easily overlooked once deployed.&lt;/p&gt;
 &lt;p&gt;“Many of the weaknesses we see come from familiar, measurable issues like outdated software components, slow patching cycles, weak credentials, exposed management interfaces and long lifespans that extend well beyond vendor support,” he said.&lt;/p&gt;
 &lt;p&gt;“In firmware analysis, we regularly see common components that are years behind current versions, carrying known vulnerabilities that attackers can and do exploit.”&lt;/p&gt;
 &lt;p&gt;Ferguson advised security teams to treat routers and similar network infrastructure as part of the active attack surface, which in practice means keeping accurate inventories, prioritising their lifecycle management, and enforcing firmware updates and patching.&lt;/p&gt;
 &lt;p&gt;To prevent attackers like Fancy Bear from scoring easy wins, security teams should also look to disable any internet-exposed management interfaces, enforce unique credentials and apply network segmentation measures so that one compromised router does not necessarily enable wider access.&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Read more about network security&lt;/h3&gt; 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;Threat actors are using increasingly sophisticated tools to make their attacks more costly. It’s time for organisations to craft &lt;a href="https://www.techtarget.com/searchnetworking/answer/How-are-network-management-and-security-converging" target="_blank" rel="noopener"&gt;a comprehensive security management strategy&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;5G has better security than 4G, including stronger encryption, privacy and authentication. But enterprises need to know the challenges of &lt;a href="https://www.techtarget.com/searchnetworking/tip/5G-security-Everything-you-should-know-for-a-secure-network" target="_blank" rel="noopener"&gt;5G’s complex, virtualised architecture&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;What does 2026 have in store for network security? Omdia analyst John Grady shares his top five predictions &lt;a href="https://www.techtarget.com/searchsecurity/opinion/NetworkSecurity-predictions" target="_blank" rel="noopener"&gt;for the upcoming year&lt;/a&gt;.&lt;/li&gt; 
   &lt;/ul&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/section&gt;</body>
            <description>The UK’s NCSC and Microsoft have shared details of an ongoing cyber espionage campaign targeting vulnerable network routers, orchestrated by Russian state actor Fancy Bear</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/HeroImages/bear-wild-threat-Lubos-Chlubny-adove.jpg</image>
            <link>https://www.computerweekly.com/news/366641403/Russian-cyber-spies-targeting-consumer-Soho-routers</link>
            <pubDate>Tue, 07 Apr 2026 14:55:00 GMT</pubDate>
            <title>Russian cyber spies targeting consumer, Soho routers</title>
        </item>
        <item>
            <body>&lt;p&gt;There is a familiar story that plays out every time another news report emerges of children being seriously harmed online. Parents are told to “take control”. Schools are asked to “do more”. Tech companies promise another round of tweaks. But this framing misses the real issue. The harm children experience on social media is not a failure of parenting or education. It is the outcome of commercial systems designed to maximise engagement at all costs.&lt;/p&gt; 
&lt;p&gt;If the tech sector genuinely prioritised child safety, we would not be facing the scale of harm that now confronts children and young people. What is happening online is not accidental, or the result of a few bad actors. It is the consequence of algorithmic recommender systems deliberately engineered to keep users scrolling. Systems optimised for profit do not suddenly behave differently because the user is a child.&lt;/p&gt; 
&lt;p&gt;This was laid bare by the findings of the &lt;a href="https://bigtechlittlevictims.org/"&gt;&lt;i&gt;Big tech’s little victims&lt;/i&gt;&lt;/a&gt; algorithm experiment. The project, led by the National Education Union, created four fictional profiles of British 13-year-olds across TikTok, Snapchat, YouTube and Instagram to see what content children are served when they sign up for the first time. The results were shocking, but sadly not surprising to teachers. Within minutes, children were shown harmful and inappropriate content, including guns, self-harm, sexualised material and misogynistic narratives.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Harmful material in three minutes"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Harmful material in three minutes&lt;/h2&gt;
 &lt;p&gt;Most alarming, the experiment found that for every minute spent scrolling, children were shown a piece of concerning content. Harmful material appeared within just three minutes of logging on – and in some cases it was the very first thing served.&lt;/p&gt;
 &lt;p&gt;This matters because teachers are not debating the online harm of children in theory - they are already dealing with its consequences. In classrooms, we see the impact of children being exposed to violent content, self-harm and suicide material, sexualised imagery, and extreme narratives pushed at scale.&lt;/p&gt;
 &lt;p&gt;One visible example is the rise of online misogyny - girls being targeted or harassed, and female staff facing open hostility. What starts on a feed becomes offline behaviour and, once embedded, becomes far harder for schools to unpick. As Louis Theroux’s recent documentary &lt;i&gt;The manosphere&lt;/i&gt; has brought into sharp focus, the scaling of misogynistic content, for example, is not incidental - it is by design.&lt;/p&gt;
 &lt;p&gt;So what needs to happen?&lt;/p&gt;
 &lt;p&gt;First, we need honesty about the limits of half measures. The government has launched a &lt;a href="https://www.computerweekly.com/news/366639654/UK-government-consults-on-social-media-ban-for-under-16s"&gt;national consultation on children’s digital wellbeing&lt;/a&gt;. Ministers have also announced a &lt;a href="https://www.gov.uk/government/news/children-and-parents-to-pilot-social-media-bans-time-limits-and-curfews-at-home-as-government-tests-next-steps-to-give-uk-kids-their-childhood-back"&gt;six-week pilot&lt;/a&gt; involving 300 teenagers, in which families will trial different forms of social media restriction at home – including disabling social media apps entirely, imposing one-hour daily limits, or enforcing overnight curfews – with a control group continuing as normal, to assess the impact on children’s sleep, wellbeing and school life.&lt;/p&gt;
 &lt;p&gt;This approach fundamentally misunderstands how social media platforms actually work. A partial ban that still leaves some children on social media is not a meaningful test of safety. Harmful content does not stay neatly contained on one screen. If even one child in a friendship group remains on a platform, others will still be exposed through shared videos, images and messages. When algorithms can push extreme material within minutes of account creation, tinkering with time limits or overnight blocks will not keep children safe.&lt;/p&gt;
 &lt;p&gt;Secondly, tech companies must take accountability now, not later. If platforms know a user is a child – or cannot be sure they are not – the duty of care must be to prevent foreseeable harm by design, not to apologise after it happens.&lt;/p&gt;
&lt;/section&gt;        
&lt;section class="section main-article-chapter" data-menu-title="Why social media for under 16s should be banned"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Why social media for under 16s should be banned&lt;/h2&gt;
 &lt;p&gt;This failure is why we are calling for a &lt;a href="https://informaplc-my.sharepoint.com/personal/bill_goodwin_informa_com/Documents/Documents/Computer%20Weekly%20Files/2026%20Documents/2026%20Opinions/The%20UK’s%20proposed%20social%20media%20ban%20explained"&gt;ban on social media access for under-16s&lt;/a&gt;. Of course, raising the age of access is not a silver bullet. It must be paired with guaranteed space in the curriculum for high quality digital literacy, so young people develop the skills to navigate online life safely and critically.&lt;/p&gt;
 &lt;p&gt;The tech sector has had repeated warnings, mounting evidence and countless opportunities to act - and it has failed to do so. That is why government action now matters. Raising the age of social media access to 16 is the only meaningful step that would reduce harm at scale – and every day of inaction leaves more children exposed to avoidable harm.&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Read more on proposals for a UK social media ban&lt;/h3&gt; 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;&lt;a href="The%20UK’s%20proposed%20social%20media%20ban%20explained"&gt;The UK’s proposed social media ban explained&lt;/a&gt; -The UK government will use new legal powers to lay the groundwork for an under-16 social media ban after its consultation on children’s digital well-being, but opponents warn the measures being considered will only treat the symptoms of the problem if they ignore the structural power of big tech&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366639654/UK-government-consults-on-social-media-ban-for-under-16s"&gt;UK government consults on social media ban for under-16s&lt;/a&gt;.&lt;b&gt; &lt;/b&gt;A UK government consultation launched today asks whether under-16s should be banned from social media, and age restrictions introduced for VPNs and chatbot&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366639244/Governments-urged-to-step-up-enforcement-of-big-tech-amid-rush-to-ban-social-media-for-under-16s"&gt;Governments urged to step up enforcement of big tech amid rush to ban social media for under-16s&lt;/a&gt; - The Council of Europe’s Commissioner for Human Rights says that European governments should consider better enforcement against big tech companies before banning children from social media&lt;/li&gt; 
   &lt;/ul&gt;
  &lt;/div&gt;
 &lt;/div&gt;
 &lt;p&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>The general secretary of the UK's largest teachers’ union explains why social media should be banned for under-sixteens</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/HeroImages/child-kid-teen-phone-JackF-adobe.jpg</image>
            <link>https://www.computerweekly.com/opinion/Tech-cant-wait-for-regulation-to-protect-children-online</link>
            <pubDate>Tue, 07 Apr 2026 14:38:00 GMT</pubDate>
            <title>Tech can’t wait for regulation to protect children online</title>
        </item>
        <item>
            <body>&lt;p&gt;&lt;a href="https://www.computerweekly.com/resources/Identity-and-access-management-products" target="_blank" rel="noopener"&gt;AI-driven identity solutions&lt;/a&gt; are often presented as the grown-up answer to modern access control: smarter verification, less friction, better security, happier users. In principle, yes. In practice, they also drag a fairly hefty suitcase of compliance, privacy and ethical questions in behind them.&lt;/p&gt; 
&lt;p&gt;The first issue is compliance. Identity is not a side topic in enterprise environments. It sits right in the middle of security, governance, risk and accountability. Once AI is involved in deciding who gets access, who is challenged, who is flagged as suspicious, or who is denied entry altogether, that stops being just a technical control and quickly becomes a governance matter. Many of these solutions rely on large volumes of personal data, sometimes including biometrics, behavioural analysis, device data, location information and patterns of use. That means organisations need to be crystal clear on lawful basis, necessity, proportionality, retention and oversight. In other words, they need to know not just that the tool can do something, but that they should be doing it at all. Like knowing that an iPhone is a tool, not the conversation.&lt;/p&gt; 
&lt;p&gt;Privacy is where things get a bit soupy. AI identity systems are usually marketed on the basis that they can take more signals into account and make better decisions as a result. That sounds great, and sometimes it is. But it also means more collection, more processing and more potential intrusion. The line between intelligent authentication and overreach can get thin very quickly. Data gathered to confirm identity can easily become data used to monitor behaviour, profile staff, track habits or support broader surveillance if the guardrails are poor. That is where trust starts to wobble. Enterprises need privacy by design, proper impact assessments, transparent notices and disciplined boundaries around how identity data is used. Just because a system can infer more does not mean it should. It’s a potential minefield that should be navigated mindfully and with integrity.&lt;/p&gt; 
&lt;div class="extra-info"&gt;
 &lt;div class="extra-info-inner"&gt;
  &lt;h3 class="splash-heading"&gt;The Computer Weekly Security Think Tank on AI and identity&lt;/h3&gt; 
  &lt;ul class="default-list"&gt; 
   &lt;li&gt;Mike Gillespie, Advent IM: &lt;a href="https://www.computerweekly.com/opinion/The-impact-of-AI-driven-ID-solutions-on-enterprise-environments" target="_blank" rel="noopener"&gt;AI-driven identity must exist in a robust compliance framework&lt;/a&gt;.&lt;/li&gt; 
  &lt;/ul&gt;
 &lt;/div&gt;
&lt;/div&gt; 
&lt;p&gt;That brings us to is the ethical question, which is where the machine gets a little too smug for its own good. AI models are not neutral simply because they are mathematical. If an identity tool has been trained on incomplete or biased data, it may perform unevenly across different groups. That can lead to higher false rejections, repeated challenges for legitimate users, or decisions that disproportionately affect certain individuals. In a business setting, that is not just inconvenient. It can be unfair, exclusionary and potentially discriminatory. Organisations cannot simply deploy these systems and hope the algorithm behaves itself. That’s magical thinking.&lt;/p&gt; 
&lt;p&gt;Explainability matters too. If someone is denied access, locked out of a process or flagged as high risk, there must be a way to explain that decision in plain language and to challenge it if necessary. Black box identity decisions are a poor fit for any organisation trying to claim strong governance. Human review, escalation routes and clear accountability all need to be part of the design.&lt;/p&gt; 
&lt;p&gt;The real implication is that AI-driven identity should never be treated as a shiny bolt-on security upgrade. It is part of a much bigger picture involving data protection, user trust, accountability and control. Used well, it can strengthen resilience and reduce fraud. Used badly, it can create exactly the kind of opaque, over-engineered risk that good governance is supposed to prevent. The smart approach is not to resist the technology, but to govern it properly from the outset. Because in identity, as in most things, clever without controlled is just chaos in a smarter outfit.&lt;/p&gt; 
&lt;div class="extra-info"&gt;
 &lt;div class="extra-info-inner"&gt;
  &lt;h3 class="splash-heading"&gt;Read more about AI regulation&lt;/h3&gt; 
  &lt;ul style="list-style-type: square;" class="default-list"&gt; 
   &lt;li&gt;As AI rules evolve, compliance grows more complex. CIO Jonas Hansson encourages IT leaders to assess data risk and track vendor sub-processors&amp;nbsp;&lt;a rel="noopener" target="_blank" href="https://www.techtarget.com/searchcio/feature/How-axis-communications-navigates-global-ai-regulation"&gt;to stay compliant.&lt;/a&gt;&lt;/li&gt; 
   &lt;li&gt;Medicines and Healthcare products Regulatory Agency (MHRA) wants to know how to regulate AI technologies in the NHS&amp;nbsp;&lt;a rel="noopener" target="_blank" href="https://www.computerweekly.com/news/366636693/MHRA-seeks-views-on-healthcare-AI-regulation"&gt;while keeping patients safe&lt;/a&gt;.&lt;/li&gt; 
   &lt;li&gt;With AI, it's better to be proactive, not reactive. This tracker compiles the major AI legislation, laws and frameworks&amp;nbsp;&lt;a rel="noopener" target="_blank" href="https://www.techtarget.com/searchenterpriseai/tip/Global-AI-legislation-and-regulation-tracker"&gt;across the US, Europe, Asia and beyond&lt;/a&gt;.&lt;/li&gt; 
  &lt;/ul&gt;
 &lt;/div&gt;
&lt;/div&gt;</body>
            <description>The Computer Weekly Security Think Tank considers the intersection of AI and IAM. In this article, learn how AI-driven IAM projects must account for important questions around data protection, user trust, accountability and control.</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/Hero%20Images/Security-Think-Tank-hero.jpg</image>
            <link>https://www.computerweekly.com/opinion/Identity-and-AI-Questions-of-data-security-trust-and-control</link>
            <pubDate>Thu, 02 Apr 2026 14:15:00 GMT</pubDate>
            <title>Identity and AI: Questions of data security, trust and control</title>
        </item>
        <item>
            <body>&lt;p&gt;The boilerplate has it that German software powerhouse &lt;a href="https://www.sap.com/index.html" target="_blank" rel="noopener"&gt;SAP&lt;/a&gt; supports mission-critical workloads for thousands of customers all over the world, and as one of the biggest customers of the big three hyperscalers – Amazon Web Services (AWS), Google Cloud and Microsoft Azure – probably runs the largest private cloud in the world.&lt;/p&gt; 
&lt;p&gt;However large its business may be aside, under the surface, the complexities that SAP experiences in securing the confidential enterprise data of thousands of its clients while dealing with an ever-more dangerous threat landscape and the ever-changing data security compliance and sovereignty requirement environment are undeniable.&lt;/p&gt; 
&lt;p&gt;This surely makes former chess champion and candidate master Roland Costea, now SAP chief information security officer (CISO) for enterprise cloud services, one of the world’s busiest cyber professionals.&lt;/p&gt; 
&lt;p&gt;“The main challenge for us when it comes to security is we need to have the right visibility end-to-end [and] we need to act with speed into all the layers of identity, detect, protect, respond and recovery,” Costea tells Computer Weekly.&lt;/p&gt; 
&lt;p&gt;If it sounds like a tall order, it is. The price of analysing such vast datasets, which regularly exceed 150TB per month, via Splunk, was becoming too much to bear, says Costea, not just in terms of time, but in terms of network capacity and financial cost as well. To make matters worse, it wasn’t even analysing half of its data.&lt;/p&gt; 
&lt;p&gt;The problem this created for SAP and its customers is obvious: it simply wasn’t possible to find all the relevant security signals. Important things were probably being missed, and that’s far from ideal. Take vulnerability management, which Costea says has been a problem “since forever”. Traditionally, he would scan the environment for a new vulnerability, research whether an exploit was available, and patch it if possible.&lt;/p&gt; 
&lt;p&gt;“But every exploit has preconditions,” he says, “and SAP is so complex that the preconditions for an exploit may be a list of 10 or 12 things that I want to know in real time. I want to know … am I vulnerable to this, and why, and to be able to inject and search for what kind of preconditions I have there and how they are configured, and to know, based on the state the application has today, that I am or am not vulnerable.&lt;/p&gt; 
&lt;p&gt;“I can’t do that with the vulnerability management tool, I can’t do that with an &lt;a href="https://www.techtarget.com/searchsecurity/tip/SIEM-vs-SOAR-vs-XDR-Evaluate-the-differences" target="_blank" rel="noopener"&gt;XDR&lt;/a&gt; [extended detection and response], I can’t do that with any tool on the market,” adds Costea.&lt;/p&gt; 
&lt;p&gt;New, advanced approaches to security data analytics were clearly needed, and in a bid to ease some of its burdens – SAP has now teamed up with &lt;a href="https://www.uptycs.com/" target="_blank" rel="noopener"&gt;Uptycs&lt;/a&gt;, a Boston innovator in AI-powered hybrid cloud security, to implement its &lt;a href="https://www.uptycs.com/juno-ai" target="_blank" rel="noopener"&gt;Juno AI&lt;/a&gt; analyst platform.&lt;/p&gt; 
&lt;p&gt;“Uptycs is in the business of cloud infrastructure security,” says company founder and CEO Ganesh Pai. “What that means is, when large enterprises and operators such as SAP deploy massive infrastructure in one of the large hyperscalers, we provide the technology which gets integrated with their hyperscale providers and the workloads they run.&lt;/p&gt; 
&lt;p&gt;“We provide security observability, which manifests as a series of security controls or a &lt;a href="https://www.techtarget.com/searchsecurity/tip/CNAPP-vs-CSPM-Comparing-cloud-security-tools" target="_blank" rel="noopener"&gt;cloud-native application protection platform&lt;/a&gt; [CNAPP], a suite of tooling which empowers organisations to do both proactive and reactive security controls, most of which fall in the bucket of governance, regulation and compliance, or that of threat operations, detection and response, incident response, and the like.”&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="D’you know Juno?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;D’you know Juno?&lt;/h2&gt;
 &lt;p&gt;Juno itself joins AI agents and human cyber analysts together in a team where the humans are left free to concentrate on advanced threat hunting and deeper attack path analysis while the AI handles the grunt work.&lt;/p&gt;
 &lt;p&gt;According to Pai, Juno was originally built as a threat-hunting tool for both cloud-native and on-premise environments, but, working alongside the likes of SAP, it is now delivering more value as a strategic agentic consultant that goes beyond standard threat detection.&lt;/p&gt;
 &lt;p&gt;“Why this is important is that, as you can imagine, there is a lot of AI which is available out there today, but we harness telemetry and we make it available in a way such that in addition to what we collect, we’re able to integrate with the [customer] data lake to provide an interface which inspires user confidence,” he says.&lt;/p&gt;
 &lt;p&gt;“This is key because when they start asking ad hoc questions across the spectrum of security controls that are needed, the answers which come back inspire confidence by showing the elements of trust but verify.”&lt;/p&gt;
 &lt;p&gt;In essence, while many threat-hunting agents will happily yell “fire”, they won’t say why (and like a too-sensitive fire alarm, they will often be responding to burnt toast). Juno differs, says Pai, because its outputs are verifiable – a human can check its output against the same signals, and it cites its sources and produces its receipts.&lt;/p&gt;
 &lt;p&gt;“That’s where the value proposition of what we built comes into play,” he tells Computer Weekly. “We built an agent tech framework which marries the rest of the components to create workflows. And hence it’s not a typical agent; it has got autonomous abilities to go and do a series of steps which a human would have otherwise hours, or, in some cases, weeks, and it’s able to collapse that into order.”&lt;/p&gt;
 &lt;p&gt;Pai, who coined the term “the Wikipedia of cyber” with help from his public relations team, claims Juno is already capable of producing “McKinsey-level” strategic risk reports in minutes.&lt;/p&gt;
 &lt;p&gt;“The industry is tired of security slop and AI that guesses,” he says. “This partnership demonstrates how we can safely combine human and AI capabilities, moving from reactive security to strategic transformation.”&lt;/p&gt;
&lt;/section&gt;         
&lt;section class="section main-article-chapter" data-menu-title="Juno in practice"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Juno in practice&lt;/h2&gt;
 &lt;p&gt;So, how is SAP using Juno? Costea explains: “We have smaller lakes in every subscription based on hyperscalers, but we also have what we call a big data lake based in Databricks today that represents the core for us.&lt;/p&gt;
 &lt;p&gt;“What we are building with Uptycs is, practically, more like an in-house in private cloud mechanism to have real-time activity and real-time searches and real-time insights based on all the possible data sets and telemetry we have stored in Databricks, because it’s much cheaper than sending it to Splunk, and we can get to a level of granularity that we could never go to with Splunk,” he says.&lt;/p&gt;
 &lt;p&gt;“What we are looking for all the time is what I like to call the low and slow operational activities that could become a suspicious attempt.”&lt;/p&gt;
 &lt;p&gt;For example, a user with valid cloud identity session has accessed the AWS instance and assumed what appears to be a normal deployment role in a standard continuous integration and deployment (CI/CD) pipeline, but is then using the system manager in AWS to access a small set of different instances and conduct additional actions in the bucket: maybe they enhance their permissions in some way, or exfiltrate a small snapshot to another account. It could be nothing.&lt;/p&gt;
 &lt;p&gt;“It’s literally normal – nothing fancy or extensive,” says Costea. “What you will see with normal toolsets, say you have an XDR on the endpoint, you will maybe see a shell, but for an admin, if it’s nothing malicious, it’s normal.&lt;/p&gt;
 &lt;p&gt;“If you are not granularly looking and correlating the right context, the right action, the right timing, and all that, it’s hard to get to the point where you can say it’s actually suspicious.&lt;/p&gt;
 &lt;p&gt;“What you can do with Uptycs and Juno by searching in the big pool of data is you can say, show me some evidence of, let’s say, an identity session provenance, or a role assumption, or a permission change, and then show me some specific commands that were made,” he says. “Then you can search all the datasets and find the trails and everything that happened that, in the end, could say that from an operational perspective, that’s not normal activity for us – there’s something weird happening.”&lt;/p&gt;
 &lt;p&gt;It’s these details, says Costea, that matter the most for SAP, because ultimately, it enables his defenders to spot discrepancies and oddities before they blow up into something much noisier – in the worst-case scenario, ransomware.&lt;/p&gt;
&lt;/section&gt;         
&lt;section class="section main-article-chapter" data-menu-title="New toys"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;New toys&lt;/h2&gt;
 &lt;p&gt;For Costea, the value SAP is realising from Juno is apparent when he thinks about how his team is responding to it. He compares them – not unkindly – to kids showing off a new toy to their parent.&lt;/p&gt;
 &lt;p&gt;“It’s that kind of feeling like they got a new toy, and they are so excited about it, and they are trying to exploit it to the level that they can do more things,” he says.&lt;/p&gt;
 &lt;p&gt;“They’re discovering things that they were not able to see before or they thought did not exist.”&lt;/p&gt;
 &lt;p&gt;Again, much of what Juno is surfacing is not, in the moment, malicious or necessarily even suspicious, says Costea, but rather an indication that people are doing things that they shouldn’t be doing or shouldn’t be able to.&lt;/p&gt;
 &lt;p&gt;This kind of data, previously inaccessible, is incredibly valuable to the security team because if a random administrator at SAP was able to perform a dangerous action, an attacker already inside the organisation’s network certainly could. This knowledge enables them to work potential attack scenarios that may not have been obvious before.&lt;/p&gt;
 &lt;p&gt;“Security in today’s cloud-centric world demands tools that not only detect threats, but elevate strategic decision-making,” he says.&lt;/p&gt;
 &lt;p&gt;“Our partnership with Uptycs reflects a shared commitment to verifiable, intelligent cyber security solutions that empower teams to stay ahead of risk while transforming how enterprise security operates.”&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Read more about AI for security professionals&lt;/h3&gt; 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;Agentic AI is touted as a helpful tool for managing tasks, and cyber criminals are already taking advantage. &lt;a href="https://www.computerweekly.com/feature/Are-AI-agents-a-blessing-or-a-curse-for-cyber-security" target="_blank" rel="noopener"&gt;Should information security teams look to AI agents to keep up? &lt;/a&gt;&lt;/li&gt; 
    &lt;li&gt;Cyber security companies have jumped on the AI bandwagon. We look at where artificial intelligence is a useful add-on &lt;a href="https://www.computerweekly.com/feature/Making-sense-of-AIs-role-in-cyber-security" target="_blank" rel="noopener"&gt;and where it poses potential risks&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;At RSA in San Francisco, NCSC chief exec Richard Horne says security professionals have an opportunity and a responsibility to get in front of the security issues &lt;a href="https://www.computerweekly.com/news/366640680/Cyber-pros-must-grasp-the-vibe-coding-nettle-says-NCSC-chief" target="_blank" rel="noopener"&gt;raised by the popularity of ‘vibe coding’&lt;/a&gt;.&lt;/li&gt; 
   &lt;/ul&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/section&gt;</body>
            <description>SAP runs enormous cloud environments for some of the world’s most heavily-regulated organisations, and in the hyperscale era, data security and compliance were becoming big challenges. It turned to cutting-edge agentic tools from Uptycs to cut through the noise</description>
            <image>https://cdn.ttgtmedia.com/visuals/LeMagIT/hero_article/Hero-Danger-by-InfiniteFlow-Adobe-10.jpg</image>
            <link>https://www.computerweekly.com/news/366641057/How-Wikipedia-of-cyber-helps-SAP-make-sense-of-threat-data</link>
            <pubDate>Thu, 02 Apr 2026 10:15:00 GMT</pubDate>
            <title>How ‘Wikipedia of cyber’ helps SAP make sense of threat data</title>
        </item>
        <item>
            <body>&lt;p&gt;News that an estimated 30,000 employees are losing their jobs at Oracle comes at a time when the company is claiming to have&amp;nbsp;&lt;a href="https://www.computerweekly.com/news/366640817/Oracle-Cloud-Infrastructure-The-bare-metal-facts"&gt;$533bn in orders to fulfil&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;As of May 2025, Oracle had a workforce of approximately 165,000. Its latest quarterly earnings filing shows that the company expects revenue of $67bn and capital expenditure of $50bn in 2026, which it stated is unchanged from its previous financial guidance.&lt;/p&gt; 
&lt;p&gt;For 2027, Oracle’s financial guidance forecasts revenue of $90bn. Neither the latest quarterly earnings filing nor the subsequent earnings call with financial analysts revealed any changes to headcount.&lt;/p&gt; 
&lt;p&gt;Yet, in a widely reported&amp;nbsp;&lt;a href="https://www.linkedin.com/in/michael-shepherd-6b374033/"&gt;LinkedIn post, Michael Shepherd,&lt;/a&gt;&amp;nbsp;an artificial intelligence (AI) operations lead at Oracle Cloud Infrastructure (OCI), reposted messages from several colleagues at the company saying they had been made redundant in the latest round of job cuts.&lt;/p&gt; 
&lt;p&gt;One post, from a security alert manager at Oracle, sums up the situation, stating: “Many of the absolute best colleagues were laid off as well. It seems layoffs follow an algorithm of high-level individual contributors and mid-level managers – especially those with outstanding stock options.”&lt;/p&gt; 
&lt;p&gt;A post from a former employee – responsible for managing a team to ensure Oracle products and services offered by the business comply with standards such as PCI-DSS (Payment Card Industry Data Security Standard), HIPAA (Health Insurance Portability and Accountability Act), PA-DSS (Payment Application Data Security Standard) and GDPR (General Data Protection Regulation) – described the layoffs as “unprecedented”.&lt;/p&gt; 
&lt;p&gt;A former principal staff engineer posted: “I have quite a few friends who were laid off today. Top performers, extremely talented and really solid at their job. They just got caught up in a wave.”&lt;/p&gt; 
&lt;p&gt;Another, who describes himself as a founding engineer at OCI’s File Storage Service, said he has handled “countless on-call shifts and solved countless problems under pressure” during his tenure at Oracle.&lt;/p&gt; 
&lt;p&gt;Those posting include people with job roles such as service operations engineer, software development architect and software development manager.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;While these LinkedIn posts represent just a small snapshot of the job losses at the tech giant, they illustrate that the cuts have affected senior people involved closely in product development, security and regulatory compliance.&lt;/p&gt; 
&lt;p&gt;At the time of writing, Computer Weekly had not received a response from Oracle about how the job cuts would affect its customers and product development.&amp;nbsp;&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Is AI behind the headcount reduction?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Is AI behind the headcount reduction?&lt;/h2&gt;
 &lt;p&gt;In its&amp;nbsp;&lt;a href="https://www.computerweekly.com/news/366639939/Oracle-cost-cutting-points-to-AI-infrastructure-gamble"&gt;fiscal year 2026 third-quarter earnings call&lt;/a&gt;&amp;nbsp;in March, the company reported cloud infrastructure revenue of $4.9bn, up 84%. At the time, Oracle co-CEO Mike Sicilia spoke about AI helping the company to deliver software more quickly.&lt;/p&gt;
 &lt;p&gt;“The use of AI coding tools inside Oracle is enabling smaller engineering teams to deliver more complete solutions to our customers more quickly,” he said. “We are building brand-new SaaS [software-as-a-service] products using AI, and embedding AI agents right into our existing application suites.”&lt;/p&gt;
 &lt;p&gt;Sicilia’s sentiment on the role of AI was mirrored by Steve Miranda during his appearance at the &lt;a href="https://www.computerweekly.com/news/366640560/Oracle-endows-Fusion-applications-with-more-autonomy"&gt;Oracle AI World Tour London&lt;/a&gt; event. When discussing people’s role in enterprise resource planning software, he suggested AI can replace certain tasks.&amp;nbsp;&lt;a href="https://www.computerweekly.com/blog/Cliff-Sarans-Enterprise-blog/Things-to-consider-about-Oracles-Agentic-Fusion"&gt;At the time, Miranda said&lt;/a&gt;: “Nobody is in business to run ERP [enterprise resource planning]. The more we can save them on the ERP side, the more they invest in what they do.”&lt;/p&gt;
 &lt;p&gt;While Oracle’s executive leadership team clearly has ambitions to deploy AI automation in roles previously achieved by humans, Forrester principal analyst JP Gownder believes the company’s decision to cut jobs is more focused on improving its share price.&lt;/p&gt;
 &lt;p&gt;“When AI replaces employees, an organisation has a vetted, proven and deployed AI solution that can do the job of the employees who lost their jobs,” he said. “That is to say, the work done by a human before the layoffs is being done by AI the day after the layoffs.”&lt;/p&gt;
 &lt;p&gt;Gownder added: “This is rare; even big tech firms don’t have mature AI agents that can take on the myriad tasks of dozens of different types of jobs that get eliminated. With Oracle, there are financial pressures to lay off staff – the company’s stock has fallen by more than 50% since Q3 2025.”&lt;/p&gt;
 &lt;p&gt;What this may point to is the financial markets being more cautious about Oracle’s ability to execute its AI strategy, especially as the company recently announced it would be seeking to raise $50bn in 2026 using a combination of debt and equity financing.&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Read more Oracle stories&lt;/h3&gt; 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366639064/Oracle-readies-AI-note-taker-for-NHS"&gt;Oracle readies AI note-taker&lt;/a&gt;&amp;nbsp;for NHS: The AI tool drafts structured notes from patient-clinician interactions, helping to reduce administrative work.&lt;/li&gt; 
    &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366640725/Oracle-applications-chief-sees-enterprise-AI-agents-as-task-specific-helpers"&gt;Oracle applications chief&lt;/a&gt; sees enterprise AI agents as task-specific helpers: At Oracle AI Summit in London, Steve Miranda, executive vice-president of Oracle applications development, discussed Oracle’s Fusion Agentic Applications.&lt;/li&gt; 
   &lt;/ul&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/section&gt;</body>
            <description>Thousands of job losses have been reported, affecting many roles at Oracle Cloud Infrastructure, including those in software engineering and product compliance</description>
            <image>https://cdn.ttgtmedia.com/visuals/German/article/job-interview-3-adobe.jpg</image>
            <link>https://www.computerweekly.com/news/366641177/Whats-driving-Oracles-latest-job-cuts</link>
            <pubDate>Thu, 02 Apr 2026 06:45:00 GMT</pubDate>
            <title>What’s driving Oracle’s latest job cuts?</title>
        </item>
        <item>
            <body>&lt;p&gt;As enterprises rush to integrate &lt;a href="https://www.techtarget.com/searchenterpriseai/definition/AI-Artificial-Intelligence" target="_blank" rel="noopener"&gt;artificial intelligenc&lt;/a&gt;e‑driven identity and verification solutions, it is tempting to be swept up in their operational elegance and apparent efficiency. But as I have argued repeatedly, deploying AI without &lt;i&gt;governance‑first thinking&lt;/i&gt; is a strategic mistake, and one that risks compliance failures, ethical missteps, and reputational harm. The UK’s shifting regulatory landscape and the emergence of new standards such as &lt;a href="https://www.iso.org/standard/42001" target="_blank" rel="noopener"&gt;ISO 42001&lt;/a&gt; only reinforce that &lt;a href="https://www.techtarget.com/searchsecurity/definition/governance-risk-management-and-compliance-GRC" target="_blank" rel="noopener"&gt;governance, risk and compliance&lt;/a&gt; (GRC) must sit ahead of technological adoption, not trail behind it.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://www.techtarget.com/searchenterpriseai/tip/Does-your-organization-need-an-AI-ethics-committee" target="_blank" rel="noopener"&gt;Ethical risks&lt;/a&gt; in AI identity systems include discriminatory bias, privacy intrusions, lack of transparency, excessive automation without oversight, and heightened risks for children and vulnerable populations, all consistently flagged across UK regulatory guidance and legal developments.&lt;/p&gt; 
&lt;p&gt;AI‑driven identity systems lean heavily on sensitive personal data; biometrics, behavioural signals, and other high‑risk attributes. AI’s appetite for data does not override the UK GDPR obligations around lawfulness, minimisation, purpose limitation, and transparency. &lt;a href="https://ico.org.uk/media2/migrated/4022261/how-to-use-ai-and-personal-data.pdf" target="_blank" rel="noopener"&gt;ICO guidance&lt;/a&gt; stresses that organisations deploying AI must conduct robust DPIAs, understand controller‑processor relationships, and maintain meaningful human oversight.&lt;/p&gt; 
&lt;p&gt;Ethically, the risks are just as significant. AI identity systems can amplify bias, disproportionately impact vulnerable groups, or become opaque decision‑engines that erode trust. Regulators are increasingly explicit that fairness, explainability, and contestability are not “nice to haves” but essential design principles embedded throughout the lifecycle of an AI system.&lt;/p&gt; 
&lt;p&gt;The UK is advancing a principles‑based, regulator‑led model for AI oversight. Even without a single AI Act, the &lt;a href="https://www.legislation.gov.uk/ukpga/2025/18/contents" target="_blank" rel="noopener"&gt;Data (Use and Access) Act 2025&lt;/a&gt;, updated ICO guidance, and ongoing reforms significantly shape how AI identity systems must operate.&lt;/p&gt; 
&lt;p&gt;The Data (Use and Access) Act 2025 expands organisational duties around automated processing, children’s data protections, and complaint handling, signaling that AI-driven identity checks will face greater scrutiny regarding oversight and safeguards.&lt;/p&gt; 
&lt;p&gt;Updated ICO guidance places renewed emphasis on fairness, transparency, and clear legal bases for processing, especially where AI influences decisions with “legal or similarly significant effects.”&lt;/p&gt; 
&lt;p&gt;Additionally, sector‑specific legislation such as the UK’s &lt;a href="https://www.gov.uk/government/publications/online-safety-act-explainer/online-safety-act-explainer" target="_blank" rel="noopener"&gt;Online Safety Act 2025&lt;/a&gt; mandates “highly effective” age and identity verification for high‑risk online services, again reinforcing the need for accuracy, privacy‑preserving methods, and demonstrable compliance.&lt;/p&gt; 
&lt;p&gt;The pattern is unmistakable: organisations must &lt;i&gt;prove&lt;/i&gt; responsible use, not merely assert it.&amp;nbsp;That means implementing effective GRC as part of the adoption.&lt;/p&gt; 
&lt;p&gt;ISO/IEC 42001, the world’s first AI management system standard, introduces a structured approach for governing AI responsibly,&amp;nbsp;integrating leadership accountability, lifecycle controls, risk assessment, and ongoing performance evaluation.&lt;/p&gt; 
&lt;p&gt;It provides a governance architecture that organisations can use to ensure AI identity solutions are explainable, monitored, tested, and continuously improved.&lt;/p&gt; 
&lt;p&gt;ISO 42001 does not replace compliance obligations&amp;nbsp;but it provides the organisational discipline needed to navigate them confidently.&lt;/p&gt; 
&lt;p&gt;Implementing effective GRC requires embedding governance from the outset: adopting ISO 42001’s structured AI management framework, performing DPIAs, enforcing privacy‑ and fairness‑by‑design, maintaining transparency and documentation, and ensuring robust human oversight.&lt;/p&gt; 
&lt;p&gt;AI‑driven identity solutions offer genuine value, but only when implemented within a robust framework of governance, privacy protection, and ethical responsibility. Emerging UK legislation and ISO 42001 do not constrain innovation, they make it sustainable. The organisations that succeed will be those that resist the lure of technology‑led adoption and instead build AI identity solutions on a foundation of trust, accountability, and principled design.&lt;/p&gt; 
&lt;p&gt;With regulators increasingly focused on accountability, fairness, and privacy, these measures are no longer optional. They are essential for safe, lawful, and responsible AI identity management.&lt;/p&gt; 
&lt;p&gt;The message aligns closely with the argument I’ve long made: privacy and ethics are not parallel workstreams; they form the foundation for any legitimate use of AI.&lt;/p&gt; 
&lt;div class="extra-info"&gt;
 &lt;div class="extra-info-inner"&gt;
  &lt;h3 class="splash-heading"&gt;Read more about AI regulation&lt;/h3&gt; 
  &lt;ul class="default-list"&gt; 
   &lt;li&gt;As AI rules evolve, compliance grows more complex. CIO Jonas Hansson encourages IT leaders to assess data risk and track vendor sub-processors &lt;a href="https://www.techtarget.com/searchcio/feature/How-axis-communications-navigates-global-ai-regulation" target="_blank" rel="noopener"&gt;to stay compliant. &lt;/a&gt;&lt;/li&gt; 
   &lt;li&gt;Medicines and Healthcare products Regulatory Agency (MHRA) wants to know how to regulate AI technologies in the NHS &lt;a href="https://www.computerweekly.com/news/366636693/MHRA-seeks-views-on-healthcare-AI-regulation" target="_blank" rel="noopener"&gt;while keeping patients safe&lt;/a&gt;.&lt;/li&gt; 
   &lt;li&gt;With AI, it's better to be proactive, not reactive. This tracker compiles the major AI legislation, laws and frameworks &lt;a href="https://www.techtarget.com/searchenterpriseai/tip/Global-AI-legislation-and-regulation-tracker" target="_blank" rel="noopener"&gt;across the US, Europe, Asia and beyond&lt;/a&gt;.&lt;/li&gt; 
  &lt;/ul&gt;
 &lt;/div&gt;
&lt;/div&gt;</body>
            <description>The Computer Weekly Security Think Tank considers the intersection of AI and IAM. In this article, learn how while AI‑driven identity solutions offer genuine value, they must be implemented within a robust framework of governance, privacy protection, and ethical responsibility.</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/Hero%20Images/Security-Think-Tank-hero.jpg</image>
            <link>https://www.computerweekly.com/opinion/The-impact-of-AI-driven-ID-solutions-on-enterprise-environments</link>
            <pubDate>Wed, 01 Apr 2026 15:12:00 GMT</pubDate>
            <title>AI-driven identity must exist in a robust compliance framework</title>
        </item>
        <item>
            <body>&lt;p&gt;The &lt;a title="https://www.computerweekly.com/news/366640628/US-government-bans-imported-routers-raising-tough-questions" target="_blank" href="https://www.computerweekly.com/news/366640628/US-government-bans-imported-routers-raising-tough-questions" rel="noopener"&gt;US decision&lt;/a&gt;&amp;nbsp;to add foreign-made consumer routers to the FCC’s Covered List has sparked predictable debate about supply chains, geopolitics and trust. Those are valid concerns. But if we are honest about where risk actually sits today, the truth is that the ban addresses tomorrow’s procurement decisions far more than today’s security exposure.&lt;/p&gt; 
&lt;p&gt;That matters, because attackers are not waiting for procurement cycles.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://www.techtarget.com/searchnetworking/definition/router" target="_blank" rel="noopener"&gt;Routers&lt;/a&gt; have quietly become one of the most attractive footholds in both enterprise and home networks. They sit at the edge, are often internet-facing and frequently overlooked once deployed. In our own research, routers consistently rank among the riskiest devices, with high vulnerability density and a growing role in real-world exploitation.&lt;/p&gt; 
&lt;p&gt;Whereas the FCC decision focuses on where a device is made, the problem organisations need to deal with is how those devices are built, managed and maintained.&lt;/p&gt; 
&lt;p&gt;“Made in” is not the same as “secure” – it’s not even close.&lt;/p&gt; 
&lt;p&gt;Many of the weaknesses we see come from familiar, measurable issues like outdated software components, slow patching cycles, weak credentials, exposed management interfaces and long lifespans that extend well beyond vendor support. In firmware analysis, we regularly see common components that are years behind current versions, carrying known vulnerabilities that attackers can and do exploit.&lt;/p&gt; 
&lt;p&gt;And crucially, none of that changes because a new device is banned from import.&lt;/p&gt; 
&lt;p&gt;The bigger blind spot in this conversation is the installed base. Millions of routers already sit in homes, branch offices and remote worker environments. They will remain there for years. They are rarely patched or monitored and hybrid working has made them part of the enterprise attack surface &lt;a href="https://www.techtarget.com/searchsecurity/opinion/Cybersecurity-Awareness-Month-The-endpoint-security-issue" target="_blank" rel="noopener"&gt;whether organisations like it or not&lt;/a&gt;. A compromised home router can be used for traffic interception, credential harvesting, or as a pivot point into corporate systems.&lt;/p&gt; 
&lt;p&gt;So while the ban may reduce future exposure in a narrow sense, it does nothing to address the risk organisations already carry today, which will inevitably extend into the future.&lt;/p&gt; 
&lt;p&gt;There is also a risk that policy discussions drift into a false sense of progress. Focusing on supplier origin can create the impression that risk is being reduced at a structural level, when in reality the underlying issues remain unchanged. Security is not something you import. It is something you continuously verify.&lt;/p&gt; 
&lt;p&gt;Network infrastructure needs to be treated as part of the active attack surface, not background plumbing. That means maintaining an accurate inventory of routers across enterprise and remote environments, including firmware versions and exposure. Lifecycle management should also be prioritised and that means replacing end-of-life devices, enforcing firmware updates and demanding transparency from vendors around software components as well as patch cadence.&lt;/p&gt; 
&lt;p&gt;In order to remove easy wins for attackers, disable internet-exposed management interfaces, enforce unique credentials and apply segmentation so that one compromised router does not automatically lead to broader access.&lt;/p&gt; 
&lt;p&gt;Finally, recognise that the FCC decision raises important questions about trust and resilience in technology supply chains, but if it leads organisations to believe the problem has been dealt with, it risks becoming a distraction. The real work is less visible, less political and far more operational. It is about fixing the conditions that make routers such an easy and persistent target in the first place.&lt;/p&gt; 
&lt;p&gt;And that work is long overdue.&lt;/p&gt; 
&lt;div class="extra-info"&gt;
 &lt;div class="extra-info-inner"&gt;
  &lt;h3 class="splash-heading"&gt;Read more about network security&lt;/h3&gt; 
  &lt;ul style="list-style-type: square;" class="default-list"&gt; 
   &lt;li&gt;BT inks deal worth up to £200m to help modernise infrastructure, strengthen resilience against cyber threats, and support delivery of electricity to&amp;nbsp;&lt;a rel="noopener" target="_blank" href="https://www.computerweekly.com/news/366640626/BT-boosts-connectivity-security-for-Northern-Ireland-Electricity-Networks"&gt;around a million homes, farms and businesses in Northern Ireland&lt;/a&gt;.&lt;/li&gt; 
   &lt;li&gt;5G has better security than 4G, including stronger encryption, privacy and authentication. But enterprises need to know the challenges of&amp;nbsp;&lt;a rel="noopener" target="_blank" href="https://www.techtarget.com/searchnetworking/tip/5G-security-Everything-you-should-know-for-a-secure-network"&gt;5G's complex, virtualised architecture&lt;/a&gt;.&lt;/li&gt; 
   &lt;li&gt;What does 2026 have in store for network security? Omdia analyst John Grady shares his top five predictions&amp;nbsp;&lt;a rel="noopener" target="_blank" href="https://www.techtarget.com/searchsecurity/opinion/NetworkSecurity-predictions"&gt;for the upcoming year&lt;/a&gt;.&lt;/li&gt; 
  &lt;/ul&gt;
 &lt;/div&gt;
&lt;/div&gt;</body>
            <description>America's foreign-made router ban sparked valid debate about supply chains, geopolitics and trust, but the truth is that the ban addresses tomorrow’s procurement decisions far more than today’s security exposure.</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/Hero%20Images/network-security-padlock-businessman-adobe.jpeg</image>
            <link>https://www.computerweekly.com/opinion/Banning-routers-wont-fix-whats-already-broken</link>
            <pubDate>Tue, 31 Mar 2026 08:00:00 GMT</pubDate>
            <title>Banning routers won’t fix what’s already broken</title>
        </item>
        <item>
            <body>&lt;p&gt;After Google moved up its &lt;a href="https://www.computerweekly.com/news/366640650/Google-targets-2029-for-post-quantum-cyber-readiness" target="_blank" rel="noopener"&gt;quantum readiness timeline&lt;/a&gt; and revealed it was working on building &lt;a href="https://www.techtarget.com/searchsecurity/video/An-explanation-of-post-quantum-cryptography" target="_blank" rel="noopener"&gt;post-quantum cryptography&lt;/a&gt; (PQC) features into the next version of its Android mobile operating system, cyber experts have welcomed indications that the pace of travel towards effective, security-preserving PQC is speeding up, but also highlighted that the data security risks posed by quantum computers must be addressed today, not whenever the so-called Q-Day occurs.&lt;/p&gt; 
&lt;p&gt;Google’s target of migrating to PQC in 2029, three years from now, blasts past the migration schedules of others, including the US Commercial National Security Algorithms (CNSA) 2.0 &lt;a href="https://media.defense.gov/2022/Sep/07/2003071836/-1/-1/0/CSI_CNSA_2.0_FAQ_.PDF" target="_blank" rel="noopener"&gt;migration schedule&lt;/a&gt;. &lt;a href="https://www.pingidentity.com/en.html" target="_blank" rel="noopener"&gt;Ping Identity&lt;/a&gt; head of privileged access management&amp;nbsp;engineering Suman Sharma said: “Google accelerating its timeline to 2029 underscores a growing realisation across the industry that the window to prepare for a post-quantum world is smaller than many anticipated.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;“We’re already in the midst of the largest overhaul of the internet’s encryption backbone in decades, with hybrid quantum-resistant standards rolling out across browsers and core infrastructure,” he said.&lt;/p&gt; 
&lt;p&gt;“High-security sectors are moving quickly toward fully quantum-safe deployments, yet much of the broader ecosystem is still operating in a transitional, hybrid state,” said Sharma. “This latest move reinforces that leading technology providers no longer see post-quantum security as a distant concern. It’s now an immediate priority, and the pace of adoption will only continue to accelerate.”&lt;/p&gt; 
&lt;p&gt;According to Mark Pecen, chair of the Technical Committee on Quantum Technologies at the &lt;a href="https://www.etsi.org/"&gt;European Telecommunications Standards Institute&lt;/a&gt; (ETSI), Google’s accelerated deadline reflects a shift from trying to predict Q-Day to preventative management of present-day risks.&lt;/p&gt; 
&lt;p&gt;“The real concern isn’t when quantum computers arrive, it’s that adversaries are already collecting encrypted data today to decrypt later,” said Pecen. “The existing public key cryptographic systems that protect our internet and wireless transactions, Rivest-Shamir-Adelman (RSA) and Elliptic Curve Cryptography (ECC) are aging cryptosystems, developed in the 1970s and 1980s respectively.&lt;/p&gt; 
&lt;p&gt;“These algorithms become weaker for every year that technology advances, so post-quantum cryptography is also being viewed as the next generation of data security.”&lt;/p&gt; 
&lt;div class="extra-info"&gt;
 &lt;div class="extra-info-inner"&gt;
  &lt;h3 class="splash-heading"&gt;Read more about quantum computing&lt;/h3&gt; 
  &lt;ul style="list-style-type: square;" class="default-list"&gt; 
   &lt;li&gt;We speak to Lucy Robson, a quantum algorithm scientist at Universal Quantum, about her work in helping to develop&amp;nbsp;&lt;a rel="noopener" target="_blank" href="https://www.computerweekly.com/podcast/Understanding-quantum-A-Computer-Weekly-Downtime-Upload-podcast"&gt;simulations for drug discovery&lt;/a&gt;.&lt;/li&gt; 
   &lt;li&gt;Japan and Singapore will work together to bridge the gap between quantum research and real-world commercialisation, marking Singapore’s first government-to-government pact&amp;nbsp;&lt;a rel="noopener" target="_blank" href="https://www.computerweekly.com/news/366637028/Singapore-and-Japan-team-up-on-quantum-computing"&gt;dedicated to the technology&lt;/a&gt;.&lt;/li&gt; 
   &lt;li&gt;Claims that quantum computing will destroy Bitcoin may be exaggerated,&amp;nbsp;&lt;a rel="noopener" target="_blank" href="https://www.computerweekly.com/opinion/Will-Quantum-Computing-Kill-Bitcoin"&gt;but Bitcoin will need to adapt&lt;/a&gt;.&lt;/li&gt; 
  &lt;/ul&gt;
 &lt;/div&gt;
&lt;/div&gt; 
&lt;p&gt;Additionally, newer and faster quantum decryption algorithms are already being developed, such as&amp;nbsp;Jesse-Victor-Gharabaghi (JVG) – &lt;a href="https://www.securityweek.com/quantum-decryption-of-rsa-is-much-closer-than-expected/" target="_blank" rel="noopener"&gt;which caused a stir in March 2026&lt;/a&gt; – as it appears to need vastly less quantum computational power (qubits) to break legacy algorithms.&lt;/p&gt; 
&lt;p&gt;Its creators say that given the right hardware, when Q-Day comes, JVG could break RSA in 11 hours.&lt;/p&gt; 
&lt;p&gt;“By moving earlier than government timelines, Google is effectively forcing the industry to treat post-quantum migration as an immediate operational priority rather than a future compliance exercise,” said Pecen.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Harvest now, decrypt later"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Harvest now, decrypt later&lt;/h2&gt;
 &lt;p&gt;At present, &lt;a href="https://globalriskinstitute.org/publication/quantum-threat-timeline-report-2025b/" target="_blank" rel="noopener"&gt;much of the concern&lt;/a&gt; stems from the demonstrable growth in so-called &lt;a href="https://www.techtarget.com/searchsecurity/feature/Cybersecurity-trends-to-watch" target="_blank" rel="noopener"&gt;harvest now, decrypt later&lt;/a&gt; (HNDL) cyber attacks in which threat actors exfiltrate encrypted data now and keep it in readiness for the moment present-day algorithms fail, and Simon Pamplin, chief technology officer at &lt;a href="https://certes.ai/" target="_blank" rel="noopener"&gt;Certes&lt;/a&gt; – a PQC specialist – said that for many organisations, the most dangerous moment in time is not the day quantum computers arrive, but rather right now.&lt;/p&gt;
 &lt;p&gt;“Adversaries are already running HNDL campaigns: exfiltrating encrypted data today with the intention of unlocking it once a cryptographically relevant quantum computer [CRQC] exists,” he said.&lt;/p&gt;
 &lt;p&gt;“If your organisation is still relying on RSA, TLS or standard PKI to protect sensitive data in transit, that data is already at risk, regardless of whether Q-Day lands in 2029 or 2035,” added Certes.&lt;/p&gt;
 &lt;p&gt;“With data flowing across legacy systems, multi-cloud environments, AI and the edge, the potential risk organisations face today is very real, and extremely serious if left unchecked.”&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Next steps"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Next steps&lt;/h2&gt;
 &lt;p&gt;Matt Campagna, who chairs ETSI’s Quantum-Safe Cryptography working group, said Google’s prioritisation of quantum-resistant digital signatures demonstrated important industry leadership in the field, and hailed significant progress in a field for which ETSI has been advocating for 13 years.&lt;/p&gt;
 &lt;p&gt;“Organisations operating information technology systems should take note,” he said. “Understanding local PQC migration timelines, as set by customers and regulators, is now essential. Businesses must develop their own PQC migration strategies and actively engage with vendors and suppliers to ensure alignment.”&lt;/p&gt;
 &lt;p&gt;Certes’ Pamplin echoed this sentiment. “Post-quantum migration is a multi-year project for most organisations, and with Gartner predicting a CRQC could arrive by 2029, the gap between where most businesses are and where they need to be is closing fast – and action should be taken today,” he said.&lt;/p&gt;
 &lt;p&gt;Some of the looming challenges that business tech leaders will soon need to face include legacy systems that may prove impossible to natively upgrade to PQC, multi-cloud environments causing issues due to inconsistent security models and data privacy policies, and gaps around the user and network edge.&lt;/p&gt;
 &lt;p&gt;Pamplin said: “Firms need to look at end-to-end PQC solutions that are able to protect data across any app, any infrastructure, anywhere. Specifically, solutions that enforce sovereign, crypto-agile PQC protection, where only the data owner controls the key, from server to edge, and ones where protection persists with the data, not infrastructure.&lt;/p&gt;
 &lt;p&gt;“Quantum readiness isn’t about predicting a date,” he said. “It’s about eliminating a long-term exposure before that date becomes irrelevant.”&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Google’s decision to move up its timeline for migration to post-quantum cryptography highlights that some of the cyber security risks posed by quantum computing are already reality</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/HeroImages/risk-Omid-studio-adobe.jpg</image>
            <link>https://www.computerweekly.com/news/366640684/Shrinking-PQC-timeline-highlights-immediate-risk-to-data-security</link>
            <pubDate>Tue, 31 Mar 2026 05:30:00 GMT</pubDate>
            <title>Shrinking PQC timeline highlights immediate risk to data security</title>
        </item>
        <item>
            <body>&lt;p&gt;We’re living through a genuinely groundbreaking moment in technology. Every week brings new breakthroughs in AI agents – capabilities that seemed impossible just months ago are now becoming reality. Organisations are rushing to adopt them, and they’re right to.&lt;/p&gt; 
&lt;p&gt;But there are important security considerations beneath the enthusiasm. According to our research, &lt;a target="_blank" href="https://www.okta.com/newsroom/articles/ai-at-work-2025--securing-the-ai-powered-workforce/" rel="noopener"&gt;at Okta&lt;/a&gt;, 91% of organisations are now adopting &lt;a href="https://www.computerweekly.com/feature/Getting-started-with-agentic-AI"&gt;AI agents&lt;/a&gt;, yet only 10% have governance strategies in place. Closing this gap will require intentional focus and effort.&lt;/p&gt; 
&lt;p&gt;The reason comes down to something more fundamental than most people realise. We’re shifting from one architectural model to something fundamentally different and we haven’t fully reckoned with what that means for security.&lt;/p&gt; 
&lt;p&gt;&lt;b&gt;When applications stop following the script&lt;/b&gt;&lt;/p&gt; 
&lt;p&gt;For decades, we’ve built applications that operate within predictable boundaries. Think of a travel booking application. You navigate defined screens and execute a transaction. What’s possible is finite. Security works because users move through guarded corridors deep inside the application’s logic.&lt;/p&gt; 
&lt;p&gt;But AI agents operate differently. They’re conversational. They accept natural language input from anywhere and make autonomous decisions we can’t entirely predict. The access point isn’t buried in application code anymore. It’s right there at the front end, in the conversation itself.&lt;/p&gt; 
&lt;p&gt;This is an architectural shift, and it means the security controls we’ve relied on are now being tested in ways we’re only beginning to understand.&lt;/p&gt; 
&lt;p&gt;&lt;b&gt;Security at the frontline&lt;/b&gt;&lt;/p&gt; 
&lt;p&gt;This shift exposes internal APIs and data surfaces in ways traditional applications never did. When you compromise a deterministic application, damage is typically contained. But when you compromise an AI agent, you’re looking at potential access across your entire infrastructure and actions that ripple in unpredictable ways.&lt;/p&gt; 
&lt;p&gt;What used to be hypothetical is now happening, and the complexity compounds when agents work together. We’re moving beyond single agents to agent-to-agent communications. That introduces permission and identity challenges we’ve genuinely never had to think about before.&lt;/p&gt; 
&lt;p&gt;&lt;b&gt;Rethinking identity in an AI-driven world&lt;/b&gt;&lt;/p&gt; 
&lt;p&gt;&lt;a target="_blank" href="https://www.verizon.com/business/en-gb/resources/reports/dbir/" rel="noopener"&gt;80% of breaches&lt;/a&gt; today involve compromised identity or credentials, which remains a key attack surface for threat actors. But, solving this in an agent-driven world requires thinking about identity differently.&lt;/p&gt; 
&lt;p&gt;For developers and organisations deploying agents, four identity requirements have become non-negotiable:&lt;/p&gt; 
&lt;ul class="default-list"&gt; 
 &lt;li&gt;&lt;b&gt;First,&lt;/b&gt; genuine agent and user authentication. You must securely link each agent’s actions back to the human user who authorised them.&lt;/li&gt; 
 &lt;li&gt;&lt;b&gt;Second,&lt;/b&gt; standardised, secure API access. Agents connect to dozens of applications. Those connections need hardening against token leakage and credential compromise.&lt;/li&gt; 
 &lt;li&gt;&lt;b&gt;Third&lt;/b&gt;, human validation in the loop for anything high-risk or sensitive. This isn’t about lack of faith in AI; it’s about maintaining human agency while these systems mature.&lt;/li&gt; 
 &lt;li&gt;&lt;b&gt;Fourth,&lt;/b&gt; fine-grained permissions. An agent should access only the data it needs, only for the time it needs it, with every action logged and auditable.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;b&gt;Learning from past mistakes&lt;/b&gt;&lt;/p&gt; 
&lt;p&gt;I’ve watched this pattern before with cloud, APIs, and microservices. Security considerations often come in later in the development of new architectural models, not earlier.&lt;/p&gt; 
&lt;p&gt;We’re seeing it again with agent protocols. &lt;a href="https://www.techtarget.com/searchdatamanagement/feature/One-year-of-MCP-Support-a-must-for-data-management-vendors"&gt;MCP, agent-to-agent frameworks&lt;/a&gt;, and cross-app access standards are developing rapidly with genuine effort to embed security from the start. But security still feels like it’s catching up rather than leading design.&lt;/p&gt; 
&lt;p&gt;The practical reality is that you can’t wait for perfect standards. You need to implement governance with available frameworks today, while remaining flexible to adapt as standards mature.&lt;/p&gt; 
&lt;p&gt;&lt;b&gt;What leaders must do now&lt;/b&gt;&lt;/p&gt; 
&lt;p&gt;Business leaders face real pressure to unlock AI’s potential and genuine concerns about security. These aren’t mutually exclusive. Here’s what needs to happen.&lt;/p&gt; 
&lt;ul class="default-list"&gt; 
 &lt;li&gt;Complete visibility into every agent running in your environment and what it’s doing. No shadow agents. No hidden permissions.&lt;/li&gt; 
 &lt;li&gt;Apply identity and permission strategies with the same rigour you’d use for human users.&lt;/li&gt; 
 &lt;li&gt;Ensure agents connect through secure, auditable channels. Whether building customer agents or using MCP servers, the same principles apply.&lt;/li&gt; 
 &lt;li&gt;Finally, log everything. Agent activity will operate at a scale that might surprise you but if every action is captured, you’ll meet regulatory requirements and investigate incidents quickly.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;b&gt;Be proactive, not reactive&lt;/b&gt;&lt;/p&gt; 
&lt;p&gt;Breaches linked to agents are happening now and will continue to happen. That’s not a reason to slow AI adoption – it’s a reason to be serious about security from the start.&lt;/p&gt; 
&lt;p&gt;The encouraging part is that the foundational principles we’ve relied on – identity governance, least-privilege access, encryption, comprehensive auditing – still work. In fact, they’re more important than ever. We just need to scale them intelligently for this non-deterministic world.&lt;/p&gt; 
&lt;p&gt;The technology exists and the frameworks are emerging. What matters now is whether we approach this thoughtfully or spend the next couple of years managing preventable incidents.&lt;/p&gt; 
&lt;p&gt;I’m betting we’re smarter than that.&lt;/p&gt; 
&lt;p&gt;&lt;i&gt;Shiv Ramji, is Auth0 President at Okta&lt;/i&gt;&lt;/p&gt; 
&lt;div class="extra-info"&gt;
 &lt;div class="extra-info-inner"&gt;
  &lt;h3 class="splash-heading"&gt;Read more about agentic AI and security&lt;/h3&gt; 
  &lt;p&gt;What &lt;a href="https://www.techtarget.com/searchsecurity/tip/What-agentic-AI-means-for-cybersecurity"&gt;agentic AI means for cybersecurity&lt;/a&gt;&lt;/p&gt; 
  &lt;p&gt;&lt;a href="https://www.computerweekly.com/opinion/Generative-and-agentic-AI-in-security-What-CISOs-need-to-know"&gt;Generative and agentic AI in security&lt;/a&gt;: What CISOs need to know&lt;/p&gt; 
  &lt;p&gt;Agentic AI requires &lt;a href="https://www.computerweekly.com/news/366637022/Agentic-AI-requires-rethink-of-cloud-security-strategy"&gt;rethink of cloud security strategy&lt;/a&gt;&lt;/p&gt;
 &lt;/div&gt;
&lt;/div&gt;</body>
            <description>Agentic AI adoption may be surging, but security is lagging behind and its fundamental principles need to be intelligently re-scaled for a non-deterministic world</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/Hero%20Images/chess-strategy-game-intelligence-1-adobe.jpeg</image>
            <link>https://www.computerweekly.com/opinion/AI-agents-are-here-Are-we-ready-for-the-security-implications</link>
            <pubDate>Mon, 30 Mar 2026 11:51:00 GMT</pubDate>
            <title>AI agents are here. Are we ready for the security implications?</title>
        </item>
        <item>
            <body>&lt;p&gt;The UK’s &lt;a href="https://committees.parliament.uk/committee/127/public-accounts-committee/" target="_blank" rel="noopener"&gt;Public Accounts Committee&lt;/a&gt; (PAC) has accused the government of lacking the “modernising ambition” to use technology to fight tax fraud and error, as taxpayers continue to lose anywhere between £55bn and £81bn per annum, the bulk of them in the tax and welfare systems.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://committees.parliament.uk/committee/127/public-accounts-committee/publications/" target="_blank" rel="noopener"&gt;In a report published today&lt;/a&gt;, the PAC said the use of legacy technology and a lack of leadership persisted, and public bodies were failing to embrace the opportunity to deploy new data analytics technology. The body declared itself sceptical of the government’s ability to make any form of improvement without a robust plan.&lt;/p&gt; 
&lt;p&gt;Though Westminster has said using data analytics to tackle the problem could save taxpayers up to £6bn every year, the PAC said it did not believe all public bodies were set up to achieve such savings, and there is not yet enough detail on how this will be achieved.&lt;/p&gt; 
&lt;p&gt;It pointed to the delayed &lt;a href="https://gds.blog.gov.uk/2026/01/20/our-roadmap-for-modern-digital-government/" target="_blank" rel="noopener"&gt;roadmap for modern digital government&lt;/a&gt; – published earlier in 2026 – which said the government would embrace artificial intelligence (AI) and replace outdated technology, but did not go into detail about how, or address how this might tackle fraud and error.&lt;/p&gt; 
&lt;p&gt;“Our committee has long identified a failing in digital leadership and fragmented data across government as one of the main blockers in government’s ability to deliver,” said PAC chair Geoffrey Clifton-Brown. “Our evidence suggests that government has a lot of data, but no information. One of the most obvious areas in which new technology could protect the taxpayer’s pound is in error and fraud.&lt;/p&gt; 
&lt;p&gt;“But while this government has talked a big game on embracing new technology, its delayed roadmap on modern digital government fails to even mention how this will tackle fraud and error, and it continues to struggle with the dead weight of legacy technology,” he added.&lt;/p&gt; 
&lt;p&gt;“We are not convinced that the government is making best use of fast-moving technology such as AI to tackle the difficult subject of fraud.”&lt;/p&gt; 
&lt;div class="extra-info"&gt;
 &lt;div class="extra-info-inner"&gt;
  &lt;h3 class="splash-heading"&gt;Read more about digital fraud&lt;/h3&gt; 
  &lt;ul class="default-list"&gt; 
   &lt;li&gt;LexisNexis Risk Solutions warns of a 450% rise in agentic traffic and an eight-fold increase in synthetic identity fraud as cyber criminals scale automation &lt;a href="https://www.computerweekly.com/news/366640815/Agentic-bots-and-synthetic-identities-fuel-surge-in-fraud" target="_blank" rel="noopener"&gt;to bypass security controls&lt;/a&gt;.&lt;/li&gt; 
   &lt;li&gt;Industries and policymakers are strongly aligned on the need for digital company IDs for UK businesses, as progress is made towards the implementation &lt;a href="https://www.computerweekly.com/news/366640405/Digital-IDs-edge-closer-to-practical-reality-for-UK-businesses" target="_blank" rel="noopener"&gt;of a practical standard&lt;/a&gt;.&lt;/li&gt; 
   &lt;li&gt;Banks are able to set their own contactless card payment limits from 19 March, following rule change &lt;a href="https://www.computerweekly.com/news/366640337/Contactless-payment-limit-removal-will-happen-overnight-but-change-wont" target="_blank" rel="noopener"&gt;by the Financial Conduct Authority&lt;/a&gt;.&lt;/li&gt; 
  &lt;/ul&gt;
 &lt;/div&gt;
&lt;/div&gt; 
&lt;p&gt;The PAC said the apparent lack of planning in government reflected a backdrop of longstanding issues with legacy technology – previous reports have highlighted a swathe of out-of-date systems across government, and noted that &lt;a href="https://www.computerweekly.com/news/366580233/Government-struggles-to-upgrade-legacy-IT-systems-says-PAC-chair" target="_blank" rel="noopener"&gt;this has been the case for years&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;An apparent lack of digital leadership is not helping matters, it added. In 2023, it recommended that all government departments have a digital expert on their boards, which has not come to pass, and the Department for Science, Innovation and Technology’s (DSIT’s) decision to not after all appoint a government-wide chief digital officer (CDO) represented a “serious shortcoming”, said the PAC, as it would have given the department more clout across government when it came to digital transformation.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Warnings and limitations"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Warnings and limitations&lt;/h2&gt;
 &lt;p&gt;The latest PAC report also repeats a warning from March 2025 over the government’s apparent opacity regarding algorithmic decision-making. This time last year, just 33 records had been published on a special website set up to improve transparency in this area, and as of the time of writing, &lt;a href="https://www.gov.uk/algorithmic-transparency-records" target="_blank" rel="noopener"&gt;there are just 125&lt;/a&gt;, of which only 11 mention fraud, and of which only two were filed this year – both by the Information Commissioner’s Office (ICO).&lt;/p&gt;
 &lt;p&gt;The PAC said DSIT had admitted that not all the expected cases have been recorded and said it was clear departments were not doing enough to be transparent or build public trust in government’s use of data analytics to fight fraud, calling on DSIT to work to ensure all government bodies record their use of algorithms.&lt;/p&gt;
 &lt;p&gt;The PAC said it had further identified a legislative limitation in relation to the deployment of data analytics techniques against fraudsters, in that because the law does not allow for individual profiling, the government can’t flag known bad actors as an indicator for future work on fraud, while National Fraud Initiative data can only be retained for two years.&lt;/p&gt;
 &lt;p&gt;The report further identified a limitation in current legislation in how government can deploy modern data analytics techniques to fight fraud. The law does not allow for individual profiling, meaning that government is not allowed to flag known fraudsters as an indicator for future fraud detection work, while National Fraud Initiative data can only be retained for two years.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Next steps"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Next steps&lt;/h2&gt;
 &lt;p&gt;The PAC report makes six recommendations for the government:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;The Treasury should require public bodies to include information on what they are doing to tackle fraud and error in their annual fraud, and set out the types of counter-fraud activity they are undertaking. This reporting should include information on targets agreed with the Public Sector Fraud Authority (PSFA) and steps to improve future performance;&lt;/li&gt; 
  &lt;li&gt;The Government Digital Service (GDS), PSFA, and Government Finance Function (GFA) should communicate a plan to cooperate on cutting fraud losses with the use of data analytics technology, which should include targets and milestones, and more clarity on how government means to move from a system that detects and recovers losses from fraud, to one that prevents it to begin with;&lt;/li&gt; 
  &lt;li&gt;Reflecting concerns that neither the digital capability nor the senior leadership capacity to achieve change exists, DSIT should mandate digitally skilled leaders at board level in all departments and any arms’ length bodies (ALBs) in which technology plays a key role. Moreover, DSIT should appoint a government CDO at permanent secretary level and equip this person with the necessary authority to effect change. DSIT should also better set out how it means to hit its target of having 10% of civil servants digitally trained;&lt;/li&gt; 
  &lt;li&gt;Within six months, the PSFA should report to the PAC on progress towards building a library of counter-fraud controls, and set out steps to address data sharing issues through the Digital Economy Act. DSIT should also set out further information on the single data platform, specifically a timetable for completion and expected benefits around tackling fraud and error. And together, the Treasury, DSIT and the PSFA should decide which elements of the National Fraud Initiative could be useful within central government, and apply them accordingly;&lt;/li&gt; 
  &lt;li&gt;DSIT should do more to ensure government bodies comply with the Algorithmic Transparency Reporting Standard to capture all relevant uses of AI and machine learning in a fashion that continually monitors, updates and ensures compliance around transparency to be as upfront as possible without accidentally creating a reference library for cyber criminals;&lt;/li&gt; 
  &lt;li&gt;Finally, the PSFA should review legislation that impacts its mission to implement fraud and error analytics, and work with DSIT on a review of the regulatory regime around fraud and error activities, and communicate to Parliament any areas in which additional powers or legislative changes might be helpful.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;“There are specific actions which this committee will continue to raise which government could take to back up its loud ambitions,” said Clifton-Brown. “It could enable better information sharing across departments; DSIT could gain the heft a small department with such a big responsibility needs by appointing a government chief digital officer; and it could move with more speed to place digital experts at the top decision-making table of each department, a PAC recommendation government has already accepted.&lt;/p&gt;
 &lt;p&gt;“We hope to see a robust plan from government in this area. Without one, government will only be able to mouth its disapproval as billions in public money continue to roll out of the door into the hands of fraudsters.”&lt;/p&gt;
&lt;/section&gt;</body>
            <description>The Public Accounts Committee says the UK government has dropped the ball on the use of data analytics to tackle tax fraud and error, as the public purse haemorrhages billions of pounds</description>
            <image>https://cdn.ttgtmedia.com/rms/German/fraud-detection-2-adobe.jpg</image>
            <link>https://www.computerweekly.com/news/366640841/UK-government-lacks-ambition-to-fight-tax-fraud-says-PAC</link>
            <pubDate>Fri, 27 Mar 2026 12:45:00 GMT</pubDate>
            <title>UK government lacks ambition to fight tax fraud, says PAC</title>
        </item>
        <item>
            <body>&lt;p&gt;Lloyds Banking Group’s response to a request from the UK government’s Treasury Committee shows that a programming error was the root cause of a breach that exposed details of more than &lt;a href="https://www.computerweekly.com/news/366639996/Lloyds-banking-app-glitch-shows-transactions-of-strangers"&gt;114,000 mobile banking customers&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;The bank said it has made goodwill payments totalling just over £139,000 to around 3,625 customers as of 23 March. It said it also submitted a formal notification to the Information Commissioner’s Office within 72 hours after the breach, in line with statutory timelines.&lt;/p&gt; 
&lt;p&gt;As Computer Weekly has previously reported, on the morning of 12 March, a fault in the Lloyds banking app enabled some customers to see the transactions of other customers. Customers of the group’s Halifax, Bank of Scotland and Lloyds Bank apps were affected by the security breach.&lt;/p&gt; 
&lt;p&gt;While the bank resolved the breach quickly, &lt;a href="https://committees.parliament.uk/publications/52193/documents/289926/default/"&gt;Meg Hillier&lt;/a&gt;, chair of the Treasury Committee, sent an email to Lloyds Banking Group’s group CEO, Charles Nunn, with the subject line “Improper disclosure of individuals’ account information”. In the email, Hillier described the incident as “an alarming breach of &lt;a href="https://www.computerweekly.com/news/366640367/MPs-asks-Lloyds-Bank-for-more-information-about-alarming-breach"&gt;data confidentiality&lt;/a&gt;.”&lt;/p&gt; 
&lt;p&gt;The information she requested from the bank’s boss included details of the breach, how many customers were affected, whether customers could be identified and what steps Lloyds Banking Group has taken to encourage those who may have taken copies of data – of which they were not entitled – to delete those copies.&lt;/p&gt; 
&lt;p&gt;Jasjyot Singh, CEO of consumer relationships at Lloyds Banking Group, has now responded to the Treasury Committee’s questions. Singh stated that the incident was caused by an IT change made overnight between 11 and 12 March which introduced a software defect.&lt;/p&gt; 
&lt;p&gt;“The defect meant that when a customer requested to view their current account transactions, their transaction data was potentially visible to other customers who were simultaneously – within small fractions of a second – requesting access to their own transactions,” Singh said.&lt;/p&gt; 
&lt;p&gt;The bank has now established that the defect was in the design of the code used to update the application programming interface (API) used by the app. Singh said the bank is &lt;a href="https://www.techtarget.com/searchsoftwarequality/tip/How-to-handle-root-cause-analysis-of-software-defects"&gt;reviewing why this individual defect&lt;/a&gt; was not detected by its design, quality assurance and testing processes.&lt;/p&gt; 
&lt;p&gt;According to Singh, a maximum of 447,936 customers who viewed their transaction list during the affected time period may have been presented with other people’s transactions or may have had some of their transactions presented on another customer’s transaction list. The bank has estimated that 114,182 customers clicked through to view the detail behind individual current account transactions during that time and may have been presented with information about individual payments.&lt;/p&gt; 
&lt;p&gt;Singh assured the Treasury Committee that the bank’s fraud and cyber monitoring processes has seen no evidence of misuse or malicious activity as a result of the incident. “Based on our assessment of this incident, we have not identified evidence that customers have suffered financial loss, and no customer has reported a financial loss arising from the incident at this stage. Accordingly, we have not made compensation payments on this basis,” he stated in the letter.&lt;/p&gt; 
&lt;div class="extra-info"&gt;
 &lt;div class="extra-info-inner"&gt;
  &lt;h3 class="splash-heading"&gt;Read more data breach stories&lt;/h3&gt; 
  &lt;ul class="default-list"&gt; 
   &lt;li&gt;Sportswear firm Under Armour falls victim to &lt;a href="https://www.computerweekly.com/news/366637595/Sportswear-firm-Under-Armour-falls-victim-to-data-breach"&gt;data breach&lt;/a&gt;: Details of over 70 million customers of US sportswear giant Under Armour were leaked following a supposed ransomware attack by the Everest gang.&lt;/li&gt; 
   &lt;li&gt;McLaren Health agrees to $14M settlement over &lt;a href="https://www.techtarget.com/healthtechsecurity/news/366639020/McLaren-Health-agrees-to-14M-settlement-over-two-data-breaches"&gt;two data breaches&lt;/a&gt;: The settlement stemmed from two separate ransomware attacks that McLaren Health Care experienced in 2023 and 2024.&lt;/li&gt; 
  &lt;/ul&gt;
 &lt;/div&gt;
&lt;/div&gt;</body>
            <description>The bank has responded to the Treasury Committee’s request for information on a major data breach in its banking app</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/Hero%20Images/bank-online-banking-3-adobe.jpeg</image>
            <link>https://www.computerweekly.com/news/366640568/Lloyds-admits-coding-fault-exposed-customer-transactions</link>
            <pubDate>Fri, 27 Mar 2026 11:13:00 GMT</pubDate>
            <title>Lloyds admits coding fault exposed customer transactions</title>
        </item>
        <item>
            <body>&lt;p&gt;The European Parliament has voted against proposals that would allow social media and tech companies to continue to scan the content of private messages of EU citizens for illegal content.&lt;/p&gt; 
&lt;p&gt;A majority of MEPs voted on Thursday 26 March to reject extending a temporary exemption to EU privacy laws that permitted companies such as Meta, Google and LinkedIn to “indiscriminately” scan private messages for child abuse. The decision marks the end of a long-running attempt to introduce Chat Control legislation across Europe.&lt;/p&gt; 
&lt;p&gt;In its original form, Chat Control would have required technology companies to monitor the content of end-to end encrypted communications, raising objections that it would undermine cyber security and put confidential communications at risk.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="US tech barred from scanning private messages"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;US tech barred from scanning private messages&lt;/h2&gt;
 &lt;p&gt;In the vote, 311 MEPs voted against a motion to extend a derogation to the &lt;a href="MEPs%20rejected%20the%20Commission%20proposal,%20closing%20EP%20first%20reading%20on%20extending%20an%20existing%20derogation%20of%20the%20ePrivacy%20Directive"&gt;e-Privacy directive&lt;/a&gt;, with 228 votes in favour, and 92 abstentions, which means that tech companies can no longer legally conduct mass scanning of private messages.&lt;/p&gt;
 &lt;p&gt;Law enforcement agencies will be able to continue to conduct surveillance of private messages when they have concrete suspicions and have obtained a judicial warrant, and will be able to conduct routine scanning of public posts and files.&amp;nbsp;&lt;/p&gt;
 &lt;p&gt;The European Commission first presented a&amp;nbsp;&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=COM%3A2022%3A209%3AFIN&amp;amp;qid=1652451192472"&gt;proposal&lt;/a&gt; to require all email and messaging providers to conduct mass scanning of all messages and emails sent on their platforms, including end-to-end encrypted messages in 2022. The proposals attracted criticism from technology companies and lawyers.&lt;/p&gt;
 &lt;p&gt;In 2024, European tech companies warned in an open letter that the proposals would “negatively impact children’s privacy and security” and could have “dramatic unforeseen consequences” for cyber security.&lt;/p&gt;
 &lt;p&gt;Leaked&amp;nbsp;&lt;a href="https://www.computerweekly.com/news/366537312/Chat-control-EU-lawyers-warn-plans-to-scan-encrypted-messages-for-child-abuse-may-be-unlawful"&gt;internal legal&lt;/a&gt; advice showed that the Council of the European Union's own lawyers had serious questions about the lawfulness of the planned measures, which they said could lead to the de facto “permanent surveillance of all interpersonal communications”.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="PhotoDNA flawed"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;PhotoDNA flawed&lt;/h2&gt;
 &lt;p&gt;A &lt;a href="https://eprint.iacr.org/2026/486"&gt;scientific study published&lt;/a&gt; this month found that the “PhotoDNA” technology used by tech companies for Chat Control was “unreliable”. They found that criminals can fool the software into missing illegal images and that harmless images can be manipulated so that innocent citizens are reported to the police.&lt;/p&gt;
 &lt;p&gt;According to a European Commission report, just &lt;a href="https://url.us.m.mimecastprotect.com/s/QSiNC68m05HMrRjy0CmiqS505Ya?domain=urldefense.com"&gt;36% of suspicious activity reports from US tech companies&lt;/a&gt; originated from the surveillance of private messages, while social media and cloud storage services are becoming increasingly relevant for investigations.&lt;/p&gt;
 &lt;p&gt;US tech companies are permitted to carry out mass scanning of private messages under an EU interim regulation which now expires on 3 April. The regulation allows “hash scanning” for known images and videos, automated analysis of previously unknown images and videos and automated analysis of text in private chats.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Lobbying exercise"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Lobbying exercise&lt;/h2&gt;
 &lt;p&gt;Patrick Breyer, who has been campaigning against Chat Control, said that tech companies – such as US tech company Thorn – and lobby groups had been trying to “panic” Europe into introducing the measures.&lt;/p&gt;
 &lt;p&gt;“Flooding our police with false positives and duplicates from mass surveillance doesn’t save a single child from abuse. Today’s definitive failure of Chat Control is a clear stop sign to this surveillance mania,” he said. “Indiscriminate mass scanning of our private messages must finally give way to truly effective and targeted child protection that respects fundamental rights.”&lt;/p&gt;
 &lt;p&gt;The European Commission, European Parliament and the European Council are continuing negotiations on a permanent regulation, dubbed Chat Control 2.0. The European Parliament has been pressing for targeted measures rather than mass surveillance since 2023.&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Read more about Chat Control&lt;/h3&gt; 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;&lt;a href="Plans%20to%20require%20technology%20companies%20across%20Europe%20to%20monitor%20the%20contents%20of%20encrypted%20messages%20and%20emails%20have%20been%20delayed%20after%20European%20Union%20member%20states%20were%20unable%20to%20reach%20agreement%20following%20German%20objections"&gt;Chat Control encryption plans delayed after EU states fail to agree&lt;/a&gt; – Plans to require technology companies across Europe to monitor the contents of encrypted messages and emails have been delayed after European Union member states were unable to reach agreement following German objections.&lt;/li&gt; 
    &lt;li&gt;&lt;a href="As%20EU%20member%20states%20prepare%20to%20vote%20on%20plans%20to%20mandate%20tech%20companies%20to%20introduce%20technology%20to%20scan%20messages%20before%20they%20are%20encrypted,%20Signal%20warns%20that%20Chat%20Control%20will%20create%20new%20security%20risks"&gt;EU Chat Control plans pose ‘existential catastrophic risk’ to encryption&lt;/a&gt;, says Signal – As EU member states prepare to vote on plans to mandate tech companies to introduce technology to scan messages before they are encrypted, Signal warns that Chat Control will create new security risks.&lt;/li&gt; 
    &lt;li&gt;&lt;a href="Law%20enforcement%20and%20police%20experts%20meet%20on%20Friday%20to%20decide%20on%20proposals%20to%20require%20technology%20companies%20to%20scan%20encrypted%20messages%20for%20possible%20child%20abuse%20images%20amid%20growing%20opposition%20from%20security%20experts"&gt;Chat Control: EU to decide on requirement for tech firms to scan encrypted messages&lt;/a&gt; – Law enforcement and police experts meet on Friday to decide on proposals to require technology companies to scan encrypted messages for possible child abuse images amid growing opposition from security experts.&lt;/li&gt; 
   &lt;/ul&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/section&gt;</body>
            <description>MEPs vote down proposals to allow US tech companies to continue scanning private messages for illegal content</description>
            <image>https://cdn.ttgtmedia.com/visuals/LeMagIT/hero_article/EU-flag-1-fotolia_hero.jpg</image>
            <link>https://www.computerweekly.com/news/366640781/EU-Parliament-rejects-Chat-Control-message-scanning</link>
            <pubDate>Fri, 27 Mar 2026 05:35:00 GMT</pubDate>
            <title>EU Parliament rejects Chat Control message scanning</title>
        </item>
        <item>
            <body>&lt;p&gt;Oracle Cloud Infrastructure (OCI) has become a strategically significant part of Oracle’s business, and one it hopes offers differentiation from the major hyperscalers. The company &lt;a href="https://www.computerweekly.com/news/366639939/Oracle-cost-cutting-points-to-AI-infrastructure-gamble"&gt;posted cloud infrastructure revenue&lt;/a&gt; of $4.9bn in the &lt;span data-teams="true"&gt;third quarter of its 2026 financial year&lt;/span&gt;, up 84% from the same period last year. It has also committed to spending $533bn to meet the compute requirements to fulfil customer contracts.&lt;/p&gt; 
&lt;p&gt;At the company’s recent &lt;a href="https://www.computerweekly.com/news/366640725/Oracle-applications-chief-sees-enterprise-AI-agents-as-task-specific-helpers"&gt;Oracle AI Tour event&lt;/a&gt; in London, Computer Weekly met up with company representatives to discuss how its public cloud competes with the hyperscalers.&lt;/p&gt; 
&lt;p&gt;When asked about the main difference between Oracle’s approach and that of other cloud service providers (CSPs), Nathan Thomas, senior vice-president of product management for OCI, said: “We do delineate a little bit between OCI and other CSPs in that we’ve stayed reasonably focused in that core infrastructure space.”&lt;/p&gt; 
&lt;p&gt;He said OCI comprises around 150 web services available as public and private cloud offerings, and it has a global footprint spanning 200 regions.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Oracle’s strategy is intentionally focused on IT infrastructure. “We don’t have some of the bloat – the niche, unprofitable services – that other CSPs carry around,” said Thomas. “We’ve taken a very firm approach to build the highest-performance, lowest-cost cloud that’s highly secure everywhere.”&lt;/p&gt; 
&lt;p&gt;The focus, he added, is to build the OCI IT environment with compute, networking and storage that “are highly tunable”, and that will remain “a major focus” for the company.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Significantly, Thomas said that of the OCI customers requiring the highest level of performance, most are opting to buy “bare metal” hosting from Oracle. “When we look at our largest customers, they deploy bare metal with their own AI-driven software and platform management.”&lt;/p&gt; 
&lt;div class="extra-info"&gt;
 &lt;div class="extra-info-inner"&gt;
  &lt;h3 class="splash-heading"&gt;Read more about Oracle OCI&lt;/h3&gt; 
  &lt;ul class="default-list"&gt; 
   &lt;li&gt;Beyond Stargate – &lt;a href="https://www.techtarget.com/searchcloudcomputing/news/366631471/Beyond-Stargate-Oracle-OCI-ups-cloud-infrastructure-appeal"&gt;Oracle OCI&lt;/a&gt; ups cloud infrastructure appeal: Oracle has struck market-shaking deals with frontier AI model makers, but experts say it has also intensified its challenges to the big three in enterprise IaaS.&lt;/li&gt; 
   &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366634749/Oracle-deploys-the-Middle-Easts-first-AI-supercluster-to-power-sovereign-AI-in-Abu-Dhabi"&gt;Oracle deploys the Middle East’s&lt;/a&gt; first AI supercluster to power sovereign AI in Abu Dhabi: Oracle expands its Abu Dhabi cloud region with the Middle East’s first Nvidia Blackwell–powered AI supercluster.&lt;/li&gt; 
  &lt;/ul&gt;
 &lt;/div&gt;
&lt;/div&gt; 
&lt;p&gt;When asked why these organisations are choosing bare metal over cloud-based IT infrastructure, Thomas spoke of the performance degradation and potential security risks inherent in server virtualisation compared to direct hardware access.&lt;/p&gt; 
&lt;p&gt;“We find that there is a bit of a tax that comes along with virtualisation, both in terms of efficiency of hardware, but also in terms of security, and the customers at the high end [of compute] are saying they would rather avoid that tax,” he said.&lt;/p&gt; 
&lt;p&gt;In his experience, some Oracle customers are more comfortable than they used to be in managing their own virtualisation as they grow their level of expertise. “A lot of the value that the clouds are bringing to bear in that space has been eroded by domain knowledge that’s growing from a customer perspective,” he said.&lt;/p&gt; 
&lt;p&gt;Thomas claimed that unlike rival cloud service providers, which he said use some level of virtualisation in their bare metal services to support storage and networking, Oracle’s is completely bare. This puts the onus on Oracle bare metal customers to deploy the entire IT environment the servers require.&lt;/p&gt; 
&lt;p&gt;“We do a huge amount of work on our root of trust concept [&lt;em&gt;see box:&lt;/em&gt; &lt;a href="#root"&gt;&lt;em&gt;What is Orace’s root of trust&lt;/em&gt;&lt;/a&gt;&lt;em&gt;]&lt;/em&gt;, where we validate the bare metal servers to ensure that they are secure for customers. This has been a huge investment for us. I don’t think we’ve seen anybody else quite follow the same pattern.”&lt;/p&gt; 
&lt;p&gt;Thomas said OCI is the only &lt;a href="https://www.techtarget.com/searchcloudcomputing/tip/Top-bare-metal-cloud-providers"&gt;CSP where the bare metal offering&lt;/a&gt; is the company’s primary focus. “I think most other CSPs start the other way around, thinking about virtualisation first and then trying to bolt on bare metal. From an engineering capacity management perspective, we think about that bare metal every day,” he said.&lt;/p&gt; 
&lt;div class="extra-info"&gt;
 &lt;div class="extra-info-inner"&gt;
  &lt;h3 class="splash-heading"&gt;&lt;a id="root"&gt;&lt;/a&gt;What is Oracle’s root of trust?&lt;/h3&gt; 
  &lt;p&gt;The goal of the Oracle Cloud Infrastructure &lt;a href="https://www.oracle.com/security/cloud-security/hardware-root-of-trust/"&gt;hardware root of trust&lt;/a&gt; concept is a security component that protects physical servers from firmware attacks. To ensure that each server is provisioned with clean firmware, Oracle has designed, built and implemented a hardware root of trust for the process of wiping and reinstalling server firmware. Oracle uses this process every time a new server is provisioned for a tenant, or between tenancies.&lt;/p&gt; 
  &lt;p&gt;The hardware root of trust role is limited to performing the specific task of wiping and reinstalling firmware. It triggers a power cycle of the hardware host, prompts for the installation of known firmware, and confirms that the process has been completed as expected. According to Oracle, this method of firmware installation tends to reduce the risk of firmware-based attacks, such as a permanent denial of service (PDoS) attack or attempts to embed backdoors in the firmware to steal data or make it otherwise unavailable. In addition, internal servers are configured to use secure boot.&lt;/p&gt; 
  &lt;p style="text-align: right;"&gt;Source: &lt;em&gt;&lt;a href="https://www.oracle.com/uk/a/ocom/docs/oracle-cloud-infrastructure-security-architecture.pdf"&gt;Oracle Cloud Infrastructure Security Architecture&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;
 &lt;/div&gt;
&lt;/div&gt;</body>
            <description>The Oracle Cloud Infrastructure appears to have more in common with datacentre hosting than with public infrastructure-as-a-service providers</description>
            <image>https://cdn.ttgtmedia.com/visuals/German/article/network-technician-3-adobe.jpg</image>
            <link>https://www.computerweekly.com/news/366640817/Oracle-Cloud-Infrastructure-The-bare-metal-facts</link>
            <pubDate>Thu, 26 Mar 2026 13:00:00 GMT</pubDate>
            <title>Oracle Cloud Infrastructure: The bare metal facts</title>
        </item>
        <item>
            <body>&lt;p&gt;The United Arab Emirates (UAE) is reinforcing its status as a &lt;a href="https://www.computerweekly.com/news/366639768/CISOs-on-alert-Strengthening-cyber-resilience-amid-geopolitical-tensions-in-the-Middle-East" target="_blank" rel="noopener"&gt;regional cyber security leader&lt;/a&gt;, advancing a nationally coordinated model to protect critical infrastructure and ensure operational continuity amid an increasingly complex threat landscape.&lt;/p&gt; 
&lt;p&gt;Recent remarks from Mohamed Hamad Al Kuwaiti, head of cyber security for the UAE government and chairman of the UAE Cyber Security Council, underscore the maturity of the country’s cyber security ecosystem, which operates at a high level of readiness across government entities, strategic industries and private-sector partners.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;At the core of this strategy is continuous monitoring and rapid response capability. Specialised teams operate around the clock, supported by advanced threat detection platforms, early warning systems and clearly defined incident response procedures aligned with international best practices. These capabilities are integrated into a unified national framework that enables swift coordination and effective containment of cyber incidents.&lt;/p&gt; 
&lt;p&gt;The model is built on strong alignment between public and private stakeholders. Cyber operations centres across key sectors are interconnected, enabling real-time intelligence sharing and coordinated responses to emerging threats. This level of integration is increasingly critical as cyber attacks grow more sophisticated and often target multiple sectors simultaneously.&lt;/p&gt; 
&lt;p&gt;“The UAE continues to invest in strengthening its cyber capabilities and enhancing its digital infrastructure, ensuring the protection of digital assets and the continuity of critical services, while maintaining a high level of preparedness to counter evolving threats,” Dr Al Kuwaiti said.&lt;/p&gt; 
&lt;p&gt;Across the GCC, organisations are facing a steadily evolving threat environment shaped by digital transformation, increased connectivity and rising geopolitical complexity. In this context, cyber security strategies are being tested not only for their technical strength but also for their ability to support resilience at scale.&lt;/p&gt; 
&lt;p&gt;For CISOs, the priority is shifting towards ensuring that organisations can withstand disruption while maintaining essential services. As Anoop Kumar, head of information security governance, risk and compliance at Gulf News Al Nisr Publishing, explains, resilience has become the defining principle.&lt;/p&gt; 
&lt;p&gt;“It’s all about resilience to continue business, how to withstand disruption and recover as quickly as possible,” he says. “Security leaders must ensure organisations can withstand more sophisticated cyber threats while educating all stakeholders about the evolving risk landscape.”&lt;/p&gt; 
&lt;p&gt;This focus on resilience is particularly relevant in sectors such as energy, finance and telecommunications, where downtime or data breaches can have far-reaching consequences. The UAE’s framework addresses this by prioritising visibility, response speed and continuity planning, ensuring that critical services remain operational even under adverse conditions.&lt;/p&gt; 
&lt;p&gt;Investment continues to play a central role in sustaining this momentum. The country is actively strengthening its cyber capabilities through the adoption of advanced technologies, the development of skilled talent and the enhancement of digital infrastructure.&lt;/p&gt; 
&lt;p&gt;“As AI adoption accelerates, cyber security priorities are shifting just as rapidly. Attackers are already &lt;a href="https://www.computerweekly.com/opinion/What-lies-in-store-for-the-security-world-in-2026"&gt;using AI to enhance ransomware and phishing campaigns&lt;/a&gt;, raising the stakes for organisations operating critical infrastructure,” said Omdia chief analyst Trevor Clarke. “As AI is harnessed by attackers for more adaptive ransomware and phishing campaigns, the stakes have never been higher for security teams.”&lt;/p&gt; 
&lt;p&gt;In response, organisations are moving away from static security postures towards adaptive, AI-enabled frameworks. “Firms will leverage unique combinations of machine learning, generative and agentic AI as complementary and foundational capabilities, rather than add-on components,” he said.&lt;/p&gt; 
&lt;p&gt;Equally important is the emphasis on collaboration and knowledge sharing, authorities of the UAE government have highlighted the need for closer cooperation between organisations, both domestically and internationally, to build a more secure and stable digital environment. This includes joint initiatives, shared threat intelligence and coordinated response strategies that extend beyond individual sectors.&lt;/p&gt; 
&lt;p&gt;While global uncertainties continue to shape the broader risk environment, the UAE’s cyber security strategy demonstrates the value of long-term planning and institutional coordination. By embedding cyber security into national priorities and fostering a culture of continuous readiness, the country is not only protecting its digital assets but also setting a benchmark for resilience in the region.&lt;/p&gt; 
&lt;div class="extra-info"&gt;
 &lt;div class="extra-info-inner"&gt;
  &lt;h3 class="splash-heading"&gt;Read more about cyber security&lt;/h3&gt; 
  &lt;ul class="default-list"&gt; 
   &lt;li&gt;&lt;a href="https://www.computerweekly.com/news/366639768/CISOs-on-alert-Strengthening-cyber-resilience-amid-geopolitical-tensions-in-the-Middle-East"&gt;CISOs on alert: Strengthening cyber resilience amid geopolitical tensions in the Middle East&lt;/a&gt;. As regional uncertainty rises, security leaders across the Gulf focus on resilience, faster incident response and deeper threat intelligence to protect critical systems and data&lt;/li&gt; 
   &lt;li&gt;&lt;a target="_blank" href="https://www.techtarget.com/healthtechsecurity/news/366640347/CISA-urges-companies-to-bolster-Microsoft-Intune-systems-after-Stryker-cyberattack" rel="noopener"&gt;CISA urges companies to bolster Microsoft Intune systems after Stryker cyber attack&lt;/a&gt;. CISA is urging US organisations to strengthen the security of their endpoint management systems after cyberthreat actors infiltrated Stryker’s Microsoft environment.&lt;/li&gt; 
  &lt;/ul&gt;
 &lt;/div&gt;
&lt;/div&gt;</body>
            <description>Strategic investment and coordination reinforce the country’s ability to withstand complex cyber threats</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/Hero%20Images/cyber-security-attack-hack-breach-MaksymFilipchuk-adobe.jpg</image>
            <link>https://www.computerweekly.com/news/366640834/UAE-positions-cyber-security-as-pillar-of-national-resilience-and-digital-growth</link>
            <pubDate>Thu, 26 Mar 2026 06:24:00 GMT</pubDate>
            <title>UAE positions cyber security as pillar of national resilience and digital growth</title>
        </item>
        <item>
            <body>&lt;p&gt;The US government has formally launched a &lt;a href="https://www.state.gov/bureaus-offices/under-secretary-for-arms-control-and-international-security-affairs/bureau-of-emerging-threats/" target="_blank" rel="noopener"&gt;Bureau of Emerging Threats&lt;/a&gt; within the State Department to protect and mitigate against threats posed to America’s national security by cyber attacks, the weaponisation of space and emerging technologies such as artificial intelligence (AI)&lt;/p&gt; 
&lt;p&gt;Although its existence first became public knowledge &lt;a href="https://www.nextgov.com/policy/2025/04/state-department-moves-cyber-and-intelligence-bureaus-under-agencywide-reorg/404753/" target="_blank" rel="noopener"&gt;fewer than 12 months ago&lt;/a&gt;, the State Department has kept a tight lid on the precise nature of the bureau until this week, when senior officials broke their silence &lt;a href="https://abcnews.com/Politics/state-department-launches-effort-counter-cyberattacks-ai-risks/story?id=131265350" target="_blank" rel="noopener"&gt;in conversation with reporters from TV network ABC&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;“The bureau will address not only the current threats we face today in cyber space, outer space, critical infrastructure and through the misuse of disruptive technology like AI and quantum, but those we will face in the decades ahead,” State Department principal deputy spokesperson Tommy Pigott told ABC News.&lt;/p&gt; 
&lt;p&gt;Led by career diplomat Anny Vu, the Bureau of Emerging Threats ultimately reports to the under secretary for arms control and international security Thomas DiNanno, and will contain five distinct offices covering cyber security, critical national infrastructure (CNI), disruptive technology, space security and threat assessment.&lt;/p&gt; 
&lt;p&gt;Officials told ABC they would be heavily focused on the activities of the so-called Big Four nation-state threat actors – China, &lt;a href="https://www.computerweekly.com/news/366639722/Iranian-hacktivists-muster-their-forces-but-state-APTs-lay-low" target="_blank" rel="noopener"&gt;Iran&lt;/a&gt;, North Korea and Russia – as well as international terrorist organisations.&lt;/p&gt; 
&lt;p&gt;The network additionally reported that the State Department has not revealed any details pertaining to the bureau’s budget, staffing levels or how it will work alongside the multiple pre-existing US agencies that claim some degree of expertise on cyber security matters – &lt;a href="https://www.computerweekly.com/news/366640448/Cisa-tells-US-organisations-to-harden-endpoint-management-after-Stryker-attack" target="_blank" rel="noopener"&gt;such as the Cybersecurity and Infrastructure Security Agency&lt;/a&gt; (Cisa) and the National Security Agency (NSA).&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Engagement"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Engagement&lt;/h2&gt;
 &lt;p&gt;Absent further detail at this stage, for the time being security leaders should continue to try to work with their existing US government contacts, said &lt;a href="https://xcapeinc.com/" target="_blank" rel="noopener"&gt;Xcape Inc&lt;/a&gt; board member David Small.&lt;/p&gt;
 &lt;p&gt;“Security leaders should&amp;nbsp;prioritise maintaining relationships with Cisa, which remains the operational bridge between the State Department’s diplomatic goals and the private sector’s technical defence needs,” he said.&lt;/p&gt;
 &lt;p&gt;“Hiring a fleet of cyber security experts into the State Department is a bit like asking a career diplomat to debug a kernel panic; they’ll handle the negotiations beautifully, but the system is still going to crash.”&lt;/p&gt;
 &lt;p&gt;The appointment of three long-standing diplomatic experts as its leadership suggests the bureau’s output will initially lean towards sanctions and treaty-writing, as opposed to technical remediation, he said.&lt;/p&gt;
 &lt;p&gt;As the new organisation beds in, Small said the business impact for private sector security pros was a period of increased regulatory noise as it attempts to define international security norms that may not always align with current engineering realities.&lt;/p&gt;
 &lt;p&gt;“To prepare, defenders and policy leaders should look to engage with the Bureau’s Office of Disruptive Technology early, treating it as a primary channel for informing the government on the feasibility of proposed AI and space-asset regulations,” added Small.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://suzulabs.com/" target="_blank" rel="noopener"&gt;Suzu Labs&lt;/a&gt; senior director for secure AI solutions and cyber security Jacob Krell believes that the Bureau of Emerging Threats was named for threats that have long-since emerged.&lt;/p&gt;
 &lt;p&gt;“Cyber and space capabilities served as the opening instruments in the current campaign against Iran. AI-driven systems are compressing military decision cycles from days to minutes. These are the primary tools of state power being deployed right now by every adversary this bureau names. Standing up a bureau to address them through foreign policy is a recognition that the nature of conflict has fundamentally changed,” he said.&lt;/p&gt;
 &lt;p&gt;“That recognition is what makes the placement under the under secretary for arms control and international security significant. The United States is formally treating cyber, AI and space as part of the same strategic conversation as conventional and nuclear capabilities. That is the right instinct.”&lt;/p&gt;
 &lt;p&gt;But like Small, Krell said he saw challenges ahead, in that technologically driven conflict occurs much quicker than diplomats can handle. For the bureau to be effective, he said it would need to operate at a pace reflecting technological reality, not at the pace of the State Department.&lt;/p&gt;
 &lt;p&gt;“The mandate is sound and the recognition is overdue. What matters now is whether this bureau arrives with the resourcing and operational speed to match threats that have already moved well past the planning stage,” he said.&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Read more about US cyber policy&lt;/h3&gt; 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;The US communications regulator has enacted a ban on all router hardware made outside America citing security concerns, but experts say the move may risk creating &lt;a href="https://www.computerweekly.com/news/366640628/US-government-bans-imported-routers-raising-tough-questions" target="_blank" rel="noopener"&gt;more issues than it solves&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;The US has unveiled a six-pillar national cyber security strategy, with developing technological areas such as post-quantum cryptography and artificial intelligence &lt;a href="https://www.computerweekly.com/news/366639879/Trump-looks-to-power-up-post-quantum-AI-security" target="_blank" rel="noopener"&gt;front and centre&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;The conduct of powerful nations is causing knock-on effects in the cyber world as long-standing security frameworks &lt;a href="https://www.computerweekly.com/news/366639044/Western-cyber-alliances-risk-fragmenting-in-new-world-order" target="_blank" rel="noopener"&gt;appear increasingly precarious&lt;/a&gt;.&lt;/li&gt; 
   &lt;/ul&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/section&gt;</body>
            <description>The US’ Bureau of Emerging Threats sits within the State Department and will supposedly help address national security threats arising from cyber attacks, the weaponisation of space and other emerging technologies</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/Hero%20Images/US-capitol-washington-congress-2-adobe.jpeg</image>
            <link>https://www.computerweekly.com/news/366640778/US-government-launches-Bureau-of-Emerging-Threats</link>
            <pubDate>Wed, 25 Mar 2026 17:02:00 GMT</pubDate>
            <title>US government launches Bureau of Emerging Threats</title>
        </item>
        <item>
            <body>&lt;p&gt;Google has announced plans to migrate to &lt;a href="https://www.computerweekly.com/opinion/Quantum-risk-to-quantum-readiness-A-PQC-roadmap" target="_blank" rel="noopener"&gt;post-quantum cryptography&lt;/a&gt; (PQC) by 2029, moving up its timeline given recent progress in the field and emerging threat vectors.&lt;/p&gt; 
&lt;p&gt;In February, the web giant called on the industry &lt;a href="https://thequantuminsider.com/2026/02/06/google-calls-on-governments-and-industry-to-prepare-now-for-quantum-era-cybersecurity/" target="_blank" rel="noopener"&gt;to act on quantum security&lt;/a&gt; before the dreaded ‘Q-Day’ on which a yet-to-be-built quantum computer will break current encryption standards permanently.&lt;/p&gt; 
&lt;p&gt;It said its new timeline reflected the pace of developments in areas such as quantum hardware development, error correction and factoring resource estimates.&lt;/p&gt; 
&lt;p&gt;“As a pioneer in both quantum and PQC, it’s our responsibility to lead by example and share an ambitious timeline. By doing this, we hope to provide the clarity and urgency needed to accelerate digital transitions not only for Google, but also across the industry,” said Google vice-president of security engineering, Heather Adkins.&lt;/p&gt; 
&lt;p&gt;It is by now common knowledge that quantum computing poses a threat to encryption and digital standards, a threat that is relevant today with the spread of harvest now, decrypt later attacks (HNDL), but digital signatures, said Google, are an emerging future threat that means the transition to PQC must take place before a cryptographically relevant quantum computer (CRQC) exists.&lt;/p&gt; 
&lt;p&gt;Hence, it is now adjusting its threat model to prioritise PQC migration for authentication services, which are an important component of online security and digital signature migrations.&lt;/p&gt; 
&lt;p&gt;The US National Institute for Standards and Technology’s (NIST) timeline for PQC migration states it plans to deprecate the use of &lt;a href="https://www.computerweekly.com/news/366625113/Noisy-quantum-hardware-could-crack-RSA-2048-in-seven-days" target="_blank" rel="noopener"&gt;RSA digital signature algorithms&lt;/a&gt; with 112 bits of security (2048-bit keys), alongside many other widely-used algorithms, in 2030, and is proposing to disallow all legacy RSA algorithms by 2035.&lt;/p&gt; 
&lt;p&gt;In the UK, the National Cyber Security Centre (NCSC) aims to have key sectors and organisations &lt;a href="https://www.computerweekly.com/news/366621031/NCSC-proposes-three-step-plan-to-move-to-quantum-safe-encryption" target="_blank" rel="noopener"&gt;transitioned to PQC&lt;/a&gt; in line with NIST’s final countdown.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="PQC already in reach"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;PQC already in reach&lt;/h2&gt;
 &lt;p&gt;The good news, said Google, is that advanced PQC technology is &lt;a href="https://security.googleblog.com/2026/03/" target="_blank" rel="noopener"&gt;already in reach for end-users&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;In parallel with its new timeline, it also announced that testing of PQC enhancements for its Android mobile operating system (OS) is beginning in the next &lt;a href="https://developer.android.com/about/versions/17" target="_blank" rel="noopener"&gt;Android 17 beta&lt;/a&gt;, with general availability slated for the stable production release – which is widely expected to take place in June 2026.&lt;/p&gt;
 &lt;p&gt;As part of this, Android is receiving a comprehensive architectural upgrade that puts the the &lt;a href="https://www.nist.gov/pqc" target="_blank" rel="noopener"&gt;NIST-endorsed&lt;/a&gt; Module-Lattice-Based Digital Signature Algorithm (ML-DSA) PQC standard at the platform’s heart.&lt;/p&gt;
 &lt;p&gt;Two significant use cases within Android will be protecting the Android Verified Boot (AVB) library to ensure the software loaded during the device’s boot sequence can resist unauthorised modification, and transitioning Remote Attestation to a fully compliant architecture that enables devices to securely prove their state to relying parties.&lt;/p&gt;
 &lt;p&gt;Google also plans to introduce features to safeguard its ecosystem of third-party Android application developers, and their wares.&lt;/p&gt;
 &lt;p&gt;“We’re establishing a new, quantum-resistant chain of trust. This chain of trust secures the platform continuously – from the moment the OS powers on, to the execution of applications distributed globally,” wrote Android product manager Eric Lynch and Google Play group product manager Dom Elliot.&lt;/p&gt;
 &lt;p&gt;“Android is swapping today’s digital locks for advanced encryption to help enhance the security of every app you download – no matter how powerful future supercomputers get.”&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Read more about quantum computing&lt;/h3&gt; 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;We speak to Lucy Robson, a quantum algorithm scientist at Universal Quantum, about her work in helping to develop &lt;a href="https://www.computerweekly.com/podcast/Understanding-quantum-A-Computer-Weekly-Downtime-Upload-podcast" target="_blank" rel="noopener"&gt;simulations for drug discovery&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;Japan and Singapore will work together to bridge the gap between quantum research and real-world commercialisation, marking Singapore’s first government-to-government pact &lt;a href="https://www.computerweekly.com/news/366637028/Singapore-and-Japan-team-up-on-quantum-computing" target="_blank" rel="noopener"&gt;dedicated to the technology&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;Claims that quantum computing will destroy Bitcoin may be exaggerated, &lt;a href="https://www.computerweekly.com/opinion/Will-Quantum-Computing-Kill-Bitcoin" target="_blank" rel="noopener"&gt;but Bitcoin will need to adapt&lt;/a&gt;.&lt;/li&gt; 
   &lt;/ul&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/section&gt;</body>
            <description>Google sets out a timeline for its migration to post-quantum cryptography, saying it will complete its migration before the end of the 2020s</description>
            <image>https://cdn.ttgtmedia.com/visuals/German/article/quantum-computing-adobe.jpg</image>
            <link>https://www.computerweekly.com/news/366640650/Google-targets-2029-for-post-quantum-cyber-readiness</link>
            <pubDate>Wed, 25 Mar 2026 14:22:00 GMT</pubDate>
            <title>Google targets 2029 for post-quantum cyber readiness</title>
        </item>
        <item>
            <body>&lt;p&gt;The consolidation wave in enterprise security is real, and the business case is compelling. A January 2025 report &lt;a href="https://www.paloaltonetworks.com/blog/2025/01/growing-need-cybersecurity-platformization/" target="_blank" rel="noopener"&gt;from IBM and Palo Alto Networks&lt;/a&gt; found that organisations manage an average of 83 security solutions from 29 vendors. The complexity is staggering – and attackers exploit the gaps between those tools. The push to rationalise is not just about budget; it's about coherence.&lt;/p&gt; 
&lt;p&gt;But the allure of a unified platform brings its own hazard. Not every vendor offering "end-to-end visibility" is delivering genuine integration. And even when they are, consolidation can silently introduce the very risk it promises to eliminate: a single point of catastrophic failure.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Spotting integration theatre"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Spotting integration theatre&lt;/h2&gt;
 &lt;p&gt;Integration theatre is the cyber security equivalent of a &lt;a href="https://www.britannica.com/topic/Potemkin-village" target="_blank" rel="noopener"&gt;Potemkin village&lt;/a&gt;: application programming interfaces (APIs) stitched together with no shared data model, dashboards that aggregate alerts without correlating them, and licensing bundles that market themselves as platforms while operating as loosely coupled point solutions.&lt;/p&gt;
 &lt;p&gt;The diagnostic questions I ask vendors are deliberately outcome-focused, not feature-focused. Does threat detection in one module automatically trigger a policy change in another, without human intervention? Does a compromise of an identity trigger endpoint quarantine in under a minute? Can you demonstrate bi-directional data flow between your extended detection and response (XDR), security information and event management (SIEM) and cloud security posture management in a live environment – not a sales demo? Genuine platforms reduce mean time to detect (MTTD) and mean time to respond (MTTR). Theatre does not.&lt;/p&gt;
 &lt;p&gt;A further tell: ask how the vendor handles failure of a single module. If the answer is that the platform degrades gracefully, probe it. If the whole stack collapses, it was never truly integrated – it was just co-located.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="The CrowdStrike warning shot"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;The CrowdStrike warning shot&lt;/h2&gt;
 &lt;p&gt;On 19 July 2024, a faulty configuration update &lt;a href="https://www.computerweekly.com/opinion/One-year-on-from-the-CrowdStrike-outageWhat-have-we-learned"&gt;to CrowdStrike’s Falcon sensor&lt;/a&gt; brought down approximately 8.5 million Windows devices globally – airlines, hospitals, broadcasters, 911 call centres. Fortune 500 losses were estimated at $5.4bn (£4.03bn). &lt;a href="https://www.computerweekly.com/news/366601558/Microsoft-and-CrowdStrike-hit-back-at-Deltas-legal-threats"&gt;Delta Air Lines&lt;/a&gt; alone reported $500m in damages. This was not a cyber attack. It was a platform failure.&lt;/p&gt;
 &lt;p&gt;For organisations that had consolidated endpoint protection, identity threat detection and cloud security posture management into one vendor stack, the incident was not a localised disruption – it was organisational paralysis. The lesson, as one post-incident analysis framed it, is not to avoid consolidation. It is to understand what you are trading away: architectural redundancy and failure isolation in exchange for operational simplicity.&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;The Computer Weekly Security Think Tank on platformisation&lt;/h3&gt; 
   &lt;ul style="list-style-type: square;" class="default-list"&gt; 
    &lt;li&gt;Stephen McDermid, Okta:&amp;nbsp;&lt;a href="https://www.computerweekly.com/opinion/Open-cyber-standards-key-to-cross-platform-integration" target="_blank" rel="noopener"&gt;Open cyber standards key to cross-platform integration&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;Aditya K Sood, Aryaka:&amp;nbsp;&lt;a rel="noopener" target="_blank" href="https://www.computerweekly.com/opinion/Platformisation-without-illusion-Separating-integration-from-theatre"&gt;Platformisation without illusion: Separating integration from theatre&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;Martin Riley, Bridewell Consulting:&amp;nbsp;&lt;a href="https://www.computerweekly.com/opinion/Strong-security-balances-consolidation-and-best-of-breed-capabilities" target="_blank" rel="noopener"&gt;Strong security balances consolidation and best-of-breed capabilities&lt;/a&gt;.&amp;nbsp;&lt;/li&gt; 
    &lt;li&gt;Vaibhav Dutta, Tata Communications:&amp;nbsp;&lt;a rel="noopener" target="_blank" href="https://www.computerweekly.com/opinion/How-CISOs-can-build-a-truly-unified-and-resilient-security-platform"&gt;How CISOs can build a truly unified and resilient security platform&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;Joe Mayhew and Ahmed Tikail, PA Consulting:&amp;nbsp;&lt;a href="https://www.computerweekly.com/opinion/Beyond-integration-theatre-Building-stronger-cyber-platforms" target="_blank" rel="noopener"&gt;Beyond integration theatre: Building stronger cyber platforms&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;Rik Ferguson, Forescout:&amp;nbsp;&lt;a rel="noopener" target="_blank" href="https://www.computerweekly.com/opinion/Cyber-platformisation-Dont-fall-into-the-integration-debt-trap"&gt;Cyber platformisation: Don't fall into the integration debt trap&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;Haris Pylarinos, Hack the Box: &lt;a href="https://www.computerweekly.com/opinion/Cyber-platformisation-is-a-skills-issue-for-security-teams" target="_blank" rel="noopener"&gt;Cyber platformisation is a skills issue&lt;/a&gt;.&lt;/li&gt; 
   &lt;/ul&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Governance and architectural safeguards"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Governance and architectural safeguards&lt;/h2&gt;
 &lt;p&gt;If you are consolidating, the governance framework must be commensurate with the concentration of risk. The Financial Conduct Authority’s (FCA’s) &lt;a href="https://www.fca.org.uk/firms/operational-resilience/crowdstrike-outage-lessons-operational-resilience" target="_blank" rel="noopener"&gt;post-CrowdStrike guidance&lt;/a&gt; is instructive here: by March 2025, firms in scope of operational resilience rules were required to demonstrate they could sustain important business services in severe but plausible failure scenarios. That is the right standard of thinking for any CISO evaluating platformisation.&lt;/p&gt;
 &lt;p&gt;My approach rests on three pillars. First, &lt;b&gt;layered redundancy&lt;/b&gt;: no single vendor should own more than two adjacent security domains without a contractual and technical fallback. Staged rollouts, canary deployments and automated rollback mechanisms are non-negotiable SLA requirements, not optional extras.&lt;/p&gt;
 &lt;p&gt;Second, &lt;b&gt;zero-trust architecture&lt;/b&gt;: platformisation does not exempt you from zero trust principles. Compartmentalise blast radius. Even within a unified platform, segment data flows so a compromise or failure in one domain cannot propagate laterally.&lt;/p&gt;
 &lt;p&gt;Third, &lt;b&gt;continuous third-party risk oversight&lt;/b&gt;: the &lt;a href="https://www.weforum.org/publications/global-cybersecurity-outlook-2025/" target="_blank" rel="noopener"&gt;WEF Global Cybersecurity Outlook 2025&lt;/a&gt; explicitly flags supply chain vulnerabilities as a systemic amplifier. Your platform vendor is a critical third party. Contractual rights to audit, independent pentesting, escrow arrangements and documented exit strategies are governance essentials, not aspirations.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="The board conversation"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;The board conversation&lt;/h2&gt;
 &lt;p&gt;The WEF notes that boards are no longer asking whether they are secure – they are asking whether they are &lt;i&gt;resilient&lt;/i&gt;. Platformisation can absolutely support resilience. But only if the CISO insists on genuine integration over marketing, builds governance structures proportionate to the concentration risk created, and retains the architectural independence to survive vendor failure.&lt;/p&gt;
 &lt;p&gt;Consolidation is a strategy. Platform theatre is a liability. Know the difference before you sign.&lt;/p&gt;
 &lt;p&gt;&lt;em&gt;John Bruce is CISO at &lt;a href="https://www.quorumcyber.com/" target="_blank" rel="noopener"&gt;Quorum Cyber&lt;/a&gt;, an Edinburgh-based managed security services provider and Microsoft partner.&lt;/em&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>The Security Think Tank looks at platformisation, considering questions such as how CISOs can distinguish between a truly integrated platform and 'integration theater, and how to protect unified platforms.</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/Hero%20Images/Security-Think-Tank-hero.jpg</image>
            <link>https://www.computerweekly.com/opinion/Platformisation-or-platform-theatre-Navigating-cyber-consolidation</link>
            <pubDate>Wed, 25 Mar 2026 13:36:00 GMT</pubDate>
            <title>Platformisation or platform theatre? Navigating cyber consolidation</title>
        </item>
        <item>
            <body>&lt;p&gt;Emergency out-of-band fixes issued by enterprise IT giants Microsoft and Oracle have shone a spotlight on issues around both&amp;nbsp;&lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/patch-management" target="_blank" rel="noopener"&gt;update cycles and patching&lt;/a&gt;, and identity security and zero-trust.&lt;/p&gt; 
&lt;p&gt;Microsoft’s emergency update, &lt;a href="https://support.microsoft.com/en-us/topic/march-21-2026-kb5085516-os-builds-26200-8039-and-26100-8039-out-of-band-09e85404-1cb6-4ed4-9ca5-3e40d74307b9" target="_blank" rel="noopener"&gt;KB5085516&lt;/a&gt;, addresses an issue that arose after installing the mandatory cumulative updates pushed live on Patch Tuesday earlier this month.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://learn.microsoft.com/en-us/windows/release-health/windows-message-center#3806" target="_blank" rel="noopener"&gt;According to Microsoft&lt;/a&gt;, it has since emerged that many users experienced problems signing into applications with a Microsoft account, seeing a “no internet” error message even though the device had a working connection. This had the effect of preventing access to multiple services and applications. It should be noted that organisations using Entra ID did not experience the issue.&lt;/p&gt; 
&lt;p&gt;But Microsoft’s emergency patch comes just days after it doubled down on a commitment to software quality, reliability and stability. In a blog post published &lt;a href="https://blogs.windows.com/windows-insider/2026/03/20/our-commitment-to-windows-quality/" target="_blank" rel="noopener"&gt;just 24 hours prior to the latest update&lt;/a&gt;, Pavan Davuluri of Microsoft’s Windows Insider Program Team said updates should be “predictable and easy to plan around”.&lt;/p&gt; 
&lt;p&gt;“Microsoft had [a] week,” said Michael Bell, founder and CEO of &lt;a href="https://suzulabs.com/home-suzu-labs" target="_blank" rel="noopener"&gt;Suzu Labs&lt;/a&gt;. “Their Windows exec published a blog promising improved reliability and quality on 20 March, and by 21 March, they were shipping an emergency out-of-band fix for a sign-in bug that their own March security update introduced.&lt;/p&gt; 
&lt;p&gt;“That’s on top of separate hotpatches for RRAS remote code execution flaws and a Bluetooth visibility bug. Three emergency fixes in eight days does not shout reliability era.”&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://www.oracle.com/security-alerts/alert-cve-2026-21992.html" target="_blank" rel="noopener"&gt;Oracle’s patch&lt;/a&gt;, meanwhile, addresses &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21992" target="_blank" rel="noopener"&gt;CVE-2026-21992&lt;/a&gt;, a remote code execution&amp;nbsp;flaw in the REST:WebServices component of Oracle Identity Manager and the Web Services Security component of Oracle Web Services Manager in Oracle Fusion Middleware. It carries a CVSS score of 9.8 and can be exploited by an unauthenticated attacker with network access over HTTP.&lt;/p&gt; 
&lt;div class="extra-info"&gt;
 &lt;div class="extra-info-inner"&gt;
  &lt;h3 class="splash-heading"&gt;Read more about patch management&lt;/h3&gt; 
  &lt;ul class="default-list"&gt; 
   &lt;li&gt;These 12 tools approach patching from different perspectives. Understanding their various approaches can &lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/12-best-patch-management-software-and-tools" target="_blank" rel="noopener"&gt;help you find the right product for your needs&lt;/a&gt;.&lt;/li&gt; 
   &lt;li&gt;Microsoft recently added WSUS to its deprecation list. Now that the battle-tested patch management tool's days are numbered, &lt;a href="https://www.techtarget.com/searchwindowsserver/tip/The-Microsoft-patch-management-guide-for-admins" target="_blank" rel="noopener"&gt;what are the alternatives from the company? &lt;/a&gt;&lt;/li&gt; 
   &lt;li&gt;Timely patch management should be crucial in any organisation, but too often it goes by the wayside. Automating the process may offer a path forward &lt;a href="https://www.computerweekly.com/feature/Automated-patch-management-A-proactive-way-to-stay-ahead-of-threats" target="_blank" rel="noopener"&gt;for hard-pressed cyber defenders&lt;/a&gt;.&lt;/li&gt; 
  &lt;/ul&gt;
 &lt;/div&gt;
&lt;/div&gt; 
&lt;p&gt;There appear to be no reports of active exploitation at the time of writing, but previous high-profile flaws in Oracle have been swiftly attacked – last year, a similar RCE issue in E-Business Suite drew the attention of the prolific&amp;nbsp;&lt;a href="https://www.computerweekly.com/news/366632397/Oracle-patches-E-Business-suite-targeted-by-Cl0p-ransomware" target="_blank" rel="noopener"&gt;Cl0p ransomware crew&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;Bell noted that &lt;a href="https://www.tenable.com/blog/cve-2026-21992-critical-out-of-band-oracle-identity-manager-and-oracle-web-services-manager" target="_blank" rel="noopener"&gt;another, possibly related&lt;/a&gt; pre-authentication RCE issue in Oracle Identity Manager – CVE-2025-61757 – was added to the Cybersecurity and Infrastructure Security Agency&amp;nbsp;Known Exploited Vulnerabilities list in short order given how trivial and easy-to-exploit it proved to be. He said the latest bug may well follow the same path.&lt;/p&gt; 
&lt;p&gt;“The reason this matters more than a typical 9.8 is the target,” said Bell. “Code execution on an identity management platform means the attacker can rewrite the access policies that control the rest of the enterprise, and that turns a single CVE into persistent access across an entire network.”&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="‘Crumbling trust’"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;‘Crumbling trust’&lt;/h2&gt;
 &lt;p&gt;Noelle Murata, a senior security engineer at &lt;a href="https://xcapeinc.com/" target="_blank" rel="noopener"&gt;Xcape&lt;/a&gt;, said the twin updates illustrated a “crumbling trust in traditional update cycles”.&amp;nbsp;&lt;/p&gt;
 &lt;p&gt;“When Oracle Identity Manager, the literal brain of enterprise security, requires an unauthenticated RCE patch, it proves that the tools we use to build zero-trust are often our most dangerous single points of failure,” she said. “At the same time, Microsoft’s need to issue a security update just to stop gaslighting users with phantom connectivity errors highlights a widening quality gap.”&lt;/p&gt;
 &lt;p&gt;Murata lamented a cycle where security services come in the form of either pre-installed backdoors or productivity-killing glitches, and called on the industry to demand more than just faster and better patching if it is to truly protect users.&lt;/p&gt;
 &lt;p&gt;“We need an industry-wide pivot toward resilient-by-design architectures that don’t fail when a single HTTP request reaches the identity layer,” she said. “If zero-trust means we can’t trust the identity manager to stay secure or the operating system to let us log in, then congratulations; the industry has finally achieved its goal.”&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Emergency out-of-band patches from Microsoft and Oracle signal underlying security issues around update cycles and patching, and identity security and zero-trust, says the community</description>
            <image>https://cdn.ttgtmedia.com/visuals/LeMagIT/hero_article/security-threat-cyber-attack-1-adobe.jpeg</image>
            <link>https://www.computerweekly.com/news/366640648/Emergency-Microsoft-Oracle-patches-point-to-wider-cyber-issues</link>
            <pubDate>Wed, 25 Mar 2026 11:30:00 GMT</pubDate>
            <title>Emergency Microsoft, Oracle patches point to wider cyber issues</title>
        </item>
        <item>
            <body>&lt;p&gt;Cyber security professionals must embrace a narrow window of opportunity to develop safeguards around artificial intelligence (AI)-enhanced software generation – popularly known as &lt;a href="https://www.techtarget.com/searchsecurity/tip/Vibe-coding-security-risks-and-how-to-mitigate-them" target="_blank" rel="noopener"&gt;vibe coding&lt;/a&gt; – or risk losing control of the narrative and exposing organisations to cyber attacks and other disruptions, &lt;a href="https://www.ncsc.gov.uk/" target="_blank" rel="noopener"&gt;National Cyber Security Centre&lt;/a&gt; (NCSC) chief executive Richard Horne has said.&lt;/p&gt; 
&lt;p&gt;In a keynote speech delivered at the annual &lt;a href="https://www.rsaconference.com/" target="_blank" rel="noopener"&gt;RSAC Conference&lt;/a&gt; in San Francisco on 24 March, Horne called on the security community to work together to develop safeguards around vibe coding, highlighting how modern-day society faces ongoing and fundamental issues with technology thanks to exploitable vulnerabilities.&lt;/p&gt; 
&lt;p&gt;However, Horne also argued that while it was true insecure software produced without human eyes on the code could propagate vulnerabilities far and wide, well-trained AI tooling could yet create &lt;a href="https://www.techtarget.com/whatis/definition/security-by-design" target="_blank" rel="noopener"&gt;secure-by-design&lt;/a&gt; software&amp;nbsp;which would be transformative for cyber security outcomes throughout its lifecycle.&lt;/p&gt; 
&lt;p&gt;“The attractions of vibe coding are clear. Disrupting the status quo of manually produced software that is consistently vulnerable is a huge opportunity, but not without risk of its own,” he said. “The AI tools we use to develop code must be designed and trained from the outset so that they do not introduce or propagate unintended vulnerabilities.”&lt;/p&gt; 
&lt;p&gt;Horne said cyber pros also have a responsibility to ensure that the future in which vibe-coding and other AI code-generation tools are widely adopted proves to be a “net positive”.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="New paradigm"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;New paradigm&lt;/h2&gt;
 &lt;p&gt;&lt;a href="http://www.ncsc.gov.uk/blogs/vibe-check-ai-may-replace-saas-but-not-for-a-while"&gt;In a thought leadership blog&lt;/a&gt; published alongside Horne’s speech on 24 March, senior NCSC technical leadership argued that while vibe coding poses an “intolerable risk” for many organisations as things stand, the trend offers “glimpses of a new paradigm”.&lt;/p&gt;
 &lt;p&gt;Indeed, wrote the agency’s architecture CTO, AI-backed coding could ultimately prove to be as much a technological revolution as &lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/Software-as-a-Service" target="_blank" rel="noopener"&gt;software as a service&lt;/a&gt; (SaaS) – pioneered at the turn of the century by the likes of Salesforce – proved to be.&lt;/p&gt;
 &lt;p&gt;While careful not to state that organisations will suddenly use AI to whip up a replacement for their CRM tools or other platforms, the NCSC said there are now clear indications that the cost versus effort curve for “bespoke enough” software is shifting and, as such, more organisations will soon begin to make &lt;a href="https://www.techtarget.com/searchitoperations/news/366639662/SaaSpocalypse-Maybe-not-but-SaaS-applications-are-changing" target="_blank" rel="noopener"&gt;different choices when it comes to software&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;Given the many security concerns around SaaS – such as appropriate authentication and access controls, misconfigurations and third-party risks – &amp;nbsp;which have never really been fully addressed to the satisfaction of all, this therefore raises the question of what technology, guardrails, platforms and assurances does the security community need to have in place to ensure that the vibe-coded future is safer than the status quo.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Things to consider"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Things to consider&lt;/h2&gt;
 &lt;p&gt;Some of the safeguards that security leaders need to advocate for are obvious, said the NCSC. For example, AI models must be schooled in security-by-design methods, humans need to have confidence in the provenance of the model and trust that it hasn’t been badly developed, and thought needs to be given to how AI can be used to review both human- and AI-generated code.&lt;/p&gt;
 &lt;p&gt;But there are also more nuanced questions, such as how to use deterministic architectures to limit what code can do should it prove malicious, compromised or unsafe, what platforms need to be designed to host AI-generated services that implement the needed controls to protect data and users, and how AI might be used to ensure the security hygiene of software through practices such as documentation, test cases, fuzzing or updating threat models.&lt;/p&gt;
 &lt;p&gt;The NCSC noted the possibility of a future where AI code is more restricted and locked down than even the most secure on-premise or SaaS products ever were. Ironically, it concluded, this may at last address the unsolved security issues that still dog SaaS and that have prevented the last, most cyber-conscious hold-outs from going all in on the cloud.&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Read more about vibe coding&lt;/h3&gt; 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;AI-driven coding is adding maintenance debt to OSS projects, adding a new dimension of risk to software supply chains. &lt;a href="https://www.techtarget.com/searchapparchitecture/tip/Vibe-coding-is-killing-open-source-increasing-software-risk" target="_blank" rel="noopener"&gt;Learn how the OSS ecosystem and the orgs that rely on it should adapt&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;Vibe coding shifts programming from line-by-line tasks to natural language collaboration with AI. &lt;a href="https://www.techtarget.com/searchcio/feature/Vibe-coding-What-IT-leaders-need-to-know" target="_blank" rel="noopener"&gt;This new approach accelerates delivery but raises new risks&lt;/a&gt;.&lt;/li&gt; 
    &lt;li&gt;Is vibe coding a bad idea for enterprises? AI can produce results faster than manual coding, but its benefits eventually unravel due to hidden costs and complexities. &lt;a href="https://www.theserverside.com/tip/The-case-against-vibe-coding" target="_blank" rel="noopener"&gt;Here's why&lt;/a&gt;.&lt;/li&gt; 
   &lt;/ul&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/section&gt;</body>
            <description>At RSA in San Francisco, NCSC chief exec Richard Horne says security professionals have an opportunity and a responsibility to get in front of the security issues raised by the popularity of ‘vibe coding’</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/Hero%20Images/software-code-developer-adobe.jpeg</image>
            <link>https://www.computerweekly.com/news/366640680/Cyber-pros-must-grasp-the-vibe-coding-nettle-says-NCSC-chief</link>
            <pubDate>Tue, 24 Mar 2026 17:01:00 GMT</pubDate>
            <title>Cyber pros must grasp the vibe coding nettle, says NCSC chief</title>
        </item>
        <title>ComputerWeekly.com</title>
        <ttl>60</ttl>
        <webMaster>editor@computerweekly.com</webMaster>
    </channel>
</rss>
