-
Top Story
Interview: How OpenAI is making ChatGPT public and private sector-ready
OpenAI’s mission statement is focused on building artificial general intelligence (AGI) to benefit everyone. It has now signed a…
Read More » -
Top Story
AWS adds vector functionality to S3 object storage
Amazon Web Services (AWS) has announced vector storage for its S3 cloud object storage – S3 Vectors – in…
Read More » -
Top Story
Fresh allegations of ‘sustained’ police and MI5 surveillance against BBC reporters
A former BBC journalist who exposed the involvement of MI5 in concealing evidence of abuse at the Kincora boys’…
Read More » -
Top Story
Hitachi Vantara claims Hitachi iQ the most complete AI stack
Among storage player claims about how well-suited their products are to AI workloads, Hitachi Vantara has a unique backstory…
Read More » -
Top Story
The most influential people in UK IT
Thank you for joining! Access your Pro+ Content below. 22 July 2025 UKtech50 2025: The most influential people in UK…
Read More » -
Top Story
UK may be seeking to pull back from Apple encryption row with US
The government may be seeking to pull back from a diplomatic row with the US over UK demands to…
Read More » -
Top Story
Meet the deepfake fraudster who applied to work at a deepfake specialist
Last year, security company KnowBe4 helped spark a wave of interest in fraudulent workers when it revealed extensive details…
Read More » -
Top Story
Darktrace buys network visibility specialist Mira
British cyber giant Darktrace has announced it is to acquire network traffic visibility specialist Mira Security for an undisclosed…
Read More » -
Top Story
Patch ToolShell SharePoint zero-day immediately, says Microsoft
Organisations running on-premise instances of Microsoft’s SharePoint collaboration and document management platform should update without delay after multiple reports…
Read More » -
Top Story
The Security Interviews: Jason Nurse, University of Kent
Jason Nurse, reader in cyber security at the University of Kent, firmly believes the blame for cyber weaknesses needs…
Read More »