Skip to main content

Post Office and Fujitsu execs 'should have known' Horizon IT system was flawed

2 days 22 hours ago
First volume of inquiry report focuses on the UKscandal's human impact

Senior Post Office staff in the UK – and those working for suppliers Fujitsu and ICL – knew or should have known about the defects causing errors in the Horizon system that contributed to the wrongful prosecution of hundreds of branch workers, 13 of whom committed suicide, most probably as a result, according to the first volume of a report submitted by the independent public inquiry into the computer scandal.…

Lindsay Clark

Tim Cook's Tim Cook stepping down from Apple

3 days 6 hours ago
Operations king Jeff Williams abdicates – just don't give him a watch

Apple Chief Operating Officer Jeff Williams is stepping down from his role next month and leaving the company later this year to spend more time with friends and family.…

Iain Thomson

IBM boasts new Power11 chips are stingy on power usage

3 days 8 hours ago
More efficient cores plus an optional energy saver mode in Big Blue's latest CPUs

In case you'd forgotten, IBM is still blazing its own trail with regard to silicon. And in terms of speeds and feeds, Big Blue's latest crop of Power chips boasts up to 55 percent faster cores than its Power9 chips.…

Tobias Mann

Suspected Scattered Spider domains target everyone from manufacturers to Chipotle

3 days 14 hours ago
Plus: Qantas makes contact with 'potential cyber criminal'

While the aviation industry has borne the brunt of Scattered Spider's latest round of social engineering attacks, the criminals aim to catch manufacturing and medical tech companies — and even Chipotle Mexican Grill — in their web, as evidenced by hundreds of domains that security researchers say look a lot like phishing websites used by the criminal crews.…

Jessica Lyons

The cloud-native imperative for effective cyber resilience

3 days 15 hours ago
Modern threats demand modern defenses. Cloud-native is the new baseline

Partner content  Every organization is investing in cyberresilience tools, training, and processes. Unfortunately, only some of them will be able to successfully respond and recover from an attack. Regardless of how hard they work, many IT and security teams are constrained by legacy technology architectures that were built for the challenges of 2015, not 2025.…

Stephen Manley, CTO, Druva
Checked
1 hour 40 minutes ago
The Register
Biting the hand that feeds IT — Enterprise Technology News and Analysis
Subscribe to The Register feed