Content Paint
Edward Targett

Edward Targett

Ed is a co-founder of The Stack. He previously edited Computer Business Review. He has also covered energy markets. He started his journalism career on local papers. He left school at 15 and has made a living asking "but why?" ever since.

The Big Interview: JPMorgan’s Global CISO, Pat Opet

"Industry has gotten good at identifying vulnerabilities in the supply chain; SBOMs and so on [but not at] at insidious backdoors and logic issues that are built into software, and update mechanisms that could cause implants..."

Sam Altman joins Microsoft Satya Nadella Twitch CEO

"We’ve learned a lot over the years about how to give founders and innovators space to build independent identities and cultures within Microsoft"

OpenAI fires CEO Sam Altman days after Microsoft...

Altman was "not consistently candid in his communications with the board, hindering its ability to exercise its responsibilities. The board no longer has confidence in his ability to continue leading OpenAI.”

1 Citrix bug alone triggered 13 “nationally significant” UK cybersecurity incidents

You filthy animals are **** at network architecture, and it may be "necessary to expand threat hunting" says NCSC.

New Nike CTO

A big ERP overhaul, sustaining app-led revenue growth and a focus on supply chain optimisation are priorities at Nike...

IT support software from SysAid being exploited in the wild

Clear IOCs, guidance and documentation: A commendable response from SysAid.

World’s Biggest Bank hacked: ICBC may have failed to patch "Citrix Bleed" vulnerability

Courier dispatched with a USB stick carrying trade settlement details after systems disrupted...

“I just starved the legacy, it was untenable anyway” BT’s CDIO Harmeen Mehta on taking mainframes to the cloud, data transformation and digital value

"Is there a path to accelerate the shit out of this?"

Amazon veteran Charlie Bell is leading a software security overhaul at Microsoft

Biggest overhaul of Redmond's security in 20 years sees promises of "code analysis [of] 100% of commercial product”, cryptographic keys to be kept in a hardened Azure HSM, more.

Search the site

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.