Connect with us

Tech

What lies in store for the security world in 2026? | Computer Weekly

Published

on

What lies in store for the security world in 2026? | Computer Weekly


If 2024 and 2025 were the years organisations felt the strain of tightening budgets, 2026 is the year those decisions will fully manifest in their cyber risk exposure. Across both the private and public sectors, years of belt-tightening have led to reduced headcount, ageing infrastructure and postponed modernisation. Analyst reports show growth in cyber security spending has slowed markedly and many security teams are operating with fewer specialists than they had three years ago. The cumulative effect of this means fewer defenders, slower detection and weakening resilience at a time when adversaries are escalating in both ambition and sophistication.

The past year has provided irrefutable proof of how these gaps translate directly into risk. A major supply-chain compromise of Oracle Cloud reportedly exposed millions of records and impacted more than 140,000 tenants. The Salesloft/Drift breach illustrated how attackers can exploit interconnected SaaS ecosystems to cascade access across multiple organisations. Meanwhile, Jaguar Land Rover’s cyber incident halted vehicle production and disrupted supply chains for weeks, demonstrating how even relatively mature, well-funded industries can be brought to a standstill by a single compromise. These incidents reveal a systemic weakening of defensive capacity and third-party oversight.

This is the backdrop against which 2026 begins, and the legacy of recent budget cuts will continue to degrade the defensive posture of many organisations. With smaller teams and constrained resources, adversaries will enjoy longer dwell times, greater freedom to move laterally and more opportunities to exploit unpatched systems. Supply-chain compromise and zero-day exploitation will remain primary attack vectors, especially in environments where patch cycles have slowed or asset inventories are incomplete. Compounding this is the fact that several national cyber bodies have themselves faced funding and workforce reductions, limiting their ability to coordinate incident response at scale. In short, the high-impact attacks of 2025 should not be viewed as peaks, unfortunately, but as early indicators of a worsening trend.

However, budget pressure is not the only factor reshaping the threat landscape. A parallel shift is emerging that is driven by a rise in what might be termed casual cyber aggression, outside the more predictable threats such as nation states or organised crime threat actors. Across the UK, several high-profile incidents in 2025 have been traced back to loosely affiliated individuals, often teenagers, wielding commodity hacking tools, rented botnets and downloadable exploit kits. These attackers are not motivated by complex financial schemes or geopolitical goals, instead drawn by curiosity, frustration, social validation or the mere thrill of notoriety.

This behaviour is being fuelled by two converging forces. First, the accessibility of attack tooling has increased dramatically. Automated scripts, ransomware-as-a-service platforms and AI-driven reconnaissance tools require minimal technical expertise, lowering the barrier to entry. Second, the volume of open source intelligence, from corporate data leaks to overshared social media profiles, has exploded. Executives, public figures and organisations leave digital footprints that can be assembled into highly persuasive social engineering campaigns. For would-be attackers, the pathway from idea to impact has never been shorter.

What appears to be eroding at the same time – maybe due to the frequency of attacks or complacency – is the perceived risk of consequence. Arrests and prosecutions for cyber offences remain rare relative to the scale of attacks; and within online communities where many of these individuals operate, reputation and bravado often outweigh caution. Combined with social disaffection and worsening economic pressures, hacking is becoming, for some, a form of digital expression by offering an accessible outlet with very real-world repercussions and very little perceived consequence.

In 2026 that will translate into an expectation of more erratic and attention-grabbing attacks by small groups or individuals using widely-available tools. While these incidents may lack technical sophistication, their public visibility and collateral impact, particularly when they target public services, transportation networks or major consumer brands, will make them strategically significant. They also risk eroding public trust in digital services at a moment when that trust is already fragile.

Of course, it wouldn’t be a look ahead without the mention of the rapid evolution of artificial intelligence in cyber security on top of everything. Back in 2020, predictions that AI would reshape defensive strategies seemed optimistic; today, they look understated. By 2025, an IBM report revealed more than two-thirds of organisations reported using AI in their cyber security programmes and nearly a third rely on it extensively. AI now underpins anomaly detection, automated response, threat-hunting and vulnerability management. But cyber criminals have adopted it just as aggressively. Research suggests that the majority of email-based attacks now incorporate AI, and AI-assisted ransomware campaigns are becoming the norm.

Generative AI has made it far easier to craft targeted phishing emails, credible social-engineering scripts and realistic deepfake impersonations. For high-value targets such as CEOs, the oversharing of personal and professional information online materially increases risk. And the growing maturity of agentic AI, those autonomous systems capable of multi-step tasks, introduces both powerful defensive opportunities and new avenues for attack.

Taking all of this into account, three trends stand out.

First, the knock-on effects of underinvestment will continue; i.e. fewer breaches overall, but those that do occur will be larger, more complex and more damaging due to longer dwell times and interconnected supply chains.

Second, casual cyber aggression will become more visible, testing societal resilience and challenging policymakers to rethink digital accountability.

Third, the AI arms race will accelerate on both sides, with defenders and attackers deploying increasingly autonomous systems, driving the next stage of the cat-and-mouse dynamic.

It’s fair to say that 2026 will not necessarily be the most catastrophic year in cybersecurity but it could be one of the most telling. The choices organisations make now, in restoring investment, rebuilding cyber skills and governing AI responsibly, will determine whether the curve bends towards resilience or further fragility.

Anthony Young is CEO at Bridewell, a managed security services provider working in the UK and US.



Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech

Need One Pair for Hiking, Traveling, and Working Out? Try Gravel Running Shoes

Published

on

Need One Pair for Hiking, Traveling, and Working Out? Try Gravel Running Shoes


HOKA’s max-stacked Rocket X Trail combines road race shoe energy with boosted grip from a 3-mm lugged outsole. If you’re looking for a fast shoe to go on the attack, this is it. It’s also fantastic for all round comfort. In testing, I laced up the Rocket X Trail and ran 3 hours (just short of 19 miles) fresh out of the box, across roads, forest gravel trails, some grass and through some serious water. It delivered efficiency and energy whether I was moving at marathon pace or with heavier, tired, ragged footfalls in the latter miles.

The rockered, supercritical midsole uses HOKA’s liveliest foam, similar to those you find in its race-ready road shoes, along with a carbon plate. That combines for a really fun ride that’s smooth, springy and fast and really consistent. It’s also highly cushioned, so you will sacrifice a lot of ground feel for that big stack springy softness. It’s also less stable over very lumpy terrain. But on open, flat, runnable mixed terrain, it’s excellent.

The lightweight uppers have a race-shoe-ready feel and after running through ankle-deep flooded sections, they shed water really quickly. This is a pricey road-to-trail shoe, it’s versatile and there’s plenty of winter road potential, too.

Specs
Weight 9.45 oz
Heel-to-toe drop 6 mm
Lug depth 3 mm



Source link

Continue Reading

Tech

If a Garmin Is Too Expensive, Consider Suunto’s Latest Adventure Watch

Published

on

If a Garmin Is Too Expensive, Consider Suunto’s Latest Adventure Watch


It’s always pleasing to see an array of physical buttons, and you get sizable ones too. You’re not going to miss these wide flat ones even when picking the pace up. The silicone strap has a nice stretch to it and while the button clasp is a bit awkward to get into place, this watch does not budge.

Suunto has jumped on the flashlight trend, with an LED light strip sat on the front of the case. You can adjust brightness levels and there’s SOS and alert modes to emit a very noticeable pulsating light pattern. This is a light I found useful rooting around indoors as well as on nighttime outings.

The biggest change is the introduction of a 1.5-inch, 466 x 466 AMOLED display. This replaces the dull, albeit very visible, memory-in-pixel (MIP) display. Suunto also ditched the solar charging that did require spending a significant amount of time outside to reap its battery benefits.

Adding AMOLED screens to outdoor watches has been contentious. The older MIP displays are just more power-efficient. The Vertical 2 is down by about 10 days from the older Vertical for what Suunto calls daily use.

Still, even if you’re putting its tracking and mapping features to use, you’re not going to be reaching for the charger every few days. After two hours of tracking in optimal GPS mode, the battery only dropped by 2 to 3 percent. The battery drop outside of tracking is also small and the standby performance is excellent as well.

Software Updates

Photograph: Michael Sawh

A more streamlined set of smartwatch features helps reserve battery for when it really matters. Unfortunately, I probably got better battery life because you don’t get phone notifications or responses if it’s paired to an iPhone instead of an Android. There’s also no onboard music player, but you do get a pretty slick set of music playback controls that are accessible during tracking.



Source link

Continue Reading

Tech

Electronic health records are still creating issues for patients | Computer Weekly

Published

on

Electronic health records are still creating issues for patients | Computer Weekly


Every NHS trust in England needs an electronic patient record (EPR) system in place by March 2026, as part of a government push to digitise the healthcare system.

In many ways, this is long overdue: some trusts have still been using pen-and-paper record-keeping until very recently. 

EPRs have the potential to massively improve efficiency in the NHS. If working properly, they allow doctors to keep all of their records in one place, speed up prescribing and diagnostics, and make it easier for patients to access their own health information.

But these roll-outs have not been without problems. Concerns have been raised about how far these benefits can actually be realised. Some NHS trusts have experienced issues with integrating new systems and training staff on how to use them.

In the extreme, there have been reports of EPRs creating new problems for hospitals, with evidence suggesting these systems may have contributed to serious harm and even deaths among patients.

NHS trusts have been put in charge of procuring their own EPRs, meaning there are numerous different technology companies involved. Some providers of these systems are large US firms. This includes Oracle Health, provided by the Larry Ellison-led tech giant, and Epic, a tech firm based in Wisconsin.

Contracts can run into nine figures: Guy’s and St Thomas’, a trust in South London, launched a £450m system from Epic in late 2023. Some parts of the NHS have been using them for more than a decade, but a handful are still set to miss the government’s March deadline.

Data access

Pritesh Mistry is a fellow at the King’s Fund, where he researches the impact of digital transformation in the NHS. He says it has had “both positive and negative impacts”.

“In the last few years, we’ve seen doubling down on the focus around digital records,” says Mistry. These are now in place in more than 90% of all trusts, and every GP practice.

“That means we’ve now got [new] data that’s within the healthcare system, which allows us to do other things, like treat populations, and understand and track patient safety,” he says.

Despite this, he cautions some patients are still struggling to get hold of their own data.

“We’ve got a lot of data that’s in silos,” says Mistry. “It doesn’t flow. That’s the biggest challenge: making the data accessible and usable for patients and healthcare professionals to be able to provide care in a way that is joined up and meets with modern expectations.”

He says complaints with new technology haven’t just come from patients.

“We need to recognise that staff are really frustrated,” says Mistry. “Software often crashes. Computers are really slow, and technology adds to their workload, instead of simplifying things.” He caveats that some parts of the NHS are better than others on this.

Safeguarding patient data

Mistry adds that there are safeguards in place to ensure patient data isn’t ending up where it shouldn’t be – such as through data protection rules and procurement requirements.

However, he warns that “we need to make sure we move with the times in terms of what technology is available”. Mistry is more concerned about medical staff inadvertently putting personal information into a large language model, for instance.

“Digital exclusion remains a barrier as well,” he says, adding that these systems have the potential to widen inequalities in healthcare. Those less able to use new technology might struggle to access their records.

“People tend to assume it’s old people [who are most impacted], but that isn’t necessarily true,” says Mistry, instead highlighting the impact of poverty and deprivation, with some still unable to afford internet access.

He argues the NHS should be working to meet people where they are, and provide more “tailored” technology services.

Patient safety

Nick Woodier is a doctor and investigator at the Health Services Safety Investigations Body (HSSIB), which looks into issues with healthcare in the UK. He sees problems arising from how EPRs are deployed by trusts, especially when medical staff overestimate their capabilities.

He uses the example of prescribing medicines: “There’s an assumption that these electronic prescribing systems will stop you [from] doing something catastrophic.”

But this isn’t always the case. In one investigation, the HSSIB found a child had been prescribed nearly 10 times the recommended dose of an anti-coagulant medication, with doctors having assumed the EPR would flag an issue. The child ended up with a bleed on their brain.

Woodier also worries hospitals are not always picking up on when these systems are at fault.

“We will often see where incidents have happened and the contribution of the electronic system has not been recognised,” he says.

Woodier sees this as coming from a culture which prefers to put the blame for safety failures on individuals.

A 2024 investigation by the BBC found there were more than 126 instances of serious harm registered by NHS trusts across 31 trusts, including three deaths related to EPR problems.

The HSSIB has also encountered problems from patients being unable to access their digital records.

“We’ve seen in general practice, for example, some patients telling us that they’ve gone without care – because in their mind, they thought the only way they could access their GP was to fill in an electronic form,” says Woodier.

A spokesperson for NHS England says EPRs are “already having a significant impact on improving safety and care for patients”, for instance, by helping to identify conditions such as sepsis, and preventing medication errors. 

“They have replaced outdated and often less-safe paper-based systems, and we are working closely with NHS trusts to ensure they are implemented safely alongside other systems with appropriate training – and are used to the highest quality and safety standards,” the spokesperson adds.

Interoperability

The EPR roll-out has also been criticised for problems with “interoperability” – the ability of different programs and modes of data collection to converse with each other. The patchwork of different systems used by different trusts means data stored in one system might not be useful for a system used by a different part of the NHS.

Woodier says this often happens in communications between hospitals and GP surgeries. This can involve someone manually inputting information from one system to another, which can create risks when data is not being transferred properly, or is missed completely.

“When you introduce a manual operation, that risk increases,” he warns. “The odds are that at some point, somebody won’t do the right thing, because that’s the reality of being human.”

Alex Lawrence, a fellow at the Health Foundation, describes interoperability as a “significant challenge”, which the NHS and technology companies have been “grappling with for a really long time”.

“Some trusts have found it much harder to access their own EPR data than they anticipated, because of where that data is stored,” she adds, referring to research the organisation carried out in 2024.

“If it’s taking you days to pull the data that you need, then it’s already not going to be useful for a lot of the purposes that you might want it for.”

However, Lawrence adds that there have been some steps made in the right direction, notably with the Data (Use and Access) Act, which was passed last year.

“The government is making information standards mandatory for EPR providers, as well as trusts, with the Secretary of State potentially having more powers to enforce those standards,” she says.

The longer term

Going forward, Lawrence would like to see a system involving “patients being empowered with access to their own data, and as far as appropriate, clinicians being able to see all of the history that they need for their patients”.

In an ideal system, different parts of the healthcare system would be able to “share a patient’s data where necessary and appropriate, in an easy and timely way”.

She says they have the “potential to offer enormous value”, but much of their functionality is going unused. “What our qualitative research suggested was that a lot of these systems are still functioning as digital notebooks,” says Lawrence.

Matthew Taylor is the head of the NHS Confederation and NHS Providers, membership bodies for healthcare organisations.

“NHS leaders say the gap between trusts on digital maturity is still stark – and it’s shaping how quickly organisations can move to modern EPRs,” he says.

This gap – combined with the organisational complexity of the healthcare system – means interoperability has “long been a thorn in the NHS’s side”.

Taylor adds that EPRs are not a “once-and-done” job, and argues they will result in savings in the long term, but that it may take around five years to see the benefits.

“Hospitals are housing a huge amount of paper records, and the cost of storing, retrieving and managing those records can run into millions of pounds each year,” he says.

These systems are part of a larger picture, and one facet of the conversation, around the use of artificial intelligence in the NHS. AI models for areas such as research and diagnostics will require extensive and standardised medical data.

Mistry warns these AI tools operate on the basis of “garbage in, garbage out”.

“There is a risk that we roll out AI tools without the underpinning data quality it needs,” he says, adding that this could exacerbate inequalities or biases from using AI.

As Woodier puts it: “We’ve got organisations who are still using archaic computers, have got infrastructure that’s not working, are still on old web systems, or have EPRs that don’t talk to each other. A few [trusts] don’t have EPRs.

“So, actually, are we trying to run before we’ve even managed to walk?”



Source link

Continue Reading

Trending