IT for small and medium-sized enterprises (SME)
-
News
16 Jul 2024
Incubator Plexal heads to Singapore for CyberBoost
Cyber startup hub Plexal expands its presence to Singapore through a new initiative, and sets its sights on helping new UK businesses break into the booming Asia-Pacific market Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Jun 2020
How Malaysia’s Gain Secure stood tall amid Covid-19
Walter Wong, executive director of Gain Secure and former Microsoft employee, talks up how his business is coping during Malaysia’s lockdown Continue Reading
By
-
News
24 Oct 2005
Reporter's Notebook: NYC 'controls the software industry'
At Information Security Decisions: a security "rock star" rages against the Microsoft machine; banging the drum for enterprise security; a sour note on zero-day exploits. Continue Reading
By- Michael S. Mimoso, Senior Editor and Anne Saita, News Director
-
News
19 Oct 2005
Elements of a data protection strategy
In this excerpt from Data Protection and Lifecycle Management, Tom Petrocelli addresses the importance of securing data for regulatory compliance and outlines the five components of a data protection strategy. Continue Reading
- News 26 Sep 2005
-
News
20 Sep 2005
SAS drives product roundup
Serial-attached SCSI (or SAS) drives offer significant storage capacity at a much lower cost, while maintaining reasonable performance. Find out who the vendors are in this market. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
- News 05 Sep 2005
- News 05 Sep 2005
- News 05 Sep 2005
- News 05 Sep 2005
-
Feature
22 Jul 2005
Riding the wave of change
CIOs can thrive as pace of change quickens, argues Des Lee Continue Reading
By- Des Lee
-
News
21 Jul 2005
HP slashes jobs and shuts enterprise divison
HP has announced 14,500 redundancies and will close down its separate enterprise sales division as part of its attempt to streamline operations and cut costs. Continue Reading
-
News
21 Jun 2005
Continuing education options for CISSPs: Top 10 ways to earn CPEs
Who says you can't have fun while earning CPE credits? Check out the top 10 ways to meet CISSP® and SSCP continuing professional education requirements. Continue Reading
- Feature 13 Jun 2005
-
News
06 Jun 2005
Know your enemy: Why your Web site is at risk
In this Lesson 1 technical paper from Web Security School, guest instructor Michael Cobb outlines the threats to Web sites and who is behind them. Continue Reading
-
News
01 Jun 2005
Zombie machines used in 'brutal' SSH attacks
IT managers use SSH to gain secure access to remote computers. Hackers are using it to crack your network, with help from their zombie friends. Continue Reading
By -
News
23 May 2005
Pre-CISSP: Options for the security newbie
Shon Harris advises novice security practitioners on the value of entry-level certifications -- and good, old-fashioned experience -- in preparation for the CISSP®. Continue Reading
-
Feature
10 May 2005
Learning Guide: Low-cost storage
Resources on low-cost networking, iSCSI, SATA and IP storage Continue Reading
-
News
21 Mar 2005
Linux lags Windows in new security report
A controversial research paper takes a critical look at two popular platforms' track record on vulnerabilities and fixes. In turn, its findings are facing sharp scrutiny as well. Continue Reading
By- Anne Saita, TechTarget
-
News
14 Mar 2005
HIPAA causes data security problems for small businesses
If your local dentist isn't complying with HIPAA's security rules, he's not alone. Experts say most doctors' offices aren't getting it. Continue Reading
By - News 08 Mar 2005
-
News
24 Feb 2005
Security Bytes: Cisco patch available for ACNS flaws
Workaround outlined for new php exploit. IBM issues patch for DB2 flaw. Payroll service goes offline to investigate security claims , and BoA loses personal data on customers. Continue Reading
By- SearchSecurity.com Staff
-
News
23 Jan 2005
Cyberstorm chasers: The folks who look out for the latest Internet threats
They keep a 'round-the-clock watch on conditions in cyberspace. CTO Johannes Ullrich discusses the volunteer effort behind the SANS Internet Storm Center. Continue Reading
By -
Feature
14 Jan 2005
Financing the future
Don't get a headache working out the best ways to pay for hardware and software. Danny Bradbury offers a user-friendly guide to... Continue Reading
-
News
10 Jan 2005
Security on a Shoestring: Creating Internet policies on the cheap
No matter how small the organization, it's impractical to stand over employees and make sure they properly use the Internet. So here's how to write a decent acceptable use policy, and make sure everyone abides by it. Continue Reading
By- Mathew Schwartz, Contributor
-
Feature
21 Oct 2004
IP everything, essentially
What are the fundamental deliverables of IP networks? How can you use IP networks to gain financial benefits in addition to... Continue Reading
-
Feature
21 Oct 2004
The basis of profitability
Not so long ago, you didn't have much choice - your IT and communications requirements were acquired, implemented and maintained... Continue Reading
- News 18 Oct 2004
-
Feature
14 Sep 2004
The gift of CRM
For Red Letter Days, a provider of gift experiences for corporates and consumers, a CRM system was essential to give it market... Continue Reading
-
Feature
14 Sep 2004
Management matters
Cath Everett finds out how you stay on top of networking. What are the management issues related to your telecoms and networks... Continue Reading
-
News
01 Sep 2004
Security Bytes: MySQL upgrade urged to fix flaw
Internet turns 35; federal computers used as spam relays; XP SP2 a bigger pain for smaller companies. Continue Reading
By- SearchSecurity.com Staff
-
News
27 Aug 2004
Over-specify when buying low cost replacement for Frame Relay
A project manager reveals how a VPN saved £275,000 a year Continue Reading
By- Peter Skipwith
-
News
26 Jul 2004
Fewer IT supplier conflicts are going to court
Law firms have reported a sharp fall in the number of IT disputes reaching the courts over the past 12 months as more users turn... Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
18 Jul 2004
Enterprise-class RAID functions, part 2: N-way mirroring, splitting and more
With the convergence of RAID and lower-priced storage technologies, advanced RAID functions can be enjoyed by any small-to-medium sized organization with critical data. Continue Reading
By- Randy Arnott
-
News
21 Apr 2004
Startup offers fixed-content archive for multiple applications
Former CTO of the New York Times has started Archivas, a company that archives fixed content from different applications in a single, centralized repository for half the price of EMC's Centera. Continue Reading
By- Jo Maitland, TechTarget
-
Feature
02 May 2002
Director's cut: Learning to spot winning technologies
Faced with a stream of new technologies it is vital that IT directors keep abreast of the latest developments and are aware of... Continue Reading
-
Feature
23 Jan 2002
Scale 21 conference will reveal key to IT success
The results of the largest ever survey of IT professionals and entrepreneurs are to be announced at the Building Britain's... Continue Reading
By- Nathalie Towner
-
News
28 Feb 2001
ASP offers wireless access to Microsoft Exchange
Application service provider Netstore is offering users wireless connections to Microsoft Exchange 2000 as an alternative to... Continue Reading
By- Will Garside
-
Feature
06 Dec 2000
A real union in a virtual world?
Amazon faces the biggest unionisation drive the dotcom sector has ever seen. Mike Arrowsmith reports Continue Reading
By- Mike Arrowsmith
-
Feature
06 Dec 2000
The VPN dilemma
With traditional networks choking on data, Liz Biddlecombe investigates the pros and cons of managing a VPN yourself or... Continue Reading
-
Feature
29 Nov 2000
Computer Weekly's evidence to the Public Accounts Committee
We write to the Public Accounts Committee in relation to its consideration of the Chinook's FADEC computerised engine control... Continue Reading
-
Feature
01 Nov 2000
Pathway and the Post Office: the lessons learned
The infamous 1996-1999 Pathway project aimed to computerise the nation’s post offices and tackle benefit fraud. But 18 months... Continue Reading
-
Feature
18 Oct 2000
How to scour the world when outsourcing
Thanks to Y2K compliance programmes, it is now perfectly acceptable for a firm to consider moving all or part of its systems development and support... Continue Reading -
News
28 Jun 2000
Defence Minister misleads MPs over Chinook accident
Last week in the House of Commons, Labour’s Defence Minister Lewis Moonie unintentionally misled the House of Commons over a Chinook accident in 1989,... Continue Reading -
Feature
31 May 2000
RAF Justice: casting doubt on pilot error
Almost a year ago Computer Weekly published its 140-page RAF Justice report on the Internet. It revealed evidence of a cover-up... Continue Reading
By -
Feature
24 May 2000
Lifting the lid on secret stiffing techniques
One of the UK's most experienced IT negotiators lifts the lid on some of the sharp practices used by software suppliers to get... Continue Reading
By- Karl Schneider
-
Feature
03 May 2000
Can Hercules lift Hitachi?
>Hitachi has been losing its position in the mainframe market for the past couple of years. But it aims to fight back in 2001... Continue Reading
- News 29 Mar 2000
- Feature 01 Mar 2000
-
Feature
21 Oct 1999
White Paper: Software solutions for effective network power management
Uncertain power conditions can wreak havoc on small businesses, however, there are ways to limit the risk of computer data loss Continue Reading
By- na