IT strategy
IT strategy (information technology strategy) is a comprehensive plan that outlines how technology should be used to meet IT and business goals.. See complete definition.
-
News
20 Nov 2024
ORG urges ICO to revise public sector enforcement approach
The Open Rights Group is urging the Information Commissioner’s Office to revise its light touch approach to public sector data protection issues, arguing that its experimental policy of limiting its enforcement actions to reprimands and notices, rather issuing fines, is allowing bad practices to continue largely unabated Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
20 Nov 2024
Apple addresses two iPhone, Mac zero-days
Two zero-day vulnerabilities uncovered in Apple’s operating systems could have allowed for arbitrary code execution and cross-site scripting attacks Continue Reading
By- Alex Scroxton, Security Editor
-
Podcast
14 Jun 2022
Podcast: SaaS data protection vulnerability and how to manage it
We talk to backup and data management supplier Cohesity about the added vulnerabilities of software-as-a-service data in a hybrid cloud environment and how best to manage multiple data sources Continue Reading
By- Antony Adshead, Storage Editor
-
Opinion
13 Jun 2022
Data leaders need to overcome their fears and unlock their creativity
Author and data management consultant Caroline Carruthers argues that data leaders need to tap into their creativity to make their analytical work pay off Continue Reading
By- Caroline Carruthers
-
News
13 Jun 2022
UK, US prepare to launch PET project
A transatlantic prize challenge to accelerate development of privacy-enhancing technologies is set to begin Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Jun 2022
Government recommits to UK’s cyber future in Digital Strategy
New strategy leans heavily on cyber security but stops short of announcing any initiatives that have not already been launched or heavily trailed Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Jun 2022
New warning over tech suppliers in thrall to hostile governments
Ukraine war could lead to shakeup of dual-use tech exports, says former UK intelligence officer Continue Reading
By -
News
13 Jun 2022
Health data strategy to exorcise ghosts of GPDPR
Government publishes a revised data in health strategy, with an emphasis firmly on preserving the integrity and privacy of patients’ confidential information Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Jun 2022
What’s new about the new digital government strategy?
There’s a new plan for improving the UK’s digital public services – and we’ve heard a lot of it before. But among all the hyperbole, there is a welcome realism in the latest approach to transforming government Continue Reading
By- Bryan Glick, Editor in chief
-
News
13 Jun 2022
Qatar bolsters cyber security in preparation for World Cup
With hackers honing their cyber weapons to target the upcoming football World Cup, Qatar is busy developing countermeasures and raising awareness Continue Reading
By- Pat Brans, Pat Brans Associates/Grenoble Ecole de Management
-
Opinion
10 Jun 2022
Security Think Tank: Don’t trust the weakest link? Don’t trust any link
Your security model shouldn’t fall apart just because a part of your business, or a partner, has weak security. This is why information-centric security is a must Continue Reading
By- Tim Holman, 2-sec
-
News
10 Jun 2022
Snake Keylogger climbing malware charts, says Check Point
Cyber criminals behind Snake Keylogger campaigns have been switching up their tactics in the past few weeks, say researchers Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Jun 2022
CIO interview: Yiannis Levantis aims at total quality for Unipart IT
Unipart has a heritage in quality manufacturing and services that CIO Yiannis Levantis is building on, in part by harnessing SAP’s cloud-based business transformation service Rise Continue Reading
By- Brian McKenna, Senior Analyst, Business Applications
-
News
09 Jun 2022
UK government promises £1bn savings from latest digital strategy
Three-year roadmap aims to transform online public services, targeting 50 top services for improvement – but contains much that has been previously promised in the past Continue Reading
By- Bryan Glick, Editor in chief
-
News
09 Jun 2022
SolarWinds CEO offers to commit staffers to government cyber agencies
A new proposal from SolarWinds’ outspoken CEO, Sudhakar Ramakrishna, could see software companies commit key staff to work with government cyber agencies to improve cooperation and incident response Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 Jun 2022
Trade body calls for public-private sector collab on digital ID
TechUK has published a report outlining 10 key recommendations it believes are urgently needed to enable the rapid creation of an effectively regulated digital identity marketplace Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
09 Jun 2022
CW Europe: Russia escalates cyber war on Ukraine
Microsoft has given details of cyber attacks on Ukrainian civilian communications, nuclear safety authorities, and the exploitation of the destruction of Mariupol in a phishing campaign. Also read about a report on the European Artificial Intelligence Act that suggests a limited ban on predictive policing systems. Continue Reading
-
Feature
09 Jun 2022
Cloud-to-cloud backup: When native cloud protection is not enough
There is a certain amount of protection built into cloud services, but it has its limits and full data protection requires that cloud data is secured with cloud-to-cloud backup Continue Reading
-
News
08 Jun 2022
China using top consumer routers to hack Western comms networks
An advisory from US cyber authorities shares details of multiple vulnerabilities exploited by Chinese state actors to hack into Western telecoms networks Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 Jun 2022
Pure FlashBlade//S and Evergreen//Flex boost as-a-service push
FlashBlade//S brings two new arrays in which customers can upgrade controllers and capacity, while //Flex allows capacity to be bought and moved across any QLC or TLC Pure array Continue Reading
By- Antony Adshead, Storage Editor
-
News
08 Jun 2022
ProxyLogon, ProxyShell may have driven increase in dwell times
The median network intruder dwell time was up 36% to 15 days last year, thanks to massive exploitation of the ProxyLogon and ProxyShell vulnerabilities by IABs, according to new Sophos data Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Jun 2022
CIO interview: Lee Cowie, chief technology officer, Merlin Entertainments
The theme park giant faced an enormous challenge during Covid with its venues closed, but digital technology came to the rescue and is now opening up new opportunities Continue Reading
By -
News
07 Jun 2022
Software house Mega achieves holistic SaaS security with Synopsys
Mega International, a supplier of IT management software, turned to Synopsys’s Coverity and Black Duck products to reassure both itself and its customers that its software-as-a-service offerings were built to the best possible security standards Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
07 Jun 2022
Using technology to reinvent shopping
In this week’s Computer Weekly, after the pandemic led to a boom in e-commerce, we look at how retailers are turning to tech to revitalise their stores. We examine the issues around using algorithmic automation to manage employees. And we find out how data science is supporting drug discovery at Novartis. Read the issue now. Continue Reading
-
Opinion
01 Jun 2022
What does the EU’s NIS 2 cyber directive cover?
We run the rule over the European Union’s updated NIS2 security directive Continue Reading
By- Will Dixon
-
Opinion
31 May 2022
The importance of making information security more accessible
Robin Smith, CSO of Aston Martin Lagonda, talks about how an accessible approach to cyber is helping him to keep the organisation secure Continue Reading
By- Robin Smith, chief security officer, Aston Martin Lagonda
-
Podcast
31 May 2022
Podcast: How to get truly portable Kubernetes storage
We talk to NetApp CTO Grant Caley about what is needed from storage to really deliver in a world of Kubernetes containerisation and microservices portability in hybrid cloud working Continue Reading
By- Antony Adshead, Storage Editor
-
Feature
31 May 2022
Attack of the clones: the rise of identity theft on social media
The proliferation of social media has resulted in the rise of identity theft on these platforms, with accounts copied for fraudulent or malicious purposes. What can be done to mitigate it? Continue Reading
-
E-Zine
31 May 2022
Trial and error – why the law on computer evidence must change
In this week’s Computer Weekly, the Post Office IT scandal highlighted the problem with computer evidence – we examine the need for legal reform. We assess the nuclear option for sustainable datacentre power. And we find out how IT experts can improve their soft skills and boost their career prospects as a result. Read the issue now. Continue Reading
-
Opinion
30 May 2022
Log4Shell: How friendly hackers rose to the challenge
HackerOne CISO Chris Evans looks back at how the security community successfully rose to the challenge of Log4Shell, and saved end-user organisations millions Continue Reading
By- Chris Evans, CISO and chief hacking officer, HackerOne
-
News
30 May 2022
UAE residents think 3D printing will have the most positive impact on society
People in the UAE believe next-generation technologies such as 3D printing and artificial intelligence will become widespread in the country Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Opinion
30 May 2022
Strong internal foundations are key to withstanding external threats
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these attack pathways better in order to fight back Continue Reading
By- Steve Forbes
-
News
30 May 2022
Analysts weigh in on Broadcom-VMware deal
VMware customers in APAC will need to assess their exposure amid uncertainty over the impact of the mega deal on the market Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
27 May 2022
Consistency is key to mitigate outsourcing risk
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these attack pathways better in order to fight back Continue Reading
By- Martin Smith, SASIG
-
News
26 May 2022
Consultation launched on datacentre, cloud security
The government is seeking views on how to boost the security and resilience of the UK’s datacentres and online cloud platforms Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 May 2022
Global business insurer saves 50,000 hours through RPA
QBE started its robotic process automation journey in 2017 and has already saved 50,000 hours, enabling staff to focus on customer care Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Opinion
26 May 2022
Security Think Tank: Core security processes must adapt in a complex landscape
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these attack pathways better in order to fight back Continue Reading
By- Andrew Morris, Turnkey Consulting
-
News
26 May 2022
Two-thirds of UK organisations defrauded since start of pandemic
Nearly two out of three UK companies say they have experienced some form of fraud or economic crime in the past two years, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 May 2022
Most CFOs being left out of ransomware conversations
Barely a tenth of CFOs are actively involved in planning for cyber attacks, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
26 May 2022
CW Nordics: How the Estonian government created a digital assistant to support citizens
As Estonia finalises the initial version of its government services digital assistant for launch, the man heading the project describes the birth of Bürokratt and beyond. Also read about Helsinki's role in a pan-EU project to introduce drone technology into emergency medical services. Continue Reading
-
News
26 May 2022
SoftIron readies Sydney manufacturing facility
Software-defined storage supplier SoftIron is making hardware appliances in Australia to improve supply chain resilience and address security concerns of government customers Continue Reading
-
News
24 May 2022
Ransomware volumes grew faster than ever in 2021
Verizon’s annual DBIR assessment of the security landscape highlights an unprecedented boom in ransomware volumes, to the surprise of nobody Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
24 May 2022
Set innovation free and make great ideas a reality
In this week’s Computer Weekly, we look at Gartner’s call to innovate – and innovation across retail, the circular economy and the automotive sector. We talk to Verastar’s CTO about customer engagement in its small business services. And we examine how poor data quality is frustrating corporate desires to be data driven. Read the issue now. Continue Reading
-
News
23 May 2022
Did the Conti ransomware crew orchestrate its own demise?
Analysts examining the shutdown of the Conti ransomware syndicate suggest the cyber crime collective orchestrated its own demise Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
23 May 2022
Security Think Tank: Understanding attack paths is a question of training
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these attack pathways better in order to fight back Continue Reading
-
News
20 May 2022
Applying international law to cyber will be a tall order
Many in the security community have voiced their support for the UK government’s ambitions to work towards agreement with other countries on the application of international law to cyber space, but not without some reservations Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 May 2022
Third of organisations to outsource more IT amid talent shortage
Cutting costs is not the main reason for outsourcing IT in the UK, according to a major study Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
20 May 2022
Microsoft drops emergency patch after Patch Tuesday screw up
Microsoft fixed a certificate mapping issue that caused server authentication failures on domain controllers for users that had installed the most recent Patch Tuesday updates Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 May 2022
Former Welsh steelworks becomes ‘living’ cyber lab
ResilientWorks security centre in Ebbw Vale provides an education hub for students and a testbed for industry Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 May 2022
Chinese cyber spooks exploit western sanctions on Russia
The actor behind an ongoing Chinese espionage campaign targeting Russian defence research bodies is taking advantage of the Ukraine war in their phishing lures Continue Reading
-
News
19 May 2022
Defensive cyber attacks may be justified, says attorney general
Speaking ahead of a speech at the Chatham House think tank, the UK’s attorney general has suggested defensive cyber attacks against hostile countries may be legally justifiable Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 May 2022
Nature of cyber war evolving in real time, says Microsoft president
The past three months have seen the rapid evolution of the very nature warfare to incorporate cyber attacks, Microsoft’s Brad Smith tells the audience at its Envision conference in London Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 May 2022
Red teaming will be standard in Dutch governmental organisations by 2025
The Dutch government wants to include the testing of the digital security of systems, processes and people – also known as red teaming – in all of its governmental organisations’ test planning and budgeting by 2025 at the latest Continue Reading
By- Kim Loohuis
-
Opinion
19 May 2022
Security Think Tank: Yes, zero trust can help you understand attack paths
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these attack pathways better in order to fight back Continue Reading
By- Paul Holland, Information Security Forum
-
Opinion
18 May 2022
Security Think Tank: To follow a path, you need a good map
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these attack pathways better in order to fight back Continue Reading
By -
News
17 May 2022
(ISC)² to train 100,000 cyber pros in UK
Security association (ISC)² unveils ambitious UK training programme Continue Reading
By- Alex Scroxton, Security Editor
-
News
17 May 2022
Video effects firm cuts costs by 20% and goes hybrid with Hammerspace
Jellyfish Pictures saves on rising power and office space costs, as well as Brexit difficulties, by using Hammerspace to allow access to large files from any geographic location Continue Reading
By- Antony Adshead, Storage Editor
-
News
17 May 2022
Hammerspace the ‘missing link’ for a cloud still lacking
The cloud can’t enable true multi-region working so Hammerspace helps make data visible globally and aggregate it as needed between locations with workflows set via customer policy Continue Reading
By- Antony Adshead, Storage Editor
-
E-Zine
17 May 2022
Digitally transforming UK power networks for renewable energy
In this week’s Computer Weekly, we find out how the UK’s power networks need to be digital transformed to be ready for renewable energy – and the role of open source. Wi-Fi 6 was meant to give a boost to wireless connectivity – we examine why adoption has stalled. And we look at what a quantum datacentre might be like. Read the issue now. Continue Reading
-
News
16 May 2022
Europol gears up to collect big data on European citizens after MEPs vote to expand policing power
The European Parliament has voted to expand Europol’s role, legalising its processing of bulk datasets containing personal information and endorsing research into predictive policing technologies Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
16 May 2022
Gartner Data & Analytics Summit: Unleash innovation on emergence from pandemic
Analysts at the Gartner Data & Analytics Summit in London urged D&A leaders to unleash innovation as their organisations emerge from the shadow of the pandemic Continue Reading
By- Brian McKenna, Senior Analyst, Business Applications
-
Blog Post
15 May 2022
Building a culture for transformation: The Unipart way
This is a guest blogpost by Ian Wahlers, Chief Operations Officer SAP UK & Ireland Last month, Unipart, a long-standing customer of SAP announced it is joining the RISE with SAP programme, ... Continue Reading
By- Brian McKenna, Senior Analyst, Business Applications
-
News
13 May 2022
Open source community sets out path to secure software
A 10-point plan to improve the security and resilience of open source software was presented this week at a summit in the US Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 May 2022
Parasol data breach: Leaked email claims Optionis is denying responsibility for incident
Parent company of the Parasol umbrella firm that suffered a cyber attack and data breach earlier this year is denying responsibility for the incident, as legal action against the firm heats up Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
12 May 2022
GPDPR data scrape a ‘mistake’, says leading scientist
Giving evidence to the Science and Technology Committee, academic, physician and science writer Ben Goldacre has expressed serious misgivings about the on-hold GPDPR NHS data scrape Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
12 May 2022
The limits and risks of backup as ransomware protection
Backups can provide a sound means of recovery from ransomware infection, but they are not 100% certain to foil attackers. We look at the limits and risks of depending on backups Continue Reading
-
News
12 May 2022
Rackspace mulls over business unit sell-off following strategic review of company
A statement by the CEO of Rackspace suggests the company could be heading for another period of change, following a strategic review of its business Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
E-Zine
12 May 2022
CW Benelux: Meta shelves hyperscale datacentre plan in Netherlands
Meta’s plan for a hyperscale datacentre in the Netherlands which was to serve the metaverse world has been halted following a campaign by environmentalists and the Dutch parliament’s call for the government to do everything in its power to stop the facility being built. Also read how the Dutch arm of customer services supplier Teleperformance has led the entire organisation to adopt robotic process automation software. Continue Reading
-
Opinion
12 May 2022
Security Think Tank: Your path to understanding attack paths
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these attack pathways better in order to fight back Continue Reading
-
News
11 May 2022
Nerbian RAT enjoys using Covid-19 phishing lures
The world is slowly coming to terms with Covid-19, but fear of the coronavirus is no less useful to cyber criminals because of it, as Proofpoint researchers have discovered Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 May 2022
Emotet has commanding lead on Check Point monthly threat chart
Emotet remains by some margin the most prevalent malware, according to Check Point’s latest monthly statistics Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 May 2022
CyberUK 22: Five Eyes focuses on MSP security
The western intelligence community has set out practical steps IT service providers and their customers can take to protect themselves Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 May 2022
Pure to offer on-prem object storage as Snowflake data source
Pure Storage partnership with Snowflake will see the cloud data warehousing platform make use of on-prem FlashBlade fast file and object storage as a source for analytics data Continue Reading
By- Antony Adshead, Storage Editor
-
News
11 May 2022
CyberUK 22: Data-sharing service to protect public from scams
A new data-sharing service set up by the NCSC and industry partners will give ISPs access to real-time threat data that they can use to block fraudulent websites Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 May 2022
Analysts confirm return of REvil ransomware gang
Secureworks CTU analysis has found that the REvil ransomware is undergoing active development, possibly heralding a new campaign of cyber attacks Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 May 2022
Cyber accreditation body Crest forges new training partnerships
Crest says partnerships with Hack The Box and Immersive Labs will enhance its members’ defensive and offensive security skills Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 May 2022
Microsoft fixes three zero-days on May Patch Tuesday
It’s the second-to-last Patch Tuesday as we know it, and Microsoft has fixed a total of 75 bugs, including three zero-days Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 May 2022
Queen’s Speech: Employment Bill omission suggests further delays to umbrella market regulation
Contracting market stakeholders were hoping for some clarification on the delivery timeline for umbrella market regulation in the Queen’s Speech, but none was forthcoming Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
10 May 2022
CyberUK 22: Cyber leaders affirm UK’s whole-of-society strategy
On the opening day of CyberUK 2022, GCHQ director Jeremy Fleming and NCSC CEO Lindy Cameron have spoken of their commitment to the government’s ambition for a whole-of-society cyber strategy Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 May 2022
NCSC pins Viasat cyber attack on Russia
UK authorities have attributed the 24 February cyber attack on the network of satellite comms company Viasat to Russia Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 May 2022
CyberUK 22: NCSC refreshes cloud security guidance
The National Cyber Security Centre is revising its cloud guidance as increasing uptake of potentially vulnerable cloud services puts more organisations at risk of compromise Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 May 2022
CyberUK 22: Wales splashes £9.5m on cyber innovation hub
A new innovation hub hopes to spur on cyber security innovation in Wales Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
10 May 2022
The spies who hack you – the growing threat of spyware
In this week’s Computer Weekly, after 10 Downing Street was hit by a spyware attack, fears about targeted mobile phone hacks are increasing. Our salary survey highlights the diversity challenge in IT, with men’s support for women in IT declining. And we look at how datacentre heat reuse can help reduce carbon emissions. Read the issue now. Continue Reading
-
News
09 May 2022
CyberUK 22: NCSC’s ACD programme blocks 2.7 million scams
On the opening day of its annual CyberUK event, the NCSC reveals how organisations around the country have used its Active Cyber Defence programme to their advantage Continue Reading
By- Alex Scroxton, Security Editor
-
News
09 May 2022
Tech Data enhances managed print offering
Distributor adds more depth to its OpenMPS cloud-based offering after getting partner feedback Continue Reading
By- Simon Quicke, Microscope Editor
-
News
09 May 2022
Malaysian government inks agreement with Google Cloud
The cloud framework agreement with Google will make it easier for Malaysia’s public sector agencies to access Google Cloud services through a single government contract Continue Reading
By- Aaron Tan, TechTarget
-
Feature
05 May 2022
How to retain cyber talent in the Great Resignation
The cyber security industry is experiencing alarming rates of resignations, leaving organisations vulnerable to cyber attacks. How can we better retain cyber talent? Continue Reading
-
Feature
05 May 2022
Disaster recovery is an essential service for EDF with Phenix-IT
EDF has built disaster recovery tracking, planning and testing software on a six-month upgrade cycle based on governance, risk and compliance functionality in Mega’s Hopex platform Continue Reading
By- Alain Clapaud
- Antony Adshead, Storage Editor
-
Opinion
05 May 2022
Security Think Tank: Identify, assess and monitor to understand attack paths
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these attack pathways better in order to fight back Continue Reading
By- Rob McElvanney
-
Opinion
04 May 2022
Following the customer: How tech leaders can learn from Alphabet and Meta
Why tech leaders should think about the changing needs of their customers Continue Reading
By- Bev White, Nash Squared
-
News
04 May 2022
Inside UnaBiz’s bid for Sigfox
Singapore-based UnaBiz has made a successful bid for the French low-power wide area network technology supplier, in a deal that will advance its vision of a unified IoT world Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
04 May 2022
Security Think Tank: Defenders must get out ahead of complexity
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to better understand these attack pathways to fight back Continue Reading
By- Jack Chapman
-
Opinion
03 May 2022
Security Think Tank: Solving for complexity in the network
The modern-day abundance of IT platforms, apps and tools gives the bad guys ample opportunity to move rapidly through the network to hit critical assets. Security teams must understand these attack pathways better in order to fight back Continue Reading
By- Mike Lloyd, RedSeal
-
E-Zine
03 May 2022
A prescription for digital accessibility at Boots
In this week’s Computer Weekly, millions of people have difficulties when using websites – we find out how Boots is making its e-commerce offering fully accessible. Our new buyer’s guide examines communications as a service. And we talk to Trainline’s CTO about how the rail app provider survived and thrived post-pandemic. Read the issue now. Continue Reading
-
Feature
02 May 2022
Next generation of collaboration and communication services
Future comms systems may look and feel rather different from what exists today – we look at the journey for communications services Continue Reading
By- Joe O’Halloran, Computer Weekly
-
E-Zine
30 Apr 2022
Dicas para diferentes sistemas operacionais
Como você lida com os requisitos de gerenciamento, segurança e atualização dos sistemas operacionais corporativos mais comuns? Aqui estão algumas dicas. Continue Reading
-
Podcast
29 Apr 2022
Podcast: War, geo-political risk, data storage and compliance
We talk to Mathieu Gorge, CEO of Vigitrust, about impacts on compliance and data storage from instability in geo-political events, such as the Russian invasion of Ukraine Continue Reading
By- Antony Adshead, Storage Editor
-
News
29 Apr 2022
CIO interview: Jeffrey Wood, deputy director of ICT, Princess Alexandra Hospital NHS Trust
A move to a brand-new hospital site offers the NHS trust a chance to introduce a range of new innovations, building on the digital transformation delivered over the past few years Continue Reading
By -
Feature
29 Apr 2022
Electric vehicle transition comes with uneven costs
Governments, car makers and tech companies are promoting electric vehicles, but are they considering the uneven social and environmental costs from extracting the critical minerals needed to make batteries? Continue Reading
-
News
28 Apr 2022
Ransomware recovery costs dwarf actual ransoms
The cost of recovering from a ransomware attack far outweighs the ransoms now being demanded by cyber criminals, according to recent data Continue Reading
By- Alex Scroxton, Security Editor
-
News
28 Apr 2022
Naver outlines global AI ambitions
South Korean internet giant Naver has built a global research network to advance and apply its artificial intelligence capabilities across its services Continue Reading
By- Aaron Tan, TechTarget
-
Podcast
28 Apr 2022
Metaverse, women in software – Computer Weekly Downtime Upload podcast
Cliff Saran joins Clare and Brian, in Caroline’s absence, to discuss the metaverse, Windows 11, the Makers Women in Software Power List, and how CIOs do technology in 2022 Continue Reading
By- Clare McDonald, Business Editor
- Cliff Saran, Managing Editor
- Brian McKenna, Senior Analyst, Business Applications