In Depth
In Depth
IT for telecoms and internet organisations
-
Ivanti vulnerabilities explained: Everything you need to know
A series of vulnerabilities in Ivanti products have caused concern worldwide. Delve into some of the key issues arising from the Ivanti disclosures, looking at the vulnerabilities and their impact, what affected users should do, and learn about new... Continue Reading
-
Biometric revolution in IAM: The future of authentication
The IAM landscape is experiencing profound change thanks to the advent of biometrics. Learn about the latest advantages and key benefits of biometrics in identity Continue Reading
-
Decoding zero trust in endpoint security: A practical guide for CISOs
The exponential increase in endpoints has vastly expanded the average organisation’s attack surface – address this by applying zero-trust best practice to endpoints Continue Reading
-
Interview: Ashish Gupta, head of EMEA, HCLTech
It’s not just enterprises that changed their operating models during and after Covid, but also the suppliers that took them on the journey, HCLTech Europe’s head explains Continue Reading
-
What the Product Security and Telecommunications Infrastructure Act means for UK industry
For years, many network-connected devices have lacked adequate security, putting their users and others at risk of cyber attacks. The UK’s PSTI Act aims to prevent this by mandating minimum security requirements, but what impact will this have on ... Continue Reading
-
Why IAM systems are crucial for securing multicloud architecture
As business tools evolve into cloud-based services, organisations are finding themselves becoming ever more reliant on the cloud, but how can data be secured across so many different platforms? Continue Reading
-
As Covid fades away, what’s the future of remote work in Europe?
Many IT leaders are still supporting some form of work from home, and a trend is beginning to take shape in Europe Continue Reading
-
What can security teams learn from a year of cyber warfare?
With the passing of the first anniversary of Russia’s invasion of Ukraine, we reflect on the ongoing cyber war, and ask what security leaders can learn from the past 12 months Continue Reading
-
Securing low Earth orbit represents the new space race
The barriers to launching satellites into low Earth orbit are falling fast, and that brings new cyber security challenges Continue Reading
-
How Finland develops its national plan for investment in innovation
A small country with limited resources, Finland carefully chooses strategic technologies to lead it into the future Continue Reading
-
Cyber security professionals share their biggest lessons of 2022
In the run-up to 2023, cyber security professionals are taking the time to reflect on the past few months and share their biggest lessons of 2022 Continue Reading
-
How gamifying cyber training can improve your defences
Security training is the cornerstone of any cyber defence strategy. With ever-escalating online threats, it is now more important than ever that this training is an engaging experience Continue Reading
-
An encouraging new conversation around sustainable IT, says Nordic CIO
What started as a whisper a decade ago has become distinctly audible chatter among IT leaders sharing best practices on how to protect the environment Continue Reading
-
AI experts question tech industry’s ethical commitments
The massive proliferation of ethical frameworks for artificial intelligence has done little to change how the technology is developed and deployed, with experts questioning the tech industry’s commitment to making it a positive social force Continue Reading
-
Clickwork and labour exploitation in the digital economy
Often ignored or assumed to be work conducted by machines rather than people, Computer Weekly explores the hidden human impact of the ‘clickwork’ that underpins the global digital economy Continue Reading
-
Tech sector efforts to root out forced labour are failing
Digitally mapping supply chains to identify forced labour and slavery is no longer a technology problem for the IT sector, but a lack of government enforcement and corporate inaction are major barriers to effective change Continue Reading
-
The cyber security impact of Operation Russia by Anonymous
The campaign against the Russian government by Anonymous surprised many with the depth and scale of the cyber attacks. What can we learn from this online war? Continue Reading
-
IT departments need holistic circular economies to fight climate change
With sustainability moving up the boardroom agenda, IT managers should revamp procurement strategies to align with the principles of the circular economy, but what does this mean for managing the IT lifecycle? Continue Reading
-
Tech companies join UK four-day work week trial
Computer Weekly speaks with tech companies taking part in the UK’s upcoming four-day work week trial, which will measure the impact of shorter working weeks on productivity, wellbeing and the environment Continue Reading
-
Recruitment risks: Avoiding the dangers of fraudulent candidates
Tech companies are seeing an increase in fraudulent job applications, with associated impacts on risk and cyber security. So how can organisations protect themselves from fraudulent applicants while ensuring they recruit the best talent? Continue Reading
-
How can I avoid an exodus of cyber talent linked to stress and burnout?
Cyber security professionals have played a crucial role during the pandemic, yet many feel like their employers aren’t providing adequate mental health support and have considered quitting their jobs as a result. What can employers do to help them? Continue Reading
-
Storage and 5G: Big impacts likely as wide-area topologies evolve
Enterprise 5G will boost the need for storage generally. It will also push capacity needs closer to the edge and create new locations for processing and storage Continue Reading
-
What neurodivergent people really think of working in cyber security
Many firms are filling cyber security skills gaps by hiring neurodivergent talent – but more support is needed for neurodivergent cyber security professionals, writes autistic tech journalist Nicholas Fearn Continue Reading
-
New supercomputer opens doors for researchers in Sweden
More than twice as powerful as its predecessor, a new supercomputer ushers in new opportunities for researchers who rely on artificial intelligence and machine learning Continue Reading
-
Is the IT sector beset by fear-mongering?
The arms race between hackers and security teams has led to a plethora of new technologies, but it can be hard to differentiate between sensible cyber purchases and those that are promoted by exaggerating risk Continue Reading
-
Swedish researchers are patiently developing a useful quantum computer
By 2028, the Wallenberg Centre for Quantum Technology in Sweden expects to have a useful quantum computer Continue Reading
-
Social value not yet fully embedded in procurement practices
Social value procurement rules are designed to diversify the public sector’s supplier base while providing society with wider collective benefits, but are yet to be fully introduced Continue Reading
-
Digital surveillance of remote workers may increase enterprise risk
From productivity tools to security threats, we explore how digital surveillance is forcing remote workers towards shadow IT Continue Reading
-
How to manage endpoint security in a hybrid work environment
The future of the workplace is clearly hybrid, but this has untold implications around endpoint security. How can businesses overcome these? Continue Reading
-
What the Telecommunications (Security) Bill means for UK industry
The Telecommunications (Security) Bill is intended to reinforce the security of the UK telecommunications infrastructure, but what are the implications for industry? Continue Reading
-
This Christmas, Covid-19 heightens retail security risks for everyone
Do you think it’s only retailers and consumers who need to consider cyber security when shopping online during the holidays? You’re dead wrong. This year, the Covid-19 pandemic and the shift to remote working has thrown a spanner in the works Continue Reading
-
Auditing for algorithmic discrimination
Despite the abundance of decision-making algorithms with social impacts, many companies are not conducting specific audits for bias and discrimination that can help mitigate their potentially negative consequences Continue Reading
-
Black Lives Matter, but do bots know that?
The volume of content generated each day necessitates automated moderation to curate everything as it is published, ensuring offensive and objectionable material is blocked. But this only works if systems are adequately configured and reviewed Continue Reading
-
Surveillance capitalism in the age of Covid-19
Could the Covid-19 coronavirus pandemic further consolidate surveillance capitalist practices and enterprises? Author Shoshana Zuboff warns Computer Weekly it is possible Continue Reading
-
How Oxeva delivered budget analytics with Pure Storage flash NAS
Web hosting provider Oxeva thought the consultants were mistaken and that what suited the web giants for analytics/big data wasn’t necessarily what was needed for enterprise customers Continue Reading
-
Top 10 storage deployment stories of 2019
Here are ComputerWeekly’s top 10 storage deployment stories for 2019, which see quite a move away from traditional SAN and NAS to hyper-converged, software-defined storage and object storage Continue Reading
-
Building enterprise-grade AI: Sberbank and AI Telekom
Machine learning and artificial intelligence are growing beyond adolescence to prove business value. Practical applications at Sberbank and AI Telekom suggest getting machine learning data in one place, where data scientists can experiment Continue Reading
-
Building a 5G city: Bristol’s valuable lessons for the UK’s digital future
West of England Combined Authority is taking part in DCMS’s 5G Testbeds and Trials programme, exploring applications for tourism and entertainment. We find out how it is applying its learnings to life in Bristol and Bath Continue Reading
-
Private 5G networks: Are they the right choice for you?
The concept of dedicated private mobile networks for large enterprises is not a new one, but with the advent of ultrafast 5G networks, they are starting to attract more interest Continue Reading
-
What 5G applications will transform your business?
The UK’s mobile network operators have started work on their 5G roll-outs, but what applications are most likely to gain enterprise traction for the new standard? Continue Reading
-
Securing your mobile estate – best practice for CIOs
The prevalence of mobile devices in every part of daily life is shaping how enterprises make choices about software and network infrastructure, but how do businesses go about securing these vast new endpoint estates? Continue Reading
-
Data protection: How privacy can be a benefit, not a burden
With the growing number of data breaches, consumers are becoming increasingly concerned about how their data is used. Organisations can take advantage of this trend by treating data protection and user privacy as product features Continue Reading
-
How to get the basics of mobile device management right the first time
When adopting mobile device management, there are often fears around implementation and whether or not the strategy is even required Continue Reading
-
Exploring UCaaS: The main benefits for enterprises
Getting unified communications-as-a-service right can mean more agility, higher productivity, and cost control Continue Reading
-
Disaster planning: How to expect the unexpected
Focusing too much on specific disasters rather than considering an organisation’s data protection, network security and process requirements, can lead to unpredicted vulnerabilities Continue Reading
-
AI storage: Machine learning, deep learning and storage needs
Artificial intelligence workloads impact storage, with NVMe flash needed for GPU processing at the highest levels of performance – and there are other choices right through the AI data lifecycle Continue Reading
-
Big tech chiefs boycott parliamentarians investigating citizens’ privacy
An International Grand Committee on Big Data, Privacy and Democracy considers whether failure to protect citizens’ privacy constitutes grounds for anti-trust regulation against Facebook and other big tech companies Continue Reading
-
Mobile phones and health: is 5G being rolled out too fast?
European countries are rolling out 5G mobile communications at breakneck speed as they seek to gain a competitive edge over the US and Asia. But some scientists have raised questions about the effects of 5G mobile phone radiation on public health ... Continue Reading
-
Politics, privacy and porn: the challenges of age-verification technology
The age-verification requirements of the Digital Economy Act are to come into force in July this year, but registering people’s personal details for accessing age-restricted content carries significant risks and challenges Continue Reading
-
How Europe’s largest datacentre is helping to expand broadband access
NGD, the operator of the largest datacentre in Europe, is playing an unlikely role in helping expand access to full-fibre broadband in south Wales. We find out how, and why Continue Reading
-
What are the CDN options for enterprises?
We look at how content delivery networks can give your organisation’s web presence a literal edge Continue Reading
-
The nightmare driving test: How to make sure self-driving cars are safe
Simulating realistic environments using deep learning to enable self-driving cars to learn the rules of the road will prove more useful than any amount of real-world practice. We find out why, and meet the people doing something about it Continue Reading
-
Brexit implications for data protection
Leaving the European Union will have serious implications for data protection in the UK unless adequate steps are taken, so businesses are advised to have contingency plans in place Continue Reading
-
Securing the SD-WAN: The next network challenge
Every time an enterprise weighs up whether or not to try SD-WAN, security is an essential part of the picture Continue Reading
-
Trusted nodes: The next generation in quantum key distribution
QKD is a form of protection against interception by quantum computers, but cost and technical limitations have made the technology impractical. Could trusted nodes make all the difference? Continue Reading
-
Intelligent automation and the WAN: Is SD-WAN moving mainstream?
Take-up of software-defined networking in corporates is slower than expected. Where have we reached on the journey to software-controlled networks – and SD-WAN in particular – becoming the norm? Continue Reading
-
What are the current SD-WAN options for enterprises?
Software-defined wide area networking is well on its way to being a multi-billion dollar market. We assess the current state of the market and look at some of the options for enterprise CIOs and network managers Continue Reading
-
Employers turn to wearable technology to help staff manage work-life balance
Companies are realising that there are sound business reasons for ensuring their employees get enough sleep and exercise, so they are turning to wearable technology to help their staff stay healthy, despite the pressures of work Continue Reading
-
Inside DevOps, containers and enterprise security
Global corporates are waking up to containers and orchestrated containerisation for software development that is fast and safe. Computer Weekly looks at the best approach to ensure security is not compromised along the way Continue Reading
-
Sustainability and the smartphone: How to give your old device a second life
Find out what happens to your smartphone after you’re finished with it and why you should commit to the circular economy Continue Reading
-
Need for speed: designing a modern campus LAN
Just like datacentres before them, campus LANs are increasingly being defined by virtualisation and software-based controls. Next to this shift, the hardware also continues to improve as network owners look to keep pace with user demand Continue Reading
-
GDPR: An overview of the latest data protection legislation
The forthcoming General Data Protection Regulation (GDPR) will have wide-ranging implications for every organisation that processes personal data. This comprehensive overview tells you what you need to know Continue Reading
-
Software-defined networking: gathering momentum in the enterprise?
Suppliers are pushing the benefits of software-defined networking harder than ever, and enterprises are starting to take the plunge rather than remaining on the sidelines Continue Reading
-
Data protection is critical for all businesses
Companies that misuse data or fall victim to breaches not only risk financial loss, but also reputational damage. There are many reasons good data practice is essential Continue Reading
-
Business needs to keep up with Investigatory Powers Act
All indications are that the obligations on communication service providers under the controversial Investigatory Powers Act will change, and affected companies must ensure they are constantly up to date Continue Reading
-
The walking dead: Is there life left in 4G mobile networks?
These days, 5G grabs all the hype and headlines, but 4G still has plenty more to give. It’s a good thing, too, as operators have no choice but to sweat their assets Continue Reading
-
Network security in the age of the internet of things
Wireless devices and smart technologies are increasingly being brought into the workplace, and pose a growing risk to company data Continue Reading
-
The future of 5G mobile networks: support and development
In the second part of our exploration of the 5G market, we find out how UK plc is innovating around 5G mobile networks, and ask what lies in store at Mobile World Congress in Barcelona Continue Reading
-
The great 5G bake-off: where are we and where are we going?
With Mobile World Congress 2018 a week away, early 5G network standards formalised and tests up and running at the Winter Olympics, we assess the state of 5G, and what's needed to kick-start commercial roll-outs Continue Reading
-
How AI will underpin cyber security in the next few years
Cyber security risks are growing in complexity and volume, but artificial intelligence techniques can help businesses track and fight them in real time Continue Reading
-
GDPR: Not too late to ensure real risks will be addressed
With just four months to go before the General Data Protection Regulation compliance deadline, there is a growing anxiety in many parts of the regulated community that their GDPR plans may not be fit for purpose Continue Reading
-
Where the device hits the network – a mobile device management update
As business becomes increasingly mobile, we look at the latest trends in mobile device management to give businesses the edge Continue Reading
-
How to implement a low-power WAN to support the IoT
We explore the options and the implementation process for an LPWAN to support internet of things projects in the enterprise Continue Reading
-
Inside the well-planned metro network: how CityFibre does it
Computer Weekly met metro network builder CityFibre to find out why, and how, the organisation believes it can mount a credible challenge to Openreach’s dominance of wholesale fibre Continue Reading
-
Cloud contracts are still a minefield
Cloud computing is maturing in the enterprise space, but the contracts that underpin cloud services have not evolved at the same pace Continue Reading
-
Challenges of complying with the Investigatory Powers Act
Despite opposition by civil liberties groups and technology companies, the UK government has passed the controversial Investigatory Powers Act, adding a host of security and contingency requirements that UK businesses need to consider Continue Reading
-
CIO Interview: Graeme Hackland, Williams Martini Racing
Williams Martini Racing CIO Graeme Hackland discusses network infrastructure, data analytics and the future for wearable tech and augmented reality in Formula 1 motor racing Continue Reading
-
CW@50: A history of IT outsourcing
Computer Weekly looks at where and when IT outsourcing was invented and considers the changes the sector has gone through since Continue Reading
-
Overcoming the scale-up challenge of enterprise DevOps adoption
CIOs and IT leaders share their advice on what enterprises can do to accelerate the spread of DevOps within their organisations Continue Reading
-
UK startups seek to lead the world in smart city technologies
Government trade mission to south-east Asia helps UK startups to target the region’s growing smart city projects Continue Reading
-
CW@50: From Captain Kirk to 5G – 50 years of mobile
As Computer Weekly prepares to celebrate the 50th anniversary of our first edition in 1966, we look back at 50 years of British innovation and development in mobile networking Continue Reading
-
Microsoft’s underwater datacentre: The pros and cons of running subsea facilities
Underwater datacentres can help providers save on land costs and cooling, but at what cost to the environment? Continue Reading
-
Five CIO tips for building an IT strategy in the digital age
CIOs and strategy experts share their experiences of creating an IT strategy that makes the most of the digital revolution Continue Reading
-
The next stage in quantum key distribution
Authentication schemes based on quantum physics are emerging to address the growing number of ways to compromise data traffic Continue Reading
-
How CIOs can raise their 'IT clock speed' as pressure to innovate grows
CIOs are facing pressure from the board to roll out IT projects increasingly quickly. How can they do that without running unacceptable risks? This article, based on cutting-edge research among leading businesses, offers some answers Continue Reading
-
Max Schrems: The man who broke Safe Harbour
Schrems has persuaded a high court judge to confirm that Edward Snowden’s evidence is acceptable in court and that the US is engaged in mass surveillance of European citizens Continue Reading
-
Risky and untested: What went wrong with the ESN procurement?
In his first major interview since walking away from the Emergency Services Network procurement, Airwave COO John Lewis reveals why his company could take no further part in the process, and discusses the future of emergency services communications Continue Reading
-
Why Pegasystems' CEO, Alan Trefler, has learned to think smaller
Pegasystems has made its name supplying CRM, analytics and case management software to the world's largest companies. Now CEO Alan Trefler plans to use cloud computing to broaden Pega's appeal Continue Reading
-
Quantum key distribution is the future for secure comms
Quantum teleportation is a technology that will ultimately replace encryption as the foundation of communication security Continue Reading
-
A guide to smart home automation
Unless it is a new build, the challenge in creating a smart home is that technology must work irrespective of the age of the property Continue Reading
-
Target data breach: Why UK business needs to pay attention
Late last year, US retailer Target was hit by one of the biggest data breaches in the industry's history. So what happened and why is it relevant to UK businesses? Continue Reading
-
Hacktivism: good or evil?
IT lawyer Dai Davis looks at the rise of hacktivism and its impact on business and international politics Continue Reading
-
No more email? Why companies are turning to collaboration technology
Collaboration technologies are helping companies improve their employees' work-life balance Continue Reading
-
Next generation hotspots: The future of Wi-Fi?
A new solution for connecting to wireless hotspots could change the user experience forever. But as Steve Evans points out, there will need to be more collaboration in the telecoms and networking industries before we start to reap the benefits. Continue Reading
-
Top 10 Android security tips
As Android becomes more prevalent in the enterprise, Computer Weekly gives you 10 top tips for keeping your devices secure Continue Reading
-
An introduction to cyber liability insurance cover
Cyber liability insurance cover has been around for 10 years, but most security professionals seem to have not heard of it or know that it exists Continue Reading
-
How to create a good information security policy
Information security policies provide vital support to security professionals, yet few organisations take the time to create decent policies Continue Reading
-
How to tackle big data from a security point of view
Before leaping into big data, companies must be clear what they are trying to achieve, otherwise their investment will be wasted Continue Reading
-
How to find the most vulnerable systems on your internal network
Most corporate networks share common vulnerabilities, but many could be mitigated with education in “hacker thinking” for technical staff Continue Reading
-
Social media: A security challenge and opportunity
Generation Y workers are posing increasing security challenges to their employers as they share data unreservedly Continue Reading