In Depth
In Depth
IT operations management and IT support
-
Tips to improve IT sustainability
With every business function being asked to look closely at their carbon footprint, we look at ways to achieve greener IT operations Continue Reading
-
A better way to manage hybrid or multicloud deployments
Cloud-native strategies notwithstanding, workloads running on-premise or in private clouds will continue to present management challenges Continue Reading
-
Forrester: Tips for assessing hybrid cloud management
Cloud-native works for new workloads, but legacy IT needs a different approach, which is why IT leaders rely on hybrid cloud deployments Continue Reading
-
Post Office Horizon scandal explained: Everything you need to know
Computer Weekly has investigated the Post Office Horizon scandal since 2008 and is, in fact, part of the story. This guide contains essential information about the scandal Continue Reading
-
Ivanti vulnerabilities explained: Everything you need to know
A series of vulnerabilities in Ivanti products have caused concern worldwide. Delve into some of the key issues arising from the Ivanti disclosures, looking at the vulnerabilities and their impact, what affected users should do, and learn about new... Continue Reading
-
Tracking the change in enterprise attitudes to hybrid cloud
Hybrid cloud deployments are poised to become even more prevalent in the enterprise as public cloud fails to live up to the hype on cost savings Continue Reading
-
Post Office Horizon IT scandal inquiry: Two years of shocking revelations
Read about two years of shocking revelations from the Post Office Horizon scandal inquiry Continue Reading
-
The rising prominence of hybrid cloud in the Nordics
Many Nordic organisations have opted for hybrid cloud environments, subscribing to the newest services without giving up what they already have. Best practices are beginning to emerge for managing the heterogenous environment Continue Reading
-
Biometric revolution in IAM: The future of authentication
The IAM landscape is experiencing profound change thanks to the advent of biometrics. Learn about the latest advantages and key benefits of biometrics in identity Continue Reading
-
British Library cyber attack explained: What you need to know
In this essential guide, Computer Weekly investigates the cyber attack on the British Library that has rendered IT systems inoperable and caused service disruption to thousands of users Continue Reading
-
How to recover systems in the event of a cyber attack
Recovering compromised systems after a cyber attack isn’t easy, but understanding industry best practice offers a template for the key processes to follow Continue Reading
-
Designing software for efficient IT operations
Rapid development and deployment of applications is not enough to achieve digitisation – IT operations needs to be re-engineered too Continue Reading
-
Joining the dots for a seamless digital transformation journey
It is often the small things that have the greatest impact on a successful digital transformation project Continue Reading
-
Jaguar TCS Formula E racing team making breakthroughs that will fine-tune electric road vehicles
The Jaguar TCS Formula E racing team is using software and digital simulations to continually improve its electric racing cars, leading to better performing electric vehicles on our roads Continue Reading
-
Why the human factor is critical to ITOps success
Digitisation often means deploying software at pace. Along with tooling, IT leaders need to consider skills and training Continue Reading
-
Automated cloud IR: Empowering cyber with AI-powered playbooks
As cyber threats increasingly target cloud infrastructure, demand for robust and reliable incident response measures is through the roof. Find out why you might want to consider bringing artificial intelligence into play Continue Reading
-
Toyota car plant outage shows database capacity planning is vital
How could database deletes and re-organisation take out car production for 36 hours at 14 plants? We drill down into the details of database capacity planning Continue Reading
-
CIO interview: Petra Tesch, Vizrt
Straight-talking when it comes to getting her messages across to the wider company, Vizrt CIO Petra Tesch revels in transformation and communication Continue Reading
-
AI-powered cloud SIEM: Real-time threat intel boosts defences
Thanks to their advanced data analysis and predictive capabilities, AI and ML will be valuable protective tools going forward. Learn about the potential of AI-backed cloud SIEM technology Continue Reading
-
CTO interview: Gavin Rea, Gulf Bridge International
GBI ensures service continuity of submarine cable networks, which bring high-speed internet to the Gulf states, supporting the region’s ambitious plans to be one of the world’s leading poles for technological innovation Continue Reading
-
Chief data officer interview: Neema Raphael, Goldman Sachs
After two decades at Goldman Sachs, Neema Raphael tells Computer Weekly about his tech journey at one of the world’s biggest banks Continue Reading
-
Norwegian data privacy experts sound alarm over generative AI
Hundreds of millions of people embrace generative artificial intelligence, blissfully ignorant of what it’s doing to data privacy. Continue Reading
-
Networking a reconfigured workspace
We find out how one company has optimised its network to support a post-pandemic work environment Continue Reading
-
Why we need advanced malware detection with AI-powered tools
AI-powered cyber security tools have now developed to a point where they are becoming an effective approach to protecting the organisation. Learn how you can benefit from adopting them Continue Reading
-
Automation: The key to FinOps success
Workload management and automation offers a way for FinOps teams to match supply to demand for cloud-based IT in an efficient way Continue Reading
-
The CIO challenges brought by e-commerce in Kuwait
E-commerce is growing fast in Kuwait, resulting in new challenges for CIOs in the retail sector Continue Reading
-
Inspired by the human brain, Belgian researchers develop a new generation of sensors
Belgian researchers have found ways of mimicking the human brain to improve sensors and the way they pass data to central computers Continue Reading
-
How APCOA is using big data to reinvent car parks
Car park operator APCOA is using big data to transform traditional car parks into mobility hubs that will offer electric vehicle charging, space for small businesses and depots for delivery companies Continue Reading
-
The changing role of the CIO from a Finnish perspective
A small country with a sophisticated workforce, Finland has its own perspective on how IT leadership is changing in both the public and private sector Continue Reading
-
As Covid fades away, what’s the future of remote work in Europe?
Many IT leaders are still supporting some form of work from home, and a trend is beginning to take shape in Europe Continue Reading
-
What can security teams learn from a year of cyber warfare?
With the passing of the first anniversary of Russia’s invasion of Ukraine, we reflect on the ongoing cyber war, and ask what security leaders can learn from the past 12 months Continue Reading
-
Green storage: Savings to be made but tricky to achieve
Storage upgrades can bring energy savings. New hardware, the cloud and as-a-service procurement models all cut costs, but can need careful tweaking to get right Continue Reading
-
IT’s shift to the cloud: Veeam’s data protection report in detail
With half of servers in the cloud, most backup and nearly all disaster recovery cloud-centric, the shift to the cloud is significant – but container backup is one area that is yet to settle down Continue Reading
-
High tech meets agriculture in Denmark
Thanks to a few strategic investments, Denmark may one day become a major exporter of farming technology Continue Reading
-
Cyber security professionals share their biggest lessons of 2022
In the run-up to 2023, cyber security professionals are taking the time to reflect on the past few months and share their biggest lessons of 2022 Continue Reading
-
A sticky story: How, and why, hackers love stickers on laptops
We’ve all seen laptops adorned with security stickers and in-jokes, but how did this cyber community trend get started, what does it signify, and what does it say about the humans behind the screens? Continue Reading
-
How gamifying cyber training can improve your defences
Security training is the cornerstone of any cyber defence strategy. With ever-escalating online threats, it is now more important than ever that this training is an engaging experience Continue Reading
-
Ransomware: Practical tips to improve resiliency
With ransomware attacks on organisations increasing, the question is not if an attack will happen, but when. We look at ways to minimise the impact of such an attack Continue Reading
-
An encouraging new conversation around sustainable IT, says Nordic CIO
What started as a whisper a decade ago has become distinctly audible chatter among IT leaders sharing best practices on how to protect the environment Continue Reading
-
The world's oldest cryptocurrency exchange prefers doing business in Luxembourg
One of the newest niches in fintech, cryptocurrency exchanges may fare very well in Luxembourg Continue Reading
-
How Imec hopes to industrialise artificial intelligence
Pure research explores the fundamental questions of artificial intelligence, but applied research takes those ideas to industry, making it all worthwhile Continue Reading
-
Why automating finance is just an integration game
We look at how the software that powers finance departments can help businesses navigate the worsening economic climate Continue Reading
-
Will the OCSF create an open and collaborative cyber industry?
The Open Cybersecurity Schema Framework promises to transform security data analysis and collection, but there are challenges around adoption Continue Reading
-
What do the US’s new software security rules mean for UK organisations?
The White House announced recently that all software supplied to the US government and its agencies needs to be secure, so what does this mean for the UK and EU security sectors? Continue Reading
-
AIOps for storage: Potential huge benefits, but lots of lock-in
Applying artificial intelligence and machine learning to storage can help to predict bottlenecks, diagnose I/O issues and recommend upgrades, but suppliers’ products are largely limited to their own hardware Continue Reading
-
RPA’s day has come – the intelligent evolution of a productivity bot
By trying to emulate humans for tasks such as data entry, robotic process automation has found a niche home in many an enterprise back office Continue Reading
-
Icelandic datacentres may lead the way to green IT
Iceland may soon become even more attractive to companies wanting to minimise their carbon footprint while using high-performance computing services Continue Reading
-
The cyber security impact of Operation Russia by Anonymous
The campaign against the Russian government by Anonymous surprised many with the depth and scale of the cyber attacks. What can we learn from this online war? Continue Reading
-
What the world can learn from Saudi Arabia’s fight against industrial control system attacks
Iran learned from attacks on its infrastructure and unleashed similar malware on Saudi Arabia. The world has now gained valuable lessons from the Saudi response Continue Reading
-
IT departments need holistic circular economies to fight climate change
With sustainability moving up the boardroom agenda, IT managers should revamp procurement strategies to align with the principles of the circular economy, but what does this mean for managing the IT lifecycle? Continue Reading
-
Macs in the enterprise – what you need to know
A guide to managing Apple Mac hardware and operating systems in the enterprise Continue Reading
-
How to retain cyber talent in the Great Resignation
The cyber security industry is experiencing alarming rates of resignations, leaving organisations vulnerable to cyber attacks. How can we better retain cyber talent? Continue Reading
-
Refugee support group works with tech startup on reporting system
Computer Weekly speaks to a refugee support group about its ongoing collaboration with an academic tech startup to develop a digital human rights reporting system for refugees Continue Reading
-
The role of infrastructure as code in edge datacentre computing
As datacentre computing is pushed to the edge of the organisation’s network, IT has to address the overheads associated with remote server management Continue Reading
-
Recruitment risks: Avoiding the dangers of fraudulent candidates
Tech companies are seeing an increase in fraudulent job applications, with associated impacts on risk and cyber security. So how can organisations protect themselves from fraudulent applicants while ensuring they recruit the best talent? Continue Reading
-
How can I avoid an exodus of cyber talent linked to stress and burnout?
Cyber security professionals have played a crucial role during the pandemic, yet many feel like their employers aren’t providing adequate mental health support and have considered quitting their jobs as a result. What can employers do to help them? Continue Reading
-
Ratcheting down the tension in the hybrid world
Employers who reject the trend towards adopting more flexible, hybrid ways of working may struggle with staff retention - and CIOs have more to win or lose than most in a hybrid world Continue Reading
-
Why post-pandemic reskilling must focus on mainframes
A major contributing factor to UK-wide skills shortages is the significant number of people who have left the workforce since the start of the Covid-19 pandemic Continue Reading
-
How to beat the heat: What can datacentre operators do to meet emissions targets?
With new mandates around sustainability proliferating, datacentres must find ways to meet their environmental goals while remaining competitive and meeting customer service-level expectations Continue Reading
-
How Dutch hackers are working to make the internet safe
We hear how the personal mission of a Dutch hacker grew into a serious organisation with international ambitions Continue Reading
-
What neurodivergent people really think of working in cyber security
Many firms are filling cyber security skills gaps by hiring neurodivergent talent – but more support is needed for neurodivergent cyber security professionals, writes autistic tech journalist Nicholas Fearn Continue Reading
-
Dispelling the top five myths of modern infrastructure
Modern infrastructure is agile, flexible and scalable. It is at the forefront of every CIO’s digital strategy – and it's everywhere. But with the multitude of choices comes complexity Continue Reading
-
Is the IT sector beset by fear-mongering?
The arms race between hackers and security teams has led to a plethora of new technologies, but it can be hard to differentiate between sensible cyber purchases and those that are promoted by exaggerating risk Continue Reading
-
Social value not yet fully embedded in procurement practices
Social value procurement rules are designed to diversify the public sector’s supplier base while providing society with wider collective benefits, but are yet to be fully introduced Continue Reading
-
What Norwegians are learning as they pioneer autonomous ships
Norway is leading the world in developing autonomous ship technology – and the world should pay attention to its latest developments Continue Reading
-
Digital surveillance of remote workers may increase enterprise risk
From productivity tools to security threats, we explore how digital surveillance is forcing remote workers towards shadow IT Continue Reading
-
How to manage endpoint security in a hybrid work environment
The future of the workplace is clearly hybrid, but this has untold implications around endpoint security. How can businesses overcome these? Continue Reading
-
Could Iceland be the best place in the world for high-performance computing?
Most of Iceland’s cheap, sustainable energy is currently used by aluminium smelters, but recognising the need to diversify, the Landsvirkjun power company now promotes other uses Continue Reading
-
Considerations when deciding on a new SIEM or SOAR tool
A successful deployment of any security tool very much depends on the maturity of security processes in the organisation Continue Reading
-
When is SIEM the right choice over SOAR?
Better instrumentation leads to better IT security but monitoring can quickly overload IT teams. Automation can help, but it may not always be needed Continue Reading
-
Five ways to ensure remote working security and compliance
A mix of on-site and remote working has become a fact of life for many organisations. We look at five key things you should consider to ensure compliance and security Continue Reading
-
Why data and the pandemic are ripping up paper processes
We explore how the Covid-19 pandemic has forced businesses to rip out traditional paper processes and replace them with end-to-end digitisation Continue Reading
-
Europe’s proposed AI regulation falls short on protecting rights
The European Commission’s proposal for artificial intelligence regulation focuses on creating a risk-based, market-led approach replete with self-assessments, transparency procedures and technical standards, but critics warn it falls short of being ... Continue Reading
-
Buying a VPN? Here’s what you need to know
VPNs are an effective cyber security tool for businesses and remote workers, but there are many things to consider before purchasing and implementing one. We explore some of these Continue Reading
-
What digital transformation means for data storage
We survey the key planks of digital transformation and look at the storage technologies emerging to support it, such as NVMe and QLC flash, hyper-converged infrastructure and cloud storage Continue Reading
-
The right tech choices for hybrid workers
Various studies give a mixed reaction to businesses returning to office work, but what is apparent is that support for remote working will continue Continue Reading
-
How do I get my users to pay attention to security training?
As cyber security risks grow daily, businesses must educate staff about these through cyber awareness training. But how can they ensure this is taken seriously by employees? Continue Reading
-
Navigating the sticky issue of monitoring employee productivity
With employees having shifted en masse to remote working during the pandemic, we explore how enterprises have maintained the productivity of their dispersed workforce Continue Reading
-
Why some jobseekers have turned to cyber crime during the pandemic
Research shows that many people have been seeking cyber crime-related work on the dark web, but why? Continue Reading
-
Preparing for enterprise-class containerisation
As more workloads are deployed in containers, IT teams will need to assess how to manage container sprawl, reduce cloud bills and support databases Continue Reading
-
The 3-2-1 backup rule: Has cloud made it obsolete?
The 3-2-1 backup rule was made for small-scale use in the pre-cloud era when tape still ruled. Is it relevant in the 2020s, or can we repurpose its fundamental principles? Continue Reading
-
How to choose the right email security service for your organisation
With email security threats growing rapidly, businesses can quickly identify and block these by using a top email security service. Here’s how to select the right provider Continue Reading
-
Does email security need a human solution or a tech solution?
People spend a lot of time using email systems, but many do not realise that this makes them attractive targets for cyber criminals. With education and technology, businesses can tackle this problem head-on Continue Reading
-
Dealing with the challenge of beg bounties
The rise of so-called beg bounties is becoming a challenge for security teams, and can be a drain on time and resources. But what is a beg bounty, and how does it differ from a bug bounty? Continue Reading
-
Five ways that disaster recovery changes in a pandemic
Covid-19 has changed IT. Previously, working remotely was a business continuity measure, but now it is the norm. That means disaster recovery has to adapt to new risks and new ways to respond Continue Reading
-
Is it time to ban ransomware insurance payments?
The former head of the NCSC recently called for a dialogue over whether or not it is time to ban insurers from covering ransomware payments. Is he on the right track? Continue Reading
-
Five key questions about Kubernetes backup answered
We look at when to back up containers, what to protect, the main methods of backup for Kubernetes and the main Kubernetes backup products available in the market Continue Reading
-
APAC career guide: How to become a DevOps engineer
A DevOps career can be highly rewarding, as long as you are open to learning new things and collaborating with team mates to solve problems in software development Continue Reading
-
How can healthcare organisations fight increased cyber crime in 2021?
As the Covid-19 pandemic enters what may be its most dangerous phase, we explore how healthcare organisations can ward off cyber threats while preserving their ability to deliver critical care Continue Reading
-
Data Dynamics aims at single view of unstructured data
Data volume is ballooning, and storage is becoming more disparate, which makes the need for a single platform to manage storage and compliance a key requirement for organisations Continue Reading
-
The nation state threat to business
The SolarWinds hack shows the widespread damage possible from a nation state cyber attack. What is the threat to business and how can it be mitigated? Continue Reading
-
Security Long Reads: Cyber insiders reveal what’s to come in 2021
In this long read, we gather together the thoughts of cyber security insiders from across the industry to get their take on what will happen in 2021 Continue Reading
-
Patching: Balancing technical requirements with business considerations
With an increasing reliance on subscription models alongside the regular patching of software, updates have become an essential part of modern business practices. However, care needs to be taken to ensure the optimum patching process is implemented Continue Reading
-
Post-pandemic approaches to IAM for cloud security
Cloud technology may have saved businesses from catastrophe during the pandemic, but it has also introduced additional challenges around identity and access management. Here’s why IAM policies are crucial in the new normal Continue Reading
-
This Christmas, Covid-19 heightens retail security risks for everyone
Do you think it’s only retailers and consumers who need to consider cyber security when shopping online during the holidays? You’re dead wrong. This year, the Covid-19 pandemic and the shift to remote working has thrown a spanner in the works Continue Reading
-
Fix bottlenecks before tackling business process automation
Business processes evolve over time, and intelligent automation requires a thorough assessment of what is not working optimally Continue Reading
-
Need to know: Five key things about backup testing
We look at five key things to consider when it comes to backup testing – what to test, how often, making sure backups work, whether recovery is effective and ensuring processes are consistent Continue Reading
-
How to build an effective vulnerability management programme
As cyber criminals increasingly look to exploit vulnerabilities in software and hardware, businesses must build and implement an effective vulnerability management programme to counter this growing threat Continue Reading
-
How AI is helping to drive business process optimisation
Automating an inefficient process simply leads to a faster inefficient process. Artificial intelligence needs to be deployed to ensure business processes are optimal Continue Reading
-
Credential stuffing: When DDoS isn’t DDoS
Ten years ago, credential stuffing attacks posed a comparatively minor threat, but with an escalating number of data breaches, the threat posed has now increased. What are the solutions to this very human problem? Continue Reading