In Depth
In Depth
IT strategy
-
Recordless email: magical or menacing?
A new startup promises recordless email. Is this a stroke of genius that will reward the company with billions of Internet bucks, or is it the end of the world as we know it? Continue Reading
-
Security Blog Log: Sailing a sea of spam
This week, bloggers struggle to purge their bloated inboxes. Their experiences lend weight to recent studies showing a breathtaking spike in spam. Continue Reading
-
Security Blog Log: Dissecting Firefox 2.0
This week, bloggers examine the security features of Firefox 2.0 and come away with mixed reviews. Does it fare better than Internet Explorer 7? Continue Reading
-
Review: Arbor Networks' Peakflow X 3.6
Hot Pick: Peakflow isn't cheap and requires an intimate understanding of data flows, applications and network infrastructure. But the investment will pay dividends. Continue Reading
-
Review: Network Intelligence's enVision
enVision offers excellent value and is highly configurable, though typically that means you have to put a lot into it to get the most out of it. Continue Reading
-
Download Advanced Storage Guide Chapter 2: Backup/Data protection (PDF)
A printable version of our Advanced Storage All-In-One Guide. Download Chapter 2: Backup/Data protection in .pdf format now. Continue Reading
-
VoIP convergence: Managing staffing issues
Companies making the transition to IP telephony must find a way to converge their voice and data networks -- and the employees who work on them. Continue Reading
-
What storage managers are buying and why, page 4
What storage managers are buying and why Continue Reading
-
Strategy clinic: Deciding which activities to measure to provide meaningful insights
I have always believed in 'doing' rather than self-monitoring, but reluctantly agree that the IT department needs to provide meaningful metrics on its activities. We have no shortage of things to measure, but how do we decide which are the most ... Continue Reading
-
Nmap Technical Manual
By now, most infosec pros have heard of Nmap, and most would agree that even though the popular freeware tool is invaluable, installing, configuring and running it in the enterprise is no easy task. With that in mind, SearchSecurity.com, in ... Continue Reading
-
Security Blog Log: Taking Google Code Search for a spin
This week, the blogosphere is buzzing about Google Code Search. Despite concerns that the tool will aid attackers, some see it as a boost for security. Continue Reading
-
School district expels outsourced backup, enrolls CDP
Revere School District dumps tape and outsourced backup, and deploys SonicWall's continuous data protection product. Continue Reading
-
Test your IQ: Business continuity -- ANSWER
This type of plan specifies a means of maintaining essential services at the crisis location. Continue Reading
-
DPM's Diary: 3 October 2006
Monday Continue Reading
-
ZERT rekindles third-party patching debate
This week in Security Blog Log: IT security pros express more reservations about third-party patching, including the CEO of a company that released one a few months ago. Continue Reading
-
PING with Suzanne Hall
In this exclusive interview with Information Security magazine, Suzanne Hall, AARP director of IT operations and security, examines how security professionals can enable telecommuters and mobile workers while keeping their data secure. Continue Reading
-
On privacy laws, every state is one of confusion
It's getting increasingly difficult for US firms to comply with regulations . David A. Meunier feels that it's time to develop safeguards and processes for this ever-changing regulatory environment. Continue Reading
-
NetApp operations chief talks growth
Tom Georgens, executive vice president and general manager at NetApp -- also rumoured to be in the running as next CEO -- discusses what's driving its growth. Continue Reading
-
Storage upstarts are tipping the vendor scales
The big storage vendors are always trying to steal a piece of each other's pie. But some small tech upstarts might play big parts in determining who comes out on top. Continue Reading
-
Security Blog Log: Word doc scam evades spam filters
Also this week: A researcher gets a harsh reward after flagging a University of Southern California Web site flaw, and more blogs are keeping an eye on the latest security breaches. Continue Reading
-
Protecting wireless networks: Step 3
Security testing expert Kevin Beaver covers the tools and techniques needed to find and exploit insecure wireless networks. Continue Reading
-
Protecting wireless networks: Step 2
Security testing expert Kevin Beaver covers the tools and techniques you'll need to find and exploit insecure wireless networks. Continue Reading
-
Wireless network security testing
Attack your own wireless networks to find vulnerabilities before malicious hackers do. Continue Reading
-
Identity and Access Management Security School
This Security School explores critical topics related to helping security practitioners establish and maintain an effective identity and access management plan. Continue Reading
-
Risk management: Data organization and impact analysis
This first article of the Insider Risk Management Guide explains how to data organization is the first step in implementing insider threat controls. Continue Reading
-
Risk management: Implementation of baseline controls
This fourth article in the Insider Risk Management Guide examines the implementation of baseline controls. Continue Reading
-
Risk management: Baseline management and control
Identifying baseline controls is the second step to implementing insider threat controls as described in this article from SearchSecurity's Insider Risk Management Guide. Continue Reading
-
Risk management references
References for our Insider Risk Management Guide. Continue Reading
-
Risk management audit
This article explores the audit function in the insider risk management process. Continue Reading
-
Security blog log: Fear and loathing in MS06-040's wake
This week, security bloggers wonder if some of the MS06-040 warnings have gone too far. Meanwhile, Symantec uses its blog to warn about the timed release of exploits. Continue Reading
-
Inside MSRC: Time to rethink security workarounds
Christopher Budd of the Microsoft Security Response Center recommends implementing one of several security workarounds to ensure a secure infrastructure until this month's most important Windows update can be installed. Continue Reading
-
Countering attackers with NAC, IPS
Product review: Information Security magazine's Wayne Rash says ForeScout Technologies' flexible CounterACT appliance combines NAC with IPS and is worth the investment. Continue Reading
-
Akonix A-Series offers complex, best-of-breed IM security
Product review: Information Security magazine's Sandra Kay Miller says The Akonix A-Series instant messaging security appliances works well but needs better documentation. Continue Reading
-
Thwarting IM management challenges
Product review: Information Security magazine's Sandra Kay Miller says Symantec's IM Manager 8.0 has limited public network features, but offers excellent reporting Continue Reading
-
Security event management, no strings attached
Product review: Information Security magazine's Joel Snyder says Check Point's vendor-agnostic Eventia Analyzer 2.0/Eventia Reporter is worth consideration despite limited BI options. Continue Reading
-
PING with Heidi Kujawa
Heidi Kujawa, director of enterprise architecture services for Sony Pictures Entertainment, explains how combatting piracy takes more than just keeping bootleggers out of the theatres Continue Reading
-
Beyond HIPAA and GLBA
Most firms are familiar with HIPAA, Gramm-Leach-Bliley and Sarbanes-Oxley, but newer regulations are pushing certain industry sectors to adopt strong authentication Continue Reading
-
SMB finds the perfect host
When All3Media, a medium-sized TV programming producer, inherited an inflexible communications system, it turned to a more appealing, hosted alternative. Continue Reading
-
Questions that need to be answered on NHS IT plan
Four years ago the government announced to a grateful NHS a national IT programme that would become the world's largest civil computer scheme. Continue Reading
-
Lenovo goes for gold with SMBs
When Shelley Rudman unexpectedly won a silver medal for her valiant efforts in the skeleton at this year’s Winter Olympics, the world knew she’d gained her unprecedented achievement for the UK in a matter of seconds. In fact, the world expected to ... Continue Reading
-
Industry chiefs to declare war on for-profit cyber criminals
IT industry leaders reaffirm the importance of security to a digital economy beset by money-driven cyber criminals. Continue Reading
-
Be careful you don't get more than you pay for with VoIP
Implementing VoIP is attractive for all companies in particular SMBs. However, there are issues to address that may cost you more than what you save Continue Reading
-
Voicing concerns on Skype
Skype has blazed a trail in the Voice over IP arena; its popularity hasn’t gone unnoticed by the hacker community however Continue Reading
-
Lost at sea: securing the channel
As attacks seem to proliferate almost unabated, it’s worrying to think that of the three interested parties in the security technology market — the technology makers, the technology sellers and the technology users—not everyone shares a common view ... Continue Reading
-
Riding the wave of change
CIOs can thrive as pace of change quickens, argues Des Lee Continue Reading
-
Business continuity keeps companies running
As we speak, it appears that disruption to IT services by the London bombings was minimised due to effective and realistic business continuity strategies. Sally Flood sees how you construct them. Continue Reading
-
Phishing for the missing piece of the CardSystems puzzle
A banking insider examines the ties between customized phishing attacks this spring and the CardSystems breach announced soon after. Don't miss his revelations on how they're linked and what the phishers really needed. Continue Reading
-
How to survive a data breach
When Colin Crook offers advice on how companies should deal a security breach, he speaks from experience. He was CTO of Citicorp [now Citigroup, parent company of Citibank] 10 years ago when a hacker penetrated the company's network.
Crook... Continue Reading
-
Learning Guide: Low-cost storage
Resources on low-cost networking, iSCSI, SATA and IP storage Continue Reading
-
Lead from the top
The starting line for effective data security is at board level, writes John Kavanagh in this review of current thinking and... Continue Reading
-
The acceptable rules of the mobile game
Mobile networks allow you to connect to your network from almost anywhere by the appropriate methodology. Yet that may also mean... Continue Reading
-
Managed services: Looking to the long term
IT directors looking for an easy way to manage increasing volumes of data by buying more hardware could be storing up problems... Continue Reading
-
Winning the cyber arms race in the classroom
In the struggle for cybersecurity, Lenny Zeltser's most important weapons are the classroom and the pen.
For the past few years he has taught part-time at the SANS Institute, creating a course on how to analyze malicious software... Continue Reading
-
Whisky galore with IP
Chivas can toast future success thanks to a cost-effective IP data network Continue Reading
-
Financing the future
Don't get a headache working out the best ways to pay for hardware and software. Danny Bradbury offers a user-friendly guide to... Continue Reading
-
IP everything, essentially
What are the fundamental deliverables of IP networks? How can you use IP networks to gain financial benefits in addition to... Continue Reading
-
The basis of profitability
Not so long ago, you didn't have much choice - your IT and communications requirements were acquired, implemented and maintained... Continue Reading
-
The gift of CRM
For Red Letter Days, a provider of gift experiences for corporates and consumers, a CRM system was essential to give it market... Continue Reading
-
Management matters
Cath Everett finds out how you stay on top of networking. What are the management issues related to your telecoms and networks... Continue Reading
-
Is the national programme for NHS IT set to be 'the biggest gamble in the world'?
The private concerns of clinicians and IT professionals about the national programme are not being addressed, despite the front... Continue Reading
-
Achieving the goal of CIO
What exactly does a chief information officer do?Paul Burfitt, global CIO at AstraZeneca, analysed the various aspects of his job... Continue Reading
-
On the right side of the law
What are the legal and regulatory issues that could affect the running of your company? What are the ramifications of the Data... Continue Reading
-
Fujitsu won £800m Post Office contract after misrepresenting itself, says lawyer
High Court claim by ex-employee makes damning accusations Continue Reading
-
What's in an IT name?
What exactly does a chief information officer do?Paul Burfitt, global CIO at AstraZeneca, analysed the various aspects of his job... Continue Reading
-
Director's cut: Learning to spot winning technologies
Faced with a stream of new technologies it is vital that IT directors keep abreast of the latest developments and are aware of... Continue Reading
-
The Heat is on
Since the 1960s, Moore's Law has described the progress of the IT industry but overheating could slow down the pace of change Continue Reading
-
Lessons to be learned from Chinook tragedy
Since 1997, Computer Weekly has studied the IT-related lessons from the crash of Chinook helicopter ZD576 on the Mull of Kintyre... Continue Reading
-
Scale 21 conference will reveal key to IT success
The results of the largest ever survey of IT professionals and entrepreneurs are to be announced at the Building Britain's... Continue Reading
-
Top Chinook test pilot reveals unease over engine software
A campaign by Computer Weekly and Channel Four News has sought to show that a computer problem not pilot error could have led to... Continue Reading
-
Chinook probe: MPs join Lords
In an extraordinary move, the House of Commons' most powerful committee is to seek the help of the House of Lords as part of its... Continue Reading
-
Feeling the pinch
The Internet age is not over just because a few dotcoms have run into difficulty, says Martin Butler, who believes that the... Continue Reading
-
Words' worth
The online retail sector is growing apace and WHSmith.co.uk is finding its place in the lead. Nathalie Towner looks at the story... Continue Reading
-
Window of the world
Going online means going global. So why do so many companies give their website less consideration than other areas of the... Continue Reading
-
Web site for black music hits the right note
Glen Yearwood hit the right note when he launched darkerthanblue.com, a site devoted to black music Continue Reading
-
Think before you link
Laws governing the Net remain a grey area, even for such issues as deep linking, while discrimination laws also apply to the Web Continue Reading
-
Silicon Valley looks East
"Cross border sourcing" is gaining in popularity in the US where an expanding skills vacuum has led Silicon Valley businesses to... Continue Reading
-
The world is enough
As a global business, IT offers managers and directors many opportunities to work abroad and, as Julia Vowler finds out, these... Continue Reading
-
Delivering digital streaming in the Real world
While the fortunes of streaming media firm Real Networks have been in decline, the company is not taking it lying down, writes... Continue Reading
-
Sema suffers sharp share drop
A 10% fall in the share price of software and services company Sema has raised questions about the company's financial stability.Sema, responsible...
Continue Reading -
A real union in a virtual world?
Amazon faces the biggest unionisation drive the dotcom sector has ever seen. Mike Arrowsmith reports Continue Reading
-
The VPN dilemma
With traditional networks choking on data, Liz Biddlecombe investigates the pros and cons of managing a VPN yourself or... Continue Reading
-
Chinook response sends "wrong signal" to software industry
As defence secretary Geoff Hoon rubbished the Public Accounts Committee report into the 1994 Chinook disaster, an MP at the centre of the case...
Continue Reading -
Computer Weekly's evidence to the Public Accounts Committee
We write to the Public Accounts Committee in relation to its consideration of the Chinook's FADEC computerised engine control... Continue Reading
-
A thoroughly modern e-apprenticeship
Jane Dudman explains how young people in Newham have the chance to be apprentices in a scheme to lessen the blow of the IT skills... Continue Reading
-
Independent inquiry into Chinook crash
Tony CollinsAn independent inquiry into the Chinook helicopter crash in 1994 is likely to be launched by the House of Lords. It will...
Continue Reading -
Tackling Internet misuse at work
Like the technology, Internet abuse appears to have proliferated in recent years. There are, however, two ways to tackle this... Continue Reading
-
Pathway and the Post Office: the lessons learned
The infamous 1996-1999 Pathway project aimed to computerise the nation’s post offices and tackle benefit fraud. But 18 months... Continue Reading
-
How to scour the world when outsourcing
Thanks to Y2K compliance programmes, it is now perfectly acceptable for a firm to consider moving all or part of its systems development and support... Continue Reading -
Bosses welcome security warnings from outsiders
-
Post Office pays price over Pathway
The Post Office has turned in its first loss in 25 years after taking a £571m charge on the disastrous Pathway IT project, writes... Continue Reading
-
RAF Justice: casting doubt on pilot error
Almost a year ago Computer Weekly published its 140-page RAF Justice report on the Internet. It revealed evidence of a cover-up... Continue Reading
-
Lifting the lid on secret stiffing techniques
One of the UK's most experienced IT negotiators lifts the lid on some of the sharp practices used by software suppliers to get... Continue Reading
-
Leaked RAF memo scathing of safety software evaluation
Computer Weekly's Tony Collins uncovers evidence that the MoD has consistently undermined the authority of its software assessors... Continue Reading
-
January-February
Tesco target of 300 online shops within one year Continue Reading
-
White Paper: Software solutions for effective network power management
Uncertain power conditions can wreak havoc on small businesses, however, there are ways to limit the risk of computer data loss Continue Reading