For more information about the site, see the
Can the IT department fix personal data?
The missing ingredient for effective problem management
Microsoft wins the PC argument for Windows 10
CW500: Are you human or are you machine?
Security Think Tank: Threat intelligence feeds not for everyone
EU Data Protection Regulation: What the EC legislation means for cloud providers
The need for a 'Capability Exchange' for digital government
The power of situational awareness for digital government
Time to get mapping - how a blind government can develop sight
PCIe SSD vs all-flash for enterprise storage
Six CIO tips for business innovation with data
Virtualisation and disaster recovery: DR features in Hyper-V
The security dangers of home networks
Computer Weekly European User Awards 2015: Best Networking Project winner
How to ensure strong passwords and better authentication
Government must listen to tech sector in Investigatory Powers Bill
Security Think Tank: Security intelligence is useful only if isolated from the noise
Supercharging cyber security protection: Questions to ask when hiring a managed services provider
Security Think Tank: Security intelligence demands getting the basics right
Max Schrems: The man who broke Safe Harbour
Mobile apps help with communication between refugees and NGOs
Communication is a human right
Technology helps with health aid in refugee camps
Mobile data collection has replaced the clipboard
Using biometric technology to register refugees
Dealing with a humanitarian crisis
The digitisation of the humanitarian process
Digital payments help provide financial aid to refugees
E-learning helps with education for young refugees
Security Think Tank: Keep C-suite informed on incidents to drive better security
Security Think Tank: Addressing the gap between security data and intelligence
Ford reduces injuries with virtual assembly programme
The best desktop strategy: Forget the desktop
Netherlands uses female role models to encourage girls into IT industry
Risky and untested: What went wrong with the ESN procurement?
How technology is helping deliver aid to Syrian refugees in the Middle East
Virtualisation and disaster recovery: DR features in VMware
What is standing in the way of a paperless NHS?
Evolving ITSM to support agile IT and BYOD
How can IT contribute to NHS efficiency?
Inside Office 2016: discover Delve
Inside Office 2016
Inside Office 2016: Excel improves business intelligence
Inside Office 2016: A changing outlook
Inside Office 2016: Real time typing
How to fully test IT networks for vulnerabilities
The pace of digital disruption varies widely by industry
Flash in NAS file access storage: Does it need it – and, if so, how much?
Mobile strategies increase need for data loss prevention technology in Europe
Inside Taiwan: The engine room of the internet of things
How to mitigate security risks associated with IoT
Digitisation propels the service management desk beyond internal support
Big data poses storage challenges in Australia and New Zealand
IT services procurement: Could G-Cloud be the answer Europe is looking for?
How Asean organisations are untangling big data storage challenge
Are you exposed? Lessons from Ashley Madison
Case study: Philips takes agile approach to building bridges between business and IT
Russian organisations have confidence in virtual backup
An application ecosystem for the all-digital era
Network security systems – dedicated or multifunction?
Shining a light on the male mentors of IT
Key challenges of mobile compliance
The truth about virtualisation and disaster recovery
Analytics helps Asean organisations read between the lines
Australian businesses running the numbers on analytics-driven customer service
Security Think Tank: Three key cyber resilience goals
The importance of e-leadership in meeting digital challenges
Security Think Tank: Resiliency is the single most effective response to cyber attacks
Security Thank Tank: Business resilience should be proactive, not reactive
Why Pegasystems' CEO, Alan Trefler, has learned to think smaller
Security Think Tank: Resilience basics will work for any size of business
IP EXPO Europe
Chief digital officer: The newcomer that’s here to stay
Security Think Tank: Aim at joined-up security for clearer risk view
Appliances move well beyond the hype
Spark versus MapReduce: which way for enterprise IT?
Russian personal data law set to come into force despite fears
Reinventing outsourcing through agile principles
Consumer Rights Act will boost trust in digital content
How George Osborne's latest tax changes affect IT contractors
Why HTML5 must replace Flash
Five lessons learned from a year in the cloud
Life’s a breach: How to handle the press after a hacking attack
Looking beyond nine-to-five
Finding the right big data appliance for your business
How innovation happens – outliers in the game of progress
Councils explore options for online mapping tools
How Verne Global tackled the Icelandic datacentre connectivity gap
How changes to EU data protection law could affect UK business
The ROI of a gender-balanced workforce
Mobile security -- what works and what doesn't?
Cloud computing in schools: privacy under threat
Virtualisation and storage: Five ways to do it better
Is Google's patent giveaway right for your tech company?
Using SAP Hana as a data warehouse
What is the #ILookLikeAnEngineer campaign?
#ILookLikeAnEngineer: Paulina Galoostian