Review: WikiLeaks - Inside Julian Assange's war on secrecy
How can we find the new recruits that IT needs?
Global sourcing trends in 2011
Software as a service can breed dependency so choose suppliers with care
Justifying your cloud investment: high-performance computing
Security Zone: DLP – Did we miss the point?
IT skills require industry engagement
Cloud predictions for 2011: Gains from early experiences come alive
Think Tank: What are the security implications of putting a smart meter in every UK home?
Security Zone: The ISO/IEC 38500 IT Governance Standard
CES 2011: Security and mobile working
Innovation out of recession: what’s ahead in 2011
IT leads the charge on project management
The seven most common project management mistakes CIOs make
Don’t let techno-babble cloud your judgement
Fibre rates – time to repeal the modern equivalent of the window tax
Why FTTC isn’t enough and how the UK might do more
Saving money through software asset management
The legal considerations of cloud computing
Government broadband strategy will fail unless fibre rates are challenged
Security Zone: More effort needed to manage third party connections
CW Security Think Tank: How to prevent security breaches from personal devices in the workplace
Youngsters driving the cloud to tipping point, says Rangaswami
Opinion: Plugging the gaps in the government's broadband strategy
Stopping the cloud taking your IT career away
Why data analytics must change
Women could fast track the alternative IT needs
Refining the language of risk
Security Zone: Cloud computing puts the spotlight on security architecture
Ten trends you cannot ignore
The new EU cookie rule – so, we need to get consent then?
Which IT suppliers will win in next 18 months?
Career structures for IT professionals: HR toys or levers for change?
Freedom of action: preventing paralysis from risk
Will a UK technology hub really rival Silicon Valley?
How to collaborate: Six lessons from BT Expedite
Beyond PCI DSS: Protecting more than just card data
Clearer visibility of product roadmaps improves IT planning
LTE: Will high speed mobile internet mean higher speed business?
Forrester: Harnessing mobile UC to transform the business
Hacking work: the businessman's Trojan
Security Zone: Mobile device management - chore or chance?
Spending Review: Prepare for the insider threat as staff are squeezed
Apps will make the smart grid worthwhile
Exploiting knowledge for project value
Time for the UK to act on cybercrime
Vote in the Computer Weekly IT Blog Awards 2010
The only way is tough – the future of data protection law
Tightening the reins – getting a grip on mobile device management
Mac vs PC: Which should I buy?
Why banks are wary of public clouds
How to avoid getting caught out by Oracle Unlimited Licence Agreements
Make mobility standard business practice
Security Zone: Faking IT support
The hidden costs of a private cloud
How the changing nature of IT sourcing will redefine CIO roles
What you need to know about the Equality Act 2010
360°IT: CIO vs CIO - the evolution of the species
IT alignment – it’s not rocket science, it just takes passion
Security Zone: An open source approach to web application security
360IT: Smart IT needs heroes
Six reasons why the NHS National Programme For IT failed
The problem with patents
Uncovering the hidden costs of fragmented data
Security think tank: Value added cloud security services
Wikileaks highlights need for better data access control
The growing security threat from mobile phone apps
Don’t just rely on technology to cut emissions, green IT is about people too
The Corporate IT Forum: Users are human and part of the risk matrix
Gartner: What matters is risk-appropriate authentication
ISF: Federated identity services may be the way forward
ISACA: more complexity delivers security, but not without cost
ISSA: Strike a balance between security and co-operation
ISC2: The more complex the technology, the greater risk users will bypass it
IT contracts: standard terms & conditions explained
Private sector IT can give cost-cutting lessons: an open letter to Francis Maude
Patent ruling re-opens door to do business in the US
Why in-sourcing ERP support makes good business sense
Byte Night: Your chance to make a difference
Security zone: Cultivating the secure mindset for systems development
Death in cyberspace: Why you should leave your passwords in your will
Confessions of an unexpected CIO
Demonstrating innovation in local government IT
Cost control is in bringing offshore contracts back in-house
Think tank: What is the ideal standpoint for security decisions?
How to fine tune your ERP system and maximise value
UK unlikely to follow German approach to wireless networks
Getting value from the CISO
Security Zone: ITIL to integrate security management processes
Rethinking contracting frameworks for effective multi-sourcing
What the budget means for the IT sector
Delivering more for less will force government to simplify processes
IT Headaches for Continental and United Airlines
How to achieve ERP success: part 3 - support and development
Think Tank: Are businesses ready to meet the requirements of e-discovery regulations?
How to stop cookies stealing your personal information
Security Zone: An incident response function is essential for business
Federated SOA – seven steps to success
Review: iPhone 4 - FaceTime, iMovie, iBooks and a gyroscope