How complex event processing could help stop hooliganism at the World Cup
Private data: balancing customer privacy against the need for useful data
Apply commercial nous to government IT, say IT leaders
Opinion: What Facebook should do next
The impact of technological change on risk management
Security Zone: Setting security boundaries for de-mergers
Government spending cuts: can outsourcing save public sector IT jobs?
Microsoft Q&A: What the new government could mean for IT staff
Is the future of enterprise Wi-Fi on the edge?
Are businesses ready for the MySpace generation?
BI: How to make intelligent use of data
Whitehall focus on long-term IT cuts deflects focus from short-term savings
New breed of project managers drive the recovery
Software patents – what the European Patent Office ruling means
Lowering IT costs through hosting
Opinion: Is IT a utility function?
Election to bring more flux for banking
A tale of two universes - how the Milky Way provides more milk for some than others
Security zone: Application security spans IT and information security
What’s in a name? Apple fights for rights to iPad name
Collaboration is key to ensuring digital data security
Ensuring online traffic doesn’t hit a dead end
Living with Windows 7, six months on
Where are the opportunities in information security?
Gartner: Investigations must be done carefully and correctly
ISACA: Rigorous approach is required
(ISC)2: Crime scene must be protected
BCS: First step is to recognise the threat
ISACA Security Advisory Group: Organisations must be forensic ready
ISSA UK: Organisations must be prepared
Corporate IT Forum: Downturn has changed employee attitudes
Innovation will suffer without investment
New government must decide quickly how to pay for high-speed broadband
Security Zone: Consider human ability in your IT security policy
Socitm’s seven-point plan for IT in tomorrow’s public services
Election 2010: Forum of Private Business says politicians must tackle ‘digital divide’
Election 2010: Innovative IT companies need help, says the UK Innovation Initiative
Election 2010: Eurim calls for rebuilding confidence in ICT's competence to deliver
Effective way for organisations to tackle ‘porn in the office’
Election 2010: Communications the life-blood of enterprise, says Communications Management Assn.
Gordon Brown: Labour would create more IT jobs and help Britain become a leading digital economy
Opinion: Google Italy convictions a concern
Opinion: An asset with little value can be a big problem
Nick Clegg: LibDems would scrap ID cards, biometric passports and child database
Opinion: How public sector could save £4bn on IT without cutting jobs
Regulators turn up the heat on online scammers
Automated abattoirs for sacred cows – what IMIS wants from the new government
Election 2010: Rural broadband needs urgent attention after 50p tax is axed
Opinion: 50p tax goes – what's next for UK's lagging broadband?
Opinion: BCS CEO's arguments miss the bigger picture
Opinion: Tif sets out IT wish list for new government
Opinion: How government CIOs can buy more from SMEs
BCS CEO David Clarke: Why call for EGM is misguided
Opinion: The impact of Google's trademark victory
Legislation to block websites – a move too far?
A security expert’s checklist for deploying software as a service
Security Zone: Ensuring security in offshoring
Google vs Louis Vuitton: When is a trade mark not a trade mark?
Opinion: Ensuring a happy marriage between IT and the environment
Opinion: Why IT professionals' world view is wrong
Opinion: IT industry prepares manifesto to make Britain great again
Making the mobile internet accessible for all
How SMEs can use social networking to get their message across
How can organisations guard against phishing scams?
Moving beyond the cost benefits of outsourcing
Security Zone: Enterprise architecture is too often a missed opportunity for security
Opinion: Is BCS priority the business or its members?
Finding space and time for continuous data protection
CIO Interview: Esat Sezer of Coca-Cola Enterprises
Balancing efficiency with resilience
Security Zone: a recipe for project success
The Google Nexus One/HTC Desire versus the IT department
Take control with software asset management
Try before you BI: budgeting and reducing costs on business intelligence
Why bank data flow to US came to a SWIFT halt
Opinion: Virgins to the banking sector
Think Tank: What should corporate IT managers do to ensure data protection?
Q&A with Microsoft's head of environmental sustainability
Outsourcing: a level playing field?
Should suppliers and customers change their ways after BSkyB vs EDS?
Security Zone: Oracle follows Sun in search of hardware
Portable data security - ebb and flow
How will the Carbon Reduction Committment affect IT outsourcing?
Information overload: lessons from the Christmas Day terror attack
Social media needs a social security strategy
E-mail management: keeping the business bloodlines flowing
Security Zone: How to complete a security questionnaire
Preparing your IT security for the mobile information boom
How to achieve ERP success: part 2 - the software
Do we need a single cyber-security organisation to secure the internet?
Data encryption is simple safeguard against data breaches
Opinion: IT systems management on a small business budget
Security Zone: why we should be more concerned about password authentication
Extract - Grown-Up Digital: Net Geners in collaboration
Telcos must transform their businesses to stop slide in profits
What is the best thing Santa could bring the IT security manager?
VDU eyecare – clearing the confusion
The beginning of the end for online tracking?
Save blushes and blame with firewall policy analysis
A sorry tale of a CEO and his laptop