Latest News
-
Third of organisations to outsource more IT amid talent shortage
Cutting costs is not the main reason for outsourcing IT in the UK, according to a major study
-
Microsoft drops emergency patch after Patch Tuesday screw up
Microsoft fixed a certificate mapping issue that caused server authentication failures on domain controllers for users that had installed the most recent Patch Tuesday updates
-
Former Welsh steelworks becomes ‘living’ cyber lab
ResilientWorks security centre in Ebbw Vale provides an education hub for students and a testbed for industry
-
Chinese cyber spooks exploit western sanctions on Russia
The actor behind an ongoing Chinese espionage campaign targeting Russian defence research bodies is taking advantage of the Ukraine war in their phishing lures
-
Government will legislate to protect access to cash
The government is giving the Financial Conduct Authority more powers to force banks to ensure cash withdrawal and deposit services are within easy reach of customers
-
Liverpool Football Club signs Extreme Networks to kick up Wi-Fi
England’s most successful football team installs high-capacity Wi-Fi and network analytics to drive ‘exceptional’ experiences for fans and more fluid operations for the club
In Depth
-
Evolution of unified comms services
Post-pandemic ways of working are forcing organisations to rethink their comms – we look at the growth in cloud-based services to support hybrid working
-
The limits and risks of backup as ransomware protection
Backups can provide a sound means of recovery from ransomware infection, but they are not 100% certain to foil attackers. We look at the limits and risks of depending on backups
-
CPaaS – a technology for the future
There is a received wisdom that as businesses flock towards the cloud, they are looking for a single platform on which to manage all their communication needs, leading to boom times ahead for communications platform as a service
-
E-Handbook | May 2022
Headline: Royal Holloway: Attack mapping for the internet of things
Download -
E-Handbook | May 2022
Data backup failure: Top 5 causes and tips for prevention Infographic
Download -
E-Handbook | May 2022
A Computer Weekly buyer’s guide to edge datacentres
Download -
E-Zine | May 2022
Digitally transforming UK power networks for renewable energy
Download -
E-Handbook | May 2022
India 2022 Salary Survey Results
Download
Blogs
-
Addressing the dirty sustainability secrets of the tech industry- Green Tech
In this guest post, Priyanka Roy, enterprise evangelist at IT operations and service management software maker ManageEngine talks about the steps enterprises and their employees can take to help ... Continue Reading
-
Hardware longevity should be encouraged- Cliff Saran's Enterprise blog
Any efforts to improve energy efficiency and cut waste should be applauded. But for every good outcomes, the IT industry seems to take several steps backwards, in its ability to promote energy ... Continue Reading
-
Accessibility is excluding the neurodivergent- WITsend
GUEST BLOG: In this contributed blog post, Craig Abbott, head of accessibility for DWP, explains the pros and cons of the current guidelines around web accessibility, and shares what companies need ... Continue Reading
-
How businesses can hold on to their coveted IT professionals- ITWorks
GUEST BLOG: In this contributed blog post, Jim Bowers, security architect at TBI, discusses how tech firms can hold on to skilled IT talent in the wake of the Great Resignation. The tech shortage ... Continue Reading
Opinion
-
Yes, zero trust can help you understand attack pathways
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these ...
-
Security Think Tank: To follow a path, you need a good map
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these ...
-
Security Think Tank: Your path to understanding attack paths
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these ...
Videos
-
The rise and rise of blockchain technology
-
How Twilio is empowering women in tech
-
Lifelong learning critical for tech’s future – Jacqueline de Rojas
-
Inclusion, tech and the pandemic – Bev White
-
Tech talent is critical - Amali de Alwis
-
Diversity and inclusion in tech: has gender been left behind?