December 2018
-
December 06, 2018
06
Dec'18
Computer Weekly Buyer's Guide features list 2019
Here is our 2019 schedule of up-and-coming in-depth articles that will cover carefully selected topics to help IT leaders select the right technology for their organisation Continue Reading
-
December 06, 2018
06
Dec'18
Asean firms dive into microservices for competitive edge
While microservices has become a buzzword linked with digital transformation, it is no magic bullet for development woes Continue Reading
-
December 05, 2018
05
Dec'18
UK can do more to explore potential of quantum tech
The government has been urged to address use cases, security and skills, and proposed a series of new innovation centres, to enable the UK to fully capture the opportunity presented by quantum technology Continue Reading
-
December 05, 2018
05
Dec'18
Drawing the line for cyber warfare
With alleged Russian meddling in elections and the state-backed attack on Iran’s nuclear programme, it is becoming difficult to define the boundaries of cyber warfare Continue Reading
-
December 05, 2018
05
Dec'18
Brexit implications for data protection
Leaving the European Union will have serious implications for data protection in the UK unless adequate steps are taken, so businesses are advised to have contingency plans in place Continue Reading
-
December 05, 2018
05
Dec'18
How APAC is riding the cloud wave
With the move to the cloud underway across most parts of the Asia-Pacific region, enterprises are no longer questioning the value of cloud computing. Instead, many are taking their cloud conversations with suppliers to the next level - how to get ... Continue Reading
-
December 05, 2018
05
Dec'18
BT moves to strip Huawei kit from EE’s network
Telco will remove Huawei’s networking equipment from the core of EE’s 4G mobile network Continue Reading
-
December 05, 2018
05
Dec'18
Security Think Tank: Situational awareness underpins effective security
As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure they detect such methods and that all C&C systems are removed, including ‘sleepers’ designed to be activated... Continue Reading
-
December 05, 2018
05
Dec'18
Mission: Interpolation
Tom Cruise has posted a video alongside Mission: Impossible – Fallout director Christopher McQuarrie, encouraging fans to adjust their television settings to improve their viewing experience of the ... Continue Reading
-
December 05, 2018
05
Dec'18
Symantec unveils AI-based protection for critical infrastructure
Cyber security firm has unveiled what it claims to be the industry’s first neural network to protect critical infrastructure from USB-borne malware attacks Continue Reading
-
December 05, 2018
05
Dec'18
Australia races towards commercial quantum computing
Universities make headway in the challenge of commercialising quantum computing Continue Reading
-
December 05, 2018
05
Dec'18
Raising security awareness through phishing simulation – how to get it right
Testing employees’ security practices by sending fake phishing emails has become commonplace, but few organisations are conducting such exercises effectively Continue Reading
-
December 05, 2018
05
Dec'18
Nike and Zara drive fashion retail’s self-service future
New store openings from Nike and Zara show it is not just in grocery stores where self-service technology is impacting retail. Continue Reading
-
December 05, 2018
05
Dec'18
Atlassian Optimizely aim to clean up developer data quality
Atlassian is of course best known (a few would argue loved) for its issue tracking software Jira. Optimizely on the other hand, is known for guess what? The clue was (obviously) in the name -- the ... Continue Reading
-
December 05, 2018
05
Dec'18
Nominet brings security expertise and tech to market
The .uk domain registry is to bring its DNS expertise and technology developed for the NCSC to market to address cyber security ‘blindspot’ Continue Reading
-
December 05, 2018
05
Dec'18
IT monitoring tops uses for machine data analytics
Advanced analytics is being deployed to make sense of the masses of machine data in IT operation, but complex environments is making this harder Continue Reading
-
December 05, 2018
05
Dec'18
Phishing at centre of cyber attack on Ukraine infrastructure
Phishing is one of the key tools used by cyber attackers against critical national infrastructure (CNI), as highlighted by attacks on telecommunications in Ukraine Continue Reading
-
December 05, 2018
05
Dec'18
UK consumers threaten data breach backlash
Most UK and global consumers are willing to walk away from businesses that fail to look after personal data, with retailers most at risk, research shows Continue Reading
-
December 04, 2018
04
Dec'18
Automation key to unravelling mysteries of the universe at CERN
How CERN is using enterprise asset management from Infor and ramping up the automation of its IT services to plumb the depths of the universe Continue Reading
-
December 04, 2018
04
Dec'18
The ruggedised reporter, part #1: Conker toughened tablets
The TSA once dropped my laptop and it made me nervous about the fact that a machine on the road is a delicate thing. To be clear, the fine people at the US Transportation Security ... Continue Reading