In Depth
In Depth
Cloud security
-
How can healthcare organisations fight increased cyber crime in 2021?
As the Covid-19 pandemic enters what may be its most dangerous phase, we explore how healthcare organisations can ward off cyber threats while preserving their ability to deliver critical care Continue Reading
-
Security Long Reads: Cyber insiders reveal what’s to come in 2021
In this long read, we gather together the thoughts of cyber security insiders from across the industry to get their take on what will happen in 2021 Continue Reading
-
Post-pandemic approaches to IAM for cloud security
Cloud technology may have saved businesses from catastrophe during the pandemic, but it has also introduced additional challenges around identity and access management. Here’s why IAM policies are crucial in the new normal Continue Reading
-
DDoS mitigation strategies needed to maintain availability during pandemic
The growing prevalence of DDoS attacks combined with the increased reliance on internet connectivity during the pandemic means enterprises can no longer afford to ignore the threat of DDoS attacks. Computer Weekly explores organisations’ perceptions... Continue Reading
-
Tackling multicloud deployments with intelligent cloud management
Organisations are moving to hybrid and multicloud deployments, which complicates software assets tracking and workload management Continue Reading
-
Getting physical with datacentre security
Whether it is natural disasters, terrorism or break-ins, datacentres will be vulnerable to a range of risks unless they are physically secured. Here’s how you can improve the physical security of your datacentre Continue Reading
-
How to apply zero-trust models to container security
Containers have become a common fixture in software development, but they have resulted in new concerns for security teams. Is zero-trust the answer to tackling them? Continue Reading
-
What are the security priorities for the post-coronavirus world?
The Covid-19 pandemic is forcing massive change across the business world and things may never go back to normal. What does security look like in this new world, and what will buyers be prioritising? Continue Reading
-
A carrot-and-stick approach to fixing cyber security complacency
With a majority of IT decision-makers holding the opinion that their employers are complacent when it comes to data protection, we look at what needs to be fixed, and how to fix it Continue Reading
-
Multicloud storage 101: Pros, cons, pitfalls and strategies
Not putting all your eggs in one basket can be helpful to an enterprise’s resilience strategy. We look at multicloud storage and the benefits and pitfalls it brings Continue Reading
-
Why security validation matters
FireEye’s top executives in Asia-Pacific discuss the benefits of security validation and offer their take on the region’s cyber threat landscape Continue Reading
-
The AWS bucket list: Keep your cloud secure
Misconfigured cloud installations risk billions of records being exposed, damaging organisations’ finances and reputations. Paying attention to securing AWS storage buckets is a simple matter Continue Reading
-
Inside the SOC: the nerve centre of security operations
Security operations centres are the bedrock of any cyber defence strategy, but operating one is increasingly challenging, with mounting workloads and a shortage of skilled personnel Continue Reading
-
Choosing the right disaster recovery for your business
We look at the various options available when implementing disaster recovery, and how much they’re worth Continue Reading
-
Human factors are critical to securing digital transformation
Sourcing the latest cyber security technology to support digital transformation projects is all well and good, but it’s meaningless if you fail to address your organisational culture and the people within it Continue Reading
-
Taking responsibility for security in the cloud
From accidental leaks to full-on data breaches, maintaining security across cloud services is becoming a headache for enterprises. What questions should organisations be asking of their cloud service provider and, ultimately, whose responsibility is... Continue Reading
-
McAfee’s push for secure cloud adoption
Organisations must do more to secure their cloud environments as malicious actors increasingly focus their attention on exploiting cloud vulnerabilities, says McAfee Continue Reading
-
Facebook’s privacy game – how Zuckerberg backtracked on promises to protect personal data
Facebook promised its users privacy then quietly abandoned its promises in pursuit of profits. Now it faces antitrust regulation Continue Reading
-
Cloud snapshots and backups: How to protect data in the cloud
You often need more data protection than native cloud services will give. But should you choose backup or snapshots? And what about third-party backup in the cloud? Continue Reading
-
A guide to choosing cloud-based security services
Cloud-based security services can help organisations with a growing cloud footprint to reduce cost and address the manpower crunch in cyber security Continue Reading
-
A cloud compliance checklist for the GDPR age
The cloud is supposed to make things simpler, but when it comes to compliance, things can get complex. Here is a look at the essential elements of a cloud compliance strategy Continue Reading
-
Securing the SD-WAN: The next network challenge
Every time an enterprise weighs up whether or not to try SD-WAN, security is an essential part of the picture Continue Reading
-
Inside DevOps, containers and enterprise security
Global corporates are waking up to containers and orchestrated containerisation for software development that is fast and safe. Computer Weekly looks at the best approach to ensure security is not compromised along the way Continue Reading
-
GDPR compliance: Addressing the overlooked in enterprise IT infrastructures
As the GDPR compliance deadline approaches, enterprises need to ensure they have looked beyond the headline-grabbing aspects of the regulation so they do not fall foul of the incoming data protection regulations Continue Reading
-
Network security in the digital transformation era
Network security has always been a core focus for CISOs and IT security managers, but in an era of digital transformation, we examine if network security strategies are keeping up with new and emerging cyber threats Continue Reading
-
AWS cloud security: Amazon CISO shares secrets to building secure cloud products
Ahead of Re:Invent 2017, AWS CISO Stephen Schmidt discusses how the cloud giant addresses user demand for new products and services, without compromising on cloud security Continue Reading
-
Microsoft SPE helps joined-up thinking
We assess how Microsoft’s secure productive enterprise licence can help enterprises coordinate their digital transformation Continue Reading
-
Why immutable buckets are a worthy risk management tool
Immutable buckets offer businesses benefits in terms of data compliance, backup, archiving and security Continue Reading
-
Tips on how to get a Hana implementation off the ground
The confusion around SAP’s in-memory database is holding many customers back. We look at some of the approaches being taken to simplify implementation Continue Reading
-
Cloud, AI and security driving network monitoring industry
We explore the latest developments and trends in enterprise network monitoring and management Continue Reading
-
Blockchain and the promise of cooperative cloud storage
Blockchain technology allows distributed retention of encrypted data and is at the heart of cooperative cloud storage Continue Reading
-
The true cost of a cyber security breach in Australia
The costs of cyber security breaches can quickly add up with fines, reputational damage and overhauls to network security all hitting the coffers. The case of one Australian firm shows why paying a ransom to a hacker might be tempting. Continue Reading
-
Mobile strategies increase need for data loss prevention technology in Europe
Data loss prevention technology that covers all popular mobile platforms and is easy to use and implement is called for as mobile strategies evolve Continue Reading
-
Mobile security -- what works and what doesn't?
Experts told the CW500 Security Club how mobility brings new challenges to security departments and an opportunity to go beyond building walls around the enterprise Continue Reading
-
Cloud computing in schools: privacy under threat
While IaaS and SaaS services are spreading in schools, the potential risks to the protection of students’ personal data are also growing Continue Reading
-
Asean organizations braced for cyber attack
As an emerging economic power bloc, Asean is bracing itself for an influx of cyber crimes as hackers look for lucrative targets Continue Reading
-
Australian businesses under cyber attack
What are the cyber security risks facing businesses in Australia and New Zealand and how are organisations addressing them? Continue Reading
-
SaaS criteria to track for business outcomes
Organisations should evolve their SaaS selection criteria to focus on newer metrics that are better indicators of supplier performance Continue Reading
-
UK datacentre growth trends: Why are users shunning inner-city facilities?
Research suggests inner cities are falling out of favour with datacentre developers, with cost-sensitive users willing to look further afield for co-location services Continue Reading
-
Security compliance is still a corporate headache
Ensuring compliance with security and data protection regulations is an eternal burden for IT departments - but it can be made easier Continue Reading
-
Bill Binney, the ‘original’ NSA whistleblower, on Snowden, 9/11 and illegal surveillance
Always a patriot: Computer Weekly talks to Bill Binney, the senior NSA official who blew the whistle before Edward Snowden Continue Reading
-
Preparing for mainstream cloud IT
2015 is set to become the breakthrough year for cloud computing – and now the challenge of making the IT department cloud-ready begins Continue Reading
-
How to secure the SDN infrastructure
As more enterprises look to deploy software-defined networking, the need for security from the ground up should not be underestimated Continue Reading
-
How to achieve optimum performance in a hybrid cloud
As hybrid cloud systems become increasingly popular, we look at how to implement them and the advantages they can offer Continue Reading
-
SAP bets future on cloud in central and eastern Europe
SAP’s turn to cloud services for the delivery of its business applications seems especially energetic in central and eastern Europe Continue Reading
-
Companies must act quickly to tackle cyber crime
With cyber attacks becoming more sophisticated and widespread, companies must take stronger measures to prevent and tackle them Continue Reading
-
Companies must act quickly to combat cyber crime
With cyber attacks becoming more sophisticated and widespread, companies must take stronger measures to prevent and tackle them Continue Reading
-
Companies driving growth of cloud
Companies and organisations are increasingly adopting cloud services for more secure and efficient device management Continue Reading
-
Big storage hybrid cloud moves show limits of cloud storage
Cloud storage has its limits, but also its opportunities, shown by the hybrid cloud storage offerings recently announced by EMC and NetApp Continue Reading
-
Tips for choosing a global cloud infrastructure provider
A guide for enterprises considering IaaS services. Continue Reading
-
Poland’s financial services sector weighs cloud’s risks and rewards
Banks and financial services enterprises in Poland are split between strict regulations and security concerns, and cloud’s benefits Continue Reading
-
What ingredients go into the successful app store?
An enterprise app store should provide the controlled availability of apps for employees.We look at what is available for organisations to use Continue Reading
-
A guide to smart home automation
Unless it is a new build, the challenge in creating a smart home is that technology must work irrespective of the age of the property Continue Reading
-
CW 500 Security Club: Securing the end point: a key challenge for business
With multitudes of devices connecting businesses and their customers to interlinking systems, securing the end point has never been more vital Continue Reading
-
Supplier profile: Workday
Computer Weekly analyses the strengths and weaknesses of the rapidly growing cloud HR and finance software company, Workday Continue Reading
-
Can telcos tap into the datacentre business?
Telcos have always run datacentres, but now many are hoping to give commercial providers a run for their money Continue Reading
-
BAFTA nominates cloud to boost web performance
Arts organisation moves to Rackspace to handle awards-season peaks and help meet the ever-growing demand for rich media content Continue Reading
-
Blackrock: measuring risk in a datacentre
How the investment giant handles the risk of managing $13 trillion of other people’s money Continue Reading
-
Hacktivism: good or evil?
IT lawyer Dai Davis looks at the rise of hacktivism and its impact on business and international politics Continue Reading
-
Is privacy undermining trade in digital services?
BSA report highlights dangers facing European Union (EU) nations as the European Commission (EC) revises its Data Protection Regulation Continue Reading
-
How to select the best hybrid cloud provider for your firm
A successful shift towards a hybrid cloud corporate environment requires a new approach to trust throughout the organisation. Continue Reading
-
Human factors in the datacentre
Whether to ensure business continuity or maximise returns, everyone from the finance director to the facilities manager needs further datacentre education Continue Reading
-
The UK’s problem with power
Datacentre power buyers say Britain’s deregulated energy market is as complex as trading in derivatives Continue Reading
-
Get ready for the datacentre storm
With a wave of innovations rolling ever faster towards the datacentre, analysts say 2014 is the year organisations must plot their course through choppy waters Continue Reading
-
Optimising performance and security of web-based software
On-demand applications are often talked about in terms of how suppliers should be adapting the way their software is provisioned to customers. Continue Reading
-
Collaboration is key in enterprise security puzzle
Collaboration is key to security, cyber security professionals told attendees of Trend Micro’s customer event in London Continue Reading
-
Cyber insurance: Understanding the legal language
CROs worried about cyber risk are increasingly turning to cyber insurance to offset risk. But is the cover as black and white as it first seems? Continue Reading
-
Big data journalism exposes offshore tax dodgers
How journalists harnessed big data to challenge offshore financial secrecy Continue Reading
-
IT security leaders debate their cyber threat challenges
Information security leaders met at a roundtable hosted by Computer Weekly, in association with Trend Micro, to discuss cyber threats they face Continue Reading
-
How to find out who is doing what to your data systems
Context-aware security cannot replace point technologies, but it can tell you when an attack is imminent and what form it will take. Continue Reading
-
CW500: Thinking outside the big storage box
Big data doesn’t necessarily mean big storage infrastructure Continue Reading
-
How to tackle big data from a security point of view
Before leaping into big data, companies must be clear what they are trying to achieve, otherwise their investment will be wasted Continue Reading
-
How to manage the security of cloud implementations
Tips for organisations adopting cloud computing on how to ensure that they secure data in line with the expectations of all stakeholders Continue Reading
-
Top 10 supplier profiles 2012
Download in-depth reports on leading IT suppliers from Computer Weekly Continue Reading
-
CW500: Inside the government's CloudStore
The government's cloud store means an end to the big four to five-year IT projects of the past, says the CloudStore lead of the G-Cloud programme Continue Reading
-
CW500: The legal risks of migrating to the cloud
Experts from the public and private sectors discuss the legal challenges of moving to the cloud Continue Reading
-
How to make your business Flame-proof
Advanced threats such as Flame can show CIOs what cyber attack tools of the future could look like Continue Reading
-
Royal Holloway 2012: Risks of multi-tenancy cloud computing
In his Royal Holloway 2012 thesis, Jacobo Ros examines the risks of multi-tenancy cloud computing. Continue Reading
-
Royal Holloway 2012: An analysis of cloud security certifications
In his Royal Holloway 2012 thesis, Robert Farrugia analyses cloud security certifications and suggests ways organisations can reduce cloud risks. Continue Reading
-
Royal Holloway 2012: PCI compliance, cloud computing are a costly pair
It is possible to achieve PCI DSS compliance in a cloud environment, but it may not be cost-effective, as explained in this Royal Holloway article. Continue Reading
-
Cloud computing: UK companies adopt eagerly, but often insecurely
While UK companies seem eager to move to the cloud with little thought for security, industry bodies are trying to raise awareness of the risks. Continue Reading