In Depth
In Depth
IT for government and public sector
-
Trusted nodes: The next generation in quantum key distribution
QKD is a form of protection against interception by quantum computers, but cost and technical limitations have made the technology impractical. Could trusted nodes make all the difference? Continue Reading
-
Prepare now for quantum computers, QKD and post-quantum encryption
The predicted processing power of quantum computers is likely to make existing encryption algorithms obsolete. Quantum key distribution (QKD) is a possible solution - we investigate whether QKD is viable Continue Reading
-
What are the current SD-WAN options for enterprises?
Software-defined wide area networking is well on its way to being a multi-billion dollar market. We assess the current state of the market and look at some of the options for enterprise CIOs and network managers Continue Reading
-
Employers turn to wearable technology to help staff manage work-life balance
Companies are realising that there are sound business reasons for ensuring their employees get enough sleep and exercise, so they are turning to wearable technology to help their staff stay healthy, despite the pressures of work Continue Reading
-
National Archives races to create electronic archive of EU law before Brexit
The National Archives faces challenges converting the EU's enormous library of laws into a publicly accessible UK archive ahead of Brexit. The Archives’ digital director, John Sheridan, explains how Continue Reading
-
An exciting time to be in cyber security innovation
Cyber security innovation has received a £1.35m shot in the arm from the UK government with the opening of a new innovation centre in London. Computer Weekly looks at why now is a good time to be working and innovating in this industry Continue Reading
-
Assessing the hyperscale squeeze on G-Cloud's SMEs
The latest government spend data suggests public sector IT buyers are increasingly using G-Cloud to procure services from the hyperscale cloud community, prompting concerns about the impact this might have on the SME-friendly framework Continue Reading
-
Need for speed: designing a modern campus LAN
Just like datacentres before them, campus LANs are increasingly being defined by virtualisation and software-based controls. Next to this shift, the hardware also continues to improve as network owners look to keep pace with user demand Continue Reading
-
IPsoft’s digital worker is part of a shift in human productivity
IPsoft used its annual user summit to allow customers to update themselves on the career of its cognitive digital agent Amelia Continue Reading
-
Digital identity: Is the puzzle about to be solved?
Solving the digital identity problem is key to the future of the digital economy as a whole – but how close are we? Computer Weekly looks at what is happening with Gov.uk Verify, private sector involvement, and lessons the UK could learn from other ... Continue Reading
-
Brexit is coming, but is the government technologically ready?
Brexit requires huge IT and technology changes across government, but as departments seem to be struggling to get to grips with the workload, Computer Weekly looks at how preparations are going Continue Reading
-
What is digital transformation?
A guide for executives in the public and private sectors on the myths, realities and best practice of digital transformation, by digital leaders who have been there and done it Continue Reading
-
GDPR: An overview of the latest data protection legislation
The forthcoming General Data Protection Regulation (GDPR) will have wide-ranging implications for every organisation that processes personal data. This comprehensive overview tells you what you need to know Continue Reading
-
Software-defined networking: gathering momentum in the enterprise?
Suppliers are pushing the benefits of software-defined networking harder than ever, and enterprises are starting to take the plunge rather than remaining on the sidelines Continue Reading
-
Network security in the age of the internet of things
Wireless devices and smart technologies are increasingly being brought into the workplace, and pose a growing risk to company data Continue Reading
-
Assessing the disparate initiatives tackling the UK’s technology skills gap
As the UK’s skills gap widens, initiatives aim to ensure the population has the skills needed for roles now and in the future, but are these disparate efforts helping or hindering the cause? Continue Reading
-
Businesses need to take cryptojacking seriously
Organisations must pay attention to cyber criminals hijacking computing resources to mine cryptocurrencies, because nearly half are affected and the impact is greater than many realise Continue Reading
-
Universal Credit: How did it go so wrong?
The DWP’s flagship welfare reform was meant to change the lives of benefits claimants through one simple IT system, but was beset by IT problems, low staff morale and delays. Newly released documents help explain what went wrong Continue Reading
-
The EURECA moment: Counting the cost of running the UK’s public sector datacentres
The EU-backed EURECA project has spent the past 36 months assessing the state of public sector datacentres across Europe, and is revealing what it found Continue Reading
-
How secure are smart energy grids?
The improved efficiency of smart grids need to be weighed against the cost of security - presenting a unique opportunity for the tech sector and a new market for security companies Continue Reading
-
UK sale of surveillance equipment to Macedonia raises questions over export licence policy
The UK approved an export licence for the sale of surveillance equipment to Macedonia – while the country was engaged in an illegal surveillance programme against its citizens. A senior minister was consulted on the decision Continue Reading
-
Where the device hits the network – a mobile device management update
As business becomes increasingly mobile, we look at the latest trends in mobile device management to give businesses the edge Continue Reading
-
The Macedonian surveillance scandal that brought down a government
Macedonia has been accused of using surveillance technology for covert spying - the subsequent political protests were instrumental in the ruling party losing power after 10 years Continue Reading
-
Organised crime exploiting new technology
European law enforcement is to focus on collaborating with industry around cyber crime as organised crime groups increasingly exploit new technologies, according to a regional crime threat report Continue Reading
-
How to implement a low-power WAN to support the IoT
We explore the options and the implementation process for an LPWAN to support internet of things projects in the enterprise Continue Reading
-
Inside the well-planned metro network: how CityFibre does it
Computer Weekly met metro network builder CityFibre to find out why, and how, the organisation believes it can mount a credible challenge to Openreach’s dominance of wholesale fibre Continue Reading
-
Cloud contracts are still a minefield
Cloud computing is maturing in the enterprise space, but the contracts that underpin cloud services have not evolved at the same pace Continue Reading
-
Lauri Love: the student accused of hacking the US
How did a brilliant but fragile computer science student from a rural English town end up facing life imprisonment in the US? Computer Weekly speaks to Lauri Love Continue Reading
-
CW@50: A history of IT outsourcing
Computer Weekly looks at where and when IT outsourcing was invented and considers the changes the sector has gone through since Continue Reading
-
Isle of Man: From seaside getaway to tech startup hub
The Isle of Man government is stepping up efforts to position itself as the low-tax jurisdiction of choice for the startup community. But what's it like to do business there? Continue Reading
-
CW@50: Government IT goes full circle in the space of 50 years
As Computer Weekly prepares to celebrate its 50th anniversary this September, we take a look at how government IT has changed over the years Continue Reading
-
UK startups seek to lead the world in smart city technologies
Government trade mission to south-east Asia helps UK startups to target the region’s growing smart city projects Continue Reading
-
CW@50: Fertile British breeding grounds for information security innovation
Computer Weekly is marking its 50th anniversary this year with a series of articles celebrating 50 years of British technology innovation. In this article, we look at the evolution of information security threats and some of the British innovation ... Continue Reading
-
Hunters: a rare but essential breed of enterprise cyber defenders
They wait, they watch, they search the outer reaches of networks and the darkest corners of the web, setting traps, crafting tools, collecting evidence and going in pursuit: they are the hunters Continue Reading
-
CW@50: 1966 - Computer Weekly goes to bat for the British computer industry
Launched in 1966 as part of a modernising wave to change British society, Computer Weekly battled for the nation’s industry against the US, and saw IT as an entry ticket to the Common Market Continue Reading
-
Interview: James Bamford on surveillance, Snowden and technology companies
Investigative journalist and documentary maker James Bamford was among the first to uncover the secrets of the US National Security Agency and its global surveillance Continue Reading
-
Avoiding security issues when recycling hardware
What are the options for the environmentally and ethically responsible recycling of end-of-life hardware, without compromising data security? Continue Reading
-
How CIOs can raise their 'IT clock speed' as pressure to innovate grows
CIOs are facing pressure from the board to roll out IT projects increasingly quickly. How can they do that without running unacceptable risks? This article, based on cutting-edge research among leading businesses, offers some answers Continue Reading
-
Risky and untested: What went wrong with the ESN procurement?
In his first major interview since walking away from the Emergency Services Network procurement, Airwave COO John Lewis reveals why his company could take no further part in the process, and discusses the future of emergency services communications Continue Reading
-
Why Pegasystems' CEO, Alan Trefler, has learned to think smaller
Pegasystems has made its name supplying CRM, analytics and case management software to the world's largest companies. Now CEO Alan Trefler plans to use cloud computing to broaden Pega's appeal Continue Reading
-
Councils explore options for online mapping tools
Councils are drawing on Ordnance Survey, Google Maps and OpenStreet Map for online mapping. What’s the optimal mix? Continue Reading
-
Bill Binney, the ‘original’ NSA whistleblower, on Snowden, 9/11 and illegal surveillance
Always a patriot: Computer Weekly talks to Bill Binney, the senior NSA official who blew the whistle before Edward Snowden Continue Reading
-
NHS data security: Lessons to be learned
The NHS does not always provide a trusted repository for patient data, but some trusts are examples of good practice in action Continue Reading
-
Cyber crime: What every business needs to know
Computer Weekly gets the low-down on cyber crime from law enforcement officers and investigators Continue Reading
-
The business challenges and benefits of identity and access management
IT leaders gathered at a CW500 Club meeting to hear from peers about the challenges of identity and access management Continue Reading
-
How the BBC became digital in three-and-a-half years
The BBC has undergone a digital transformation that started 18 months prior to the London 2012 Olympic Games Continue Reading
-
Interview: Ed Vaizey MP talks digital economy and digital skills
Minister for the digital economy Ed Vaizey discusses his new role and the future of digital policy Continue Reading
-
Government's digital strategy could cut red tape
Governments can harness digital technology to make public services more efficient and generate significant cost savings Continue Reading
-
Target data breach: Why UK business needs to pay attention
Late last year, US retailer Target was hit by one of the biggest data breaches in the industry's history. So what happened and why is it relevant to UK businesses? Continue Reading
-
Hacktivism: good or evil?
IT lawyer Dai Davis looks at the rise of hacktivism and its impact on business and international politics Continue Reading
-
Realising the benefits of a totally connected world
The internet of things will transform everyday life, from managing airports’ passenger flow to heating buildings and caring for the elderly. Continue Reading
-
How Capgemini keeps its Merlin datacentre green and energy-efficient
Capgemini's Swindon-based Merlin datacentre is one of the most energy-efficient in the world. But what makes it green? Continue Reading
-
An introduction to cyber liability insurance cover
Cyber liability insurance cover has been around for 10 years, but most security professionals seem to have not heard of it or know that it exists Continue Reading
-
How to create a good information security policy
Information security policies provide vital support to security professionals, yet few organisations take the time to create decent policies Continue Reading
-
How to tackle big data from a security point of view
Before leaping into big data, companies must be clear what they are trying to achieve, otherwise their investment will be wasted Continue Reading
-
How to find the most vulnerable systems on your internal network
Most corporate networks share common vulnerabilities, but many could be mitigated with education in “hacker thinking” for technical staff Continue Reading
-
Social media: A security challenge and opportunity
Generation Y workers are posing increasing security challenges to their employers as they share data unreservedly Continue Reading
-
Business priorities: what to protect, monitor and test
How information security professionals can prioritise what to protect, monitor and test in the light of current budget and resource constraints Continue Reading
-
How to preserve forensic evidence in the golden hour after a breach
There is a golden hour at the outset where a clear head and good planning can make or break any subsequent forensic investigation Continue Reading
-
How to secure Macs in the enterprise
Apple computers are becoming increasingly used in the enterprise - we look at how to securely introduce Macs in the corporate network Continue Reading
-
Tune Raid performance to get the most from your HDDs
Tune Raid performance at the storage controller to match application I/O demands to optimal hard drive (HDD) performance Continue Reading
-
Setting up a botnet is easier than you think
Acquiring, installing, configuring and using a powerful data-stealing banking Trojan toolkit is not as difficult as it sounds Continue Reading
-
UKtech50: Meet the 50 most influential people in UK IT
Computer Weekly has announced the final listing for the second annual UKtech50, the definitive list of the real movers and shakers in UK IT. Continue Reading
-
Questions that need to be answered on NHS IT plan
Four years ago the government announced to a grateful NHS a national IT programme that would become the world's largest civil computer scheme. Continue Reading