In Depth
In Depth
IT operations management and IT support
-
The cyber security impact of Operation Russia by Anonymous
The campaign against the Russian government by Anonymous surprised many with the depth and scale of the cyber attacks. What can we learn from this online war? Continue Reading
-
What the world can learn from Saudi Arabia’s fight against industrial control system attacks
Iran learned from attacks on its infrastructure and unleashed similar malware on Saudi Arabia. The world has now gained valuable lessons from the Saudi response Continue Reading
-
IT departments need holistic circular economies to fight climate change
With sustainability moving up the boardroom agenda, IT managers should revamp procurement strategies to align with the principles of the circular economy, but what does this mean for managing the IT lifecycle? Continue Reading
-
Macs in the enterprise – what you need to know
A guide to managing Apple Mac hardware and operating systems in the enterprise Continue Reading
-
How to retain cyber talent in the Great Resignation
The cyber security industry is experiencing alarming rates of resignations, leaving organisations vulnerable to cyber attacks. How can we better retain cyber talent? Continue Reading
-
Refugee support group works with tech startup on reporting system
Computer Weekly speaks to a refugee support group about its ongoing collaboration with an academic tech startup to develop a digital human rights reporting system for refugees Continue Reading
-
The role of infrastructure as code in edge datacentre computing
As datacentre computing is pushed to the edge of the organisation’s network, IT has to address the overheads associated with remote server management Continue Reading
-
Recruitment risks: Avoiding the dangers of fraudulent candidates
Tech companies are seeing an increase in fraudulent job applications, with associated impacts on risk and cyber security. So how can organisations protect themselves from fraudulent applicants while ensuring they recruit the best talent? Continue Reading
-
How can I avoid an exodus of cyber talent linked to stress and burnout?
Cyber security professionals have played a crucial role during the pandemic, yet many feel like their employers aren’t providing adequate mental health support and have considered quitting their jobs as a result. What can employers do to help them? Continue Reading
-
Ratcheting down the tension in the hybrid world
Employers who reject the trend towards adopting more flexible, hybrid ways of working may struggle with staff retention - and CIOs have more to win or lose than most in a hybrid world Continue Reading
-
Why post-pandemic reskilling must focus on mainframes
A major contributing factor to UK-wide skills shortages is the significant number of people who have left the workforce since the start of the Covid-19 pandemic Continue Reading
-
How to beat the heat: What can datacentre operators do to meet emissions targets?
With new mandates around sustainability proliferating, datacentres must find ways to meet their environmental goals while remaining competitive and meeting customer service-level expectations Continue Reading
-
How Dutch hackers are working to make the internet safe
We hear how the personal mission of a Dutch hacker grew into a serious organisation with international ambitions Continue Reading
-
What neurodivergent people really think of working in cyber security
Many firms are filling cyber security skills gaps by hiring neurodivergent talent – but more support is needed for neurodivergent cyber security professionals, writes autistic tech journalist Nicholas Fearn Continue Reading
-
Dispelling the top five myths of modern infrastructure
Modern infrastructure is agile, flexible and scalable. It is at the forefront of every CIO’s digital strategy – and it's everywhere. But with the multitude of choices comes complexity Continue Reading
-
Is the IT sector beset by fear-mongering?
The arms race between hackers and security teams has led to a plethora of new technologies, but it can be hard to differentiate between sensible cyber purchases and those that are promoted by exaggerating risk Continue Reading
-
Social value not yet fully embedded in procurement practices
Social value procurement rules are designed to diversify the public sector’s supplier base while providing society with wider collective benefits, but are yet to be fully introduced Continue Reading
-
What Norwegians are learning as they pioneer autonomous ships
Norway is leading the world in developing autonomous ship technology – and the world should pay attention to its latest developments Continue Reading
-
Digital surveillance of remote workers may increase enterprise risk
From productivity tools to security threats, we explore how digital surveillance is forcing remote workers towards shadow IT Continue Reading
-
How to manage endpoint security in a hybrid work environment
The future of the workplace is clearly hybrid, but this has untold implications around endpoint security. How can businesses overcome these? Continue Reading
-
Could Iceland be the best place in the world for high-performance computing?
Most of Iceland’s cheap, sustainable energy is currently used by aluminium smelters, but recognising the need to diversify, the Landsvirkjun power company now promotes other uses Continue Reading
-
Considerations when deciding on a new SIEM or SOAR tool
A successful deployment of any security tool very much depends on the maturity of security processes in the organisation Continue Reading
-
When is SIEM the right choice over SOAR?
Better instrumentation leads to better IT security but monitoring can quickly overload IT teams. Automation can help, but it may not always be needed Continue Reading
-
Five ways to ensure remote working security and compliance
A mix of on-site and remote working has become a fact of life for many organisations. We look at five key things you should consider to ensure compliance and security Continue Reading
-
Why data and the pandemic are ripping up paper processes
We explore how the Covid-19 pandemic has forced businesses to rip out traditional paper processes and replace them with end-to-end digitisation Continue Reading
-
Europe’s proposed AI regulation falls short on protecting rights
The European Commission’s proposal for artificial intelligence regulation focuses on creating a risk-based, market-led approach replete with self-assessments, transparency procedures and technical standards, but critics warn it falls short of being ... Continue Reading
-
Buying a VPN? Here’s what you need to know
VPNs are an effective cyber security tool for businesses and remote workers, but there are many things to consider before purchasing and implementing one. We explore some of these Continue Reading
-
What digital transformation means for data storage
We survey the key planks of digital transformation and look at the storage technologies emerging to support it, such as NVMe and QLC flash, hyper-converged infrastructure and cloud storage Continue Reading
-
The right tech choices for hybrid workers
Various studies give a mixed reaction to businesses returning to office work, but what is apparent is that support for remote working will continue Continue Reading
-
How do I get my users to pay attention to security training?
As cyber security risks grow daily, businesses must educate staff about these through cyber awareness training. But how can they ensure this is taken seriously by employees? Continue Reading
-
Navigating the sticky issue of monitoring employee productivity
With employees having shifted en masse to remote working during the pandemic, we explore how enterprises have maintained the productivity of their dispersed workforce Continue Reading
-
Why some jobseekers have turned to cyber crime during the pandemic
Research shows that many people have been seeking cyber crime-related work on the dark web, but why? Continue Reading
-
Preparing for enterprise-class containerisation
As more workloads are deployed in containers, IT teams will need to assess how to manage container sprawl, reduce cloud bills and support databases Continue Reading
-
The 3-2-1 backup rule: Has cloud made it obsolete?
The 3-2-1 backup rule was made for small-scale use in the pre-cloud era when tape still ruled. Is it relevant in the 2020s, or can we repurpose its fundamental principles? Continue Reading
-
How to choose the right email security service for your organisation
With email security threats growing rapidly, businesses can quickly identify and block these by using a top email security service. Here’s how to select the right provider Continue Reading
-
Does email security need a human solution or a tech solution?
People spend a lot of time using email systems, but many do not realise that this makes them attractive targets for cyber criminals. With education and technology, businesses can tackle this problem head-on Continue Reading
-
Dealing with the challenge of beg bounties
The rise of so-called beg bounties is becoming a challenge for security teams, and can be a drain on time and resources. But what is a beg bounty, and how does it differ from a bug bounty? Continue Reading
-
Five ways that disaster recovery changes in a pandemic
Covid-19 has changed IT. Previously, working remotely was a business continuity measure, but now it is the norm. That means disaster recovery has to adapt to new risks and new ways to respond Continue Reading
-
Is it time to ban ransomware insurance payments?
The former head of the NCSC recently called for a dialogue over whether or not it is time to ban insurers from covering ransomware payments. Is he on the right track? Continue Reading
-
Five key questions about Kubernetes backup answered
We look at when to back up containers, what to protect, the main methods of backup for Kubernetes and the main Kubernetes backup products available in the market Continue Reading
-
APAC career guide: How to become a DevOps engineer
A DevOps career can be highly rewarding, as long as you are open to learning new things and collaborating with team mates to solve problems in software development Continue Reading
-
How can healthcare organisations fight increased cyber crime in 2021?
As the Covid-19 pandemic enters what may be its most dangerous phase, we explore how healthcare organisations can ward off cyber threats while preserving their ability to deliver critical care Continue Reading
-
Data Dynamics aims at single view of unstructured data
Data volume is ballooning, and storage is becoming more disparate, which makes the need for a single platform to manage storage and compliance a key requirement for organisations Continue Reading
-
The nation state threat to business
The SolarWinds hack shows the widespread damage possible from a nation state cyber attack. What is the threat to business and how can it be mitigated? Continue Reading
-
Security Long Reads: Cyber insiders reveal what’s to come in 2021
In this long read, we gather together the thoughts of cyber security insiders from across the industry to get their take on what will happen in 2021 Continue Reading
-
Patching: Balancing technical requirements with business considerations
With an increasing reliance on subscription models alongside the regular patching of software, updates have become an essential part of modern business practices. However, care needs to be taken to ensure the optimum patching process is implemented Continue Reading
-
Post-pandemic approaches to IAM for cloud security
Cloud technology may have saved businesses from catastrophe during the pandemic, but it has also introduced additional challenges around identity and access management. Here’s why IAM policies are crucial in the new normal Continue Reading
-
This Christmas, Covid-19 heightens retail security risks for everyone
Do you think it’s only retailers and consumers who need to consider cyber security when shopping online during the holidays? You’re dead wrong. This year, the Covid-19 pandemic and the shift to remote working has thrown a spanner in the works Continue Reading
-
Fix bottlenecks before tackling business process automation
Business processes evolve over time, and intelligent automation requires a thorough assessment of what is not working optimally Continue Reading
-
Need to know: Five key things about backup testing
We look at five key things to consider when it comes to backup testing – what to test, how often, making sure backups work, whether recovery is effective and ensuring processes are consistent Continue Reading
-
How to build an effective vulnerability management programme
As cyber criminals increasingly look to exploit vulnerabilities in software and hardware, businesses must build and implement an effective vulnerability management programme to counter this growing threat Continue Reading
-
How AI is helping to drive business process optimisation
Automating an inefficient process simply leads to a faster inefficient process. Artificial intelligence needs to be deployed to ensure business processes are optimal Continue Reading
-
Credential stuffing: When DDoS isn’t DDoS
Ten years ago, credential stuffing attacks posed a comparatively minor threat, but with an escalating number of data breaches, the threat posed has now increased. What are the solutions to this very human problem? Continue Reading
-
Tackling multicloud deployments with intelligent cloud management
Organisations are moving to hybrid and multicloud deployments, which complicates software assets tracking and workload management Continue Reading
-
Forrester: Why tagging should be used to manage hybrid assets
With complex hybrid environments, there is a need to apply IT asset management best practices across cloud and on-premise systems Continue Reading
-
Why securing the DNS layer is crucial to fight cyber crime
Domain name system security is often overlooked by organisations, but focusing on this layer could actually improve the effectiveness of cyber security strategies. We explore the latest DNS trends and best practice Continue Reading
-
Baking adaptability into the supply chain
The coronavirus crisis has highlighted the importance of data and automation in supporting an agile supply chain. Continue Reading
-
Digital safeguarding of physical workspaces can help employees return to 'normal'
Employees across all sectors are putting their trust in data – not just devices – upon their imminent return to physical workspaces Continue Reading
-
Double extortion ransomware attacks and how to stop them
As ransomware attacks increase, hackers are diversifying their tactics to get victims to hand over larger sums of money. We investigate the rise of double extortion attacks Continue Reading
-
Getting physical with datacentre security
Whether it is natural disasters, terrorism or break-ins, datacentres will be vulnerable to a range of risks unless they are physically secured. Here’s how you can improve the physical security of your datacentre Continue Reading
-
How to achieve resilience – the modern uptime trinity
IT leaders can take responsibility for ensuring their organisations are resilient during times of crisis. There are no quick fixes, but if you think it is expensive to ensure resilience in your IT systems, try frequent failure instead Continue Reading
-
APT groups’ mobile momentum finally faces resistance
State-backed APT groups are increasingly targeting mobile devices as Covid-19 puts the spotlight on remote working infrastructure security. We explore how the industry is fighting back Continue Reading
-
How to apply zero-trust models to container security
Containers have become a common fixture in software development, but they have resulted in new concerns for security teams. Is zero-trust the answer to tackling them? Continue Reading
-
Coronavirus: How to go back to the office safely and securely
Security teams should be used to supporting remote workers effectively by now, but what’s going to happen when people start returning to their offices? We look at the risks and how to address them. Continue Reading
-
Accurate data in, better insights out
The coronavirus pandemic has propelled data into the headlines, but it has also shown the challenges of dealing with incomplete datasets Continue Reading
-
Constructing the future for engineering – finding the right model where one size does not fit all
Design and engineering has rapidly evolved to be all about interconnected devices. We see how one of the leading manufacturing software suppliers is meeting the challenge Continue Reading
-
What are the security priorities for the post-coronavirus world?
The Covid-19 pandemic is forcing massive change across the business world and things may never go back to normal. What does security look like in this new world, and what will buyers be prioritising? Continue Reading
-
Storage 101: Crash-consistent vs application-consistent snapshots
We look at crash-consistent and application-consistent snapshots and backup, how they are defined, the pros and cons of each and the benefits and limits of Windows VSS Continue Reading
-
Coronavirus: How to cope with the digital skills divide
Since the Covid-19 pandemic started, employers need tech and digital talent more than ever. But how can organisations recruit and train the skills they need during a lockdown? Continue Reading
-
Snapshots 101: Array vs backup software
We run the rule over snapshots in storage arrays and backup software and find a range of capabilities that go from mere support to fully snapshot-centric approaches Continue Reading
-
Malaysia’s business continuity planning readiness a mixed bag
Larger Malaysian enterprises have BCP in place, but SMEs lag behind and will find it harder to weather the Covid-19 storm Continue Reading
-
Coronavirus: Can the networks take the strain?
It was predicted that the mass roll-out of computer networks would mean at some point that there was no difference between work and home as a working location. These assumptions are about to be tested to the full Continue Reading
-
Whisper it… but could a cyber attack be good for your career?
All too often it’s the CISO who carries the can for an enterprise security failure, but this might not be a bad thing. There’s lots of evidence to suggest that falling victim to a cyber attack may actually enhance your CV Continue Reading
-
Five ways that backup has changed since the days of tape
Back in the day, all this was tape, but times have changed, with cloud-to-cloud backup, cloud storage, virtual and physical backup appliances and myriad endpoint hardware Continue Reading
-
Top 10 storage deployment stories of 2019
Here are ComputerWeekly’s top 10 storage deployment stories for 2019, which see quite a move away from traditional SAN and NAS to hyper-converged, software-defined storage and object storage Continue Reading
-
Changes in the CI/CD pipeline
Continuous integration/continuous delivery is responsible for pushing out a set of “isolated changes” to an existing application. We look at how big these changes can be Continue Reading
-
Low-code maturity boosts efficiency and helps user acceptance
Low-code development is finding new maturity in enterprise application development, and organisations of all kinds are taking advantage of the trends Continue Reading
-
Making the case for integrated risk management
Security experts discuss how an integrated approach to risk and governance can be effectively managed Continue Reading
-
How Sporting Group tackles the Rugby World Cup
Sporting Group has readied its system monitoring to ensure the technology is able to cope with the huge demand for bets during the Rugby World Cup final Continue Reading
-
Data storage: The top five storage deployment pitfalls
Key pitfalls in data storage include silos, under-utilisation, backup and disaster recovery, plus neglect of skills and application requirements. We ask analysts how to avoid them Continue Reading
-
Cambridge Cognition CTO on applying server monitoring principles to suicide prevention
Cambridge Cognition CTO, Ricky Dolphin, discusses why it pays to think outside the box when trying to find technological answers to business and customer problems Continue Reading
-
Interview: Rackspace EMEA CTO on why it pays to put people at the heart of IT transformation
Rackspace EMEA CTO Lee James opens up about how taking a people-first approach to digital transformation raises staff morale and engagement levels while helping the managed cloud provider win new business Continue Reading
-
Microsoft’s modern desktop management
How cloud services make the critical business of keeping Windows 10 patched and up to date easier for administrators Continue Reading
-
Serving up managed desktops
Microsoft is dropping its table d’hôte-like Windows 7 menu in favour of a more tapas-style offering, in the form of Windows 10. This will mean big changes for sysadmins Continue Reading
-
Winning ways with Windows 10 updates
We look at how IT leaders can effectively manage the major changes Windows 10 imposes on businesses Continue Reading
-
How to avoid a hyper-convergence minefield
How firms can implement hyper-converged infrastructure to make cost and performance savings Continue Reading
-
Layer your approach to web security
Combining unified threat management with other security systems and a strategic CISO is essential to defend against threats Continue Reading
-
Choosing the right kind of hybrid cloud management
We look at the various factors businesses should consider when looking to solve their cloud management problems Continue Reading
-
Counting the costs of IaaS and SaaS
Cost management is a priority for organisations seeking to use infrastructure and software as a service Continue Reading
-
Steering a safe course through hybrid cloud
We look at why hybrid cloud can create a tricky infrastructure to manage Continue Reading
-
How to create a great strategy in the digital age
What are the best ways for technology leaders to create a strategy that is fit for the digital age? Computer Weekly asks the experts Continue Reading
-
How ASEAN firms can tap storage analytics to improve operations
With storage systems becoming more heterogeneous and siloed, some organisations in ASEAN are turning to storage analytics to reduce costs and address storage issues before they occur Continue Reading
-
How Australia is keeping pace with microservices
Adoption of microservices remains patchy in Australia, although some sectors pursuing digital transformation are catching up rapidly Continue Reading
-
DevOps and containers: How to get connected
We look at how to apply a DevOps approach to a container-based microservices architecture Continue Reading
-
Streamline infrastructure management through robotic automation
Robotic automation is changing the infrastructure management game, helping IT departments make fewer mistakes and boost their productivity Continue Reading
-
Enhance efficiency by automating IT services
We look at the role of artificial intelligence and chatbots in IT service management Continue Reading
-
Let automation take away the tedium
Computer Weekly looks at how far the suppliers of systems management tools and associated products have progressed with automation Continue Reading
-
IPsoft’s digital worker is part of a shift in human productivity
IPsoft used its annual user summit to allow customers to update themselves on the career of its cognitive digital agent Amelia Continue Reading
-
Inside the distros: A year in Linux development
Linux will turn 30 in three years. We look at how far the major Linux distributions – or distros – have come over the past year and what they might be able to bring in the future Continue Reading
-
Chrome OS: Why it may be time to approach desktop IT in a different way
The managed desktop has been running for nearly 20 years. Surely there must be a better way? We investigate Continue Reading