In Depth
In Depth
IT risk management
-
Carbon reduction brings financial benefits
For some time now, organisations deemed to be high consumers of energy, such as mining and refining, have had to adhere to laws around setting and achieving... Continue Reading
-
Social networks offer a new way of sharing knowledge
The rapid spread of enterprise social networks is still a huge puzzle for most senior managers whose bewilderment at the topic and attempts to make some... Continue Reading
-
Taking the complexity out of communications costs
Large enterprises are no strangers to the benefits of mobility. Deployments of Blackberry handsets, PDAs or other smartphone devices to management, sales or field staff are almost commonplace. But how do you negotiate the best telco deal? Mia ... Continue Reading
-
Case study: Haysmacintyre mobilises the enterprise
UK chartered accountancy firm Haysmacintyre has a number of years' experience in mobilising its enterprise data, communications and people to provide financial and other business support services predominantly for entrepreneurial businesses,. Continue Reading
-
Harnessing the full value of identity management
Identity management is about more than just access; it’s about delivering the right information to the right people at the right time. Indeed, the power of having an integrated, centralised definition of the roles and data access levels held by each... Continue Reading
-
ISACA: Users reject Trusted Computing because of privacy and security concerns
Why is corporate adoption of the trusted computing standard still very low when over 70% of new computing devices have built-in trusted platform modules (TPMs)? Continue Reading
-
BCS: Cost of support outweighs the benefits
Why is corporate adoption of the trusted computing standard still very low when over 70% of new computing devices have built-in trusted platform modules (TPMs)? Continue Reading
-
ISSA UK: ‘Treacherous Computing’ can constrain legitimate software
Why is corporate adoption of the trusted computing standard still very low when over 70% of new computing devices have built-in trusted platform modules (TPMs)? Continue Reading
-
(ISC)2: Users resist limits imposed on their freedom
Why is corporate adoption of the trusted computing standard still very low when over 70% of new computing devices have built-in trusted platform modules (TPMs)? Continue Reading
-
How to resell old storage when you upgrade
Reselling old storage devices when upgrading to newer platforms can be a complex issue, particularly when it comes to the content stored on it. Continue Reading
-
The security implications of green IT
Green IT has gone mainstream. The past year has seen corporations such as Citigroup establishing their environmental credentials by opening green datacentres. But how do the separate disciplines of green IT and information security come together? Continue Reading
-
How tech staff helped saved lives in Iraq
Nearly six-and-a-half years ago, IT engineers were among the first of the armed forces to arrive in Iraq when the war started. They were also among the... Continue Reading
-
Eight top tips to ensure your business continuity plan is upto scratch
In the event of a widespread outbreak of swine flu expected this autumn is your IT department ready and what are your business planning assumptions? Here are eight top tips to ensuring business continuity. Continue Reading
-
Enabling business while minimising risk
In the first part of a report from an exclusive Computer Weekly roundtable, in association with Oracle, Joe O'Halloran discovers how IT security professionals are coping with unprecedented demands for their services. Continue Reading
-
Risk Management Software - Essential Guide
Risk management software, often linked closely with compliance management software, is designed to lower the overall risk and security implications that enterprises face. Continue Reading