In Depth
In Depth
IT risk management
-
How tech staff helped saved lives in Iraq
Nearly six-and-a-half years ago, IT engineers were among the first of the armed forces to arrive in Iraq when the war started. They were also among the... Continue Reading
-
Eight top tips to ensure your business continuity plan is upto scratch
In the event of a widespread outbreak of swine flu expected this autumn is your IT department ready and what are your business planning assumptions? Here are eight top tips to ensuring business continuity. Continue Reading
-
Enabling business while minimising risk
In the first part of a report from an exclusive Computer Weekly roundtable, in association with Oracle, Joe O'Halloran discovers how IT security professionals are coping with unprecedented demands for their services. Continue Reading
-
Risk Management Software - Essential Guide
Risk management software, often linked closely with compliance management software, is designed to lower the overall risk and security implications that enterprises face. Continue Reading
-
Stamp out data loss
Data loss prevention (DLP) technology has plenty of hype blowing its sails, but it is also being carried along by a serious undercurrent. Organisations have no choice but to follow its drift - they have to take it seriously. UK watchdogs the ... Continue Reading
-
How to handle IT security as XP goes into Extended Support
Microsoft has ended mainstream support for all flavours of Windows XP, including Windows XP Professional and Windows XP Professional x64 Edition. Continue Reading
-
Infosec 2009: the human side of security
Cybercrime and data breaches have grabbed the headlines in the past year, but it is people and their role in preventing these that will dominate Infosecurity Europe 2009. Continue Reading
-
Tackling IT security during the recession
Staying true to the real risks facing organisations is not easy for infosecurity managers, especially with a mountain of diversions competing for their hearts. Even covering the basics is not as straightforward as it should be. Continue Reading
-
Tackle internal fraud
Although hackers and phishing attacks make the headlines, almost 78% of fraud by individuals against UK organisations is committed by employees. Continue Reading
-
Security zone: untangle complexity
Since early viruses were created (often transmitted by floppy disk) there has been an ever escalating challenge for those working in security to keep data and resources safe. This "war" is characterised by increasing technology on both sides of the ... Continue Reading
-
Benefits of full disk encryption lie in avoiding PR and compliance risks of breeching data
Full disk encryption is expected to be the top security technology to be tested or adopted this year, what are the challenges and benefits likely to be?
Benefits...
Continue Reading
-
Increased mobility makes full disk encryption more important, but so is end-user policy management
Full disk encryption is expected to be the top security technology to be tested or adopted this year, what are the challenges and benefits likely to be?
Increased...
Continue Reading -
Business case must be well-managed to balance cost and benefits of full disk encryption
Full disk encryption is expected to be the top security technology to be tested or adopted this year, what are the challenges and benefits likely to be?
Business...
Continue Reading -
Security Zone: Cloud security – pie in the sky?
Amazon Web Services , Google... Continue Reading
-
EADS presents an office of the future
You are about to be tangoed. No, it is not about drinking some adolescent fizz, this is about using the Technically Advanced Next Generation Office, or Tango. Continue Reading
-
Security Zone: Promoting accountability through ISO/IEC 27001 & 27002 (formerly ISO/IEC 17799)
As organisations go, there are those that welcome internationally recognised standards with open arms, and those that shy away citing cost or even applicability....
Continue Reading -
Business continuity tips for SMEs for the Christmas holiday season
Many companies - outside of the retail industry, at least - slow down over the Christmas holiday period, but an unexpected disaster can strike at any time. So how can you protect your business over the festive season? Continue Reading
-
Video: Top ten data drive disasters of 2008
Data recovery firm Kroll Ontrack have just released their annual list of top ten data disasters, detailing some of the most dramatic ways in which people have lost files and precious data. This year's batch includes the amusing but cautionary tales ... Continue Reading
-
Consultancies still snapping up IT staff despite the downturn
While newspaper headlines may be filled with job losses and company closures, it looks like IT staff working in consultancies don't have to worry about job security. Continue Reading
-
The continuing challenge of getting IT on the board
Ten years ago I wrote a paper headlining the fact that few organisations had IT representation at main board level. At that time, however, the trend was...
Continue Reading -
Ten things to do when looking for contractor work
Despite the recession, there is an endless supply of well-paid contract work, and a warm and welcoming community of contractors ready to share their bread and butter with newly-redundant "permies"… well, no actually, there is not. Continue Reading
-
Telecommuting beating the credit crunch
In order that they stay competitive and innovative, businesses cannot afford to stop investing in technology says Florian Malecki, Sonic Wall's Product Marketing Manager. Continue Reading
-
IT job opportunities in the public sector
With the economic slowdown affecting industries as... Continue Reading
-
How LogLogic is linking operational IT to compliance
Computer system log files are deeply boring and unsexy, but it is amazing how quickly they can become fascinating when things go wrong. Continue Reading
-
Securing applications on the network
When it comes to securing applications on a network, limiting privileges is the golden rule. Vulnerabilities that expose web applications start with the... Continue Reading
-
Asking the right questions: how information security needs to gather intelligent information
Companies that perform traditional risk management use a business impact assessment to gauge the risk a project will introduce into the business. The engagement between security and business is measured in information security concepts rather than ... Continue Reading
-
Green Storage and the challenges of data growth
Whatever their long-term view ought to be, many people see the premium on green goods as discretionary, and among the first thing to be cut when times get... Continue Reading
-
XAM: a guide to standardising archives
How much money has your organisation invested in storage systems and processes over the last decade? Chances are you have spent many millions of pounds storing... Continue Reading
-
Banks should prepare for post-sub-prime legislation
As scrutiny continues into the role that mortgage-backed securities played in the credit crunch, data integration specialist, Informatica, believes banks...
Continue Reading -
Storage Expo preview: Why e-mail is a legal timebomb
E-mail is the data type that nobody wants to know about - it is a huge problem. The storage teams do not want to know, the mail teams do not know how to cope, and the compliance issues grow just as fast as the e-mail volumes. Corporate e-mail is a ... Continue Reading
-
Companies tread carefully on SaaS adoption
History repeats itself, first as tragedy, second as farce, according to Karl Marx. Is software as a service a tragi-comic re-run of the application service provider (ASP) model - a lovely idea that didn't work in practice? Continue Reading
-
Hacker Gary McKinnon - Essential Guide
UK hacker Gary McKinnon has lost his appeal to the European Court of Human and now faces extradition to the US on charges of causing damage to US military systems when hacking into them to seek information on UFOs. Find out more in our essential ... Continue Reading
-
Virtualisation: realising the benefits
Virtualisation: Realising the benefits
T departments are being pressured to cut costs, and yet deliver more services faster and better than before....
Continue Reading -
How to manage your software assets
In May, the Business Software Alliance, the industry's licensing watchdog, launched a six-week blitz to cut the use of illegally copied or counterfeit software across 5,000 businesses in the Manchester area. Continue Reading
-
Microsoft’s guide to IT efficiency for SMBs
In this series of articles Microsoft UK offers directors of small-to-medium businesses advice and... Continue Reading
-
Case study: Simplifying IT at Nottingham Building Society
Working with systems integrator Esteem, Nottingham Building Society has re-engineered its entire IT estate to reduce its service overhead and enable its IT team to work more strategically towards long-term goals, employing virtualisation and remote ... Continue Reading
-
IT managers in finance sector trapped
IT managers in the finance sector ... Continue Reading
-
How UK business broadband is evolving
Broadband connectivity was supposed to be a revolution in digital communications. In the late 1990s, businesses that wanted high-speed internet access...
Continue Reading -
Securing the desktop and still allowing for flexibility
Few enterprises could bear a $7.2bn loss caused by a "computer genius" avoiding company policies and controls. But for international bank Société Générale,...
Continue Reading -
Best IT blogs: Full shortlist for Computer Weekly's IT Blog Awards 2008
Shortlist for Computer Weekly's IT Blog Awards 2008 in full, with links direct to all the shortlisted blogs. Continue Reading
-
Evolution of the internet protocol virtual private network
Fran Howath, principal analyst, Quocirca Many organisations today operate in complex, distributed environments that encompass multiple branch offices... Continue Reading
-
Chinook helicopter disaster - computer software failure or pilot error?
Chinook helicopter crash: was it computer software failure or a cause we'll never know? This article gives the background to the Chinook helicopter disaster with links to all the relevant articles published by ComputerWeekly and other useful web ... Continue Reading
-
Efficiency the priority as main players map out datacentre strategies
Computer Weekly reviews how the main server makers are formulating strategy for the datacentre, and whether any viable alternatives are on the way. Our conclusion: keep an eye on Dell Continue Reading
-
Cranfield seeks key to understanding change management
How can you maximise the chances that a large-scale IT project will succeed? Continue Reading
-
Credit crunch: the IT expert view
The credit crunch currently blighting the financial services industry and contributing to the onset of global recession has had a major impact on IT... Continue Reading
-
ID cards in depth
Prime Minister Gordon Brown has reiterated the government's determination to press ahead with plans for ID cards at a cost of £5.4bn over 10 years, despite concerns over a series of data losses by government departments. Continue Reading
-
Constant vigilance keeps Stroud & Swindon secure
"Information security is part of life now for financial services organisations and you have to take it seriously. If the business is linked to any loss of sensitive data, it causes serious reputational damage and you can't afford for that to happen,... Continue Reading
-
Infosecurity 2008: show guide and preview
Infosecurity Europe is the event where those responsible for securing their organisations' information can find all the latest technology, services and advice, with more than 300 of the top security companies from across the globe taking part. Continue Reading
-
Spot the Editor: Terms and conditions
Full competition terms and conditions Continue Reading
-
Heathrow Terminal 5 - Essential Guide
BAA’s latest London airport terminal, Heathrow Terminal 5 is based on ambitious and innovative use of IT, despite its current difficulties. Catch up on the background and latest news. Continue Reading
-
Infosecurity needs pragmatic solutions, says Aviva chief
Aviva's security head, Paul Wood, talks to SA Mathieson about the City's approach to infosecurity, including toughening data protection regulation, the shortcomings of suppliers - and why finance is a better sector to work in than people think Continue Reading
-
Seven categories of software security flaws
These seven attack vectors for software were formulated by Gary McGraw, CTO at secure code development consultancy Cigital, in conjunction with security experts Katrina Tsipenyuk and Brian Chess. Continue Reading
-
Trusted client computing cuts out the operating system to ensure security
Lloyds TSB recently informed some of its on-line banking customers that their home computers had been infected with a virus which stole passwords. The... Continue Reading
-
Can Web 2.0 cope with second class security?
Web 2.0 promises a banquet of tasty features, rich experience and sizzling socialising. But will the dash to gorge bring its own problems? Continue Reading
-
Game: Debug your system with Infosecurity Europe
Coffee break? Play Debug, a great free online game from Infosecurity Europe, and get that virus out of your system. Continue Reading
-
Politics, persuasion and the path to the top IT post
Somebody once joked that you can tell an extrovert in the IT department because, "when he talks to you, he looks at your shoes instead of his own". Continue Reading
-
Assessing automation for conquering the 'compliance Hydra'
The pressure to demonstrate compliance with multiple standards is increasing, with some organisations now subject to three or more regulatory mandates - each with its own mission, scope and control statements - creating a highly complex, ... Continue Reading
-
How to win funds for systems development
No-one goes into IT just to maintain and tweak old applications. The main attraction is always in creating new systems, preferably using the latest technology. Systems development not only makes life a lot more interesting, but when it comes to ... Continue Reading
-
DPM's diary: 8 January 2008
Catch up with the events from Bogcaster Council Continue Reading
-
HMRC data breach highlights need for data compliance
The data breach at HMRC, which placed 25 million people at risk of identity theft, has brought information governance back to the fore. Early indications suggest that risk management procedural failures and human error were to blame. Continue Reading
-
Israel takes a lead on information security
Israel has a booming economy. Westernisation is sweeping the country, and its advances in research and development are taking the global market by storm. Continue Reading
-
Business Intelligence: an expert view
Latest news, analysis, and case studies from Computer Weekly and the web suitable for those implementing or running a business intelligence system. Continue Reading
-
IT managers must learn to cope with consumer innovation
As the mobile market continues to move from a technology to a services focus, IT directors will have to tread a fine line between managing an influx of difficult-to-manage consumer-based devices without stifling innovation. Continue Reading
-
Hot skills: AIX 6.1
Thinking of working with IBM's Unix operating system? Get the facts here. Continue Reading
-
XML publishing: primed for business
Enterprises are expanding their understanding and use of component-based publishing processes., writes Rita Knox, research vice-president at analyst firm Gartner. Continue Reading
-
Working overseas: what IT professionals need to know
Finding a position in a different country can bring personal and professional benefits, but navigating the potential pitfalls requires forward planning Continue Reading
-
Napier University adopts coursework fingerprint scheme
Napier University in Edinburgh is using biometrics to revolutionise the way that undergraduate and postgraduate students submit coursework within its School of Computing. Continue Reading
-
Security Handbook to establishing a security policy - Essential Guide
There exist many threats to hinder the normal running of organisations, including, of course, being hit by a computer virus intrusion or hack. Continue Reading
-
Best Places to Work in IT 2008 finalists announced
Judges have sifted through the entries to find the IT departments doing the most to make their workplaces attractive to staff Continue Reading
-
Vanderbilt hospital fights archive growth with grid
Vanderbilt University Medical Centre simplifies document management using Bycast's archiving grid system. Continue Reading
-
Data deduplication explained
This report provides an extensive overview on data deduplication, the white hot technology storage managers are deploying as we move towards 2008. Continue Reading
-
Crisis management requires pragmatism
Over the past two years I have facilitated more than 100 exercises for incident management teams from a range of organisations. These have varied in scope from straightforward desktop scenarios to complex multi-level simulations. Continue Reading
-
Checklist for purchasing hardware-based encryption
Encryption appliances sit inline on a network and use specially designed electronics to encrypt data at line speeds, essentially eliminating the performance penalty imposed by encryption software running on a general server. While software-based ... Continue Reading
-
Hardware-based encryption product specifications
The product snapshots in this chapter highlight key specifications for a cross section of dedicated encryption appliances. Continue Reading
-
Download our all-in-one back-up guide
You asked for it, so here it is -- a printable version of our back-up all-in-one guide. Continue Reading
-
How to select the right IP PBX
Selecting the right IP PBX system for your company can be complicated. Here are some important things to consider when purchasing an IP PBX. Continue Reading
-
Videocast: data deduplication and protection
Where is the future of backup heading? How viable are technologies such as data deduplication and continuous data protection? In this videocast, W. Curtis Preston covers the basics and the benefits of some emerging backup technologies Continue Reading
-
Tape encryption purchase considerations
Storage administrators who use tape-based won't slow up their backups and will have peace of mind knowing that the tape content is secure. However, LTO-4 tape drives have specific encryption issues. Continue Reading
-
Storage session downloads: architecture track
Data classification is at the core of nearly all modern storage management techniques and tools. Featured in this track is the popular tiered storage school sessions, along with other sessions that can help any manager set up or administer this new ... Continue Reading
-
Storage session downloads: infrastructure track
This track looks at San and Nas issues, virtualization, distance demands, remote offices and how to build out systems. Continue Reading
-
Storage session downloads: disaster recovery track
This track explores how users can coordinate a range of data protection technologies to create more recoverable infrastructures. Restructuring your recovery methods can also help you recover the right data at the right time and in the right manner. Continue Reading
-
Microsoft patch management policy
In the Microsoft Patch Management tutorial, learn about Windows patch management policy, patch maintenance and post-patch security as well as what tools you can use for patch management in Windows networks. Continue Reading
-
Video:CISO security special part two
In the second part of our security special video, ComputerWeekly.com blogger and security expert David Lacey interviews Standard Chartered Bank's John Meakin. Meakin is group head of information security at Standard Chartered and agreed to be ... Continue Reading
-
Risk management: an IT director's guide
Risk management has traditionally been considered the concern of the finance department, but regulatory requirements and an increasing number of risk-based standards are pushing IT directors to consider the issue as well. Continue Reading
-
SMBs demand attention from business apps vendors -- and get it
Competition is at a fever pitch in the SMB ERP market, and as a result, vendors are scoring with products specifically for SMBs. Continue Reading
-
Video: CISO security special
In the first part of our security special video, ComputerWeekly.com blogger David Lacey interviews Betfair's Sandra Barton-Nicol Continue Reading
-
Business intelligence drives compliance for M&S
BI tools enable financial services company to achieve Basel II legislative compliance and create an environment for assuring the quality of data Continue Reading
-
Vendor report: PCI; Is your Business up to the Standard?
Far too many businesses are still struggling to meet conditions that specify how merchants safeguard customer account information using encryption, firewalls, vulnerability assessments, and other means Continue Reading
-
IT troubles leave UK farmers £17m out of pocket
Public Accounts Committee identifies the failure to test computer systems as one of the key reasons for delays in farm payments under the EU's Single Payment Scheme. Continue Reading
-
Improving Performance, Resilience, and Achieving Compliance with Corporate and Regulatory Mandates
Success in IT governance and risk management requires a company take a comprehensive approach that addresses the enterprise as a whole Continue Reading
-
The profitable alternatives to building your own datacentre
Mergermarket is an independent Mergers and Acquisitions (M&A) service that provides the global advisory and corporate communities with intelligence and analysis, leading to real revenues for clients. Continue Reading
-
SaaS apps being deployed by business units, not IT
When it comes to deploying applications via SaaS, IT is still behind the curve. What's preventing IT from getting control over the programs business units want? Continue Reading
-
Mobile security is end user and IT responsibility
Mobile security is not top-of-mind for many mobile workers, according to recent research by Cisco and the National Cyber Security Alliance. Continue Reading
-
CDP overview
Storage volumes are growing at an alarming pace, and tape-based backups are not always possible within an available backup window. Today's businesses are increasingly focused on tighter RTO and RPO. Faster restorations and more recent recovery ... Continue Reading
-
Your shout: business skills a necessity for successful CIOs
Readers have their say Continue Reading
-
Experts: IDS is here to stay
IDS technology has survived predictions that it would be replaced by IPS. One expert says it will remain a separate product while IPS is folded into firewalls. Continue Reading
-
Backup reporting expands to add capacity planning
Aptare adds capacity planning for primary data storage to its product line, joining Symantec in recent attempts to broaden the appeal of reporting software. Continue Reading
-
VoIP models and services: Complete guide
With clear, concise explanations of existing VoIP business models and deployment methodologies, this guide will enable you to weigh the pros and cons of each based on your needs. Continue Reading
-
Disk-based backup overview
Implementing a backup scheme that is fast, safe and cost-effective remains a serious challenge for storage administrators. Here's how to do it Continue Reading
-
Does compliance make encryption always necessary?
Many organisations look to encryption to protect sensitive data. Yet hundreds of millions of people who use the Internet also use encryption, yet most of them don't even know it. Continue Reading