In Depth
In Depth
IT risk management
-
Securing a virtualised environment
Virtualised client server technology is riding high at the moment, with its potential to increase efficiency and reduce costs making it seem an attractive option for many CIOs. But is security in danger of getting left behind in the race to save ... Continue Reading
-
Downtime: terminators, rain and moody computers
The wacky side of IT Continue Reading
-
Analyst paper: provisioning the mobile workforce
In this report, Cutter Consortium analyst Brian Dooley explains the security and access control required to give mobile users the ability to run enterprise applications via their mobile devices Continue Reading
-
BP points way to integrated security
BP's plans to align physical and IT security to combat emerging threats offer lessons for other firms looking to implement integrated security strategies Continue Reading
-
Business continuity: the expert view
Business continuity is about expecting the unexpected and preparing for a system failure. Continue Reading
-
BlackBerrys' underground reception solution
BlackBerrys and cell phones wouldn't work in a law office until it deployed a multi-carrier system. Continue Reading
-
Downtime: Orange, rail enquiries, viruses, Web 2.0 and drafts
Orange finds new ways to sell GPS, Downtime reveals the most talked-to man in the country, the virus turns 25, Web 2.0 used to find a cure for hiccups, drafts solved at last. Continue Reading
-
Securing Microsoft Internet Explorer 7
Microsoft's latest version of their Web browser, Internet Explorer 7, was touted as their most secure browser to date. In this section of our Internet Explorer security learning guide, find out what is so secure about IE 7 and what you can do to ... Continue Reading
-
WAN clustering for disaster recovery
This tip provides information about WAN clustering for disaster recovery, its pros and cons, and what you need to watch out for. Continue Reading
-
ISO 27001 could bridge the regulatory divide, expert says
Karen Worstell, former CISO at Microsoft and AT&T Wireless, now on the advisory board of Neupart A/S, explains how ISO 27001 can be used to help companies comply with a variety of regulations and standards Continue Reading
-
Email archiving tool purchase considerations
The purchase considerations for email archiving tools. Continue Reading
-
Sarbanes-Oxley compliance for SMBs: How much do you know?
Dec. 15 is quickly approaching. For public SMBs, this means the extended Sarbanes-Oxley Act deadline is almost here. Is your company prepared? Are you? Take our quiz on the latest SMB-related Sarbanes-Oxley news to find out. Continue Reading
-
Insider threats thwarted in simple steps
Don't wait for new SMB-specific offerings before you prevent insider threats. Leverage your existing systems with simple planning and integration. Continue Reading
-
Data migration product specifications
Part of the Tiered Storage Buying guide focusing on product specifications for data migration tools. Continue Reading
-
Enabling Successful IT Governance and Risk Management
Businesses funnel serious money into their enterprise infrastructures. Find out how to get the best from this investment Continue Reading
-
Security acquisition wish list
Instead of guessing which companies will cash out next, Dennis Fisher makes a list of security mergers he'd like to see either for sheer entertainment value or actual customer value ... Continue Reading
-
Who should be considering file archiving and compliance
Who should be looking at and considering file archiving plus is file archiving just for companies and applications that have to meet regulatory compliance requirements? Continue Reading
-
File archiving: copies of archived data and CAS
How many copies of archived data should be made and does file archiving require content- or CAS-based storage? Continue Reading
-
Storage Decisions Downloads: Executives' storage guide
Ideas of where firms' storage should be and where it's headed. Also key ways to integrate new technologies, processes and ideas without going over budget. Continue Reading
-
Prevent network hacks with secure Web browsing
Hackers can penetrate your network in almost unlimited ways these days, and that includes through your Web browser. Learn how to improve Web browser security and keep these hackers out of your network. Continue Reading
-
Systems needed to resolve e-mail crunch
With the regulations for data storage becoming increasingly demanding, finding workable solutions to e-mail archiving requires a sophisticated approach Continue Reading
-
Big Microsoft Vista concerns for Big Pharma
The second installment of an ongoing series examining the challenges of deploying Windows Vista and the considerations that go into the decision to roll out the new OS. Continue Reading
-
Is a merger or acquisition in Sourcefire's future?
Sourcefire founder and Chief Technology Officer Martin Roesch, talks about how Sourcefire fits into Security 3.0 theme and how the firm may be involved in a future merger or acquisition. Continue Reading
-
Why hacking contests, 'month-of' projects don't help
Ivan Arce, chief technology officer of Core Security Technologies explains why he thinks hacking contests and public vulnerability disclosure projects do little to improve IT security. Continue Reading
-
The Art of Software Security Testing
Identifying software security flaws including the proper methods for examining file formats. Continue Reading
-
Data Backup School: the backup basics
All of the aspects of backup and how to optimize your backup environments. Continue Reading
-
Downtime: don't be Microdaft, they surely won't sue
The wacky world of IT Continue Reading
-
Data retrieval strategies: Document management software overview
The role of document management software in data storage and how it can mitigate risk for the enterprise. Continue Reading
-
Cisco: File virtualisation a service, for now
Cisco's Jayshree Ullal talks about the company's plans for file virtualisation, green datacentres and Fibre Channel over Ethernet. Continue Reading
-
Storage Area Networks: getting the full value
What is a storage area network? What are the benefits and pitfalls of installation? How can a SAN fit into your organisation? These questions and more are answered in our Storage Area Network School. Continue Reading
-
AT&T subsidiary talks real-world storage virtualisation
3PAR's storage virtualisation helps AT&T's managed services arm to stay competitive over EMC and NetApp, though there are still some kinks to be worked out. Continue Reading
-
IT outsourcing: the expert view
News stories, features, podcasts, blogs, videos and links on all aspects of IT outsourcing in the UK Continue Reading
-
The man behind the Month of Search Engine Bugs speaks
Ukrainian security researcher Eugene Dokukin, more widely known by his online name MustLive, is about to launch a new "Month-of" flaw disclosure project focusing on search engine bugs, at a time when many security professionals are dismissing such ... Continue Reading
-
University tracks network to success
Dundee University is upgrading its network to prevent downtime and meet rising demand. Asset-tracking software is helping to make the transition easier Continue Reading
-
Admins run into trouble with Microsoft updates
A DNS service failure and an ongoing WSUS glitch are among this month's frustrations as IT administrators try to deploy the latest security patches from Microsoft. Continue Reading
-
Network access control learning guide
From PDAs to insecure wireless modems, users have myriad options for connecting to -- and infecting -- the network. Created in partnership with our sister site SearchSecurity.com, this guide offers tips and expert advice on network access control. ... Continue Reading
-
Storage Decisions Downloads: SAN and NAS issues
This track will look at SAN and NAS issues, distance demands, remote offices and how to build out systems. Continue Reading
-
Storage Decisions Session Downloads: Disaster Recovery
How users can coordinate a range of data protection technologies to create more recoverable infrastructures. Continue Reading
-
How to get the best systems deal
Traditional licensing models are inflexible and struggle to offer value to businesses, but there are alternatives out there that can ensure you get a good deal Continue Reading
-
My pay is falling, have I been in IT too long?
Expert advice for readers' career problems Continue Reading
-
ISCSI TCP/IP TOE card specifications
Key specifications for a cross-section of popular iSCSI TOE cards. Continue Reading
-
Security technology making headway against spam
Paul Judge, chief technology officer at Secure Computing, discusses the progress of the battle against spam and whether technology has reached the limits of its ability to help in the fight. Continue Reading
-
Downtime: don't leave your laptop on the roof of your car
The wacky world of IT Continue Reading
-
Beware security test errors: part 2
There are many mistakes one can and does make, causing weaknesses in your network. Protect your network further by avoiding these five security assessment mistakes. Continue Reading
-
Beware security test errors
There are many mistakes one can and does make, causing weaknesses in your network. Protect your network further by avoiding these five security assessment mistakes. Continue Reading
-
Not looking at the whole security picture
There are many mistakes one can and does make, causing weaknesses in your network. Protect your network further by avoiding these five security assessment mistakes. Continue Reading
-
Avoiding security assessment mistakes
There are many mistakes one can and does make, causing weaknesses in your network. Protect your network further by avoiding these five security assessment mistakes. Continue Reading
-
Relying on security audit checklists
There are many mistakes one can and does make, causing weaknesses in your network. Protect your network further by avoiding these five security assessment mistakes. Continue Reading
-
Somerset cuts costs with mobile system for occupational therapists
Somerset County Council has cut back-office administration costs by equipping social workers with tablet PCs. Continue Reading
-
Local government consolidates storage with IP SAN
IP SAN was cheap, simple, and a NAS gateway allows end users at the City of Isles Beach better protection and access to files than traditional servers. Continue Reading
-
Readers' Choice awards for security technology
The best security technology with the Readers' Choice awards from Information Security Continue Reading
-
IT change helps Parcelforce loss into profit
An IT-based streamlining programme by Parcelforce has helped turn around initial losses of £193m to make a profit of £18m over the past 27 months Continue Reading
-
Security Blog Log: Mac hack puts Apple faithful on defence
A much-hyped QuickTime exploit threatens Mac OS X and Windows browsers, but the Apple faithful feel the greatest sting. Continue Reading
-
IP storage switch and router specifications
Key specifications for a cross section of popular IP storage switch and router products. Continue Reading
-
Storage consolidation: WAN acceleration and WAFS technology overview
One important avenue of storage consolidation is the consolidation of remote office storage; this is where WAN acceleration and WAFS technology comes into play. Continue Reading
-
Outsource World comes to London
The global outsourcing community will converge on London next week for the annual Outsource World conference and exhibition. Continue Reading
-
Your shout: education, users, licencing
Have your say at computerweekly.com Continue Reading
-
Information security: Implementing converged security
Today's technology allows greater integration of identity recognition and access management. We look at how businesses are implementing converged security. Continue Reading
-
Swap code for prose to win Write IT prize
The BCS is asking anybody interested in IT to put fingers to keyboard as part of a short story competition to mark its half-centenary and celebrate the impact of computers on society. Continue Reading
-
Security podcast series: Howard Schmidt
Security luminary Howard Schmidt talks about his latest book and about the private sector's role in securing cyberspace. Continue Reading
-
Your shout: NHS IT through the looking glass
Computer Weekly readers' have their say at computerweekly.com Continue Reading
-
MPs dissect NHS IT plan's failings
Public Accounts Committee questions whether NHS IT contracts will bring significant clinical benefits and calls for National Programme for IT's business case to be reassessed Continue Reading
-
Inside MSRC: Windows Vista security update explained
Microsoft's Christopher Budd details the first Windows Vista security updates. Continue Reading
-
What will the NPIA do for police IT?
Three years after the Bichard Enquiry into the Soham murders called for the urgent introduction of a national IT system to support police intelligence, the Home Office has created the agency it claims will have the power to make such a system ... Continue Reading
-
When disaster recovery and data classification collide
Attendees at a disaster recovery seminar discussed the complex application dependencies when disaster recovery and data classification combine. Continue Reading
-
Preparing your business for IPv6
The move to Internet Protocol version 6 is already under way. But what does it mean for your company, and how should you be preparing for the change? Continue Reading
-
Wokingham develops online tool to help schools with Ofsted reports
Smart projects: Council's school self-evaluation application supports compliance Continue Reading
-
Case studies: Public transport project management
Developing and implementing IT systems for a transport network is a challenging undertaking. Continue Reading
-
DPM's diary 3 April 2007
Weekly round up of events at Bodcaster City Council Continue Reading
-
Downtime: Your place in the sun is just a matter of chance
Your place in the sun is just a matter of chance Continue Reading
-
Will data breach be the end of TJX?
This week in Security Blog Log: Industry experts say companies can learn from a data breach and even prosper from it. But is TJX following the right example? Continue Reading
-
Windows security assessment Step 3
Keep security-related problems to a minimum in your Windows shop by setting security assessment expectations Continue Reading
-
Windows security assessment Step 5
Keep security-related problems to a minimum in your Windows shop by setting security assessment expectations Continue Reading
-
Windows security assessment Step 1
Keep security-related problems to a minimum in your Windows shop by setting security assessment expectations Continue Reading
-
Windows security assessment Step 2
Keep security-related problems to a minimum in your Windows shop by setting security assessment expectations . Continue Reading
-
Windows security assessment Step 4
Keep security-related problems to a minimum in your Windows shop by setting security assessment expectations Continue Reading
-
FMC: new opportunities but security headaches
Fixed-mobile convergence (FMC) will help enterprises save money and boost productivity. First, though, they'll have to address security issues on an unprecedented scale. Continue Reading
-
Setting your Windows security assessment expectations
Keep security-related problems to a minimum in Windows shop by setting security assessment expectations Continue Reading
-
IP communications tools boost productivity
IP communications tools have opened up several possibilities for one North American company, giving it presence awareness and unified messaging. Continue Reading
-
IT pros eye Windows Server 2003 SP2 with caution
Despite its security and stability enhancements, IT pros say they are in no rush to deploy Windows Server 2003 SP2 Continue Reading
-
Back office overhaul helps Surrey council meet online planning target
Smart projects: Integration project enables compliance with Pendleton principles Continue Reading
-
Housing Corp refuses to disclose report on problems of £17m project
The Housing Corporation, the quango responsible for distributing more than £2bn a year to housing associations, is refusing to disclose the results of an independent investigation into its problematic £17m IT modernisation programme. Continue Reading
-
Symantec threat report under the microscope
This week in Security Blog Log: Infosec professionals dissect Symantec's latest threat report and express a range of views in the blogosphere. Continue Reading
-
From IT geek to security rock star
Those who recognise change, bond with colleagues outside IT and factor physical security into their daily routine can go from IT geek to security rock star, experts say. Continue Reading
-
Measuring Vista's true security muscle will take time
Researchers are digging through the Windows Vista code right now, and when they find flaws we'll hear about it. But it's the ones we don't hear about that should keep us up at night. Continue Reading
-
Managing a corporate network to plan the Olympics
Case studies: Managing any corporate network is tough enough. Add in factors such as Olympian deadlines and natural disasters if you really enjoy life at the sharp end Continue Reading
-
The portal to staying in control of compliance
For Simon Benson, Environmental, Safety & Security Manager, NYK Group Europe Ltd, there are a number of challenges that occupy his working day but there’s one in particular: compliance Continue Reading
-
DPM's Diary 20 March
By CP Bound Continue Reading
-
Teknor cuts manufacturing costs with ERP order routing
International manufacturing company Teknor Apex has cut costs on some of its busiest product lines by using order routing functions in its enterprise resource planning software to manufacture orders in the cheapest way possible. Continue Reading
-
HMRC keeps books closed on spiralling IT costs
The cost of HM Revenue and Customs' IT contract with Capgemini has continued to rise, and evidence is needed that the extra money is being well spent Continue Reading
-
HSBC bridges the Windows divide
HSBC is taking advantage of the recent collaboration agreement between Microsoft and Novell to simplify its global IT infrastructure and to reduce costs Continue Reading
-
Business Focus: IT spend in the telecoms sector
Telecoms companies call on IT to meet compliance and consumer demands Continue Reading
-
Google boosts security but storage glut continues
Dennis Fisher sounds off on the latest issues affecting the information security community. Continue Reading
-
CIO Interview: Big changes come from small steps
"Delivering change is the art of the feasible," says Tania Howarth of Coca-Cola. And that means incremental progress, rather than the big bang approach cio interview "Delivering change is the art of the feasible," says Tania Howarth of Coca-Cola. ... Continue Reading
-
Get on the right mobile OS track
There is a vast array of operating systems available to run on mobile devices. So how do you choose the one that is best for your business needs? Continue Reading
-
LexisNexis fights crime with storage
The document search company is offering a new data forensics service staffed by former federal agents and powered by commodity NAS. Continue Reading
-
The benefit of balance
With taxpayers' money at stake, public sector project failures and problems are likely to attract the kind of adverse publicity that private ventures often find easier to avoid. Continue Reading
-
ISCSI vs. FC performance: A closer look at storage
Think that FC is faster than iSCSI? Vice versa? Storage expert Tony Asaro explains why the real answer may surprise you. Continue Reading
-
Review: Elemental Security Platform
A tool for monitoring and enforcing system compliance, and providing asset management and asset-centric access controls. Continue Reading
-
Heinz secures thin client PCs with Sophos
Food manufacturer Heinz has become one of the first companies to deploy dedicated security hardware from Sophos designed to protect thin client desktop terminals with web browsers. Continue Reading