In Depth
In Depth
IT strategy
-
Five key questions about Kubernetes backup answered
We look at when to back up containers, what to protect, the main methods of backup for Kubernetes and the main Kubernetes backup products available in the market Continue Reading
-
How can healthcare organisations fight increased cyber crime in 2021?
As the Covid-19 pandemic enters what may be its most dangerous phase, we explore how healthcare organisations can ward off cyber threats while preserving their ability to deliver critical care Continue Reading
-
Cloud DR from the Big Three: Who’s best at what?
We look at cloud disaster recovery from AWS, Microsoft Azure and Google to see which is best for provision of turnkey solutions, breadth of portfolio and modular building blocks Continue Reading
-
Data Dynamics aims at single view of unstructured data
Data volume is ballooning, and storage is becoming more disparate, which makes the need for a single platform to manage storage and compliance a key requirement for organisations Continue Reading
-
Picking the right IAM tools is based on more than today’s needs
With remote working now normal, it is important to take proactive steps in managing credentials across platforms that can be subject to multiple data protection regulations. IAM services can streamline this process, but care must be taken to ensure ... Continue Reading
-
The nation state threat to business
The SolarWinds hack shows the widespread damage possible from a nation state cyber attack. What is the threat to business and how can it be mitigated? Continue Reading
-
Five key points about cloud vs in-house disaster recovery
The cloud is well suited as a disaster recovery failover option. The key questions are about what you should keep on-site and what goes to the cloud. We look at five key points to consider Continue Reading
-
Security Long Reads: Cyber insiders reveal what’s to come in 2021
In this long read, we gather together the thoughts of cyber security insiders from across the industry to get their take on what will happen in 2021 Continue Reading
-
Patching: Balancing technical requirements with business considerations
With an increasing reliance on subscription models alongside the regular patching of software, updates have become an essential part of modern business practices. However, care needs to be taken to ensure the optimum patching process is implemented Continue Reading
-
Interview: AWS’s Teresa Carlson talks about new role and cloud adoption during Covid-19
AWS executive talks about her expanded remit beyond public sector to include other industries, and driving a unified agenda to push cloud and data adoption worldwide Continue Reading
-
Interview: Chris Hayman, AWS UK public sector director, on cloud evolution during Covid-19
AWS executive discusses the evolution of cloud technology in government, the need for dynamic procurement, skills, and joining the oligarchy of government tech suppliers Continue Reading
-
Post-pandemic approaches to IAM for cloud security
Cloud technology may have saved businesses from catastrophe during the pandemic, but it has also introduced additional challenges around identity and access management. Here’s why IAM policies are crucial in the new normal Continue Reading
-
This Christmas, Covid-19 heightens retail security risks for everyone
Do you think it’s only retailers and consumers who need to consider cyber security when shopping online during the holidays? You’re dead wrong. This year, the Covid-19 pandemic and the shift to remote working has thrown a spanner in the works Continue Reading
-
Microsoft Windows’ future is all about users
We look at how Microsoft is evolving the Windows desktop operating system platform and providing developer flexibility Continue Reading
-
Need to know: Five key things about backup testing
We look at five key things to consider when it comes to backup testing – what to test, how often, making sure backups work, whether recovery is effective and ensuring processes are consistent Continue Reading
-
How to build an effective vulnerability management programme
As cyber criminals increasingly look to exploit vulnerabilities in software and hardware, businesses must build and implement an effective vulnerability management programme to counter this growing threat Continue Reading
-
DDoS mitigation strategies needed to maintain availability during pandemic
The growing prevalence of DDoS attacks combined with the increased reliance on internet connectivity during the pandemic means enterprises can no longer afford to ignore the threat of DDoS attacks. Computer Weekly explores organisations’ perceptions... Continue Reading
-
Credential stuffing: When DDoS isn’t DDoS
Ten years ago, credential stuffing attacks posed a comparatively minor threat, but with an escalating number of data breaches, the threat posed has now increased. What are the solutions to this very human problem? Continue Reading
-
Unified file and object storage: The best of both worlds?
Unified file and object storage tackles growing volumes of unstructured data in a way that’s compatible with traditional and cloud-era applications, and friendlier to analytics Continue Reading
-
Why securing the DNS layer is crucial to fight cyber crime
Domain name system security is often overlooked by organisations, but focusing on this layer could actually improve the effectiveness of cyber security strategies. We explore the latest DNS trends and best practice Continue Reading
-
How can CIOs prepare for 12 months of uncertainty ahead?
Just 12 months ago, nobody could have predicted where we are now. So how can CIOs prepare for the future amid such uncertainty? We asked five IT leaders for their expert advice Continue Reading
-
Business process automation expansion could founder on IT drift from business focus
Business process automation might find new territory to expand into as businesses have become bloated with excess processes since the 2008 crash. But has IT drifted out of business alignment again? Continue Reading
-
Top five ways backup can protect against ransomware
Ransomware threatens to put your data beyond reach, so the best way to prepare is to have good-quality data you can restore from backup. We look at the key things to consider Continue Reading
-
Top five ways to benefit from tape today
We look at the benefits that tape can bring, including in backup and recovery, long-term and ‘warm’ archiving, compliance and WORM use cases and ‘air gapping’ to protect data Continue Reading
-
Double extortion ransomware attacks and how to stop them
As ransomware attacks increase, hackers are diversifying their tactics to get victims to hand over larger sums of money. We investigate the rise of double extortion attacks Continue Reading
-
Getting physical with datacentre security
Whether it is natural disasters, terrorism or break-ins, datacentres will be vulnerable to a range of risks unless they are physically secured. Here’s how you can improve the physical security of your datacentre Continue Reading
-
APAC buyer’s guide to BI and analytics
In this buyer’s guide, we look at the state of adoption of business intelligence and analytics tools, common use cases and other technology and business considerations Continue Reading
-
Cloud storage costs: How to get cloud storage bills under control
Many organisations look to the cloud to cut storage budgets, but the potential costs are many and varied. So what are the key ways to cut cloud storage costs? Continue Reading
-
Portrait of the software developer as an artist
Many programmers see themselves as artists – of a sort. Computer Weekly investigates what it means to be a modern software developer Continue Reading
-
How to achieve resilience – the modern uptime trinity
IT leaders can take responsibility for ensuring their organisations are resilient during times of crisis. There are no quick fixes, but if you think it is expensive to ensure resilience in your IT systems, try frequent failure instead Continue Reading
-
Five on-premise and cloud options for network-attached storage
We look at five options for file access storage, from ‘traditional’ NAS in a standalone appliance to distributed hybrid cloud file storage and NAS cloud gateways Continue Reading
-
Storage pros and cons: Block vs file vs object storage
Despite the many changes in storage, there are still some fundamentals that hold true. We look at the key defining characteristics and use cases of block, file and object storage Continue Reading
-
APAC hybrid cloud adoption still cloudy
Although there are clear benefits of hybrid cloud, enterprises in Asia-Pacific aren’t making the most of them due to a lack of holistic understanding, strategic frameworks and skillsets Continue Reading
-
Decision points in storage for artificial intelligence, machine learning and big data
Artificial intelligence and machine learning storage is not one-size-fits-all. Analytics work differs, and has varied storage requirements for capacity, latency, throughput and IOPS. We look at key decision points Continue Reading
-
Black Lives Matter, but do bots know that?
The volume of content generated each day necessitates automated moderation to curate everything as it is published, ensuring offensive and objectionable material is blocked. But this only works if systems are adequately configured and reviewed Continue Reading
-
How Malaysia’s industries are tapping IoT
Computer Weekly speaks to four industries that claim to have benefited from various IoT deployments and how it has changed their businesses Continue Reading
-
Will the Covid-19 crisis accelerate a shift in tech talent out of London?
As the coronavirus pandemic has forced firms to work more flexibly, threatening traditional large office spaces in London, will tech talent make a long-term shift away from the capital? Continue Reading
-
APT groups’ mobile momentum finally faces resistance
State-backed APT groups are increasingly targeting mobile devices as Covid-19 puts the spotlight on remote working infrastructure security. We explore how the industry is fighting back Continue Reading
-
How to apply zero-trust models to container security
Containers have become a common fixture in software development, but they have resulted in new concerns for security teams. Is zero-trust the answer to tackling them? Continue Reading
-
Cloud flash storage: SSD options from AWS, Azure and GCP
We look at the flash storage options available from the big three cloud providers – Amazon Web Services, Microsoft Azure and Google Cloud Platform – that can help narrow the gap between on-site and cloud workloads Continue Reading
-
Coronavirus: How to go back to the office safely and securely
Security teams should be used to supporting remote workers effectively by now, but what’s going to happen when people start returning to their offices? We look at the risks and how to address them. Continue Reading
-
Cloud storage 101: File, block and object storage in the cloud
We run the rule over file, block and object storage from the big three public cloud providers: AWS, Azure and GCP. We look at what’s on offer and the use cases they are aimed at Continue Reading
-
GDPR at two: How far we’ve come, how far we still have to go
Marking two years of the General Data Protection Regulation, industry voices weigh in on the state of data protection and privacy, consider what has changed, and what still needs to change Continue Reading
-
Mainframe storage: Three players in a market that’s here to stay
Far from disappearing, the mainframe market and the storage it needs is here to stay for some time. The three key array makers compete with high-end flash-equipped products Continue Reading
-
What are the security priorities for the post-coronavirus world?
The Covid-19 pandemic is forcing massive change across the business world and things may never go back to normal. What does security look like in this new world, and what will buyers be prioritising? Continue Reading
-
How Blackwell's is responding to the coronavirus pandemic
Traditional bookshop chain Blackwell’s talked about adaptations to its business model, trends and IT operation during the coronavirus crisis Continue Reading
-
Snapshots 101: Array vs backup software
We run the rule over snapshots in storage arrays and backup software and find a range of capabilities that go from mere support to fully snapshot-centric approaches Continue Reading
-
A carrot-and-stick approach to fixing cyber security complacency
With a majority of IT decision-makers holding the opinion that their employers are complacent when it comes to data protection, we look at what needs to be fixed, and how to fix it Continue Reading
-
NAS backup: Which suppliers have gone post-NDMP?
NAS backup with NDMP has many drawbacks so some vendors have moved to a data management approach that tracks changes and allows for incremental forever protection Continue Reading
-
Malaysia’s business continuity planning readiness a mixed bag
Larger Malaysian enterprises have BCP in place, but SMEs lag behind and will find it harder to weather the Covid-19 storm Continue Reading
-
Top five compliance concerns for UK business in 2020
We look at the top five legal and regulatory compliance concerns for UK businesses in 2020. It’s a list that includes GDPR, the DPA, PECR, PCI-DSS and the CCPA Continue Reading
-
The AWS bucket list: Keep your cloud secure
Misconfigured cloud installations risk billions of records being exposed, damaging organisations’ finances and reputations. Paying attention to securing AWS storage buckets is a simple matter Continue Reading
-
Computational storage: What is it and what are its key use cases?
Computational storage brings the CPU to the storage and so boosts system performance by tackling processing tasks, such as near the edge or in AI/machine learning workloads Continue Reading
-
Coronavirus: How to implement safe and secure remote working
Find out what CIOs and CISOs need to know to enable their end-users to work remotely and stay secure during the Covid-19 coronavirus crisis, and learn how users can help themselves Continue Reading
-
Coronavirus: Can the networks take the strain?
It was predicted that the mass roll-out of computer networks would mean at some point that there was no difference between work and home as a working location. These assumptions are about to be tested to the full Continue Reading
-
Malaysia’s digital transformation efforts progress
Malaysian enterprises are taking steps to modernise their infrastructure, but many are still grappling with the lack of niche IT skills in key emerging technologies such as the internet of things Continue Reading
-
Molotov.tv streams 24/7 with Dell EMC and Scality object storage
France-based Molotov.tv has offered streaming TV services on digital platforms since 2016, based on Dell EMC servers with GPU acceleration and Scality Ring object storage Continue Reading
-
Is this Netflix-style thriller the future of security training?
Cyber awareness specialists at KnowBe4 reckon that bringing Netflix-style production values to corporate videos heralds a new approach to security training Continue Reading
-
Zero trust: Taking back control of IT security
Trust on the network is a crucial factor in security risk, and zero trust changes the traditional model of ‘trust but verify’ Continue Reading
-
How IT can back up ESG efforts to do environmental and social good
Organisations’ environmental, social and governance programmes depend on IT leaders for technological backup Continue Reading
-
Caribbean island hospital rebuilds after hurricane with DataCore
Hurricane Irma tore the roof off a server room and flooded IT hardware, but that was an opportunity to rebuild redundant IT using DataCore’s SANsymphony software-defined storage Continue Reading
-
Top four compliance considerations for SMEs
We look at the key data compliance regulations that affect smaller companies – such as GDPR, the Data Protection Act, PCI-DSS and PECR – and some key industry-specific frameworks Continue Reading
-
Do you use cloud storage for these use cases yet?
We look at the use cases most suited to a quick transition to the cloud: backup, archiving, disaster recovery, file storage and cloud bursting – cloud storage’s low-hanging fruit Continue Reading
-
Big storage meets cloud in the datacentre 'as-a-service' revolution
Cloud is mainstream but the datacentre’s here to stay. This has resulted in a trend towards as-a-service in the datacentre where big storage array makers and the cloud giants meet Continue Reading
-
DRaaS decisions: Key choices in disaster recovery as a service
We examine the key decisions when considering DRaaS. Whether to go full self-service, assisted or managed will depend on what you need to protect and your in-house resources Continue Reading
-
Whisper it… but could a cyber attack be good for your career?
All too often it’s the CISO who carries the can for an enterprise security failure, but this might not be a bad thing. There’s lots of evidence to suggest that falling victim to a cyber attack may actually enhance your CV Continue Reading
-
Five ways that backup has changed since the days of tape
Back in the day, all this was tape, but times have changed, with cloud-to-cloud backup, cloud storage, virtual and physical backup appliances and myriad endpoint hardware Continue Reading
-
Top 10 storage deployment stories of 2019
Here are ComputerWeekly’s top 10 storage deployment stories for 2019, which see quite a move away from traditional SAN and NAS to hyper-converged, software-defined storage and object storage Continue Reading
-
Amazon, AWS and antitrust: How tough could US lawmakers be on the tech titan?
How Amazon conducts its business is coming under close scrutiny from US lawmakers, both from an online retail and cloud perspective, and this is why Continue Reading
-
What are the key issues facing healthcare CIOs?
Six healthcare IT leaders give their views on the major challenges for digital transformation across the NHS Continue Reading
-
How diversity spurs creativity in software development
Diversity of all kinds – gender and ethnicity, but also intellectual diversity and neuro-diversity – can boost creativity in software development Continue Reading
-
Computer Weekly Buyer's Guide features list 2020
Here is our 2020 schedule of up-and-coming in-depth articles that will cover carefully selected topics to help IT leaders select the right technology for their organisation Continue Reading
-
Get ready for CCPA: Implications for UK businesses
The California Consumer Privacy Act, a wide-ranging data privacy and consumer protection law, comes into effect on 1 January 2020. How does CCPA differ from the EU GDPR regulations and what are the responsibilities for UK businesses operating in the... Continue Reading
-
SME disaster recovery made easy with cloud, hybrid and HCI
Disaster recovery is a lot easier for small businesses than it used to be, with use of the cloud, hybrid cloud, physical and virtual appliances, and hyper-converged infrastructure all among the choices on offer Continue Reading
-
DevOps and storage: APIs and flexibility key
The details of back-end storage are irrelevant to DevOps engineers, but they need enough of it, when they want it, and the ability to manage it programmatically is key Continue Reading
-
Data management strategies are evolving – so must enterprises
A growing number of data-driven initiatives, alongside heightened demand for security in governance, data management and compliance, has led to the rise of a more holistic approach – integrated risk management Continue Reading
-
What is UK plc doing to address the tech skills gap in the face of Brexit?
The growing technology skills gap in the UK is widely known, with firms complaining of a lack of skilled workers – but what are they doing fill their empty roles? Continue Reading
-
Data storage: The top five storage deployment pitfalls
Key pitfalls in data storage include silos, under-utilisation, backup and disaster recovery, plus neglect of skills and application requirements. We ask analysts how to avoid them Continue Reading
-
Top five cloud storage pitfalls
Cloud storage offers apparent simplicity, but unexpected costs, complexity, data movement and integration challenges can arise. We look at how to avoid common cloud storage pitfalls Continue Reading
-
Cutting the cord: Negotiating cloud contracts with problematic customers
How accountable should cloud firms be for the actions of the customers that use their platforms, and how much thought should they give to aligning themselves with problematic brands before hosting them? Continue Reading
-
Private 5G networks: Are they the right choice for you?
The concept of dedicated private mobile networks for large enterprises is not a new one, but with the advent of ultrafast 5G networks, they are starting to attract more interest Continue Reading
-
What 5G applications will transform your business?
The UK’s mobile network operators have started work on their 5G roll-outs, but what applications are most likely to gain enterprise traction for the new standard? Continue Reading
-
Hop jumps to Pure Storage to avoid big storage complexity
Air France short-haul and regional brand Hop jumps to Pure Storage after coming up against Dell EMC, NetApp and HPE, which all tried to sell it solutions ill-suited to its needs Continue Reading
-
How UK councils are using technology to support adult social care
As budgets dwindle and central government delays the creation of an overarching strategy around the future of care, local authorities are looking into innovations such as robotics and voice assistant technologies to ease the pressure on resources Continue Reading
-
APAC buyer’s guide to human capital management software
More Asia-Pacific organisations are turning to HCM software to recruit, engage and retain a new breed of employees who increasingly expect personalised services from HR teams Continue Reading
-
CW500: How AI will transform technology leadership
Addressing issues around data and defining strategies that will attract top talent are among the key challenges discussed at the Computer Weekly CW500 Club Continue Reading
-
Cambridge Cognition CTO on applying server monitoring principles to suicide prevention
Cambridge Cognition CTO, Ricky Dolphin, discusses why it pays to think outside the box when trying to find technological answers to business and customer problems Continue Reading
-
Choose tools to prevent communication overload
Social media platforms can improve collaboration, but organisations need to be careful not to swamp staff with messages Continue Reading
-
APAC IoT adoption improves amid challenges
More enterprises across the region are using the internet of things to track fleet vehicles and improve operations, but technology integration and security concerns are still holding back widespread adoption Continue Reading
-
Securing your mobile estate – best practice for CIOs
The prevalence of mobile devices in every part of daily life is shaping how enterprises make choices about software and network infrastructure, but how do businesses go about securing these vast new endpoint estates? Continue Reading
-
Facebook’s privacy game – how Zuckerberg backtracked on promises to protect personal data
Facebook promised its users privacy then quietly abandoned its promises in pursuit of profits. Now it faces antitrust regulation Continue Reading
-
Rise of the machines: How AI is changing unified communications
Artificial intelligence is now moving into live UC environments at scale. We look at the impact it will have and what lies ahead Continue Reading
-
How to get the basics of mobile device management right the first time
When adopting mobile device management, there are often fears around implementation and whether or not the strategy is even required Continue Reading
-
Exploring UCaaS: The main benefits for enterprises
Getting unified communications-as-a-service right can mean more agility, higher productivity, and cost control Continue Reading
-
Employee activism: How staff revolts are shaking up the IT recruitment landscape
As staff at tech giants Microsoft, Google and Amazon continue to speak out about pressing social issues, pressure is growing on firms to better align themselves with their employees on ethics Continue Reading
-
Unstructured data compliance: Obstacles and solutions
Stored unstructured data could be a black hole full of unknown risk. We look at the key dangers to compliance in unstructured data and some ways of mitigating the risks Continue Reading
-
Interview: How Hackney Council will help accelerate innovation across London boroughs
Hackney Council’s director of ICT, Rob Miller, talks to Computer Weekly about how one of the most digitally advanced local authorities plans to collaborate with counterparts across the capital to revamp public services delivery Continue Reading
-
Interview: Rackspace EMEA CTO on why it pays to put people at the heart of IT transformation
Rackspace EMEA CTO Lee James opens up about how taking a people-first approach to digital transformation raises staff morale and engagement levels while helping the managed cloud provider win new business Continue Reading
-
Rise in business-led IT spend increases risks and opportunities
Digitally leading businesses benefit from faster time to market, better employee experience and improved finances, but lack of partnership between CIOs and business units can jeopardise progress, says Harvey Nash / KPMG survey Continue Reading
-
SAN vs NAS vs hyper-converged for virtual machine storage
The pros and cons of file and block access storage arrays vs the new breed of all-in-one server/storage architecture for storage of virtual machine systems and data Continue Reading