In Depth
In Depth
Managing IT and business issues
-
Creative workers say livelihoods threatened by generative AI
Computer Weekly speaks with various creative workers about the impact generative artificial intelligence systems are having on their work and livelihoods Continue Reading
-
Ivanti vulnerabilities explained: Everything you need to know
A series of vulnerabilities in Ivanti products have caused concern worldwide. Delve into some of the key issues arising from the Ivanti disclosures, looking at the vulnerabilities and their impact, what affected users should do, and learn about new... Continue Reading
-
Post Office Horizon IT scandal inquiry: Two years of shocking revelations
Read about two years of shocking revelations from the Post Office Horizon scandal inquiry Continue Reading
-
The rising prominence of hybrid cloud in the Nordics
Many Nordic organisations have opted for hybrid cloud environments, subscribing to the newest services without giving up what they already have. Best practices are beginning to emerge for managing the heterogenous environment Continue Reading
-
UK police facial recognition explained: What you need to know
In this essential guide, Computer Weekly looks at the use of facial recognition technology by UK police forces, including the points of contention around its deployment so far and where it’s heading next Continue Reading
-
Expert guide to e-discovery
An expert guide to why your organisation needs an electronic discovery policy and how to go about creating one Continue Reading
-
GenAI outlook: Expect industry disruption and job cuts
It’s early days for generative AI, but as the technology becomes more pervasive, the business services sector is likely to experience big changes Continue Reading
-
Biometric revolution in IAM: The future of authentication
The IAM landscape is experiencing profound change thanks to the advent of biometrics. Learn about the latest advantages and key benefits of biometrics in identity Continue Reading
-
British Library cyber attack explained: What you need to know
In this essential guide, Computer Weekly investigates the cyber attack on the British Library that has rendered IT systems inoperable and caused service disruption to thousands of users Continue Reading
-
How hybrid work patterns change end user computing
While some organisations have mandated that staff return to the office, many places still operate a hybrid policy – we look at the IT admin challenges Continue Reading
-
How to recover systems in the event of a cyber attack
Recovering compromised systems after a cyber attack isn’t easy, but understanding industry best practice offers a template for the key processes to follow Continue Reading
-
Elected officials' lack of digital skills affects public services
A lack of digital skills and tech expertise among elected officials encourages government to contract out IT work instead of building up internal capacity, making the public sector increasingly reliant on outside knowledge to get things done Continue Reading
-
Are firms using mergers and acquisitions to inherit talent?
Getting the right tech skills is proving increasingly difficult for businesses, so some are resorting to combining companies to find the industry’s existing talent – but what are the pros and cons? Continue Reading
-
The world's most advanced Arabic LLM is now available on open source
On 30 August 2023, Abu Dhabi-based Inception, a subsidiary of G42, announced the release of an Arabic large language model to open source Continue Reading
-
Greek data watchdog to rule on AI systems in refugee camps
A forthcoming decision on the compliance of surveillance and security systems in Greek refugee camps could set a precedent for how AI and biometric systems are deployed for ‘migration management’ in Europe Continue Reading
-
Jaguar TCS Formula E racing team making breakthroughs that will fine-tune electric road vehicles
The Jaguar TCS Formula E racing team is using software and digital simulations to continually improve its electric racing cars, leading to better performing electric vehicles on our roads Continue Reading
-
Automated cloud IR: Empowering cyber with AI-powered playbooks
As cyber threats increasingly target cloud infrastructure, demand for robust and reliable incident response measures is through the roof. Find out why you might want to consider bringing artificial intelligence into play Continue Reading
-
CIO interview: Petra Tesch, Vizrt
Straight-talking when it comes to getting her messages across to the wider company, Vizrt CIO Petra Tesch revels in transformation and communication Continue Reading
-
AI-powered cloud SIEM: Real-time threat intel boosts defences
Thanks to their advanced data analysis and predictive capabilities, AI and ML will be valuable protective tools going forward. Learn about the potential of AI-backed cloud SIEM technology Continue Reading
-
Chief data officer interview: Neema Raphael, Goldman Sachs
After two decades at Goldman Sachs, Neema Raphael tells Computer Weekly about his tech journey at one of the world’s biggest banks Continue Reading
-
What the Product Security and Telecommunications Infrastructure Act means for UK industry
For years, many network-connected devices have lacked adequate security, putting their users and others at risk of cyber attacks. The UK’s PSTI Act aims to prevent this by mandating minimum security requirements, but what impact will this have on ... Continue Reading
-
Norwegian data privacy experts sound alarm over generative AI
Hundreds of millions of people embrace generative artificial intelligence, blissfully ignorant of what it’s doing to data privacy. Continue Reading
-
Why low code/no code opens doors but no panacea for skills shortages
Citizen development is not without risk but it has a bright future in the enterprise, especially as a way to handle skills gaps Continue Reading
-
Aalto University: The startup’s starting place
Helsinki's Aalto University is at the heart of one of the world's most productive tech startup hotbeds Continue Reading
-
ChatGPT is creating a legal and compliance headache for business
ChatGPT’s increased use in the workplace has led many to question its legal and compliance implications for businesses. Experts warn that the software poses major security and copyright risks Continue Reading
-
Why we need advanced malware detection with AI-powered tools
AI-powered cyber security tools have now developed to a point where they are becoming an effective approach to protecting the organisation. Learn how you can benefit from adopting them Continue Reading
-
How AI ethics is coming to the fore with generative AI
The hype around ChatGPT and other large language models is driving more interest in AI and putting ethical considerations surrounding their use to the fore Continue Reading
-
How artificial intelligence and automation can streamline procurement
We speak to chief procurement officers about the role of artificial intelligence in helping their organisations reduce costs and tackle the economic slowdown Continue Reading
-
The CIO challenges brought by e-commerce in Kuwait
E-commerce is growing fast in Kuwait, resulting in new challenges for CIOs in the retail sector Continue Reading
-
Inspired by the human brain, Belgian researchers develop a new generation of sensors
Belgian researchers have found ways of mimicking the human brain to improve sensors and the way they pass data to central computers Continue Reading
-
How APCOA is using big data to reinvent car parks
Car park operator APCOA is using big data to transform traditional car parks into mobility hubs that will offer electric vehicle charging, space for small businesses and depots for delivery companies Continue Reading
-
The changing role of the CIO from a Finnish perspective
A small country with a sophisticated workforce, Finland has its own perspective on how IT leadership is changing in both the public and private sector Continue Reading
-
Generative AI at watershed moment with spate of legal challenges
Just over 20 years ago, Napster was closed on copyright grounds for allowing users to access digital copies of music for free. Now, a spate of legal cases have experts questioning whether OpenAI and other generative AI innovators will go the same way Continue Reading
-
What can security teams learn from a year of cyber warfare?
With the passing of the first anniversary of Russia’s invasion of Ukraine, we reflect on the ongoing cyber war, and ask what security leaders can learn from the past 12 months Continue Reading
-
Software enables new business model for Sweden-headquartered car manufacturer
One of the many things software now does with cars is to enable ‘mobility as a service’, a new business model that provides people with freedom of movement, without the cost and hassle of ownership Continue Reading
-
Securing low Earth orbit represents the new space race
The barriers to launching satellites into low Earth orbit are falling fast, and that brings new cyber security challenges Continue Reading
-
Cyber security professionals share their biggest lessons of 2022
In the run-up to 2023, cyber security professionals are taking the time to reflect on the past few months and share their biggest lessons of 2022 Continue Reading
-
A sticky story: How, and why, hackers love stickers on laptops
We’ve all seen laptops adorned with security stickers and in-jokes, but how did this cyber community trend get started, what does it signify, and what does it say about the humans behind the screens? Continue Reading
-
Storage hardware shortage causes and how to mitigate them
We look at the IT supply chain shortages that have hit data storage equipment, their causes and what organisations can do to work more smartly to mitigate them Continue Reading
-
Can real-time data visualisation deliver trust and opportunity?
More than ever, decision-makers are relying on data to plot a path through the economic turmoil. We explore where real-time data fits Continue Reading
-
From capex to opex: Storage procurement options bloom
We look at the growing list of possibilities when it comes to paying for storage infrastructure, ranging from upfront purchases with upgrades to pure pay-as-you-go options Continue Reading
-
How gamifying cyber training can improve your defences
Security training is the cornerstone of any cyber defence strategy. With ever-escalating online threats, it is now more important than ever that this training is an engaging experience Continue Reading
-
An encouraging new conversation around sustainable IT, says Nordic CIO
What started as a whisper a decade ago has become distinctly audible chatter among IT leaders sharing best practices on how to protect the environment Continue Reading
-
AI experts question tech industry’s ethical commitments
The massive proliferation of ethical frameworks for artificial intelligence has done little to change how the technology is developed and deployed, with experts questioning the tech industry’s commitment to making it a positive social force Continue Reading
-
The tech helping organisations manage their finances
With a worsening economic climate, software has an important role in helping finance departments control budgets and spending Continue Reading
-
Will the OCSF create an open and collaborative cyber industry?
The Open Cybersecurity Schema Framework promises to transform security data analysis and collection, but there are challenges around adoption Continue Reading
-
What do the US’s new software security rules mean for UK organisations?
The White House announced recently that all software supplied to the US government and its agencies needs to be secure, so what does this mean for the UK and EU security sectors? Continue Reading
-
Clickwork and labour exploitation in the digital economy
Often ignored or assumed to be work conducted by machines rather than people, Computer Weekly explores the hidden human impact of the ‘clickwork’ that underpins the global digital economy Continue Reading
-
Hybrid working: Preventing damage to company culture
The hybrid working model is still a work in progress, and most employers are at an early stage in learning and finding their way towards achieving its benefits Continue Reading
-
Carbon copies: How to stop data retention from killing the planet
Our society has a serious digital hoarding problem, which is coming at a cost to the environment. But what can be done to address it? Continue Reading
-
How water conservation and management floats on cloud
From the cloud comes our water supply – an essential building block and life support system increasingly underpinned by IT infrastructure Continue Reading
-
Icelandic datacentres may lead the way to green IT
Iceland may soon become even more attractive to companies wanting to minimise their carbon footprint while using high-performance computing services Continue Reading
-
Luxembourg taps into innovation for better government tech
With a diverse population and a digital inclusion and open innovation strategy, Luxembourg has developed a way of using technology to improve government services Continue Reading
-
Tech sector efforts to root out forced labour are failing
Digitally mapping supply chains to identify forced labour and slavery is no longer a technology problem for the IT sector, but a lack of government enforcement and corporate inaction are major barriers to effective change Continue Reading
-
The cyber security impact of Operation Russia by Anonymous
The campaign against the Russian government by Anonymous surprised many with the depth and scale of the cyber attacks. What can we learn from this online war? Continue Reading
-
What the EU’s content-filtering rules could mean for UK tech
EU proposals to clamp down on child sexual abuse material will have a material impact on the UK’s technology sector Continue Reading
-
Attack of the clones: the rise of identity theft on social media
The proliferation of social media has resulted in the rise of identity theft on these platforms, with accounts copied for fraudulent or malicious purposes. What can be done to mitigate it? Continue Reading
-
Macs in the enterprise – what you need to know
A guide to managing Apple Mac hardware and operating systems in the enterprise Continue Reading
-
Tech companies join UK four-day work week trial
Computer Weekly speaks with tech companies taking part in the UK’s upcoming four-day work week trial, which will measure the impact of shorter working weeks on productivity, wellbeing and the environment Continue Reading
-
How to retain cyber talent in the Great Resignation
The cyber security industry is experiencing alarming rates of resignations, leaving organisations vulnerable to cyber attacks. How can we better retain cyber talent? Continue Reading
-
Interview: LF Energy on using open source to ready energy systems for phasing out fossil fuels
With the climate crisis putting increasing pressure on countries to decarbonise their economies, the founder of open source championing LF Energy talks about digitising power networks to be ready for renewables Continue Reading
-
Recruitment risks: Avoiding the dangers of fraudulent candidates
Tech companies are seeing an increase in fraudulent job applications, with associated impacts on risk and cyber security. So how can organisations protect themselves from fraudulent applicants while ensuring they recruit the best talent? Continue Reading
-
Cloud ERP: Rise of the industry cloud
There is a new variable in the build or buy debate, and it’s all about the way cloud-based services connect internal and external business processes Continue Reading
-
It takes a village: Protecting kids online is everyone’s responsibility
The rapid uptake of smartphones among children has contributed to the increasing number of cases of cyber bullying and online grooming. Is this an educational issue or a cultural problem, and can modern enterprise help? Continue Reading
-
Evolving a data integration strategy
Linking IT systems together is never going away, but the approach CIOs adopt is key to ensuring relevant data feeds the decision-making process Continue Reading
-
How Dutch hackers are working to make the internet safe
We hear how the personal mission of a Dutch hacker grew into a serious organisation with international ambitions Continue Reading
-
What neurodivergent people really think of working in cyber security
Many firms are filling cyber security skills gaps by hiring neurodivergent talent – but more support is needed for neurodivergent cyber security professionals, writes autistic tech journalist Nicholas Fearn Continue Reading
-
Navigating PIPL: European businesses plot their next steps into China
How does China’s strict new Personal Information Protection Law impact European businesses? Continue Reading
-
Is the IT sector beset by fear-mongering?
The arms race between hackers and security teams has led to a plethora of new technologies, but it can be hard to differentiate between sensible cyber purchases and those that are promoted by exaggerating risk Continue Reading
-
The emerging role of software in business development
Business leaders generally recognise the importance of software as a business enabler – but some see technology driving business growth Continue Reading
-
Social value not yet fully embedded in procurement practices
Social value procurement rules are designed to diversify the public sector’s supplier base while providing society with wider collective benefits, but are yet to be fully introduced Continue Reading
-
APAC expert guide to cloud migration
In this expert guide on cloud migration in Asia-Pacific, we highlight the key considerations and strategies that enterprises can take when moving their workloads to public cloud Continue Reading
-
What Norwegians are learning as they pioneer autonomous ships
Norway is leading the world in developing autonomous ship technology – and the world should pay attention to its latest developments Continue Reading
-
Digital surveillance of remote workers may increase enterprise risk
From productivity tools to security threats, we explore how digital surveillance is forcing remote workers towards shadow IT Continue Reading
-
How to manage endpoint security in a hybrid work environment
The future of the workplace is clearly hybrid, but this has untold implications around endpoint security. How can businesses overcome these? Continue Reading
-
Online Safety Bill puts user protection onus on platform providers
The Online Safety Bill will place new duties and responsibilities on online platforms accessible from the UK, but as it currently stands, it contains several grey areas Continue Reading
-
Back on the office network: What are the risks for mobile users?
Many people are returning to offices and bringing their mobile devices with them. What are the cyber security implications of this? Continue Reading
-
How Estonia’s country-as-a-service scheme has attracted tens of thousands of foreign entrepreneurs
Estonia has created a country-as-a-service offering which is attracting entrepreneurs and businesses from across the world Continue Reading
-
Is the tech sector facing an IT skills exodus?
Three out of five of tech professionals say they are looking to move jobs over the next year. Why is this, and how big a skills problem is the tech industry facing? Continue Reading
-
How do SOAR and SIEM services fare in a rapidly changing cyber threat landscape?
Given that cyber risks are rapidly growing in sophistication and number, we look at whether SIEM and SOAR security tools are still effective Continue Reading
-
Making the enterprise composable
We speak to industry experts about how to develop composable IT that can quickly adapt to business change Continue Reading
-
Boots leading drive for ‘professionalisation of IT’ in retail
Boots becomes member of the BCS, the Chartered Institute for IT, as CIO Rich Corbridge accelerates drive for the ‘professionalisation of IT’ Continue Reading
-
What the Telecommunications (Security) Bill means for UK industry
The Telecommunications (Security) Bill is intended to reinforce the security of the UK telecommunications infrastructure, but what are the implications for industry? Continue Reading
-
Buying a VPN? Here’s what you need to know
VPNs are an effective cyber security tool for businesses and remote workers, but there are many things to consider before purchasing and implementing one. We explore some of these Continue Reading
-
How AI and automation drive better customer service
Forrester analysts explore the benefits of combining artificial intelligence with automation Continue Reading
-
APAC buyer’s guide to HRM software
In this buyer’s guide, we look at the key considerations when choosing human resource management software to enable workforce resilience, flexibility and agility in the post-pandemic world Continue Reading
-
Why some jobseekers have turned to cyber crime during the pandemic
Research shows that many people have been seeking cyber crime-related work on the dark web, but why? Continue Reading
-
Ecolabels and data sanitisation key to recycling and reusing IT assets
Ecolabels on hardware and data sanitisation of devices are key to recycling and reusing old IT equipment respectively, helping enterprises avoid unnecessary asset destruction and contributing to increasingly high levels of electronic waste globally Continue Reading
-
How to choose the right email security service for your organisation
With email security threats growing rapidly, businesses can quickly identify and block these by using a top email security service. Here’s how to select the right provider Continue Reading
-
Does email security need a human solution or a tech solution?
People spend a lot of time using email systems, but many do not realise that this makes them attractive targets for cyber criminals. With education and technology, businesses can tackle this problem head-on Continue Reading
-
Dealing with the challenge of beg bounties
The rise of so-called beg bounties is becoming a challenge for security teams, and can be a drain on time and resources. But what is a beg bounty, and how does it differ from a bug bounty? Continue Reading
-
Is it time to ban ransomware insurance payments?
The former head of the NCSC recently called for a dialogue over whether or not it is time to ban insurers from covering ransomware payments. Is he on the right track? Continue Reading
-
APAC career guide: How to become a DevOps engineer
A DevOps career can be highly rewarding, as long as you are open to learning new things and collaborating with team mates to solve problems in software development Continue Reading
-
How can healthcare organisations fight increased cyber crime in 2021?
As the Covid-19 pandemic enters what may be its most dangerous phase, we explore how healthcare organisations can ward off cyber threats while preserving their ability to deliver critical care Continue Reading
-
Picking the right IAM tools is based on more than today’s needs
With remote working now normal, it is important to take proactive steps in managing credentials across platforms that can be subject to multiple data protection regulations. IAM services can streamline this process, but care must be taken to ensure ... Continue Reading
-
The nation state threat to business
The SolarWinds hack shows the widespread damage possible from a nation state cyber attack. What is the threat to business and how can it be mitigated? Continue Reading
-
How to monitor remote workers humanely
Monitoring employees who work remotely has taken on a whole extra dimension in the Covid-19 pandemic year of 2020. Financial services firms are among those which suggest ways of doing it humanely and legally Continue Reading
-
Security Long Reads: Cyber insiders reveal what’s to come in 2021
In this long read, we gather together the thoughts of cyber security insiders from across the industry to get their take on what will happen in 2021 Continue Reading
-
Patching: Balancing technical requirements with business considerations
With an increasing reliance on subscription models alongside the regular patching of software, updates have become an essential part of modern business practices. However, care needs to be taken to ensure the optimum patching process is implemented Continue Reading
-
Post-pandemic approaches to IAM for cloud security
Cloud technology may have saved businesses from catastrophe during the pandemic, but it has also introduced additional challenges around identity and access management. Here’s why IAM policies are crucial in the new normal Continue Reading