In Depth
In Depth
Managing IT and business issues
-
CIO interview: Petra Tesch, Vizrt
Straight-talking when it comes to getting her messages across to the wider company, Vizrt CIO Petra Tesch revels in transformation and communication Continue Reading
-
AI-powered cloud SIEM: Real-time threat intel boosts defences
Thanks to their advanced data analysis and predictive capabilities, AI and ML will be valuable protective tools going forward. Learn about the potential of AI-backed cloud SIEM technology Continue Reading
-
Chief data officer interview: Neema Raphael, Goldman Sachs
After two decades at Goldman Sachs, Neema Raphael tells Computer Weekly about his tech journey at one of the world’s biggest banks Continue Reading
-
What the Product Security and Telecommunications Infrastructure Act means for UK industry
For years, many network-connected devices have lacked adequate security, putting their users and others at risk of cyber attacks. The UK’s Product Security and Telecommunication Act aims to prevent this by mandating minimum security requirements, ... Continue Reading
-
Norwegian data privacy experts sound alarm over generative AI
Hundreds of millions of people embrace generative artificial intelligence, blissfully ignorant of what it’s doing to data privacy. Continue Reading
-
Why low code/no code opens doors but no panacea for skills shortages
Citizen development is not without risk but it has a bright future in the enterprise, especially as a way to handle skills gaps Continue Reading
-
Aalto University: The startup’s starting place
Helsinki's Aalto University is at the heart of one of the world's most productive tech startup hotbeds Continue Reading
-
ChatGPT is creating a legal and compliance headache for business
ChatGPT’s increased use in the workplace has led many to question its legal and compliance implications for businesses. Experts warn that the software poses major security and copyright risks Continue Reading
-
Why we need advanced malware detection with AI-powered tools
AI-powered cyber security tools have now developed to a point where they are becoming an effective approach to protecting the organisation. Learn how you can benefit from adopting them Continue Reading
-
How AI ethics is coming to the fore with generative AI
The hype around ChatGPT and other large language models is driving more interest in AI and putting ethical considerations surrounding their use to the fore Continue Reading
-
How artificial intelligence and automation can streamline procurement
We speak to chief procurement officers about the role of artificial intelligence in helping their organisations reduce costs and tackle the economic slowdown Continue Reading
-
The CIO challenges brought by e-commerce in Kuwait
E-commerce is growing fast in Kuwait, resulting in new challenges for CIOs in the retail sector Continue Reading
-
Inspired by the human brain, Belgian researchers develop a new generation of sensors
Belgian researchers have found ways of mimicking the human brain to improve sensors and the way they pass data to central computers Continue Reading
-
How APCOA is using big data to reinvent car parks
Car park operator APCOA is using big data to transform traditional car parks into mobility hubs that will offer electric vehicle charging, space for small businesses and depots for delivery companies Continue Reading
-
The changing role of the CIO from a Finnish perspective
A small country with a sophisticated workforce, Finland has its own perspective on how IT leadership is changing in both the public and private sector Continue Reading
-
Generative AI at watershed moment with spate of legal challenges
Just over 20 years ago, Napster was closed on copyright grounds for allowing users to access digital copies of music for free. Now, a spate of legal cases have experts questioning whether OpenAI and other generative AI innovators will go the same way Continue Reading
-
What can security teams learn from a year of cyber warfare?
With the passing of the first anniversary of Russia’s invasion of Ukraine, we reflect on the ongoing cyber war, and ask what security leaders can learn from the past 12 months Continue Reading
-
Software enables new business model for Sweden-headquartered car manufacturer
One of the many things software now does with cars is to enable ‘mobility as a service’, a new business model that provides people with freedom of movement, without the cost and hassle of ownership Continue Reading
-
Securing low Earth orbit represents the new space race
The barriers to launching satellites into low Earth orbit are falling fast, and that brings new cyber security challenges Continue Reading
-
Cyber security professionals share their biggest lessons of 2022
In the run-up to 2023, cyber security professionals are taking the time to reflect on the past few months and share their biggest lessons of 2022 Continue Reading
-
A sticky story: How, and why, hackers love stickers on laptops
We’ve all seen laptops adorned with security stickers and in-jokes, but how did this cyber community trend get started, what does it signify, and what does it say about the humans behind the screens? Continue Reading
-
Storage hardware shortage causes and how to mitigate them
We look at the IT supply chain shortages that have hit data storage equipment, their causes and what organisations can do to work more smartly to mitigate them Continue Reading
-
Can real-time data visualisation deliver trust and opportunity?
More than ever, decision-makers are relying on data to plot a path through the economic turmoil. We explore where real-time data fits Continue Reading
-
From capex to opex: Storage procurement options bloom
We look at the growing list of possibilities when it comes to paying for storage infrastructure, ranging from upfront purchases with upgrades to pure pay-as-you-go options Continue Reading
-
How gamifying cyber training can improve your defences
Security training is the cornerstone of any cyber defence strategy. With ever-escalating online threats, it is now more important than ever that this training is an engaging experience Continue Reading
-
An encouraging new conversation around sustainable IT, says Nordic CIO
What started as a whisper a decade ago has become distinctly audible chatter among IT leaders sharing best practices on how to protect the environment Continue Reading
-
AI experts question tech industry’s ethical commitments
The massive proliferation of ethical frameworks for artificial intelligence has done little to change how the technology is developed and deployed, with experts questioning the tech industry’s commitment to making it a positive social force Continue Reading
-
The tech helping organisations manage their finances
With a worsening economic climate, software has an important role in helping finance departments control budgets and spending Continue Reading
-
Will the OCSF create an open and collaborative cyber industry?
The Open Cybersecurity Schema Framework promises to transform security data analysis and collection, but there are challenges around adoption Continue Reading
-
What do the US’s new software security rules mean for UK organisations?
The White House announced recently that all software supplied to the US government and its agencies needs to be secure, so what does this mean for the UK and EU security sectors? Continue Reading
-
Clickwork and labour exploitation in the digital economy
Often ignored or assumed to be work conducted by machines rather than people, Computer Weekly explores the hidden human impact of the ‘clickwork’ that underpins the global digital economy Continue Reading
-
Hybrid working: Preventing damage to company culture
The hybrid working model is still a work in progress, and most employers are at an early stage in learning and finding their way towards achieving its benefits Continue Reading
-
Carbon copies: How to stop data retention from killing the planet
Our society has a serious digital hoarding problem, which is coming at a cost to the environment. But what can be done to address it? Continue Reading
-
How water conservation and management floats on cloud
From the cloud comes our water supply – an essential building block and life support system increasingly underpinned by IT infrastructure Continue Reading
-
Icelandic datacentres may lead the way to green IT
Iceland may soon become even more attractive to companies wanting to minimise their carbon footprint while using high-performance computing services Continue Reading
-
Luxembourg taps into innovation for better government tech
With a diverse population and a digital inclusion and open innovation strategy, Luxembourg has developed a way of using technology to improve government services Continue Reading
-
Tech sector efforts to root out forced labour are failing
Digitally mapping supply chains to identify forced labour and slavery is no longer a technology problem for the IT sector, but a lack of government enforcement and corporate inaction are major barriers to effective change Continue Reading
-
The cyber security impact of Operation Russia by Anonymous
The campaign against the Russian government by Anonymous surprised many with the depth and scale of the cyber attacks. What can we learn from this online war? Continue Reading
-
What the EU’s content-filtering rules could mean for UK tech
EU proposals to clamp down on child sexual abuse material will have a material impact on the UK’s technology sector Continue Reading
-
Attack of the clones: the rise of identity theft on social media
The proliferation of social media has resulted in the rise of identity theft on these platforms, with accounts copied for fraudulent or malicious purposes. What can be done to mitigate it? Continue Reading
-
Macs in the enterprise – what you need to know
A guide to managing Apple Mac hardware and operating systems in the enterprise Continue Reading
-
Tech companies join UK four-day work week trial
Computer Weekly speaks with tech companies taking part in the UK’s upcoming four-day work week trial, which will measure the impact of shorter working weeks on productivity, wellbeing and the environment Continue Reading
-
How to retain cyber talent in the Great Resignation
The cyber security industry is experiencing alarming rates of resignations, leaving organisations vulnerable to cyber attacks. How can we better retain cyber talent? Continue Reading
-
Interview: LF Energy on using open source to ready energy systems for phasing out fossil fuels
With the climate crisis putting increasing pressure on countries to decarbonise their economies, the founder of open source championing LF Energy talks about digitising power networks to be ready for renewables Continue Reading
-
Recruitment risks: Avoiding the dangers of fraudulent candidates
Tech companies are seeing an increase in fraudulent job applications, with associated impacts on risk and cyber security. So how can organisations protect themselves from fraudulent applicants while ensuring they recruit the best talent? Continue Reading
-
Cloud ERP: Rise of the industry cloud
There is a new variable in the build or buy debate, and it’s all about the way cloud-based services connect internal and external business processes Continue Reading
-
It takes a village: Protecting kids online is everyone’s responsibility
The rapid uptake of smartphones among children has contributed to the increasing number of cases of cyber bullying and online grooming. Is this an educational issue or a cultural problem, and can modern enterprise help? Continue Reading
-
Evolving a data integration strategy
Linking IT systems together is never going away, but the approach CIOs adopt is key to ensuring relevant data feeds the decision-making process Continue Reading
-
How Dutch hackers are working to make the internet safe
We hear how the personal mission of a Dutch hacker grew into a serious organisation with international ambitions Continue Reading
-
What neurodivergent people really think of working in cyber security
Many firms are filling cyber security skills gaps by hiring neurodivergent talent – but more support is needed for neurodivergent cyber security professionals, writes autistic tech journalist Nicholas Fearn Continue Reading
-
Navigating PIPL: European businesses plot their next steps into China
How does China’s strict new Personal Information Protection Law impact European businesses? Continue Reading
-
Is the IT sector beset by fear-mongering?
The arms race between hackers and security teams has led to a plethora of new technologies, but it can be hard to differentiate between sensible cyber purchases and those that are promoted by exaggerating risk Continue Reading
-
The emerging role of software in business development
Business leaders generally recognise the importance of software as a business enabler – but some see technology driving business growth Continue Reading
-
Social value not yet fully embedded in procurement practices
Social value procurement rules are designed to diversify the public sector’s supplier base while providing society with wider collective benefits, but are yet to be fully introduced Continue Reading
-
APAC expert guide to cloud migration
In this expert guide on cloud migration in Asia-Pacific, we highlight the key considerations and strategies that enterprises can take when moving their workloads to public cloud Continue Reading
-
What Norwegians are learning as they pioneer autonomous ships
Norway is leading the world in developing autonomous ship technology – and the world should pay attention to its latest developments Continue Reading
-
Digital surveillance of remote workers may increase enterprise risk
From productivity tools to security threats, we explore how digital surveillance is forcing remote workers towards shadow IT Continue Reading
-
How to manage endpoint security in a hybrid work environment
The future of the workplace is clearly hybrid, but this has untold implications around endpoint security. How can businesses overcome these? Continue Reading
-
Online Safety Bill puts user protection onus on platform providers
The Online Safety Bill will place new duties and responsibilities on online platforms accessible from the UK, but as it currently stands, it contains several grey areas Continue Reading
-
Back on the office network: What are the risks for mobile users?
Many people are returning to offices and bringing their mobile devices with them. What are the cyber security implications of this? Continue Reading
-
How Estonia’s country-as-a-service scheme has attracted tens of thousands of foreign entrepreneurs
Estonia has created a country-as-a-service offering which is attracting entrepreneurs and businesses from across the world Continue Reading
-
Is the tech sector facing an IT skills exodus?
Three out of five of tech professionals say they are looking to move jobs over the next year. Why is this, and how big a skills problem is the tech industry facing? Continue Reading
-
How do SOAR and SIEM services fare in a rapidly changing cyber threat landscape?
Given that cyber risks are rapidly growing in sophistication and number, we look at whether SIEM and SOAR security tools are still effective Continue Reading
-
Making the enterprise composable
We speak to industry experts about how to develop composable IT that can quickly adapt to business change Continue Reading
-
Boots leading drive for ‘professionalisation of IT’ in retail
Boots becomes member of the BCS, the Chartered Institute for IT, as CIO Rich Corbridge accelerates drive for the ‘professionalisation of IT’ Continue Reading
-
What the Telecommunications (Security) Bill means for UK industry
The Telecommunications (Security) Bill is intended to reinforce the security of the UK telecommunications infrastructure, but what are the implications for industry? Continue Reading
-
Buying a VPN? Here’s what you need to know
VPNs are an effective cyber security tool for businesses and remote workers, but there are many things to consider before purchasing and implementing one. We explore some of these Continue Reading
-
How AI and automation drive better customer service
Forrester analysts explore the benefits of combining artificial intelligence with automation Continue Reading
-
APAC buyer’s guide to HRM software
In this buyer’s guide, we look at the key considerations when choosing human resource management software to enable workforce resilience, flexibility and agility in the post-pandemic world Continue Reading
-
Why some jobseekers have turned to cyber crime during the pandemic
Research shows that many people have been seeking cyber crime-related work on the dark web, but why? Continue Reading
-
Ecolabels and data sanitisation key to recycling and reusing IT assets
Ecolabels on hardware and data sanitisation of devices are key to recycling and reusing old IT equipment respectively, helping enterprises avoid unnecessary asset destruction and contributing to increasingly high levels of electronic waste globally Continue Reading
-
How to choose the right email security service for your organisation
With email security threats growing rapidly, businesses can quickly identify and block these by using a top email security service. Here’s how to select the right provider Continue Reading
-
Does email security need a human solution or a tech solution?
People spend a lot of time using email systems, but many do not realise that this makes them attractive targets for cyber criminals. With education and technology, businesses can tackle this problem head-on Continue Reading
-
Dealing with the challenge of beg bounties
The rise of so-called beg bounties is becoming a challenge for security teams, and can be a drain on time and resources. But what is a beg bounty, and how does it differ from a bug bounty? Continue Reading
-
Is it time to ban ransomware insurance payments?
The former head of the NCSC recently called for a dialogue over whether or not it is time to ban insurers from covering ransomware payments. Is he on the right track? Continue Reading
-
APAC career guide: How to become a DevOps engineer
A DevOps career can be highly rewarding, as long as you are open to learning new things and collaborating with team mates to solve problems in software development Continue Reading
-
How can healthcare organisations fight increased cyber crime in 2021?
As the Covid-19 pandemic enters what may be its most dangerous phase, we explore how healthcare organisations can ward off cyber threats while preserving their ability to deliver critical care Continue Reading
-
Picking the right IAM tools is based on more than today’s needs
With remote working now normal, it is important to take proactive steps in managing credentials across platforms that can be subject to multiple data protection regulations. IAM services can streamline this process, but care must be taken to ensure ... Continue Reading
-
The nation state threat to business
The SolarWinds hack shows the widespread damage possible from a nation state cyber attack. What is the threat to business and how can it be mitigated? Continue Reading
-
How to monitor remote workers humanely
Monitoring employees who work remotely has taken on a whole extra dimension in the Covid-19 pandemic year of 2020. Financial services firms are among those which suggest ways of doing it humanely and legally Continue Reading
-
Security Long Reads: Cyber insiders reveal what’s to come in 2021
In this long read, we gather together the thoughts of cyber security insiders from across the industry to get their take on what will happen in 2021 Continue Reading
-
Patching: Balancing technical requirements with business considerations
With an increasing reliance on subscription models alongside the regular patching of software, updates have become an essential part of modern business practices. However, care needs to be taken to ensure the optimum patching process is implemented Continue Reading
-
Post-pandemic approaches to IAM for cloud security
Cloud technology may have saved businesses from catastrophe during the pandemic, but it has also introduced additional challenges around identity and access management. Here’s why IAM policies are crucial in the new normal Continue Reading
-
A safe bet: How Covid-19 is fuelling investor interest in the datacentre industry
With demand for cloud and colocation capacity soaring on the back of the Covid-19 pandemic, datacentres are looking like an increasingly attractive bet for the investor community. Computer Weekly finds out why Continue Reading
-
This Christmas, Covid-19 heightens retail security risks for everyone
Do you think it’s only retailers and consumers who need to consider cyber security when shopping online during the holidays? You’re dead wrong. This year, the Covid-19 pandemic and the shift to remote working has thrown a spanner in the works Continue Reading
-
How to build an effective vulnerability management programme
As cyber criminals increasingly look to exploit vulnerabilities in software and hardware, businesses must build and implement an effective vulnerability management programme to counter this growing threat Continue Reading
-
How AI is helping to drive business process optimisation
Automating an inefficient process simply leads to a faster inefficient process. Artificial intelligence needs to be deployed to ensure business processes are optimal Continue Reading
-
DDoS mitigation strategies needed to maintain availability during pandemic
The growing prevalence of DDoS attacks combined with the increased reliance on internet connectivity during the pandemic means enterprises can no longer afford to ignore the threat of DDoS attacks. Computer Weekly explores organisations’ perceptions... Continue Reading
-
Credential stuffing: When DDoS isn’t DDoS
Ten years ago, credential stuffing attacks posed a comparatively minor threat, but with an escalating number of data breaches, the threat posed has now increased. What are the solutions to this very human problem? Continue Reading
-
Why securing the DNS layer is crucial to fight cyber crime
Domain name system security is often overlooked by organisations, but focusing on this layer could actually improve the effectiveness of cyber security strategies. We explore the latest DNS trends and best practice Continue Reading
-
Baking adaptability into the supply chain
The coronavirus crisis has highlighted the importance of data and automation in supporting an agile supply chain. Continue Reading
-
How can CIOs prepare for 12 months of uncertainty ahead?
Just 12 months ago, nobody could have predicted where we are now. So how can CIOs prepare for the future amid such uncertainty? We asked five IT leaders for their expert advice Continue Reading
-
Business process automation expansion could founder on IT drift from business focus
Business process automation might find new territory to expand into as businesses have become bloated with excess processes since the 2008 crash. But has IT drifted out of business alignment again? Continue Reading
-
Digital safeguarding of physical workspaces can help employees return to 'normal'
Employees across all sectors are putting their trust in data – not just devices – upon their imminent return to physical workspaces Continue Reading
-
Double extortion ransomware attacks and how to stop them
As ransomware attacks increase, hackers are diversifying their tactics to get victims to hand over larger sums of money. We investigate the rise of double extortion attacks Continue Reading
-
Getting physical with datacentre security
Whether it is natural disasters, terrorism or break-ins, datacentres will be vulnerable to a range of risks unless they are physically secured. Here’s how you can improve the physical security of your datacentre Continue Reading
-
How to achieve resilience – the modern uptime trinity
IT leaders can take responsibility for ensuring their organisations are resilient during times of crisis. There are no quick fixes, but if you think it is expensive to ensure resilience in your IT systems, try frequent failure instead Continue Reading
-
APAC hybrid cloud adoption still cloudy
Although there are clear benefits of hybrid cloud, enterprises in Asia-Pacific aren’t making the most of them due to a lack of holistic understanding, strategic frameworks and skillsets Continue Reading
-
How Malaysia’s industries are tapping IoT
Computer Weekly speaks to four industries that claim to have benefited from various IoT deployments and how it has changed their businesses Continue Reading
-
Will the Covid-19 crisis accelerate a shift in tech talent out of London?
As the coronavirus pandemic has forced firms to work more flexibly, threatening traditional large office spaces in London, will tech talent make a long-term shift away from the capital? Continue Reading