In Depth
In Depth
Managing IT and business issues
-
How to monitor remote workers humanely
Monitoring employees who work remotely has taken on a whole extra dimension in the Covid-19 pandemic year of 2020. Financial services firms are among those which suggest ways of doing it humanely and legally Continue Reading
-
Security Long Reads: Cyber insiders reveal what’s to come in 2021
In this long read, we gather together the thoughts of cyber security insiders from across the industry to get their take on what will happen in 2021 Continue Reading
-
Patching: Balancing technical requirements with business considerations
With an increasing reliance on subscription models alongside the regular patching of software, updates have become an essential part of modern business practices. However, care needs to be taken to ensure the optimum patching process is implemented Continue Reading
-
Post-pandemic approaches to IAM for cloud security
Cloud technology may have saved businesses from catastrophe during the pandemic, but it has also introduced additional challenges around identity and access management. Here’s why IAM policies are crucial in the new normal Continue Reading
-
A safe bet: How Covid-19 is fuelling investor interest in the datacentre industry
With demand for cloud and colocation capacity soaring on the back of the Covid-19 pandemic, datacentres are looking like an increasingly attractive bet for the investor community. Computer Weekly finds out why Continue Reading
-
This Christmas, Covid-19 heightens retail security risks for everyone
Do you think it’s only retailers and consumers who need to consider cyber security when shopping online during the holidays? You’re dead wrong. This year, the Covid-19 pandemic and the shift to remote working has thrown a spanner in the works Continue Reading
-
How to build an effective vulnerability management programme
As cyber criminals increasingly look to exploit vulnerabilities in software and hardware, businesses must build and implement an effective vulnerability management programme to counter this growing threat Continue Reading
-
How AI is helping to drive business process optimisation
Automating an inefficient process simply leads to a faster inefficient process. Artificial intelligence needs to be deployed to ensure business processes are optimal Continue Reading
-
DDoS mitigation strategies needed to maintain availability during pandemic
The growing prevalence of DDoS attacks combined with the increased reliance on internet connectivity during the pandemic means enterprises can no longer afford to ignore the threat of DDoS attacks. Computer Weekly explores organisations’ perceptions... Continue Reading
-
Credential stuffing: When DDoS isn’t DDoS
Ten years ago, credential stuffing attacks posed a comparatively minor threat, but with an escalating number of data breaches, the threat posed has now increased. What are the solutions to this very human problem? Continue Reading
-
Why securing the DNS layer is crucial to fight cyber crime
Domain name system security is often overlooked by organisations, but focusing on this layer could actually improve the effectiveness of cyber security strategies. We explore the latest DNS trends and best practice Continue Reading
-
Baking adaptability into the supply chain
The coronavirus crisis has highlighted the importance of data and automation in supporting an agile supply chain. Continue Reading
-
How can CIOs prepare for 12 months of uncertainty ahead?
Just 12 months ago, nobody could have predicted where we are now. So how can CIOs prepare for the future amid such uncertainty? We asked five IT leaders for their expert advice Continue Reading
-
Business process automation expansion could founder on IT drift from business focus
Business process automation might find new territory to expand into as businesses have become bloated with excess processes since the 2008 crash. But has IT drifted out of business alignment again? Continue Reading
-
Digital safeguarding of physical workspaces can help employees return to 'normal'
Employees across all sectors are putting their trust in data – not just devices – upon their imminent return to physical workspaces Continue Reading
-
Double extortion ransomware attacks and how to stop them
As ransomware attacks increase, hackers are diversifying their tactics to get victims to hand over larger sums of money. We investigate the rise of double extortion attacks Continue Reading
-
Getting physical with datacentre security
Whether it is natural disasters, terrorism or break-ins, datacentres will be vulnerable to a range of risks unless they are physically secured. Here’s how you can improve the physical security of your datacentre Continue Reading
-
How to achieve resilience – the modern uptime trinity
IT leaders can take responsibility for ensuring their organisations are resilient during times of crisis. There are no quick fixes, but if you think it is expensive to ensure resilience in your IT systems, try frequent failure instead Continue Reading
-
APAC hybrid cloud adoption still cloudy
Although there are clear benefits of hybrid cloud, enterprises in Asia-Pacific aren’t making the most of them due to a lack of holistic understanding, strategic frameworks and skillsets Continue Reading
-
How Malaysia’s industries are tapping IoT
Computer Weekly speaks to four industries that claim to have benefited from various IoT deployments and how it has changed their businesses Continue Reading
-
Will the Covid-19 crisis accelerate a shift in tech talent out of London?
As the coronavirus pandemic has forced firms to work more flexibly, threatening traditional large office spaces in London, will tech talent make a long-term shift away from the capital? Continue Reading
-
APT groups’ mobile momentum finally faces resistance
State-backed APT groups are increasingly targeting mobile devices as Covid-19 puts the spotlight on remote working infrastructure security. We explore how the industry is fighting back Continue Reading
-
How to apply zero-trust models to container security
Containers have become a common fixture in software development, but they have resulted in new concerns for security teams. Is zero-trust the answer to tackling them? Continue Reading
-
Coronavirus: How to go back to the office safely and securely
Security teams should be used to supporting remote workers effectively by now, but what’s going to happen when people start returning to their offices? We look at the risks and how to address them. Continue Reading
-
GDPR at two: How far we’ve come, how far we still have to go
Marking two years of the General Data Protection Regulation, industry voices weigh in on the state of data protection and privacy, consider what has changed, and what still needs to change Continue Reading
-
What are the security priorities for the post-coronavirus world?
The Covid-19 pandemic is forcing massive change across the business world and things may never go back to normal. What does security look like in this new world, and what will buyers be prioritising? Continue Reading
-
Coronavirus: How to cope with the digital skills divide
Since the Covid-19 pandemic started, employers need tech and digital talent more than ever. But how can organisations recruit and train the skills they need during a lockdown? Continue Reading
-
A carrot-and-stick approach to fixing cyber security complacency
With a majority of IT decision-makers holding the opinion that their employers are complacent when it comes to data protection, we look at what needs to be fixed, and how to fix it Continue Reading
-
Australian firms soldier on amid Covid-19 outbreak
From the largest financial institutions to small companies, Aussie firms have been dialling up their use of technology tools to keep their businesses humming during the coronavirus pandemic Continue Reading
-
How APAC firms are coping with the Covid-19 outbreak
The air of change looms large in companies operating in the Asia-Pacific region, with some doing better than others in keeping the lights on amid the coronavirus pandemic Continue Reading
-
What are the drivers for application modernisation?
Application modernisation is not something that just happens, nor is it just driven by digitisation and cloud-first strategies Continue Reading
-
The AWS bucket list: Keep your cloud secure
Misconfigured cloud installations risk billions of records being exposed, damaging organisations’ finances and reputations. Paying attention to securing AWS storage buckets is a simple matter Continue Reading
-
Coronavirus: How to implement safe and secure remote working
Find out what CIOs and CISOs need to know to enable their end-users to work remotely and stay secure during the Covid-19 coronavirus crisis, and learn how users can help themselves Continue Reading
-
Malaysia’s digital transformation efforts progress
Malaysian enterprises are taking steps to modernise their infrastructure, but many are still grappling with the lack of niche IT skills in key emerging technologies such as the internet of things Continue Reading
-
Is this Netflix-style thriller the future of security training?
Cyber awareness specialists at KnowBe4 reckon that bringing Netflix-style production values to corporate videos heralds a new approach to security training Continue Reading
-
Alan Bates: The ‘details man’ the Post Office paid the price for ignoring
In 2003, subpostmaster Alan Bates had his contract terminated when he refused to comply with Post Office policy. A decade and a half later, against the odds, he took the Post Office to the High Court and won a multimillion-pound legal case Continue Reading
-
Whisper it… but could a cyber attack be good for your career?
All too often it’s the CISO who carries the can for an enterprise security failure, but this might not be a bad thing. There’s lots of evidence to suggest that falling victim to a cyber attack may actually enhance your CV Continue Reading
-
Computer Weekly Buyer's Guide features list 2020
Here is our 2020 schedule of up-and-coming in-depth articles that will cover carefully selected topics to help IT leaders select the right technology for their organisation Continue Reading
-
Get ready for CCPA: Implications for UK businesses
The California Consumer Privacy Act, a wide-ranging data privacy and consumer protection law, comes into effect on 1 January 2020. How does CCPA differ from the EU GDPR regulations and what are the responsibilities for UK businesses operating in the... Continue Reading
-
EBA outsourcing guidelines: What banks, fintechs and cloud providers need to know
The regulatory landscape for financial services and outsourcing will undergo a refresh this month with new guidance from the European Banking Authority. We look at what banks, fintechs and cloud firms need to do Continue Reading
-
APAC buyer’s guide to human capital management software
More Asia-Pacific organisations are turning to HCM software to recruit, engage and retain a new breed of employees who increasingly expect personalised services from HR teams Continue Reading
-
Cambridge Cognition CTO on applying server monitoring principles to suicide prevention
Cambridge Cognition CTO, Ricky Dolphin, discusses why it pays to think outside the box when trying to find technological answers to business and customer problems Continue Reading
-
Choose tools to prevent communication overload
Social media platforms can improve collaboration, but organisations need to be careful not to swamp staff with messages Continue Reading
-
APAC IoT adoption improves amid challenges
More enterprises across the region are using the internet of things to track fleet vehicles and improve operations, but technology integration and security concerns are still holding back widespread adoption Continue Reading
-
Facebook’s privacy game – how Zuckerberg backtracked on promises to protect personal data
Facebook promised its users privacy then quietly abandoned its promises in pursuit of profits. Now it faces antitrust regulation Continue Reading
-
How to get the basics of mobile device management right the first time
When adopting mobile device management, there are often fears around implementation and whether or not the strategy is even required Continue Reading
-
Exploring UCaaS: The main benefits for enterprises
Getting unified communications-as-a-service right can mean more agility, higher productivity, and cost control Continue Reading
-
Blackout after Brexit: UK datacentres brace for post-EU power supply and cost changes
As the uncertainty over how the UK intends to extricate itself from the European Union rumbles on, datacentre operators are weighing up how Brexit might affect the availability and cost of the power they need to run their facilities in future Continue Reading
-
How to find a much sought-after data scientist
Every organisation seems to be hunting for a data scientist, but securing the right people with the right skills is a challenge Continue Reading
-
Counting the costs of IaaS and SaaS
Cost management is a priority for organisations seeking to use infrastructure and software as a service Continue Reading
-
Steering a safe course through hybrid cloud
We look at why hybrid cloud can create a tricky infrastructure to manage Continue Reading
-
How IT leaders can build great relationships with marketing leaders
Experts dish out their advice on how to work better together with their marketing peers to deliver a high-quality customer experience Continue Reading
-
How to create a great strategy in the digital age
What are the best ways for technology leaders to create a strategy that is fit for the digital age? Computer Weekly asks the experts Continue Reading
-
When is it best to stick with paper?
Going digital has been seen as the thing to do, but there can be limits to digital and there's an enduring value to paper. Digital isn’t always best Continue Reading
-
IBM pushes boundaries of AI, but insists companies take an ethical approach
Researchers at IBM are pushing the boundaries of what artificial intelligence and machine learning can do, but remain wary of the ethical implications that accompany the proliferation of this technology Continue Reading
-
Where in Britain works best for IT?
Where is the best place to be an IT professional in the UK? Computer Weekly looks at which location comes out on top for tech companies, and it’s not Silicon Roundabout Continue Reading
-
Employers turn to wearable technology to help staff manage work-life balance
Companies are realising that there are sound business reasons for ensuring their employees get enough sleep and exercise, so they are turning to wearable technology to help their staff stay healthy, despite the pressures of work Continue Reading
-
Fighting fit: The ODI on courting startups to use open data to get the UK moving
The Open Data Institute is aiming to change the fact that millions of people in the UK are inactive, and is using open data and startups to help engage citizens to exercise. Continue Reading
-
National Archives races to create electronic archive of EU law before Brexit
The National Archives faces challenges converting the EU's enormous library of laws into a publicly accessible UK archive ahead of Brexit. The Archives’ digital director, John Sheridan, explains how Continue Reading
-
An IT operating model for the digital age
Enterprises need to form cross-functional teams and give them the mandate to work together towards a single goal Continue Reading
-
DevOps done right: Securing grassroots support for a top-down DevOps enterprise push
As more and more enterprises rush to join the DevOps movement, practitioners share details of how they secured grassroots support for their senior leadership team's top-down agile adoption mandates Continue Reading
-
IPsoft’s digital worker is part of a shift in human productivity
IPsoft used its annual user summit to allow customers to update themselves on the career of its cognitive digital agent Amelia Continue Reading
-
Lessons from GE’s flight to digital platforms
Examining the challenges industrial giant GE has encountered on its digital journey and the lessons learned for CIOs heading in the same direction Continue Reading
-
Injecting entrepreneurship into enterprise IT
What should CIOs do to ensure that IT plays a leading role in the digital future of their organisations Continue Reading
-
GDPR: An overview of the latest data protection legislation
The forthcoming General Data Protection Regulation (GDPR) will have wide-ranging implications for every organisation that processes personal data. This comprehensive overview tells you what you need to know Continue Reading
-
The ins and outs of cloud portability
Public cloud portability comes in many forms – the secret is to research and plan appropriately Continue Reading
-
Inside Red Hat’s open culture
The open source stalwart’s culture of transparency, openness and collaboration has been instrumental to its success as one of the world’s most successful software companies Continue Reading
-
How Australian enterprises are unifying business communications
Business leaders and experts in rolling out unified communications tools in Australia stress the importance of change management and employee consultation to avoid digital white elephants Continue Reading
-
Universal Credit: How did it go so wrong?
The DWP’s flagship welfare reform was meant to change the lives of benefits claimants through one simple IT system, but was beset by IT problems, low staff morale and delays. Newly released documents help explain what went wrong Continue Reading
-
Four CIO trends to watch in 2018
As automation becomes more popular, bringing with it plenty of opportunities, 2018 is all about investing in in-house skills and innovation, with a focus on equality and flexibility Continue Reading
-
Inside DBS Bank’s digital journey
The Singapore-based bank laid the foundation for its digital strategy a decade ago, starting with an overhaul of its IT systems before going big on cloud computing in later years Continue Reading
-
UK sale of surveillance equipment to Macedonia raises questions over export licence policy
The UK approved an export licence for the sale of surveillance equipment to Macedonia – while the country was engaged in an illegal surveillance programme against its citizens. A senior minister was consulted on the decision Continue Reading
-
Formula 1: Mercedes team turns to big data in quest for victory in Grand Prix
Data analytics could help Mercedes-AMG Petronas Motorsport team gain an edge on rival Ferrari during the 2017 and 2018 Grand Prix season. Its head of IT, Matt Harris, reveals the team’s plans Continue Reading
-
What it takes for the internet of things to take off in ASEAN
Besides lowering adoption costs, an ecosystem of governments, technology suppliers and telcos is necessary for the internet of things to flourish in Southeast Asia Continue Reading
-
Why and how men in the technology industry have helped women progress
Many have argued gender parity will not happen in the technology industry without help from the top. Since the top is predominantly male, we’ve reached out to some of the men in the industry who are helping to drive tech equality Continue Reading
-
Software asset management maturity in the age of SaaS
For asset tracking, software as a service is no different from any other type of software licensing – but the process of software asset management needs adapting Continue Reading
-
Cloud contracts are still a minefield
Cloud computing is maturing in the enterprise space, but the contracts that underpin cloud services have not evolved at the same pace Continue Reading
-
Value chain mapping – making sense of executive strategy
In this first excerpt from his book on value chain mapping, Simon Wardley explains why business leaders need to understand the importance of maps for corporate strategy Continue Reading
-
Value chain mapping – finding a path
In the second extract from his forthcoming book, Simon Wardley explains how to draw a map to describe the changing nature of your business Continue Reading
-
Lauri Love: the student accused of hacking the US
How did a brilliant but fragile computer science student from a rural English town end up facing life imprisonment in the US? Computer Weekly speaks to Lauri Love Continue Reading
-
CW@50: Bugs, blunders and bad practices
Computer Weekly’s arrival on 22 September 1966 reflected a growing global industry and the hopes for British computing Continue Reading
-
CW@50: Women in technology – the shifting gender landscape
As Computer Weekly celebrates its 50th anniversary, we look back on the great women who have made technology as well as the IT industry possible Continue Reading
-
CW@50: A history of IT outsourcing
Computer Weekly looks at where and when IT outsourcing was invented and considers the changes the sector has gone through since Continue Reading
-
CW@50: The evolution of the CIO
From working in statistics departments to becoming a key part of any business transformation – as Computer Weekly gets ready to celebrate its 50th anniversary, we look back at the changing role of IT leaders Continue Reading
-
Isle of Man: From seaside getaway to tech startup hub
The Isle of Man government is stepping up efforts to position itself as the low-tax jurisdiction of choice for the startup community. But what's it like to do business there? Continue Reading
-
CW@50: Government IT goes full circle in the space of 50 years
As Computer Weekly prepares to celebrate its 50th anniversary this September, we take a look at how government IT has changed over the years Continue Reading
-
My first IoT project: A guide for businesses
We’ve all had a good giggle about having our fridges hacked – but now it’s time to get real. What are the first steps enterprises should take when implementing their first internet of things project? Continue Reading
-
An overview of cloud customer relationship management
Businesses are confident about buying customer relationship management (CRM) software as a cloud-based service. Computer Weekly looks at the main players Continue Reading
-
Co-ordinate outsourced services with Siam
We look at the practical considerations of implementing an effective service integration and management strategy Continue Reading
-
Datacentre heat reuse: Why aren’t more operators doing it?
With the datacentre industry’s sustainability habits coming under increasingly close scrutiny, we find out why operators are not rushing to reuse their waste heat Continue Reading
-
What are containers and microservices?
Independently deployable bits of code can be used to build agile applications. We look at some of the main players Continue Reading
-
Interview: James Bamford on surveillance, Snowden and technology companies
Investigative journalist and documentary maker James Bamford was among the first to uncover the secrets of the US National Security Agency and its global surveillance Continue Reading
-
Acquire new skills for technology management
The age of the customer requires organisations to focus on both the business technology and IT agendas Continue Reading
-
Next‑generation CIOs: The changing role of IT leaders
The position of CIO is changing and there are more people in the role from less technical backgrounds than in the past Continue Reading
-
How CIOs can raise their 'IT clock speed' as pressure to innovate grows
CIOs are facing pressure from the board to roll out IT projects increasingly quickly. How can they do that without running unacceptable risks? This article, based on cutting-edge research among leading businesses, offers some answers Continue Reading
-
Case study: Philips takes agile approach to building bridges between business and IT
Dutch technology giant talks up the success of its attempts to embrace agile IT delivery methods, and how it's shaping future customer engagements Continue Reading
-
Why Pegasystems' CEO, Alan Trefler, has learned to think smaller
Pegasystems has made its name supplying CRM, analytics and case management software to the world's largest companies. Now CEO Alan Trefler plans to use cloud computing to broaden Pega's appeal Continue Reading
-
Still running Windows Server 2003? Don’t panic
Many organisations are facing the prospect of running Windows 2003 server unsupported. Where do you go from here? Continue Reading
-
Bill Binney, the ‘original’ NSA whistleblower, on Snowden, 9/11 and illegal surveillance
Always a patriot: Computer Weekly talks to Bill Binney, the senior NSA official who blew the whistle before Edward Snowden Continue Reading
-
Cloud storage: The top five things that go wrong – and how to avoid them
Cloud storage provides cost savings and ease of management, but there are pitfalls – and here are the top five things that can go wrong Continue Reading