Opinion
Opinion
IT security
-
Licensing: Do not become a target
Beware licence complications of second-hand software, says Quentin Archer. Continue Reading
-
Your shout: Security is everyone's responsibility, e-recycling
Computer Weekly readers have their say. Continue Reading
-
No jobs for the bad boys
Can there ever be such a person as an ex-hacker?, asks Mark Hanvey Continue Reading
-
A question of quality
It is good to see Oracle's chief security officer, Mary-Ann Davidson, admit that the IT industry's biggest challenge is software quality. With users needing masses of patches to manage, the industry is at the bottom of the curve of software quality,... Continue Reading
-
Polishing up the act
The new Companies Act will affect firms to different degrees but makes proper data management essential, says Jon Fell Continue Reading
-
Tiers are not enough
Everyone seems to want a tiered storage architecture but the correct approach is essential to business efficiency, says Geoff Hough Continue Reading
-
Storage and security
Keeping data stored safely means finding a balance between accessibility, protection and staying within the law, says Correy Voo Continue Reading
-
SOA: Beware IT balkanisation
Service-oriented architectures raise security issues, says Jean-Noël Ezingeard Continue Reading
-
Making a habit of strong security
There is a lot of talk about creating a security culture in the workplace, but for most IT departments it is a tough job to get users across the organisation to understand why it is important, to put it into practice and, even more important, to ... Continue Reading
-
Think modular for effective recovery plans
There is no one-size-fits-all business continuity strategy, so think of disaster recovery scenarios as modules that can be invoked depending on the situation, says Josh Krischer Continue Reading
-
Let's sort the bugs before we get regulated
Developers need to focus on decreasing risk in new releases to an acceptable level. Rather than tackle every single flaw the most risky areas should be addressed first, says Sarah Saltzman Continue Reading
-
Need for testing limits value of automation as IT managers look to accelerate patching
Worms and viruses that exploit newly discovered vulnerabilities are appearing faster and faster, prompting IT departments to install security patches at an ever greater speed. Continue Reading
-
Continuity plans are going public
Once, business continuity was a matter between a company and its shareholders. Continue Reading
-
Virtualisaton key to service improvement in next phase of datacentre consolidation
Datacentres are going through various stages of consolidation. Driven by the development of technology and the need to contain costs and improve services, the system infrastructure has become more resilient, more available and more secure. Continue Reading
-
High cost of ignorance
Over the past couple of months I have attended a series of roundtables with IT managers, talking about asset management. They revealed that one of the biggest barriers to them taking greater control over their software assets was a lack of board ... Continue Reading
-
Overanxious or underinsured?
The problem with business continuity planning is the third word in that phrase. All the planning in the world is pointless if the reality fails to match when things go pear-shaped. Continue Reading
-
European 'no' to software patent directive leaves doors open to protection of new ideas
Software can still be patented as long as certain conditions are met Continue Reading
-
The devil is in the data
The value of mergers or acquisitions can be reduced if data migration is not sorted out before completion Continue Reading
-
New approach to aid security management
Data extraction software can provide comprehesive view of corporate systems. Continue Reading
-
Model-based automation can help users keep pace with changing security demands
Setting up automated systems that respond to events can improve adaptability Continue Reading
-
Know your risks
Speed is vital to assess and manage swiftly changing risks and meet regulatory demands. A matrix-based approach can offer a faster route than traditional, bottom-up methods Continue Reading
-
When IT should come last
A new approach is needed to avert public sector failure Continue Reading
-
Classes of service won't guarantee quality of service in the brave new world of MPLS
What every business should know before deploying Wan connectivity technology Continue Reading
-
US card fiasco is a warning for all
The security breach which exposed the full personal and banking details of 40 million MasterCard, Visa and other card holders should act as a wake-up call to us all. Continue Reading
-
DPM's diary: CP bound
The first hot weather of the year sees the return of a few old challenges to the department. Continue Reading
-
A CIOstands up for openness
Steve Lamey, chief information officer at the newly merged HM Revenue and Customs, has set himself the task of removing major inefficiencies. He has discovered, for example, that staff in each of the UK's 72 tax offices do things differently. Continue Reading
-
Reliability and performance testing is the only way to guarantee quality of service
If you want a successful IP network, test it before, during and after implementation Continue Reading
-
Cybercrime fight under-funded as millions 'wasted' on software piracy convictions
National Hi-Tech Crime Unit should give piracy a lower priority Continue Reading
-
Your shout: Skills, security and communications
Have your say at computerweekly.com Continue Reading
-
Developers should be encouraged to write security into the code for new applications
Securing applications is as important as securing systems but is often overlooked Continue Reading
-
Don't become a sitting duck
IT departments are fighting an increasingly fraught battle to keep their systems free of security vulnerabilities Continue Reading
-
Information security: Seeing the big picture
Information security is about securely bringing together the organisation's two most important assets - information and people. Continue Reading
-
Your shout: Security and skills
Have your say at computerweekly.com Continue Reading
-
Combine to beat crime
The IT industry must work together to do more to protect itself and help the police bring cybercriminals to justice Continue Reading
-
Identify security gaps
A three-step process will let you bridge the divide between your current security regime and a more robust system Continue Reading
-
Babies and bathwater
Throwing away your spam filter so it cannot prevent crucial messages reaching your inbox rather misses the point Continue Reading
-
Join the programme
InfoSecurity Forum standard will help firms draft a comprehensive best-practice plan of action for security Continue Reading
-
Defining the real spyware
Some anti-spyware products may leave you no better off Continue Reading
-
Plug-and-play perils
Portable data storage may be convenient, but pen-sized high-capacity devices are becoming the latest threat Continue Reading
-
Lock up data or lose it
Confidential data leakage can be devastating, but the cause is often ignorance rather than malicious intent Continue Reading
-
Guide spells out key risks of Basel 2
A guide about the forthcoming Basel 2 code on risk management has been published by consultancy BearingPoint. Continue Reading
-
Make suppliers take responsibility
In a further extract from his book, computer security expert Bruce Schneier looks at where to apply pressure to improve products Continue Reading
-
There will always be 'must have' security - but can you identify the 'don't need'?
The first step to managing risk is to identify the dangers to your organisation Continue Reading
-
Take the initiative on security certification to meet the demands of corporate partners
Signing up to security standards such as BS7799 could ease pressure on SMEs, says Arthur Barnes Continue Reading
-
Your shout: Patents, careers and project management
Have your say at computerweekly.com Continue Reading
-
Don't let test data open a security loophole
Using real business data to test new applications is vital, but take precautions, says David Chalmers Continue Reading
-
Speak up to beat cybercriminals
Hats off to the police National Hi-Tech Crime Unit for foiling the £220m attempted e-raid on Japanese bank Sumitomo Mitsui in the... Continue Reading
-
Your shout: ID cards, spam and security
Have your say at computerweekly.com Continue Reading
-
Independent assessment is needed to stop NPfIT becoming yet another IT disaster
Shadow health minister states Conservative position on national IT programme Continue Reading
-
Dear diary… this entry may be libellous
IT managers need to be aware of the dangers of employees keeping web logs, says Nick Chronias Continue Reading
-
IT should take the lead on Sarbanes-Oxley
US financial reporting law can be used as a catayst for better management, says Ashley Braganza Continue Reading
-
SMBs' real risk of being online
Stuart King CISSP, is responsible for online security and risk assessment for the Reed Elsevier Group. Continue Reading
-
The skills of IT architects provide the foundation for business success
A sound architecture involves both strong technology and a professional approach, says Allen Brown Continue Reading
-
Top four pitfalls of BPO
Relationships are key to business process outsourcing, says Michael Hyltoft Continue Reading
-
Building a win-win deal
Trust is key to successful outsourcing partnerships, says John Creber Continue Reading
-
Is variable reponse the key to secure systems?
Variable detection and prevention is only way to let users in and keep intruders out, says Phil Cracknell Continue Reading
-
Ending the age of the password
IT directors face the constant challenge of giving the business enough flexibility to access IT however, wherever and whenever... Continue Reading
-
Regulators to lessen pain of exporting data
Data protection law is a continuing headache for international businesses. The 1997 EU Data Protection Directive even applies to... Continue Reading
-
Get the doctors on board - or fail
One simple maxim should be pinned on the wall of the project management office of any major IT development: No matter how elegant... Continue Reading
-
Capacity for change
Over the years storage has very much been the poor relation, something purchased as a server add-on. However, now it is important... Continue Reading
-
Firms can be brought to book for illegal images on their systems
Companies are liable for all illegal images stored by staff, says Dave McLoughlin Continue Reading
-
Crime is no private affair
The police must not leave firms to fend for themselves, says Richard Starnes Continue Reading
-
Rise of the digital mafia
Collaboration key to beating professional e-criminals, says Pete Simpson Continue Reading
-
Politics and IT: a difficult mix
The dangers of mixing politics and IT projects are clearly illustrated by the reaction of ministers and senior civil servants to... Continue Reading
-
FOI: a licence to snoop?
IT firms must beware of rivals seeking to exploit law, says Renzo Marchini Continue Reading
-
Prepare to free your information
The past few years have seen a raft of corporate governance regulations aimed at making company dealings more transparent. And... Continue Reading
-
Define IT risks to the company to comply with new business continuity legislation
The board will be legally required to protect the business from known risks, says Marcus Hill Continue Reading
-
IT challenges for 2005
Wise CIOs are preparing for economic uncertainty, says Ben Booth Continue Reading
-
Thought for the day: The fight against fraud
2005 is set to be a critical year for criminal activity, says Peter Dorrington Continue Reading
-
Thought for the day: Human factor is key to wireless security
As increasing numbers of firms allow at least some of their staff to use wireless devices, it is important to educate the... Continue Reading
-
Thought for the Day Asking for trouble
Thousands of ordinary users will plug into Broadband Britain this Christmas, says Simon Moores, and they haven't a hope of... Continue Reading
-
Your shout! On the problem of youth discrimination
In response to Nick Huber's article, entitled Beware youngsters' ageism claims (Computer Weekly, 26 October) Continue Reading
-
Thought for the day: Virus writers enjoy public holiday releases
Christmas comes but once a year but that will not stop the hackers, so users must ensure that all their anti-virus defences are... Continue Reading
-
Thought for the day: Big brother is watching
Is the introduction of the raft of well-intentioned technological measures aimed at protecting national security going to... Continue Reading
-
Thought for the day Virus protection is easier than you think
Simple rules can deal with most threats without the need for AV products, says Nick Scales Continue Reading
-
Thought for the day: Web of deceit
The truth is out there, but disentangling it from the scams is more than Simon Moores can do. Continue Reading
-
Plan for data protection rules when moving IT work offshore
Outsourcing deals could fall foul of EU data privacy directive. Continue Reading
-
Thought for the day: We know where you live
Resist the web browser witch hunt - online crime doesn't represent anything like the same kind of threat as global terrorism,... Continue Reading
-
Multi-layered security is vital to stop new wave of day zero attacks and mobile threat
Traditional reactionary anti-virus measures are no longer adequate for business. Continue Reading
-
Spending rise has a downside
The Computer Weekly/Kew Associates quarterly spending survey should put a smile on everyone's face. IT spending by corporate... Continue Reading
-
Use regulations to get boardroom backing for IT security policies
Buy-in from top is essential to build security culture, says Jon Fell Continue Reading
-
Thought for the day Create a security culture
Staff education is vital to effective information security, writes Richard Starnes. Continue Reading
-
Thought for the day: Thieves' charters
Sometimes the internet goes out of its way to let other people get their hands on your intellectual property, says Simon Moores. Continue Reading
-
Thought for the day The bogeyman cometh
Don't let reasonable security concerns turn into panic-filled hysteria, says Simon Moores. Continue Reading
-
Your shout! On finding a way to report phishing scams
In response to Malcolm Frary, who wanted to know how to report banking phishing scams (Letters, 26 October) Continue Reading
-
Thought for the day: A descent into hell
The dreams and visions that made IT and the internet a force for freedom have been transformed into a nightmare of political... Continue Reading
-
Secure state of mind
Not surprisingly, security is one of the biggest issues facing businesses today. The threat posed by viruses, hackers and... Continue Reading
-
How to avoid the pitfalls in the small print
Ensure you are not trapped by contracts' limited liability clauses. Continue Reading
-
Thought for the day: You've been Googled
Do you really want Google to get to know you better? Simon Moores certainly doesn't Continue Reading
-
Thought for the day: How to beat the sinister side of spamming
Failure to tackle zombies can lead to company blacklisting, says Pete Simpson Continue Reading
-
Involve IT from the start to ease pain of mergers and acquisitions
"The integration programme is on track. It is only IT that is behind." A comment along these lines usually occurs within a month... Continue Reading
-
Thought for the day: Safe as houses
It has become increasingly difficult to prevent the bad guys getting hold of your credit card and bank account details.Will it... Continue Reading
-
Downtimes
Same old chaos reigns a century from now Continue Reading
-
IT industry must have the freedom to grow
Shadow minister for industry and technology for the Conservatives, Michael Fabricant, explains why a light touch from government... Continue Reading
-
Stop the party games with IT
Over the past three weeks, the Liberal Democrats, Labour and the Conservatives have spelt out their IT policies. Continue Reading
-
Thought for the day: Cybersex and the kiss of death
By hiding trojans within the pornographic images so enthusiastically pinged around the internet, hackers have finally made... Continue Reading
-
£28bn: the cost of the 'worst case worm'
Study assess the dameage that the worst possible electronic attack could inflict Continue Reading
-
Thought for the day: At your Service (Pack2)
The security benefits of XP SP2 are probably worth the risk of disrupting your system when you install it, says Simon Moores Continue Reading
-
Defences must be multi-layered
Spam blights many networks, but it can be managed and blocked Continue Reading
-
Thought for the day: Organised crime sews up internet scams
Where do we start in defending ourselves against the ever growing internet scams, asks Simon Moores Continue Reading