Podcasts
IT risk management
-
Podcast: Cybersecurity Awareness Month, Covid-19 and storage
We look at how organisations can use Cybersecurity Awareness Month as an opportunity to revisit their handling of data and compliance, especially with changes brought by Covid-19 and home working
-
Podcast: UK SME planning and compliance for ‘the new normal’
We look at how UK SMEs face a “new normal” following the coronavirus lockdowns and how they can plan for compliance with more remote working and a new data landscape
-
Podcast: How to get cyber accountability on the board agenda
We look at how boards should carry out strategic and operational risk profile assessments and plan for compliance on an ongoing basis to avoid fines and damage to the business
-
Podcast: Remote compliance assessments and how they are done
Remote working adds to IT compliance risks, but doesn’t remove the need to assess compliance. How are remote compliance assessments carried out and how can you prepare for them?
-
Podcast: Covid-19, compliance risk, remote assessment and training
We talk to Mathieu Gorge, CEO of Vigitrust, about why organisations cannot drop their guard on compliance during the increased risks faced as a result of the coronavirus crisis
-
BA/Marriott GDPR fines: What they were for and how to avoid them
We talk to Mathieu Gorge, CEO of Vigitrust, about the BA and Marriott GDPR fines and what organisations can do to ensure they achieve compliance with GDPR and similar regulations
-
Podcast: The Computer Weekly Downtime Upload – Episode 22
In this week’s episode of the Computer Weekly Downtime Upload podcast, Brian McKenna, Caroline Donnelly and Clare McDonald talk about digital transformation in the NHS, Sky’s efforts to get more women working in tech and how big businesses could be risking extinction by ignoring IT
-
Podcast: Storage and compliance priorities in 2019
Mathieu Gorge, CEO of Vigitrust, looks ahead to key areas in compliance in 2019, including mushrooming data volumes, GDPR fines and the California Consumer Privacy Act
-
Printing, document capture and compliance risk in the GDPR era
Printers, scanners and mobile devices that capture data from documents all store data in some way or other. How can you be sure to be compliant with GDPR with regard to that data?
-
Podcast: Storage compliance for GDPR data subject requests
The General Data Protection Regulation is upon us. Mathieu Gorge, CEO of Vigitrust, talks you through the key areas needed for compliance in storage of data subjects’ data and how to find it quickly on request
-
GDPR’s impact on storage of personally identifiable data
Computer Weekly talks to Mathieu Gorge of Vigitrust about the practical impacts on data storage of the GDPR concepts of “personally identifiable data” and “the right to be forgotten”
-
Toxic data: What it is and how to find it and deal with it
In this podcast, Mathieu Gorge, CEO of Vigitrust, looks at the management of legacy data and how to find and deal with toxic data that could expose your organisation to compliance breaches
-
RSA 2016: Data compliance beyond the firewall
Vigitrust's Mathieu Gorge reports from the RSA 2016 conference, where a key discussion was storage and compliance in an age where data doesn't necessarily live in the firewall
-
EU data protection discussion dominates LegalTech 2016
Vigitrust's Mathieu Gorge reports on key issues discussed at LegalTech 2016 and discusses compliance with EU data protection regulations in the wake of Safe Harbour's nullification
-
Your multi-functional printers: A compliance and security risk?
Multi-functional printers use large amounts of storage capacity and are host to data that is subject to legal and regulatory compliance, says Vigitrust’s Mathieu Gorge
-
Podcast: Compliance in the legal sector
Compliance and data protection is second nature to legal sector organisations but threats and opportunities exist to secure printing processes and build evidence with big data
-
What’s new in ISO 27001: 2103 for storage and backup?
This year, ISO 27001: 2013 was published, putting more emphasis on mapping risk to an ever-expanding and mobile IT infrastructure. But what is new in ISO 27001: 2013?
-
Cyber espionage prevention strategies for your business
Cyber espionage has become a common threat. Join cyber security expert Jeffrey Carr, as he discusses ways to protect your organization from cyber espionage.
-
Podcast: Hacking Work
ComputerWeekly.com's Cliff Saran speaks to Bill Jensen and osh Klein on the role of the IT department in the knowledge economy.
-
Podcast Interview with Macro Wikinomics author Don Tapscott
Don Tapscott talks about how businesses and governments must reinvent themselves to survive the recession
-
Podcast:Cyber peace demands action now, says former US security official
Uncertainty is the greatest threat to peace, and that is why we need to have a doctrine of cybersecurity for the 21st century, according to Michael Chertoff, former US secretary of homeland security.
-
Podcast: Business must help shape security regulations, says RSA president
In this podcast, Art Coviello, president of RSA, the security division of EMC, explains what role organisations have to play in shaping better, less onerous regulations.
-
Podcast: Cloud has security and compliance advantages, says Microsoft
Microsoft sees cloud computing as a way of enabling businesses to tap into...
-
Ten years after LoveBug: social engineering and security lessons
A decade after the LoveBug computer virus caught the online world by surprise, social engineering is still a popular element of cyber attacks, but it has become far more sophisticated.
-
Cloud computing and security: How valid are the infosec concerns?
Learn about possible information security concerns and threats in cloud computing environments from Mano Paul, the Software Assurance Advisor for (ISC)2.
-
Beating the threat of spam – a ComputerWeekly podcast
Ever since the first spam email message was sent back in 1978 to 393 recipients on Arpanet, unsolicited email messages have been causing a headache for IT managers. Dealing with the constant influx of spam costs not only money but time as well.
-
Podcast: News round-up for 1 July 2008 - Government data handling after the Poynter report
Highlights include an exploration of proposed changes to Government data security measures following two recent reports criticising HM Revenue and Customs for its poor handling of data, which resulted in the loss of two computer discs containing 25-million child; and the trend among multinational companies towards outsourcing to single voice and data services suppliers.
-
Podcast: Columbia space shuttle data recovery
Podcast interview with Jeff Pederson of data recovery operations at Kroll Ontrack about the task of recovering data from the hard disc retrieved from the Columbia space shuttle disaster.
-
Podcast: Business continuity is not just an IT issue - Russell Price of the Continuity Forum
The responsibility for business continuity has to reside at the highest level or any organisation and not just with the IT department. Russell Price of the Continuity Forum talks to Computer Weekly's Warwick Ashford about the issues involved.
-
Podcast: News round-up 7 April – Anti-fraud measures for debit cards and the Phorm privacy debate
Round-up of UK IT industry news including last week’s top five stories on ComputerWeekly.com and a look at the main stories in this week’s issue.
-
Opinion + audio: UK companies must improve business continuity
UK companies are still not doing enough to ensure business continuity, according to the Continuity Forum.
-
UK IT news round-up podcast: Government u-turn on NPfIT papers
Podcast round-up of the UK IT news for the week ending 5 February 2008. This week we focus on the UK government's U-turn decision to release papers first requested by Computer Weekly under the Freedom of Information Act in 2005.
-
The true cost of IT security
In this interview, Cliff Saran speaks to Martin Sadler, director of HP's Trusted Systems Lab, about how much should we be expected to spend and how much security is enough. Hackers are getting smarter, and Martin believes newly trained IT professionals are ill-equipped to deal with the sophisticated nature of modern attacks because of limitations in the current way IT security is taught.
-
Making the business benefits of security technology reap rewards
The need for all firms to have an effective, robust and flexible IT security strategy is as important as it ever was. Yet there exists a train of thought that security is a business hygiene factor; that firms simply have to invest in security. However, strategic investment in security technology can actually act as an agent of change for the business.
-
Podcast: Mobile device threats are real, white-hat hacker says
Learn how easy it is for a hacker to gain access to a mobile device, whether employees are aware of security for their devices and why Bluetooth headsets should be turned off.
-
Podcast: Tor peer-to-peer privacy could be hacked
In this edition of Security Wire Weekly, Andrew Christensen of FortConsult explains how the Tor peer-to-peer network can be hacked to track down user identities.
-
Podcast: The state of Oracle security
In this edition of Security Wire Weekly, Oracle DBA Jon Emmons gives his observations about Oracle's new critical patch update format.
Photo Stories
-
UKtech50 2021 – The most influential people in UK IT
-
Five easy tips to improve working from home networks
-
Preview of The National Museum of Computing’s virtual tour
-
Computer Weekly/TechTarget UK IT priorities 2020
-
Arpanet: 50 years of internetworking
Videos
-
Diversity and inclusion in tech: The pandemic and the pay gap
-
Diversity and inclusion in tech: What is neurodiversity?
-
Diversity and inclusion in tech: How to be an effective ally
-
Being LGBTQ+ in science and tech – Alfredo Carpineti
-
How to practice better allyship – Suzanne McGovern
-
Advocacy and allyship - Dame Stephanie Shirley