IT for charity organisations
Charities have to operate at the lowest cost possible, and that includes the way they use IT. IT managers in the third sector have learned how to deploy cost-effective technology to support the critical work that charities and voluntary organisations do, and their experiences can offer relevant case studies for IT managers in other sectors.
-
Feature
16 Jan 2026
Dutch researcher’s AI breakthrough tackles the structured data paradox
Table representation learning unlocks 99% of organisational data that remains unused Continue Reading
-
News
15 Jan 2026
Cyber body ISC2 signs on as UK software security ambassador
Professional cyber association ISC2 pledges support to UK government’s Software Security Ambassador scheme, part of the recently unveiled Cyber Action Plan Continue Reading
By- Alex Scroxton, Security Editor
-
News
01 Feb 2012
Fewer than a third of UK organisations plan mobile security projects
Despite the media hype around the adoption of mobile technologies and the need to secure them, relatively few UK organisations are planning mobile security projects, a survey has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Jan 2012
EC publishes proposed data protection reforms
European Justice Commissioner, Viviane Reding, has unveiled the new European data privacy framework that includes new regulation. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 Jan 2012
Apple aims to improve working conditions for technology workforce
Apple has published a list of all suppliers for the first time and says it will allow independent observers into its facilities around the world to monitor working conditions. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Jan 2012
Hacktivists plan to use satellites to by-pass internet censorship
Hacker activists plan to launch communication satellites to overcome the threat of internet censorship. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Dec 2011
Cloud leaves many firewalls wanting – but could automation prove the silver bullet?
Most companies rely on firewalls, but the IT landscape is changing and so must approaches to security. Is there a silver bullet? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
08 Dec 2011
Adobe to release out-of-cycle patch for latest vulnerability
Adobe has issued a security advisory about a newly discovered and still unpatched vulnerability in Adobe Reader and Adobe Acrobat which is being used in "limited, targeted attacks in the wild". Continue Reading
-
Feature
08 Dec 2011
UKtech50: Meet the 50 most influential people in UK IT
Computer Weekly has announced the final listing for the second annual UKtech50, the definitive list of the real movers and shakers in UK IT. Continue Reading
-
News
08 Dec 2011
UKtech50: Meet Mike Lynch, the most influential person in UK IT
Mike Lynch, voted as the most influential person in UK IT, doesn’t like to think about challenges, but about opportunities. Continue Reading
-
News
05 Dec 2011
One in four IT security staff abuse admin rights, survey shows
At least one in four IT security staff use their privileged login rights to look at confidential information, a survey has revealed. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Nov 2011
United Nations Development Programme investigates hacking claims
The United Nations Development Programme (UNDP) is investigating claims from hacker group Team Poison that it extracted over 100 e-mail addresses and login details belonging to UN staff. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
23 Nov 2011
Government mutual will be a beacon for IT procurement
The pension administration mutual being set up by the government will be the first of a wave of new business models that could shake-up central government outsourcing contracts. Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Feature
18 Nov 2011
How to embed innovation in the corporate culture
This paper from Kurt Salmon identifies the common inhibitors to innovation and how to overcome them, and sets out some important principles that can help. Continue Reading
— Computerweekly.com -
News
17 Nov 2011
Forensics key to effective info security, says E&Y
Intelligence-led security strategies are the most effective in eliminating vulnerabilities and preventing IP theft through enabling informed change, says consultancy firm Ernst & Young. Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
11 Nov 2011
Computer Weekly Technology Industry Survey
This in-depth research from Computer Weekly and Mortimer Spinks, provides a must-read analysis and insight into UK IT salaries. Continue Reading
— Computerweekly.com -
News
11 Nov 2011
The market landscape for print security
This report is gives an overview of the security risks of the print environment , the market landscape, best practices for a print security strategy. Continue Reading
— CW Bitpipe -
News
10 Nov 2011
Welcome to the new-look ComputerWeekly.com
Computer Weekly has launched its brand new website - the most important online development in the brand’s 45-year history. Continue Reading
By- Bryan Glick, Editor in chief
-
News
07 Nov 2011
Analysis: Intelligence key to security business case
Information security is becoming an increasingly important part of any business as the value of information assets continually grow, as do the threats from cyber crime and espionage. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
31 Oct 2011
UKtech50: We launch the search for the most influential people in UK IT
Computer Weekly has launched the second annual UKtech50, the definitive list of the real movers and shakers in UK IT - the leaders driving the creation of a high-tech economy. Continue Reading
By- Bryan Glick, Editor in chief
