IT for utilities and energy
Utility firms and energy companies rely on IT to support their often highly complex operations. The industry is being forced by politial and customer pressure to be greener and technology is central to achieving greater energy efficiency, through major initiatives such as smart meters. Our stories about energy and utility firms examine how IT is helping to enable change and improvement in these companies.
-
News
03 Jan 2024
Artificial intelligence to the front in Sweden’s National Technology Strategy
Sweden focuses in on artificial intelligence in its latest far-reaching national IT strategy Continue Reading
-
Feature
07 Sep 2023
Interview: Ashish Gupta, head of EMEA, HCLTech
It’s not just enterprises that changed their operating models during and after Covid, but also the suppliers that took them on the journey, HCLTech Europe’s head explains Continue Reading
-
News
04 Dec 2013
Proof-of-concept malware jumps air gap with sound card
Researchers demonstrate proof-of-concept malware exfiltrating data using high-frequency transmissions inaudible to humans Continue Reading
-
News
04 Dec 2013
The Guardian denies Snowden stories damaged national security
Guardian editor Alan Rusbridger defends decision to publish stories on documents leaked by whistleblower Edward Snowden Continue Reading
-
News
04 Dec 2013
UK proposes formal talks on cyber security with China
Prime minister David Cameron has called on China to be more open about cyber security Continue Reading
-
News
28 Nov 2013
EU calls on US to rebuild trust in post-Snowden era
The EC has called on the US to provide guarantees to restore trust in the wake of spying revelations Continue Reading
-
News
26 Nov 2013
NCA changed UK cyber crime fighting, says NCCU head
The NCA has changed the UK law enforcement landscape, says Andy Archibald, head of the NCA’s National Cyber Crime Unit Continue Reading
-
News
26 Nov 2013
Government lays out 2014 cyber security agenda
The UK government has reiterated its commitment to addressing cyber security and laid out some plans for 2014 at the Cyber Security Summit 2013 Continue Reading
-
News
26 Nov 2013
White hat Wi-Fi hacking shows vulnerability of business data
Whitehat hackers have shown that senstitive data can be sniffed easily from public Wi-Fi hotspots Continue Reading
-
News
26 Nov 2013
FTSE 350 firms complete cyber risk assessment
Most FTSE 350 companies put cyber risk on the board agenda, but many need to improve how they manage that risk Continue Reading
-
News
21 Nov 2013
CSA appoints Microsoft’s Adrienne Hall to board
The CSA has appointed Adrienne Hall, from Trustworthy Computing at Microsoft, to its board of directors Continue Reading
-
News
21 Nov 2013
Pegasystems CEO Alan Trefler plans his next move for the $500m software company
Alan Trefler discusses his plans for Pegasystems, the BPM and CRM specialist that has grown into a $500m a year company Continue Reading
-
News
20 Nov 2013
Report highlights poor UK attitudes to mobile security
Businesses should note that many UK mobile users do not take security precautions and do not know how to guard against data theft Continue Reading
-
News
19 Nov 2013
Google reaches $17m multi-state settlement over Safari snooping
Google has reached a $17m settlement agreement with 10 US states for bypassing Apple Safari privacy settings Continue Reading
-
News
18 Nov 2013
Google and Microsoft to block searches for child porn
Google and Microsoft have announced measures to make it more difficult to find child abuse images online Continue Reading
-
News
15 Nov 2013
Cyber collateral damage a concern for all, says Lancope
All organisations could be affected by cyber attack collateral damage, says network security firm Lancope Continue Reading
-
News
14 Nov 2013
Shell delivers global SAP upgrade
Shell has simplified and standardised business processes in its business focused on refining and marketing activities for oil products and chemicals, through a global SAP upgrade Continue Reading
-
News
12 Nov 2013
Mass surveillance a bad idea, says Information Commissioner Christopher Graham
Information Commissioner Christopher Graham says issues of national security must not overshadow concerns of legitimate public interest Continue Reading
-
News
12 Nov 2013
Web surveillance not a good idea, says Info Commissioner
Information Commissioner Christopher Graham says issues of national security cannot be allowed to overshadow concerns of legitimate public interest Continue Reading
-
News
08 Nov 2013
NSA and GCHQ mass surveillance violates EU law, study finds
Mass internet surveillance by US and UK intelligence agencies violates European law, according to a study by two academics Continue Reading
-
News
07 Nov 2013
UK intelligence heads defend mass surveillance operations
Heads of the UK’s intelligence services insist all they do in term of mass surveillance is strictly within the confines of UK law Continue Reading
-
News
29 Oct 2013
Analysis: RSA says security needs to change, but what does that mean?
RSA executive chairman Art Coviello has issued a call to action to the security industry to improve technology and collaboration Continue Reading
-
News
29 Oct 2013
Most businesses need to transform IT security, says RSA
No modern network or IT system can withstand the onslaught of a skilled adversary, given focus and time, says Amit Yoran, general manager of RSA Continue Reading
-
News
28 Oct 2013
Cyber attack shuts down Israeli toll road tunnel
A cyber attack has shut down a major link in Israel's national road network, experts claim Continue Reading
-
News
24 Oct 2013
Thales launches critical infrastructure cyber security lab
Thales has set up a cyber security lab dedicated to help improve the security of critical national infrastructure, government and business Continue Reading
-
News
23 Oct 2013
US publishes draft cyber security framework
The US has published a draft framework of voluntary cyber security standards aimed at reducing risks to critical national infrastructure Continue Reading
-
News
21 Oct 2013
Microsoft withdraws faulty Windows RT 8.1 update for Surface tablets
Microsoft has widthdrawn its Windows 8.1 update for Surface RT tablets after some users reported system crashes Continue Reading
-
News
17 Oct 2013
Dexter payment card malware variant hits South Africa
The Dexter payment card skimming malware discovered last year has resurfaced in South Africa, resulting in millions of pounds lost to fraud Continue Reading
-
News
16 Oct 2013
Neustar to host first DDoS awareness day
Communications firm Neustar is to host the first international awareness day on distributed denial of service (DDoS) attacks Continue Reading
-
News
15 Oct 2013
The ICO issues BYOD warning after breach
The ICO is calling on organisations to ensure data protection policies reflect how employees are using personal devices for work Continue Reading
-
Photo Story
15 Oct 2013
10 security reasons to upgrade to iOS 7
Even if it did not include numerous security fixes, iOS 7 has compelling reasons for corporates to adopt it to improve their security Continue Reading
-
News
15 Oct 2013
D-Link begins fixing router backdoor
D-Link has begun releasing security patches to close the backdoor discovered on some of its routers Continue Reading
-
News
11 Oct 2013
Legitimate users of Tor need not worry, says NCA
The National Crime Agency (NCA) says criminals cannot hide on the internet, but legitimate business users of anonymity software Tor are safe Continue Reading
-
News
07 Oct 2013
UK National Cyber Crime Unit becomes operational
The UK's National Cyber Crime Unit has become operational as part of the new National Crime Agency Continue Reading
-
News
03 Oct 2013
FBI shuts down Silk Road online drug market
The FBI has shut down the Silk Road online drug market and arrested kingpin Ross Ulbricht, previously known only as Dread Pirate Roberts Continue Reading
-
Opinion
03 Oct 2013
Privacy concerns in the digital world
Considering the full spectrum of privacy, people need to ask themselves if they are comfortable with all their characteristics in the public domain Continue Reading
-
News
02 Oct 2013
McAfee Focus 2013: McAfee leadership upbeat about Stonesoft acquisition
Intel-owned security firm McAfee is upbeat about its acquisition of Stonesoft and its future capability to tackle security differently Continue Reading
-
News
01 Oct 2013
IT security industry still immature, says (ISC)2 board member
The information security industry is still immature and failing to act or speak as one, says Dave Lewis, (ISC)2 board member Continue Reading
-
News
27 Sep 2013
Financial markets next big cyber target, says US expert
Manipulation of international financial markets will be the next evolution of cyber crime, says US Cyber Consequences Unit chief Continue Reading
-
News
27 Sep 2013
Top 10 cyber crime stories of 2013
Cyber crime featured heavily in security news coverage in 2013, with cyber criminals and cyber law enforcers upping their games with each passing month Continue Reading
-
News
27 Sep 2013
Software acquisition is risk acquisition, says industry panel
New software often means new security vulnerabilities, panel tells the (ISC)2 Security Congress 2013 Continue Reading
-
Feature
24 Sep 2013
How Capgemini keeps its Merlin datacentre green and energy-efficient
Capgemini's Swindon-based Merlin datacentre is one of the most energy-efficient in the world. But what makes it green? Continue Reading
-
News
19 Sep 2013
NSA reveals how Snowden accessed secret Prism files
Prism whistleblower Edward Snowden accessed secret documents through a file-share, the NSA has revealed Continue Reading
-
News
16 Sep 2013
Risk assessment key to cloud adoption, says Isaca
There is mass confusion among small and medium businesses about cloud computing, says Amar Singh, chair of Isaca UK Continue Reading
-
News
09 Sep 2013
Most websites could be targeted through PHP, warns Imperva
Hackers are focusing on vulnerabilities in PHP web application development platform, threatening most websites, warns Imperva Continue Reading
-
News
09 Sep 2013
Executive interview: Andrew Brem, Connected Homes, British Gas
British Gas is digitising energy. Andrew Brem speaks to Computer Weekly about the internet connected home Continue Reading
-
News
03 Sep 2013
Disinfecting PCs false security, says security expert
Many companies proud of their ability to identify and clean malware infected machines are missing a trick, says veteran security expert Continue Reading
-
News
22 Aug 2013
Charlie McMurdie joins PwC’s cyber practice
Charlie McMurdie, former head of the Metro Police central e-crime unit, is joining business consultancy firm PwC as its senior crime adviser Continue Reading
-
Opinion
14 Aug 2013
How to appoint a new outsourcing supplier
Outsourcing can come with its own security risks if not managed appropriately, making due diligence and clear contractual arrangements key Continue Reading
-
E-Zine
12 Aug 2013
Is the UK smart meter project doomed to fail?
In this week’s Computer Weekly, we look at one of the biggest IT roll-outs in the UK - the £12bn plan to install smart meters in every home – and ask: is it doomed to fail? Our latest buyer’s guide examines software asset management. We analyse the big IT suppliers’ plans to compete with pure-play cloud providers. And we discuss the future of the chief information security officer role. Read the issue now. Continue Reading
-
Opinion
30 Jul 2013
The ideology of hacking
Business leaders need to be educated on the true threats their firms face and IT security professionals have to arm their executives with that information Continue Reading
-
News
30 Jul 2013
ICO to investigate sale of online dating profiles
The UK’s data protection watchdog is to investigate the sale of 10,000 online dating profiles to the BBC’s Panorama programme Continue Reading
-
Feature
29 Jul 2013
An introduction to cyber liability insurance cover
Cyber liability insurance cover has been around for 10 years, but most security professionals seem to have not heard of it or know that it exists Continue Reading
-
News
29 Jul 2013
Continual vigilance key to security, says Damballa
UK businesses must update their approach to cyber security to look for signs of compromise continually Continue Reading
-
News
26 Jul 2013
FireEye partners with Phishme for multi-layered security
Security technology developer FireEye has partnered with phishing awareness training firm PhishMe to offer a multi-layered approach to securing information networks Continue Reading
-
News
25 Jul 2013
MI5 and GCHQ call for FTSE 350 cyber health check
Intelligence agencies MI5 and GCHQ call on UK’s top listed companies to take part in a cyber governance health check Continue Reading
-
News
23 Jul 2013
Cisco buys cyber security company Sourcefire for $2.7bn
Networking giant Cisco has reached an agreement to buy cyber security business Sourcefire in a $2.7bn deal Continue Reading
-
News
22 Jul 2013
Insider threat: Balancing security with privacy
How can organisations increase security without affecting productivity or encroaching on employees’ right to privacy? Continue Reading
-
News
22 Jul 2013
UK to block online porn by default
The UK is to block online pornography by default to all new internet users, David Cameron is to announce Continue Reading
-
Opinion
19 Jul 2013
How to assess the security of a cloud service provider
As businesses continue to put more information online, understanding cloud suppliers and agreements has never been more important Continue Reading
-
News
17 Jul 2013
Tech firms target piracy profiting websites
Tech firms including Google, Yahoo and Microsoft join an initiative targeting websites that profit from piracy by cutting off advert revenue Continue Reading
-
News
16 Jul 2013
More than one-fifth of UK firms hit by DDoS attacks in 2012
More than a fifth of UK firms experienced a disruptive distributed denial of service (DDoS) attack in 2012 Continue Reading
-
News
15 Jul 2013
Black market for software security flaws reaches new highs
The black market in previously undiscovered vulnerabilities in commercial software is so established that the average flaw sells for up to $160,000 Continue Reading
-
News
11 Jul 2013
Yahoo wants Fisa objections revealed
Yahoo is the latest company implicated in the Prism internet surveillance programme to call for more transparency around its involvement Continue Reading
-
News
11 Jul 2013
Protecting against modern password cracking
This article in our Royal Holloway Security Thesis series explains just how insecure passwords are and offers advice on alternative methods of security. Continue Reading
-
News
11 Jul 2013
Smart cards: security risks
This article in our Royal Holloway Information Security Thesis series assess the new features introduced in Java Card 3 Connected Edition smart card specification and their associated security risks. Continue Reading
-
News
11 Jul 2013
Security visualisation
This article in our Royal Holloway Information Security Thesis series shows how to generate a visual representation of a dataset and use visualisation in the evaluation of known security vulnerabilities. Continue Reading
-
News
10 Jul 2013
Microsoft notches up over 3,000 copyright cases
In its battle against piracy, Microsoft says it has settled 3,265 copyright cases in the past year and warns of links to malware distribution Continue Reading
-
News
09 Jul 2013
Will cloud services follow the evolution of the banking industry?
Cloud service providers say security will become the very reason companies choose cloud services in future Continue Reading
-
News
08 Jul 2013
UK takes cyber threats to infrastructure seriously
The UK is taking seriously potential cyber threats to critical national infrastructure, according to GCHQ head Iain Lobban Continue Reading
-
News
05 Jul 2013
Tougher EU penalties for cyber crime not enough, say security experts
The European Parliament has adopted a draft directive to toughen up EU penalties for cyber crime, but security experts say this is not enough on its own Continue Reading
-
News
05 Jul 2013
Security Think Tank: Prism unlikely to change much
Does the data collected by Prism put the US Government at risk from other state or non-state sponsored activists? Continue Reading
-
News
05 Jul 2013
UK joins EU demands for Google to rewrite privacy policy
The UK’s privacy watchdog has joined data protection authorities in France, Spain, Germany and Italy in demanding changes to Google’s privacy policy Continue Reading
-
News
05 Jul 2013
NSA Prism scandal could hit US cloud providers, says EC vice-president
EC vice-president Neelie Kroes says US cloud services providers could lose business because of fears over US Prism surveillance programme Continue Reading
-
News
04 Jul 2013
FBI warns of increased spear phishing attacks
The FBI has issued a warning about an increase in spear-phishing attacks targeting multiple industry sectors Continue Reading
-
News
02 Jul 2013
Security Think Tank: Prism – Sitting duck or elaborate honeypot?
Does the data collected by Prism put the US Government at risk from other state or non-state sponsored activists? Continue Reading
-
News
02 Jul 2013
Senior MPs flout EU cookie law
Two years after the EU cookie regulation and UK law came into force, not all UK websites are compliant, including the sites of 13 senior MPs Continue Reading
-
News
01 Jul 2013
Stuxnet leak investigation leads to project originator
The US government investigation into Stuxnet leak of classified information leads to retired general in the Marines, James Cartwright Continue Reading
-
News
27 Jun 2013
How BP made its IT future-ready with a hybrid cloud infrastructure
BP bridged its cloud gap with a cautious and calculated approach using a mix of private cloud, public cloud and in-house IT infrastructure Continue Reading
-
News
26 Jun 2013
Data quality more important than fixating over big data, says Shell VP
Johan Krebbers, vice-president of architecture at Shell, says it is more important to get data quality right than to find a ‘big data silver bullet’ Continue Reading
-
News
26 Jun 2013
Encrypting enterprises miss out on cloud benefits
Enterprises sending encrypted data to the cloud are missing out on some of the greatest benefits of cloud computing, says Thales e-Security Continue Reading
-
News
24 Jun 2013
Identity management key to browser-based IT strategy
A cloud-based identity management system is key to enabling a browser-based IT strategy at online recruitment firm Reed.co.uk Continue Reading
-
News
21 Jun 2013
Most firms underestimate volume of malware, study shows
Most companies greatly underestimate the number of malicious programs appearing daily, a global survey of more than 2,000 IT professionals has revealed Continue Reading
-
News
21 Jun 2013
UK businesses failing to secure virtual environments, study finds
Most UK businesses are failing to secure data in virtual environments, a survey of IT decision makers has revealed Continue Reading
-
News
21 Jun 2013
Government launches cyber awareness campaign
UK government debuts the first stage of a £4m cyber awareness campaign as part of the National Cyber Security Programme Continue Reading
-
News
11 Jun 2013
UK links to US internet surveillance remain unclear
The government insists that UK spy agencies operate within the law, but questions remain Continue Reading
-
News
07 Jun 2013
PM urged to criminalise internet rape porn
Campaigners are calling for the criminalisation of possessing internet pornography depicting rape Continue Reading
-
News
05 Jun 2013
Human error causes most data breaches, Ponemon study finds
Human errors and system problems caused two-thirds of data breaches in 2012, according to a study from Symantec and the Ponemon Institute Continue Reading
-
News
29 May 2013
Stratfor hacker pleads guilty
US hacktivist Jeremy Hammond pleads guilty to accessing computers of law enforcement agencies and government contractors illegally Continue Reading
-
News
29 May 2013
Syrian hackers deface Sky Android apps
Syrian hackers have defaced several of Sky’s Android apps, forcing the broadcaster to remove them temporarily from the Google Play store Continue Reading
-
News
21 May 2013
Privileged accounts key to most APT attacks, says Cyber-Ark
The theft, misuse and exploitation of privileged accounts is becoming an increasingly key tactic in advanced persistent threat attacks Continue Reading
-
News
16 May 2013
Most IT environments immature, Microsoft reveals
Most business IT environments are immature, analysis of data from Microsoft’s Cloud Security Readiness Tool has revealed Continue Reading
-
News
15 May 2013
Microsoft declares conformance with ISO 27034-1
Microsoft has declared conformance with ISO 27034-1, the first part of an international standard for secure software development Continue Reading
-
News
08 May 2013
Adobe moves to cloud-based subscription model
Adobe has announced that it is to introduce a cloud-based subscription model for popular applications, including Photoshop Continue Reading
-
News
07 May 2013
Symantec helps NHS trust cut security costs by a quarter
The Royal Liverpool and Broadgreen University Hospitals NHS Trust cut security costs by 25% in its partnership with security supplier Symantec Continue Reading
-
News
07 May 2013
Windows 8 passes 100 million in sales
Microsoft says Windows 8 OS has sold more than 100 million copies, roughly matching Windows 7 in the six months after launch Continue Reading
-
News
03 May 2013
Netherlands considers hacking powers for police
The Netherlands government considers legislation to give police powers to hack into computers, install spyware and read emails Continue Reading
-
News
01 May 2013
What’s to be done about data breach discovery?
The time from first contact by cyber attackers to the victim learning of it is still measured in months and years, not hours and days Continue Reading
-
News
25 Apr 2013
Infosec 2013: Cyber crime challenges law enforcement
Cyber crime is forcing police and law enforcement agencies to re-think basic skills needed, according to experts at Infosecurity Europe 2013 Continue Reading
-
News
25 Apr 2013
Lib Dems will block Snoopers’ Charter, says Nick Clegg
The draft Communications Data Bill will not go ahead while the Lib Dems are in government, says deputy prime minister Nick Clegg Continue Reading
-
News
22 Apr 2013
Infosec 2013: University research challenges reliability of IPS
Research shows intrusion prevention systems (IPS) are not as effective at detecting malicious activity as some might think Continue Reading
-
News
22 Apr 2013
Security spend misaligned with threats, says security veteran
Security budget allocations have remained the same for the past 15 years, but threats have changed, says Shlomo Kramer, chief executive at security firm Imperva Continue Reading