IT management
-
News
05 May 2025
How AsiaPac transformed into a multi-cloud powerhouse
AsiaPac CEO Andrew Cheng outlines the company’s growth from a laptop PC distributor to a regional technology service provider known for its multi-cloud capabilities Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
02 May 2025
Security Think Tank: What CISOs can learn from Signalgate
A leak of information on American military operations caused a major political incident in March 2025. The Security Think Tank considers what can CISOs can learn from this potentially fatal error. Continue Reading
-
News
23 May 2005
Pre-CISSP: Options for the security newbie
Shon Harris advises novice security practitioners on the value of entry-level certifications -- and good, old-fashioned experience -- in preparation for the CISSP®. Continue Reading
-
News
17 May 2005
Should the government define spyware?
Who's best qualified to define what is and isn't spyware -- your congressman or your online user community? Security experts say no entity can do it alone. Continue Reading
By -
News
17 May 2005
Some vendors get labeled as spyware pushers
To win the battle with spyware, you must be able to spot it. That's not as easy as you think. Continue Reading
By -
News
11 May 2005
A new era of computer worms: Wireless mobile worms
In this excerpt of Chapter 9 from "The Art of Computer Virus Research and Defense," author Peter Szor dissects the Cabir worm. Continue Reading
-
Feature
10 May 2005
Learning Guide: Low-cost storage
Resources on low-cost networking, iSCSI, SATA and IP storage Continue Reading
-
News
25 Apr 2005
Tight contract management vital, users told at SSRG debut
The Strategic Supplier Relationships Group, which brings together 10 of the UK's most influential IT user groups, was formally... Continue Reading
By -
Feature
25 Apr 2005
Lead from the top
The starting line for effective data security is at board level, writes John Kavanagh in this review of current thinking and... Continue Reading
-
Opinion
25 Apr 2005
Seeing the big picture
Information security is about securely bringing together the organisation's two most important assets - information and people. Continue Reading
By- Lewis Gee
-
News
19 Apr 2005
LogicaCMG on Met payroll
The Metropolitan Police Authority has selected LogicaCMG to provide a £31m fully-managed payroll and pension administration... Continue Reading
-
Feature
15 Apr 2005
The acceptable rules of the mobile game
Mobile networks allow you to connect to your network from almost anywhere by the appropriate methodology. Yet that may also mean... Continue Reading
-
News
14 Apr 2005
Who should be on (and off) the hook for ID theft?
An influential cryptographer and a panel of technologists today debate how best to fight false authentication and fraudulent transactions. Continue Reading
By- Anne Saita, TechTarget
-
News
14 Apr 2005
Spike ** LogicaCMG to manage Met payroll
The Metropolitan Police Authority (MPA) has selected LogicaCMG to provide a £31m fully-managed payroll and pension administration... Continue Reading
-
News
12 Apr 2005
Met Police gets LogicaCMG on payroll
The Metropolitan Police Authority (MPA) has selected LogicaCMG to provide a £31m fully-managed payroll and pension administration... Continue Reading
-
News
03 Apr 2005
Are identities safer on laptops than central databases?
Microsoft pledges better ID security. Given the theft of a laptop storing 100,000 Social Security numbers, Redmond's approach could prove controversial. Continue Reading
By- SearchSecurity.com Staff
-
News
29 Mar 2005
Quiz: Do you have a firm e-mail security foundation?
This Security School quiz is the first in a series of three on e-mail security essentials. Continue Reading
-
News
24 Mar 2005
Atos wins DWP deal extension
The Department for Work and Pensions has renewed a contract with IT services company Atos Origin to deliver medical advice and... Continue Reading
-
News
21 Mar 2005
Linux lags Windows in new security report
A controversial research paper takes a critical look at two popular platforms' track record on vulnerabilities and fixes. In turn, its findings are facing sharp scrutiny as well. Continue Reading
By- Anne Saita, TechTarget
-
News
17 Mar 2005
Botnets more menacing than ever
Researchers from the Honeynet Project and iDefense say bots are spreading quickly, digging their heels into more than a million machines around the world. Continue Reading
By -
Feature
16 Mar 2005
Managed services: Looking to the long term
IT directors looking for an easy way to manage increasing volumes of data by buying more hardware could be storing up problems... Continue Reading
-
News
15 Mar 2005
ID theft and national security
Check out what some ITKnowledge Exchange members had to say about this controversial issue. Continue Reading
- News 14 Mar 2005
-
News
14 Mar 2005
HIPAA causes data security problems for small businesses
If your local dentist isn't complying with HIPAA's security rules, he's not alone. Experts say most doctors' offices aren't getting it. Continue Reading
By - News 14 Mar 2005
-
Feature
14 Mar 2005
Healthcare system designer explains HIPAA pitfalls
Kate Borten is president of The Marblehead Group Inc., has more than 20 years of experience designing, implementing and integrating healthcare information systems and is author of HIPAA Security Made Simple. This Q&A focuses on how she believes hospitals are meeting HIPAA's security guidelines.
Continue ReadingBy -
Feature
13 Mar 2005
Winning the cyber arms race in the classroom
In the struggle for cybersecurity, Lenny Zeltser's most important weapons are the classroom and the pen.
For the past few years he has taught part-time at the SANS Institute, creating a course on how to analyze malicious software,. He's also directed security efforts for several organizations as a consultant and employee. As a writer, he co-authored Inside Network Perimeter Security and contributed a few chapters to the book Malware: Fighting Malicious Code.
In this Q&A, Zeltser outlines his latest course offerings and book projects, and what he sees as today's greatest threats.
Continue ReadingBy - News 08 Mar 2005
-
News
08 Mar 2005
A sound architecture involves both strong technology and a professional approach
Although many large organisations need to respond rapidly to changes in the market as well as to competition and globalisation... Continue Reading
By- Alan Brown
-
News
07 Mar 2005
Windows vulnerable to LAND attack
Security researchers say this type of attack leaves enterprise customers of popular Windows products open to a denial of service. There is good news, though. Continue Reading
By -
Feature
25 Feb 2005
Whisky galore with IP
Chivas can toast future success thanks to a cost-effective IP data network Continue Reading
-
News
24 Feb 2005
Security Bytes: Cisco patch available for ACNS flaws
Workaround outlined for new php exploit. IBM issues patch for DB2 flaw. Payroll service goes offline to investigate security claims , and BoA loses personal data on customers. Continue Reading
By- SearchSecurity.com Staff
-
News
15 Feb 2005
Federal agency security still poor, but improving
Report cards give federal security a D-plus average, but the Homeland Security Department is still failing. Continue Reading
By- Keith Regan, Contributing Writer
- News 14 Feb 2005
-
News
14 Feb 2005
Strategic Storage: DR planning blueprint
Developing a good disaster recovery (DR) plan is similar to good dental hygiene -- and almost as exciting. Similar to going to the dentist twice a year, you should also test your DR plan with the same frequency. Wait too long to clean up your plan and you'll be stuck with the root canal of recovering your data. Continue Reading
By -
News
09 Feb 2005
The Controversy of Hacking Books and Classes
Read this excerpt and download Chapter 1, Ethics of Ethical Hacking from Shon Harris' All-in-One Gray Hat Hacking. Continue Reading
-
News
07 Feb 2005
CEOs and CIOs split on IT success
Business and IT directors are still at loggerheads on key technology issues, according to a new survey by the Economist... Continue Reading
By -
News
02 Feb 2005
Compressed files strike another blow to AV
The "alternative" .rar files are picking up where popular .zip files left off as attack vectors. Continue Reading
By- Shawna McAlearney, News Editor
-
News
31 Jan 2005
ID theft remains No. 1 worry
For the fifth straight year, the FTC said most complaints came from identity theft victims. And that's a problem for enterprises. Continue Reading
By -
News
23 Jan 2005
Cyberstorm chasers: The folks who look out for the latest Internet threats
They keep a 'round-the-clock watch on conditions in cyberspace. CTO Johannes Ullrich discusses the volunteer effort behind the SANS Internet Storm Center. Continue Reading
By - News 19 Jan 2005
-
Feature
14 Jan 2005
Financing the future
Don't get a headache working out the best ways to pay for hardware and software. Danny Bradbury offers a user-friendly guide to... Continue Reading
-
News
10 Jan 2005
Security Bytes: George Mason U. hacked; new Trojans on the loose
Hackers steal personal data of more than 30,000 members of George Mason University. Two new Trojans emerge. BMC Software buys a Parisian company. Continue Reading
By- SearchSecurity.com Staff
-
News
10 Jan 2005
Security on a Shoestring: Creating Internet policies on the cheap
No matter how small the organization, it's impractical to stand over employees and make sure they properly use the Internet. So here's how to write a decent acceptable use policy, and make sure everyone abides by it. Continue Reading
By- Mathew Schwartz, Contributor
-
News
19 Dec 2004
Transforming the cybersecurity culture
Eleven New Year's resolutions can help employees at all levels empower the security function at their organization. Continue Reading
By- Shawna McAlearney, News Editor
-
News
08 Dec 2004
The security lingo of 2004
This was the year of botnets, zombie PC armies and phishying online schemes. Continue Reading
By -
News
28 Oct 2004
MoD may write off £200m Chinook helicopters
The Ministry of Defence could write off more than £200m spent on eight Chinook Mk3 helicopters. Continue Reading
By -
Feature
21 Oct 2004
IP everything, essentially
What are the fundamental deliverables of IP networks? How can you use IP networks to gain financial benefits in addition to... Continue Reading
-
Feature
21 Oct 2004
The basis of profitability
Not so long ago, you didn't have much choice - your IT and communications requirements were acquired, implemented and maintained... Continue Reading
-
News
08 Oct 2004
First integrated children's system goes live
The first web-based system to help councils meet new legal requirements for information sharing among teachers, social workers... Continue Reading
- News 04 Oct 2004
-
News
03 Oct 2004
Training for CISSP Certification: SearchSecurity.com's Security School
Study guides for each of the ten domains of the CBK for those preparing to take the CISSP exam or expanding their knowledge of security concepts and practices. Continue Reading
-
News
26 Sep 2004
Authorize.Net says it has 'learned' from attack
The credit card processing service was unprepared for the kind of attack it suffered last week, but it will use the experience to improve security. Continue Reading
By -
Feature
14 Sep 2004
The gift of CRM
For Red Letter Days, a provider of gift experiences for corporates and consumers, a CRM system was essential to give it market... Continue Reading
-
Feature
14 Sep 2004
Management matters
Cath Everett finds out how you stay on top of networking. What are the management issues related to your telecoms and networks... Continue Reading
-
News
27 Aug 2004
Over-specify when buying low cost replacement for Frame Relay
A project manager reveals how a VPN saved £275,000 a year Continue Reading
By- Peter Skipwith
-
News
24 Aug 2004
Latest worm uses IM to lure victims
A version of the worm which spread from infected Microsoft Internet Information Services (IIS) web servers in June has been... Continue Reading
-
News
27 Jul 2004
New attacks and vulnerability trends highlighted at Black Hat
Presentations beginning today will analyze vulnerabilities, zero-day code, phishing and secure wireless deployment, among many other topics. Continue Reading
By- Shawna McAlearney, News Writer
-
News
26 Jul 2004
Fewer IT supplier conflicts are going to court
Law firms have reported a sharp fall in the number of IT disputes reaching the courts over the past 12 months as more users turn... Continue Reading
By- Bill Goodwin, Computer Weekly
- News 25 Jul 2004
-
News
18 Jul 2004
Debian fixes multiple flaws
Denial-of-service, buffer overflow and format string vulnerabilities in Debian GNU/Linux that an attacker could use to remotely execute malicious code has been fixed. Continue Reading
By -
News
18 Jul 2004
Enterprise-class RAID functions, part 2: N-way mirroring, splitting and more
With the convergence of RAID and lower-priced storage technologies, advanced RAID functions can be enjoyed by any small-to-medium sized organization with critical data. Continue Reading
By- Randy Arnott
-
News
21 Jun 2004
Users at risk after web host attack
Users have been warned to brace themselves for attacks on sites which provide patch downloads and web hosting services. Continue Reading
By -
News
01 Jun 2004
Report finds computer system likely culprit in Chinook crash
A former air commodore - one of the highest ranks in the RAF - has questioned the airworthiness of the Chinook Mk2 helicopter... Continue Reading
By -
News
01 Jun 2004
Chinook 10 years on
This week sees the 10th anniversary of the Chinook ZD576's crash, as former top military officers cast doubt on the finding that... Continue Reading
By -
News
28 May 2004
Ex-RAF chief says no to blame on Chinook
A former RAF air commodore has questioned the integrity of systems and the airworthiness of the type of Chinook helicopter which... Continue Reading
By -
News
23 May 2004
Hacking for Dummies: Chapter 10 -- Wireless LANs
Read Chapter 10, Wireless LANs, from the book "Hacking for Dummies" written by Kevin Beaver. Continue Reading
-
News
19 May 2004
IT experts not losing sleep over code theft
Days after Cisco acknowledged someone may have stolen source code from its network, IT experts said they doubt it will amount to anything catastrophic. After all, source code has made it onto the Internet before, and there's no proof it has ever led to an attack. For them, the bigger question is how to prevent such a thing from happening to their organization. Continue Reading
By -
News
13 May 2004
Hacking For Dummies: Chapter 7 -- Passwords
In his latest book, "Hacking For Dummies," Kevin Beaver takes the reader into the mindset of a hacker in order to help admins fend off vulnerabilities and attacks. Continue Reading
-
News
02 May 2004
Return to sender?
Several researchers have identified a new e-mail attack that can be used to swamp enterprise e-mail servers, as well as some secondary systems. Continue Reading
By- Hank Hogan, Contributing Writer
-
News
15 Apr 2004
Bacs launches online billing service
UK clearing house Bacs has embarked on a joint venture with a US software company to provide an online bill presentation and... Continue Reading
By - News 11 Apr 2004
-
Feature
22 Mar 2004
Is the national programme for NHS IT set to be 'the biggest gamble in the world'?
The private concerns of clinicians and IT professionals about the national programme are not being addressed, despite the front... Continue Reading
By -
News
17 Mar 2004
Best practices for enabling and maintaining compliance
As part of our Storage Decisions conference preview series, Shaun Mahoney, senior storage engineer for Citigroup, Randy Wilson, assistant vice president of IT at Essex Investment Management Company and Enterprise Storage Group's Peter Gerr discussed the best practices for enabling compliance. Continue Reading
By- Mark Lewis, Editor
-
Feature
15 Mar 2004
Achieving the goal of CIO
What exactly does a chief information officer do?Paul Burfitt, global CIO at AstraZeneca, analysed the various aspects of his job... Continue Reading
By - News 01 Mar 2004
-
News
15 Dec 2003
IT staff predict e-government success despite councillors’ doubts
Tony Blair has failed to convince councillors in almost half of the UK’s local authorities of the value of e-government. Continue Reading
By- James Rogers
-
Feature
03 Dec 2003
On the right side of the law
What are the legal and regulatory issues that could affect the running of your company? What are the ramifications of the Data... Continue Reading
-
News
11 Nov 2003
MPs slam Libra as one of UK's worst PFI deals ever
Costs more than double and Whitehall shoulders risk on magistrates IT. Continue Reading
By -
News
10 Nov 2003
NHS IT plan risky but will not fail, says OGC
The £2.3bn national programme to modernise health service IT systems is "risky and ambitious" but it has sufficient safeguards in... Continue Reading
By -
News
28 Jul 2003
Court blocks former ICL solicitor's Pathway claim
Fujitsu has won a court ruling to stop a former solicitor for the company pursuing allegations about the government's disastrous... Continue Reading
By -
Feature
28 Apr 2003
Fujitsu won £800m Post Office contract after misrepresenting itself, says lawyer
High Court claim by ex-employee makes damning accusations Continue Reading
By -
Feature
26 Mar 2003
What's in an IT name?
What exactly does a chief information officer do?Paul Burfitt, global CIO at AstraZeneca, analysed the various aspects of his job... Continue Reading
By -
News
10 Feb 2003
UK firms are offered help to migrate to open source
Companies are being given help to migrate to free-license software by a joint initiative from OpenForum Europe and the National... Continue Reading
By -
News
06 Feb 2003
Users warned as number of software holes soars
IT departments were put on alert this week after it emerged that the number of security vulnerabilities discovered in commercial... Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
05 Feb 2003
NHS £5bn IT procurement finally begins
The Department of Health (DoH) has launched the formal procurement process for its £5bn restructuring of NHS IT. Continue Reading
By- James Rogers
-
News
29 Jan 2003
Courts Libra system 'is one of the worst IT projects ever seen'
The cost of the Libra project to provide a national system for 385 magistrates courts soared from £146m to £390m, and the main... Continue Reading
By -
News
13 Oct 2002
Jamie Gruener's position on API sharing
Key questions on API sharing answered Continue Reading
By- SearchStorage.com
-
News
20 Jun 2002
MoD's Chinook tactics spark a constitutional row
Chinook: The MoD's actions over the crash of Chinook ZD576 could have legal ramifications Continue Reading
By -
Feature
02 May 2002
Director's cut: Learning to spot winning technologies
Faced with a stream of new technologies it is vital that IT directors keep abreast of the latest developments and are aware of... Continue Reading
-
Feature
29 Apr 2002
The Heat is on
Since the 1960s, Moore's Law has described the progress of the IT industry but overheating could slow down the pace of change Continue Reading
By- Graham Titterington
-
News
20 Mar 2002
MPs from all parties unite in fight to clear Chinook pilots
This week the Tories led an unprecedented all-party move to get the Government to clear the names of the pilots blamed for the... Continue Reading
By- Parliamentary reporter
-
Feature
07 Feb 2002
Lessons to be learned from Chinook tragedy
Since 1997, Computer Weekly has studied the IT-related lessons from the crash of Chinook helicopter ZD576 on the Mull of Kintyre... Continue Reading
-
News
07 Feb 2002
Victory! Lords confirm CW stand - software flaw could have caused Chinook crash
An historic House of Lords report has this week vindicated a five-year campaign by Computer Weekly for justice after the crash of... Continue Reading
By -
News
31 Jan 2002
Lords prepare to release Chinook verdict report
The House of Lords will publish a report next Tuesday on whether pilot negligence or a possible technical malfunction was the... Continue Reading
By -
Feature
23 Jan 2002
Scale 21 conference will reveal key to IT success
The results of the largest ever survey of IT professionals and entrepreneurs are to be announced at the Building Britain's... Continue Reading
By- Nathalie Towner
-
News
08 Nov 2001
RAF Chinook pilots could be vindicated
Details of an RAF Board of Inquiry report into the crash of a Chinook helicopter on the Mull of Kintyre in 1994 were revealed for... Continue Reading
By -
Feature
25 Oct 2001
Top Chinook test pilot reveals unease over engine software
A campaign by Computer Weekly and Channel Four News has sought to show that a computer problem not pilot error could have led to... Continue Reading
By -
News
25 Oct 2001
Chinook pilots feared onboard software
RAF pilots refused to fly the Chinook Mk2 helicopter for even short journeys before the fatal Mull of Kintyre crash due to... Continue Reading
By -
News
27 Sep 2001
Chinook hearing begins
A new inquiry into the crash of a Chinook helicopter on the Mull of Kintyre in June 1994 is due to begin this week in the House... Continue Reading
By -
News
24 Sep 2001
Semiconductor equipment orders down 75%
US semiconductor equipment manufacturers posted $742 (£507m) in orders booked in August, down 75% from a year earlier, according... Continue Reading
-
News
21 Sep 2001
Now Via sues Intel to block sales of Pentium 4
Via Technologies is seeking to stop sales of the Pentium 4 family of microprocessors through a lawsuit filed on 10 September... Continue Reading