IT risk management
Risk management is an increasingly important discipline for IT leaders, with regulatory compliance an ever-present consideration and the amount of legislation and regulation concerning data security on the rise. We examine the issues around IT risk management and the best practices that IT managers need to know.
-
News
23 Feb 2025
Check Point co-founder on AI, quantum and independence
Gil Shwed, Check Point’s co-founder and executive chairman, discusses the company’s focus on AI-driven security and his commitment to remaining an independent force in the cyber security market Continue Reading
By- Aaron Tan, TechTarget
-
E-Zine
20 Feb 2025
CW APAC – Trend Watch: CIO trends 2025
It will be no surprise to see artificial intelligence high on the agenda for 2025. In this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly looks at how banks are navigating technology, the continued importance of cyber security, and how enterprises can cement their AI future. Continue Reading
-
News
26 May 2011
Cross-site scripting attack on Hotmail highlights personal e-mail risk to business
A vulnerability in the Hotmail site has enabled hackers to steal an unknown number of messages from users' accounts, according to security firm Trend Micro. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 May 2011
Apple issues Max OS X update to remove fake AV MacDefender malware
Apple is to release a Mac OS X update to tackle fake antivirus software or "scareware" known as MacDefender, MacSecurity and MacProtector. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 May 2011
Future of NHS National Programme for IT in critical condition following NAO report
The remaining NHS National Programme for IT could be scrapped entirely, as the project's aim to deliver electronic records for every patient has fallen far below expectations, according to a National Audit Office report. Continue Reading
By- Kathleen Hall, TechTarget
-
News
12 May 2011
Analysis: Will Android dominance increase IT security threats for business?
The Android Market is forecast to become the world's biggest mobile content platform by August 2011, according to research by mobile application research firm Distimo. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 May 2011
New ICO guidance issued on EU cookie law
The Information Commissioner's Office has released practical guidance for companies to comply with the new EU cookie law. Continue Reading
By -
News
06 May 2011
Hackers plan third attack on Sony
Hackers are planning a third attack on Sony in retaliation for its handling of the PlayStation Network and Online Entertainment services data breaches, according to US reports. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 May 2011
What cloud risks should business consider after Amazon's EC2 outage?
Amazon's recent outage has raised questions over the reliability of cloud services. If Amazon, with its global reach, cannot get IT right, how can CIOs expect other operators to cope? Jenny Williams investigates. Continue Reading
By- Jenny Williams, University of Gloucestershire
-
News
27 Apr 2011
HSBC Insurance works with IBM to solve Solvency II
HSBC Insurance in the UK is using IBM Global Services to support its European Solvency... Continue Reading
By- Cliff Saran, Managing Editor
-
News
20 Apr 2011
Infosec 2011: APT attacks a real threat to business, says security panel
Advanced Persistent Threats are a reality and cannot be dismissed as a myth or media hype, according to a panel of experts debating the top threats at Infosecurity Europe 2011 in London. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Apr 2011
Infosec 2011: Cisco announces new tools for securing the mobile enterprise
Cisco has introduced new security products to its Borderless Networks portfolio to help IT departments manage mobile devices, changing workforce habits and the impact of video on the network. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Apr 2011
Growth of NFC to drive overhaul of Chip and PIN equipment
The growth of near-field communication (NFC) in the UK will drive the replacement of retailers' Chip and PIN point of sale (PoS) equipment, according to an analyst. Continue Reading
By- Jenny Williams, University of Gloucestershire
-
News
13 Apr 2011
Building an Olympics network
Preparation is clearly the key to Olympic success, as players on 27 July 2012 will see years of finely honed practice condensed into one gruelling fortnight Continue Reading
By- Kathleen Hall, TechTarget
-
News
13 Apr 2011
Infosec 2011: Charity sector shows the way to balance budget and security
Tackling security project by project is an effective way of securing data on a limited budget, says Matt Holland, head of information security at children's charity NSPCC. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Apr 2011
Infosec 2011: Compliance the biggest security juggernaut, says security expert
The biggest security compliance juggernaut for businesses is concentrating on achieving compliance rather than changing they way they work, says Des Ward, president of the Cloud Security Alliance UK and Ireland chapter. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Apr 2011
Manageability issues impede adoption of virtualisation
Virtual infrastructure management challenges are hindering the adoption of virtualisation within businesses, according to research. Continue Reading
By- Jenny Williams, University of Gloucestershire
-
News
08 Apr 2011
Motivated, information security policye-aware employees are the best defence
Keeping employees motivated is the best way to ensure you have satisfied customers, and if it is an employee's responsibility to keep the customers happy,...
Continue ReadingBy -
Photo Story
08 Apr 2011
In 1966 England won the World Cup and Computer Weekly launched the world's first weekly IT newspaper
After 45 years in print, Computer Weekly, the award-winning title for senior IT decision-makers, is to become a 100% online publication. Here is a celebration of 45 years in print. Continue Reading
By- Cliff Saran, Managing Editor
-
News
07 Apr 2011
Sophisticated cyber thieves behind Epsilon data breach, says parent company
US marketing firm Epsilon was hit by one of the biggest data thefts to date, the work of highly sophisticated cyber thieves, says parent company Alliance... Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Apr 2011
Sex offence technology helps business avoid legal liability
Technology that cross references image hash codes against child sexual abuse material will help businesses avoid legal liability. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Apr 2011
City of York falls foul of data protection act following printer mix-up
The City of York Council has fallen foul of the Data Protection Act after having accidentally disclosed personal data following a printer mix-up. Continue Reading
By- Kathleen Hall, TechTarget
-
News
04 Apr 2011
RSA discloses phishing-attack data breach details
RSA, the security division of EMC, has revealed the firm's data breach in mid March was the result of a spear phishing attack. The spear phishing attack exploited an Adobe Flash vulnerability that was unpatched at the time. Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
01 Apr 2011
Secure your SCADA architecture by separating networks
Many critical national infrastructure systems include supervisory control and data acquisition (SCADA) functionality. These systems can be viewed as the set of software, computers and networks that provide remote co-ordination of controls systems for tangible infrastructures such as power generation systems, chemical plants, manufacturing equipment and transportation systems Continue Reading
-
News
29 Mar 2011
Open Group launches guide to boost ISO 27005 efforts
A new guide from the Open Group is designed to help organisations meet ISO 27005 standards, but some risk management professionals feel it may not be so effective. Continue Reading
By -
News
28 Mar 2011
Spotify hit by malicious ads
Spotify, the popular streaming music service, has been displaying malicious advertisements to users of its Free version. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 Mar 2011
Businesses spend over £600k a week on data security abroad
Companies are spending up to £624,000 a week to secure their most sensitive business data abroad, a study has revealed. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Mar 2011
Hackers steal member email details from TripAdvisor site
A number of TripAdvisor members may receive spam after hackers stole email details from the travel website. Continue Reading
By- Jenny Williams, University of Gloucestershire
-
Tip
25 Mar 2011
Mature data loss prevention: 8 questions to ask your vendor
To determine if a data loss prevention (DLP) solution truly meet your organization’s needs, there are certain clarifications you always require. Continue Reading
By- Lior Arbel, Contributor
-
News
23 Mar 2011
SAP combines GRC and BI in new platform
SAP has launched a new governance, risk and compliance platform that combines and integrates existing GRC and business intelligence technologies. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
23 Mar 2011
Budget 2011: UK public worried spending cuts will impact data security
A large proportion of the UK public is worried that government spending cuts will have a negative effect on data security, a survey has revealed. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Mar 2011
RSA hit by advanced persistent threat attacks
RSA, the security division of EMC, has revealed that attackers have stolen information from the company's IT systems Continue Reading
By- Warwick Ashford, Senior analyst
-
News
17 Mar 2011
Ban threat looms for Blackberry services as India demand corporate data access
India could block Research in Motion (RIM) from 31 March 2011 after government officials expressed dissatisfaction with access to Blackberry services. Continue Reading
By- Jenny Williams, University of Gloucestershire
-
News
16 Mar 2011
Trusteer debuts no-software malware protection
Secure web access firm Trusteer has announced a web login and transaction monitoring service to detect malware without installing software. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 Mar 2011
RIM urges Blackberry users to disable Javascript after web browsing vulnerability revealed
Research in Motion (RIM) is advising Blackberry smartphone users to disable Javascript to protect against a security vulnerability in its web browser. Continue Reading
By- Jenny Williams, University of Gloucestershire
-
News
15 Mar 2011
IT failures blamed for immigration system faults
IT failures have been blamed for failures of the points based immigration system in a National Audit Office (NAO) report. Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
15 Mar 2011
Adobe warns of zero-day vulnerability in Adobe Flash
Adobe has published a security advisory for a critical vulnerability in Adobe Flash that can be used to take control of an attacked machine. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Mar 2011
Most organisations approach IAM in the wrong way, says Gartner
Most organisations are approaching identity and access management (IAM) in the wrong way, by planning deployments around technologies, says Gartner. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Mar 2011
Advanced persistent threats - are businesses prepared?
Businesses usually attain adequate levels of IT defences at the point that it becomes more cost effective for cyber criminals to target someone else. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Mar 2011
Industry calls on employers to say what security skills are needed
The National Skills Academy for IT is calling on employers to address the cyber security skills gap by sharing views on the most useful courses and qualifications. Continue Reading
By- Jenny Williams, University of Gloucestershire
-
News
08 Mar 2011
Exclusive: Free software guru Richard Stallman on government IT and why he hates the cloud
The founding father of the free software movement tells Computer Weekly why government just doesn't "get it" Continue Reading
By -
News
07 Mar 2011
France's G20 files target of cyber attack
France's files on the G20 meetings were the target of a cyber attack, the country's finance minister has confirmed. Continue Reading
By- Kathleen Hall, TechTarget
-
News
07 Mar 2011
HSBC uses token to secure smartphone banking
HSBC is sending four million online banking customers a security token which will enable them to log in to their online bank account wherever they are, without using a card reader. Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Tip
02 Mar 2011
Employee information awareness training: PCI policy templates
To comply with PCI DSS -- and keep cardholder data secure -- organisations must train their employees on data handling best practices. This tip explains how. Continue Reading
By- Mathieu Gorge, VigiTrust
-
News
01 Mar 2011
Intel finalises £5bn acquisition of McAfee
Intel has confirmed the completion of its $7.7bn (£5bn) acquisition of security software giant McAfee. Continue Reading
By- Jenny Williams, University of Gloucestershire
-
News
24 Feb 2011
Exxon, Shell, BP hacked in Night Dragon attacks
Exxon Mobil, Royal Dutch Shell and BP were among the oil companies targeted by hackers working through internet servers in China, say US reports. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Feb 2011
Middle East governments stepping up internet control, study shows
The internet has proved to be a powerful tool for rallying social and political change, but Middle East governments have also recognised their capability to disrupt communications Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Feb 2011
RSA 2011: Microsoft promotes co-ordinated vulnerability disclosure
Software producers remain largely unresponsive to input from security researchers, according to Aaron Portnoy, manager of the security research team HP TippingPoint. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Feb 2011
RSA 2011: Top attacks business will face in 2011
Social networking will be the attacker platform of choice in 2011, says Ed Skoudis, founder and senior security consultant with InGuardians. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
17 Feb 2011
RSA 2011: RSA, EMC and VMWare advise on defending against advanced persistent threats
Security leaders have outlined ways organisations can better defend against advanced persistent threats (APTs) in a paper published by RSA, the security division of EMC. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 Feb 2011
RSA 2011: Cybersecurity leads conference with cloud security keynote
Cybersecurity is one of the key topics at the RSA Conference 2011 taking place this week in San Francisco. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
14 Feb 2011
Dell rolls out services for enterprise mobility
Dell has introduced a portfolio of services to help businesses manage mobile devices and an increasingly mobile workforce. Continue Reading
By- Jenny Williams, University of Gloucestershire
-
News
11 Feb 2011
Mobile hacker attacks will damage business in 2011
Businesses cannot afford to ignore mobile hacking attacks as they are proving extremely lucrative over shorter periods, a study of mobile threats has found. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Feb 2011
ID card database is destroyed
The National Identity Register (NIR), which was built to hold the fingerprints and personal details of millions of ID card holders, has been publicly destroyed. Continue Reading
By- Kathleen Hall, TechTarget
-
News
10 Feb 2011
IT departments are unable to support employee devices
Security concerns are holding companies back from allowing staff to use their own technology at work. Continue Reading
By- Kathleen Hall, TechTarget
-
News
10 Feb 2011
Mobile workers practise lax security
More than half of Europeans practise unsafe networking when they work away from the office, according to research by German remote access experts NCP Engineering. Continue Reading
-
News
08 Feb 2011
Post Office faces legal action over alleged accounting system failures
More than 50 postmasters are planning legal action against the Post Office to reclaim money they paid to the Post Office after being accused of theft and false accounting. Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
08 Feb 2011
AXA in £150m settlement for software glitch
Financial services giant AXA will be forced to pay millions of pounds to clients after it emerged that errors in trading software were hidden by three of its subsidiaries, prompting bad performance in investment portfolios. Continue Reading
-
News
08 Feb 2011
Businesses must learn how to defend against cyberattack, says McAfee
Cybercrime has thrived over the past decade according to recent reports from security firm McAfee, but business can expect even more dramatic change in the next ten years, researchers say. Continue Reading
By- Warwick Ashford, Senior analyst
-
Photo Story
08 Feb 2011
Ten most dangerous places to offshore your IT
A report published by the Brown-Wilson Group details which locations are the most risky places to outsource. Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
E-Zine
01 Feb 2011
Handle with care: Calculating and managing risk is tricky business
Faced with an ever increasing bevy of sophisticated threats, information security risk managers have a difficult job. This edition of IT in Europe: Information Security e-zine assesses the reputation of risk management, considers the role of the CISO when sharing sensitive data with third parties, and ranks the global cyberthreat. Continue Reading
-
News
31 Jan 2011
Vodafone restores services to Egypt after mobile shutdown
Mobile operator, Vodafone, has restored mobile phone services in Egypt after a 24-hour shutdown. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 Jan 2011
SMEs still lack data backup
Many small business lack data recovery plans, despite a recent uptake in cloud adoption, according to a survey. Continue Reading
By- Kathleen Hall, TechTarget
-
Tip
28 Jan 2011
Seven social media security best practices
This tip aims to highlight seven crucial factors to be considered while devising a strategy for optimal social media security. Continue Reading
By- Shantanu Ghosh, Contributor
-
News
26 Jan 2011
Cybercriminals target data in transit
Cybercriminals are shifting away from basic "smash and grab" attacks targeting stored data to more complex methods of data harvesting in transit, security research reveals. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Jan 2011
Smart meter and smart grids: security risk or opportunity?
A smart meter in every home in the UK by 2017 is the government plan as a first step towards a smart grid, but how can we ensure the benefits will outweigh the security risks? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Jan 2011
Parliament to debate cost-sharing element of Digital Economy Act
Secondary legislation on sharing the costs of the Digital Economy Act's measures to tackle online copyright infringement has been laid in Parliament. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Jan 2011
RBI guidelines focus on fortifying IT security by banks
RBI has issued security guidelines for the Indian banks that touch upon aspects such as IT governance, security, and cyber fraud. Continue Reading
By- SearchSecurity.in staff
-
News
19 Jan 2011
2010 IT security threats point to priorities for 2011, says Sophos
Cyber threats of 2010 highlight the top risks to business for 2011, including social media sites, whistleblowers, and hacktivists, warns security firm Sophos. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Jan 2011
Microsoft January Patch Tuesday misses open security issues
Microsoft's January 2011 Patch Tuesday security update contains only two bulletins, but misses several open security issues. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Jan 2011
Government departments criticised over data sharing mistake
Three government agencies have been criticised over a data sharing mistake that led to the wrongful disclosure of a woman's personal and financial information. Continue Reading
By- Kathleen Hall, TechTarget
-
Opinion
11 Jan 2011
Security Zone: The ISO/IEC 38500 IT Governance Standard
IT governance means different things to different folks, yet it is generally understood to require alignment with best practice standards and methodologies. However, it can be really hard to see the wood for the trees due to the multiple frameworks, all of which can be applicable for organisations to demonstrate good governance. Continue Reading
By- Chris Power, Mazars UK
-
News
06 Jan 2011
Update: Who takes the blame for the Lloyds TSB duplicate payment error?
Over 200,000 people were affected by a glitch at Lloyds TSB, when an error with its merchant system duplicated payments on New Year's Eve. Jenny Williams investigates. Continue Reading
By- Jenny Williams, University of Gloucestershire
-
News
06 Jan 2011
$21m acquisition of Immunet takes Sourcefire to the cloud
Snort creator Sourcefire has announced the $21m (£13.5m) acquisition of cloud-based anti-malware technologies firm Immunet. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
23 Nov 2010
Martha Lane Fox calls for ‘revolution’ in online government services
Digital champion Martha Lane Fox has published a report calling for a centralised government internet address to replace 750 websites. In a review... Continue Reading
By- Kathleen Hall, TechTarget
-
News
24 Feb 2010
Chinook Mk2's safety-critical backup system was faulty
Software supplier EDS found so many anomalies in fuel-control software on the Chinook Mk2 helicopter that it became concerned that the Ministry of Defence and RAF would ignore the potential importance of each flaw because of the high volume of errors, a confidential report reveals. Continue Reading
By -
News
22 Feb 2010
What was the 'dangerous' flaw in safety-critical Chinook system?
Defence contractor EDS - now part of HP - warned the Ministry of Defence that flaws in a Fadec safety-critical system fitted to the Chinook Mk2 helicopter could cause it to malfunction, months before a fatal crash on the Mull of Kintyre. Continue Reading
By -
Feature
22 Feb 2010
EDS report on 'dangerous' Chinook software published for the first time
Computer Weekly is publishing, for the first time, a technical analysis of the software installed on the Chinook Mk2 helicopter, the Chinook model which featured in the RAF's worst peacetime crash. Continue Reading
By -
News
12 Jan 2010
Senior airmen question safety of Chinook software
Three fellows of the Royal Aeronautical Society have questioned whether the Chinook Mk2, of the type which crashed on the Mull of Kintyre in 1994, was airworthy. Continue Reading
By -
News
07 Jan 2010
MoD renews attack on dead Chinook pilots despite software flaw disclosures
The Ministry of Defence has renewed its attack on the dead pilots of Chinook ZD576, after the publication of documents that revealed a "dangerous" flaw in software installed on the type of helicopter that crashed. Continue Reading
By -
News
05 Jan 2010
Chinook computer flaws - ex-ministers speak out
Former Defence ministers are calling for a new inquiry into the crash of Chinook 576, after new disclosures of a "positively dangerous" flaw in software...
Continue ReadingBy -
News
04 Jan 2010
Chinook computer was 'positively dangerous' say newly-disclosed MoD documents
A computer flaw in the type of Chinook helicopter that crashed on the Mull of Kintyre, killing all 29 on board, was known to be "positively dangerous", according to military documents that have not been published until today. Continue Reading
By -
Photo Story
10 Dec 2009
Ten IT Christmas wishes for business
The end of the year and the seasonal festivities are often a time for reflection. But what will CEOs be asking CIOs to give them for Christmas? Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
07 Dec 2009
NHS IT scheme to be scaled back
The Chancellor Alistair Darling and the Treasury are to scale back spending on the NHS's National Programme for IT. Continue Reading
By -
News
03 Sep 2009
Labour rejects review of Chinook crash
Defence Secretary, Bob Ainsworth, has ruled out ordering a new inquiry into the controversial Chinook crash, which left all 29 people on board dead, including... Continue Reading
By -
News
02 Sep 2009
Tories commit to Chinook crash review
The Tories have made it party policy to appoint a senior judge to review a finding of gross negligence against the two deceased pilots of a Chinook Mk2 helicopter which crashed on the Mull of Kintyre in June 1994. Continue Reading
By -
News
16 Jun 2009
Air France Airbus pitot sensor linked to two fatal crashes
Faults similar to those on an Air France Airbus that crashed into the sea on 1 June were major factors in two little-noticed fatal losses of passenger... Continue Reading
By -
News
04 Jun 2009
Chinook crash: critical internal memo on software flaws
Computer Weekly is publishing, in full for the first time, an MoD memo that is the clearest evidence yet that software problems made the helicopter unsafe to fly at the time of the accident. Continue Reading
By -
Photo Story
30 Apr 2009
Infosec 2009: Catch up with this year's show in pictures
Infosec 2009: The story of this year's Infosec with annotated pictures, so if you weren't there, this is a great to get a flavour of the highlights. Continue Reading
By -
Tip
27 Feb 2009
How to plant a listening device
Part two of our Les Goldsmith interview reveals how to plant a listening device if you feel like conducting a little industrial espionage. Continue Reading
By- Patrick Gray, Contributor
-
News
23 Feb 2009
Exclusive: Computer Weekly publishes 'secret' gateway review
This is the first publication of an entire gateway review by an online news service. Continue Reading
By -
News
10 Dec 2008
MoD was warned not to fly Chinook on day of crash
A senior defence official warned the Ministry of Defence to suspend flights of a Chinook helicopter because of safety concerns on the day the aircraft crashed... Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
08 Dec 2008
Chronology: The Chinook
1985 : Almost at the start of development of the Chinook's Full Authority Digital Engine Control ( Fadec ) computer system there... Continue Reading
By -
News
08 Dec 2008
Chinook ZD576: How the Fadec engine control software worked and what could have gone wrong
What follows is some of the evidence ... Continue Reading
By -
News
08 Dec 2008
Victory over Chinook crash after 14 years
A brave, independent stand by the Defence Secretary John Hutton and his predecessor Des Browne, against 14 years of obfuscation and immovable arrogance by the Ministry of Defence, has led finally to justice over the notorious crash of a Chinook helicopter in June 1994. Continue Reading
By -
News
08 Dec 2008
Tens of thousands of IT jobs at risk in global finance sector
The investment banking industry will see thousands of job cuts as mergers are completed and companies prepare for a slowdown in business. Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
31 Jul 2008
Minister hails Fujitsu’s leaving NPfIT as sign of strength
The termination of Fujitsu's... Continue Reading
By -
News
16 Jun 2008
Gary McKinnon broke into 73,000 US government computers, Lords told
Self confessed British hacker Gary McKinnon, who is fighting extradition to the US, broke into more than 73,000 US government computers, including those of the US Army, Navy and Nasa, and deleted critical data, the House of Lords heard today. Continue Reading
By -
Feature
28 May 2008
Chinook helicopter disaster - computer software failure or pilot error?
Chinook helicopter crash: was it computer software failure or a cause we'll never know? This article gives the background to the Chinook helicopter disaster with links to all the relevant articles published by ComputerWeekly and other useful web links. Continue Reading
By -
News
27 May 2008
New doubts raised on Chinook crash ruling
A former senior officer who helped write rules for RAF accident inquiries has spoken publicly for the first time about his concerns over the cause of a controversial Chinook helicopter crash 14 years ago. Continue Reading
By -
News
04 Apr 2008
How to scope the liability clause in your software license agreement
Standard limit of liability clauses favour the vendor. Here's how to modify them to protect your firm from IT risk. Continue Reading
By- Matt Karlyn, Cooley LLP
-
News
23 Jan 2008
Network managers: master project management to get better salaries
Network technicians will need to learn project manager skills if corporate rollouts of wider and more advanced networks are to be successful, according to attendees at the Cisco Networkers 2008 this week. Continue Reading