IT risk management
Risk management is an increasingly important discipline for IT leaders, with regulatory compliance an ever-present consideration and the amount of legislation and regulation concerning data security on the rise. We examine the issues around IT risk management and the best practices that IT managers need to know.
-
News
05 Dec 2025
Cloudflare fixes second outage in a month
A change to web application firewall policies at Cloudflare caused problems across the internet less than three weeks after another major outage at the service, but no cyber attack is suspected Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
04 Dec 2025
From trust to turbulence: Cyber's road ahead in 2026
As we prepare to close out 2025, the Computer Weekly Security Think Tank panel looks back at the past year, and ahead to 2026. Continue Reading
-
News
02 May 2004
Return to sender?
Several researchers have identified a new e-mail attack that can be used to swamp enterprise e-mail servers, as well as some secondary systems. Continue Reading
By- Hank Hogan, Contributing Writer
-
News
15 Apr 2004
Bacs launches online billing service
UK clearing house Bacs has embarked on a joint venture with a US software company to provide an online bill presentation and... Continue Reading
By - News 11 Apr 2004
-
News
17 Mar 2004
Best practices for enabling and maintaining compliance
As part of our Storage Decisions conference preview series, Shaun Mahoney, senior storage engineer for Citigroup, Randy Wilson, assistant vice president of IT at Essex Investment Management Company and Enterprise Storage Group's Peter Gerr discussed the best practices for enabling compliance. Continue Reading
By- Mark Lewis, Editor
-
Feature
15 Mar 2004
Achieving the goal of CIO
What exactly does a chief information officer do?Paul Burfitt, global CIO at AstraZeneca, analysed the various aspects of his job... Continue Reading
By - News 01 Mar 2004
-
News
24 Feb 2004
Exploiting Software: How to Break Code, Chapter 7 -- Buffer Overflow
This excerpt is from Chapter 7, Buffer Overflow of Exploiting Software: How to Break Code written by Greg Hoglund and Gary McGraw. Continue Reading
-
News
10 Nov 2003
NHS IT plan risky but will not fail, says OGC
The £2.3bn national programme to modernise health service IT systems is "risky and ambitious" but it has sufficient safeguards in... Continue Reading
By -
Feature
26 Mar 2003
What's in an IT name?
What exactly does a chief information officer do?Paul Burfitt, global CIO at AstraZeneca, analysed the various aspects of his job... Continue Reading
By -
News
06 Feb 2003
Users warned as number of software holes soars
IT departments were put on alert this week after it emerged that the number of security vulnerabilities discovered in commercial... Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
29 Jan 2003
Courts Libra system 'is one of the worst IT projects ever seen'
The cost of the Libra project to provide a national system for 385 magistrates courts soared from £146m to £390m, and the main... Continue Reading
By -
Opinion
23 May 2002
Who watches the watchers?
The Civil Aviation Authority must come clean about how it has policed Nats' computer systems Continue Reading
-
News
07 Feb 2002
Victory! Lords confirm CW stand - software flaw could have caused Chinook crash
An historic House of Lords report has this week vindicated a five-year campaign by Computer Weekly for justice after the crash of... Continue Reading
By -
Feature
06 Dec 2000
The VPN dilemma
With traditional networks choking on data, Liz Biddlecombe investigates the pros and cons of managing a VPN yourself or... Continue Reading
-
News
30 Nov 2000
Chinook: a breach of natural justice
MPs slam MoD over 1994 crash whitewash. Software, not pilot error, could have killed 29 Continue Reading
By -
Feature
29 Nov 2000
Computer Weekly's evidence to the Public Accounts Committee
We write to the Public Accounts Committee in relation to its consideration of the Chinook's FADEC computerised engine control... Continue Reading
-
Opinion
16 Nov 2000
Solution: Internet misuse at work
Like the technology, Internet abuse appears to have proliferated in recent years. There are, however, two ways to tackle this... Continue Reading
By- Paul Grant
-
Feature
15 Nov 2000
Tackling Internet misuse at work
Like the technology, Internet abuse appears to have proliferated in recent years. There are, however, two ways to tackle this... Continue Reading
By- Paul Grant
-
Feature
15 Nov 2000
MoD kept RAF chief in the dark
New evidence shows that the air chief marshal who blamed the pilots for the Chinook crash on the Mull of Kintyre in 1994 was not given potentially vital information related to the helicopter's safety-critical software Continue Reading
By -
Feature
01 Nov 2000
Pathway and the Post Office: the lessons learned
The infamous 1996-1999 Pathway project aimed to computerise the nation’s post offices and tackle benefit fraud. But 18 months... Continue Reading
-
Feature
18 Oct 2000
How to scour the world when outsourcing
Thanks to Y2K compliance programmes, it is now perfectly acceptable for a firm to consider moving all or part of its systems development and support... Continue Reading -
Feature
24 May 2000
Lifting the lid on secret stiffing techniques
One of the UK's most experienced IT negotiators lifts the lid on some of the sharp practices used by software suppliers to get... Continue Reading
By- Karl Schneider
-
News
29 Mar 2000
MoD did not tell the whole truth on Chinook software
Letters from software experts to Computer Weekly show the Ministry of Defence omitted to mention it sanctioned the very testing... Continue Reading
-
Feature
08 Mar 2000
Leaked RAF memo scathing of safety software evaluation
Computer Weekly's Tony Collins uncovers evidence that the MoD has consistently undermined the authority of its software assessors... Continue Reading
By- Computer Weekly's Tony Collins
- Feature 01 Mar 2000
-
News
09 Feb 2000
NAO report puts software at the heart of Chinook debate
Tony CollinsGovernment auditors will report tomorrow (Friday) that defence staff put into operational service a fleet of Chinook...
Continue ReadingBy -
Feature
12 Jan 2000
Was Y2K a costly non-event?
Many expected catastrophe. In reality, the industry coped well and is now in good shape for the future, writes Bill Goodwin Continue Reading
By- Bill Goodwin, Investigations Editor
-
Feature
21 Oct 1999
White Paper: Software solutions for effective network power management
Uncertain power conditions can wreak havoc on small businesses, however, there are ways to limit the risk of computer data loss Continue Reading
By- na
