IT strategy
IT strategy (information technology strategy) is a comprehensive plan that outlines how technology should be used to meet IT and business goals.. See complete definition.
-
News
10 Apr 2024
Google Cloud debuts agent builder to ease GenAI adoption
Vertex AI Agent Builder is touted to enable developers with different levels of expertise to build conversational AI agents grounded in enterprise data Continue Reading
-
News
09 Apr 2024
Google Cloud embeds Gemini across product portfolio
Google Cloud’s Gemini model will power a slew of AI assistant capabilities across its portfolio to bring the benefits of generative AI to developers and enterprise users Continue Reading
-
E-Zine
10 May 2022
The spies who hack you – the growing threat of spyware
In this week’s Computer Weekly, after 10 Downing Street was hit by a spyware attack, fears about targeted mobile phone hacks are increasing. Our salary survey highlights the diversity challenge in IT, with men’s support for women in IT declining. And we look at how datacentre heat reuse can help reduce carbon emissions. Read the issue now. Continue Reading
-
News
09 May 2022
CyberUK 22: NCSC’s ACD programme blocks 2.7 million scams
On the opening day of its annual CyberUK event, the NCSC reveals how organisations around the country have used its Active Cyber Defence programme to their advantage Continue Reading
-
News
09 May 2022
Tech Data enhances managed print offering
Distributor adds more depth to its OpenMPS cloud-based offering after getting partner feedback Continue Reading
-
News
09 May 2022
Malaysian government inks agreement with Google Cloud
The cloud framework agreement with Google will make it easier for Malaysia’s public sector agencies to access Google Cloud services through a single government contract Continue Reading
-
Feature
05 May 2022
How to retain cyber talent in the Great Resignation
The cyber security industry is experiencing alarming rates of resignations, leaving organisations vulnerable to cyber attacks. How can we better retain cyber talent? Continue Reading
-
Feature
05 May 2022
Disaster recovery is an essential service for EDF with Phenix-IT
EDF has built disaster recovery tracking, planning and testing software on a six-month upgrade cycle based on governance, risk and compliance functionality in Mega’s Hopex platform Continue Reading
-
Opinion
05 May 2022
Security Think Tank: Identify, assess and monitor to understand attack paths
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these attack pathways better in order to fight back Continue Reading
-
Opinion
04 May 2022
Following the customer: How tech leaders can learn from Alphabet and Meta
Why tech leaders should think about the changing needs of their customers Continue Reading
-
News
04 May 2022
Inside UnaBiz’s bid for Sigfox
Singapore-based UnaBiz has made a successful bid for the French low-power wide area network technology supplier, in a deal that will advance its vision of a unified IoT world Continue Reading
-
Opinion
04 May 2022
Security Think Tank: Defenders must get out ahead of complexity
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to better understand these attack pathways to fight back Continue Reading
-
Opinion
03 May 2022
Security Think Tank: Solving for complexity in the network
The modern-day abundance of IT platforms, apps and tools gives the bad guys ample opportunity to move rapidly through the network to hit critical assets. Security teams must understand these attack pathways better in order to fight back Continue Reading
-
E-Zine
03 May 2022
A prescription for digital accessibility at Boots
In this week’s Computer Weekly, millions of people have difficulties when using websites – we find out how Boots is making its e-commerce offering fully accessible. Our new buyer’s guide examines communications as a service. And we talk to Trainline’s CTO about how the rail app provider survived and thrived post-pandemic. Read the issue now. Continue Reading
-
Feature
02 May 2022
Next generation of collaboration and communication services
Future comms systems may look and feel rather different from what exists today – we look at the journey for communications services Continue Reading
-
E-Zine
30 Apr 2022
Dicas para diferentes sistemas operacionais
Como você lida com os requisitos de gerenciamento, segurança e atualização dos sistemas operacionais corporativos mais comuns? Aqui estão algumas dicas. Continue Reading
-
Podcast
29 Apr 2022
Podcast: War, geo-political risk, data storage and compliance
We talk to Mathieu Gorge, CEO of Vigitrust, about impacts on compliance and data storage from instability in geo-political events, such as the Russian invasion of Ukraine Continue Reading
-
News
29 Apr 2022
CIO interview: Jeffrey Wood, deputy director of ICT, Princess Alexandra Hospital NHS Trust
A move to a brand-new hospital site offers the NHS trust a chance to introduce a range of new innovations, building on the digital transformation delivered over the past few years Continue Reading
-
Feature
29 Apr 2022
Electric vehicle transition comes with uneven costs
Governments, car makers and tech companies are promoting electric vehicles, but are they considering the uneven social and environmental costs from extracting the critical minerals needed to make batteries? Continue Reading
-
News
28 Apr 2022
Ransomware recovery costs dwarf actual ransoms
The cost of recovering from a ransomware attack far outweighs the ransoms now being demanded by cyber criminals, according to recent data Continue Reading
-
News
28 Apr 2022
Naver outlines global AI ambitions
South Korean internet giant Naver has built a global research network to advance and apply its artificial intelligence capabilities across its services Continue Reading
-
Podcast
28 Apr 2022
Metaverse, women in software – Computer Weekly Downtime Upload podcast
Cliff Saran joins Clare and Brian, in Caroline’s absence, to discuss the metaverse, Windows 11, the Makers Women in Software Power List, and how CIOs do technology in 2022 Continue Reading
-
News
28 Apr 2022
Russia plumbs new depths in cyber war on Ukraine
Microsoft details cyber attacks on Ukrainian civilian communications, nuclear safety authorities, and the exploitation of the destruction of Mariupol in a phishing campaign Continue Reading
-
News
27 Apr 2022
Log4Shell, ProxyLogon, ProxyShell among most exploited bugs of 2021
These 15 CVEs were the most commonly exploited last year, and if you haven’t mitigated against them, now is the time Continue Reading
-
News
27 Apr 2022
Russia-supporting cyber crime gang claims Coca-Cola as victim
Stormous cyber crime collective claims to have stolen 161GB of data from Coca-Cola, and says it plans to sell it off Continue Reading
-
Feature
27 Apr 2022
Cloud-first strategy forces big shift on IT infrastructure, skills
More and more, IT infrastructure is in the cloud. As organizations adopt cloud-first strategies, forward-looking CIOs are refocusing their teams on new roles and tasks. Continue Reading
-
News
27 Apr 2022
Ransomware victims paying out when they don’t need to
Sophos’s annual State of Ransomware report shows dramatic increases in the impact of ransomware attacks, but also finds many organisations are paying ransoms when they don’t need to Continue Reading
-
News
27 Apr 2022
Government digital ignorance puts Dutch economy at risk
In this interview, Michiel Steltman, managing director of Digital Infrastructure Netherlands, tells Computer Weekly why the Dutch digital economy is at risk due to a lack of knowledge and understanding at government level Continue Reading
-
Opinion
26 Apr 2022
Digital begins in the boardroom
Successful organisations need a digitally savvy board to shape their business agenda Continue Reading
-
News
26 Apr 2022
Emotet tests new tricks to thwart enhanced security
The operators of the Emotet botnet seem to be trying to find a way to get around recent changes made by Microsoft to better protect its users Continue Reading
-
News
26 Apr 2022
Odense Robotics helps develop key export for Denmark
Robotics seen as a future export sector for Denmark as investment startups build their skills in public sector projects Continue Reading
-
E-Zine
26 Apr 2022
The latest salary trends for IT professionals
In this week’s Computer Weekly, the results of our annual salary survey show pay returning to pre-pandemic levels and work-life balance a growing consideration. As sustainability becomes a critical issue, we look at how datacentres can meet emissions targets. And we find out how IT leaders can help protect children online. Read the issue now. Continue Reading
-
News
25 Apr 2022
US mobile network emerges as latest Lapsus$ victim
Lapsus$ extortion gang hit T-Mobile and attempted to perform SIM-swapping attacks and code theft Continue Reading
-
News
25 Apr 2022
Government appoints head of technology transfer unit
Government announces a CEO to lead its initiatives around commercialising its knowledge assets Continue Reading
-
News
25 Apr 2022
Sophos soaks up SOC.OS
Sophos says acquisition of BAE spinout SOC.OS will enhance its managed threat and extended detection and response services Continue Reading
-
News
22 Apr 2022
What’s up with Conti and REvil, and should we be worrying?
New intelligence on some of the world’s most prolific ransomware gangs suggests recent disruption to their activities was like water off a duck’s back Continue Reading
-
Feature
22 Apr 2022
Snapshots vs backup: Use both for optimum RPOs
We look at snapshots and backup, the key difference, their pros and cons and how best to use the two approaches in an integrated data protection strategy for optimal RPO Continue Reading
-
News
22 Apr 2022
UAE bolsters cyber security
The United Arab Emirates has successfully improved its security posture amid mounting cyber threats Continue Reading
-
Feature
21 Apr 2022
10 critical people skills today's CIOs and IT leaders need
Learn about 10 of the most important soft skills -- from communication to empathy -- and why they are critical to successful technology leadership. Continue Reading
-
News
21 Apr 2022
Zoom adds new round of cyber security enhancements
Videoconferencing platform Zoom adds multiple third-party security certifications and service enhancements Continue Reading
-
News
21 Apr 2022
Five Eyes in new Russia cyber warning
Latest cross-body alert warns of Russian threat to utilities and other core elements of national infrastructure Continue Reading
-
News
21 Apr 2022
Impact of Lapsus$ attack on Okta less than feared
Okta’s investigation into Lapsus$ breach of its systems via a Sitel workstation has concluded that the impact was significantly less than the maximum potential Continue Reading
-
News
20 Apr 2022
How Veeam helped grocery chain Franprix escape its backup hell
French supermarket chain had backup windows that ran well into the next working day and restoring deleted files could take days. It chose Veeam in a contest with Cohesity Continue Reading
-
News
20 Apr 2022
AWS fixes vulnerabilities in Log4Shell hot patch
AWS issues fixes for a series of Log4Shell hot patches after they turned out to leave its services vulnerable to further exploitation Continue Reading
-
News
20 Apr 2022
How PropertyGuru is approaching technology integration
Property tech firm PropertyGuru has invested in capabilities such as DevOps and authentication that can be applied across different platforms that it has acquired over time Continue Reading
-
News
20 Apr 2022
Financial Ombudsman Service chooses TCS as digital transformation partner
Tata Consultancy Services will build and implement key systems as part the Financial Ombudsman Service’s digital transformation Continue Reading
-
News
19 Apr 2022
Median threat actor ‘dwell time’ dropped during 2021
Security teams appear to be getting better at detecting attackers within their networks, according to a report Continue Reading
-
Feature
19 Apr 2022
Positive benefits in the new experience economy
While creating a positive employee experience (EX) has been on the agenda of companies for years, the concept – and that of the experience economy in general – has come of age in the Covid-defined working arena Continue Reading
-
News
18 Apr 2022
Singtel expands datacentre footprint in Indonesia
Singtel’s datacentre platform will host selected datacentre assets from Indonesia’s Telkom as part of the telco’s move to grow its datacentre footprint in key regional markets Continue Reading
-
News
14 Apr 2022
Kyndryl kindles cyber incident recovery pact with Dell
IBM spin-out Kyndryl hops into bed with Dell Technologies in a joint cyber resilience proposition Continue Reading
-
News
14 Apr 2022
Multi-ERP systems are on the menu for SAP implementations
Organisations using SAP may build future ERP systems from composable building blocks from multiple software providers Continue Reading
-
News
14 Apr 2022
Zhadnost DDoS botnet deployed against Finland
A coordinated DDoS attack hit two government ministries in Finland at the same time as Ukrainian president Volodymyr Zelensky delivered a virtual address to the Finnish parliament Continue Reading
-
News
14 Apr 2022
Incontroller ICS malware has ‘rare, dangerous’ capabilities, says Mandiant
Mandiant joins a growing chorus of warnings over novel nation state threats to ICS systems Continue Reading
-
News
13 Apr 2022
Hybrid work catching on in India
More tech workers in India now enjoy flexi-work arrangements and higher salaries, but talent retention remains an issue in the subcontinent, study finds Continue Reading
-
News
13 Apr 2022
WatchGuard firewall users urged to patch Cyclops Blink vulnerability
The US authorities have seen fit to add the WatchGuard vulnerability used by Sandworm to build the Cyclops Blink botnet to its list of must-patch vulnerabilities Continue Reading
-
News
13 Apr 2022
Microsoft patches two zero-days, 10 critical bugs
Patch Tuesday is here once again. This month, security teams must fix two privilege escalation zero-days in the Windows Common Log File System Driver and the Windows User Profile Service Continue Reading
-
News
13 Apr 2022
Criminals researched hacking TTPs post-breach in ‘messy’ cyber attack
Sophos shares details of a cyber attack that saw attackers hang out in their victim environment for five months while they prepared to sow further mischief Continue Reading
-
News
12 Apr 2022
Universal IAM policy failings put cloud environments at risk
Almost all organisations lack appropriate IAM policy controls to effectively secure their data in the cloud, according to a damning study Continue Reading
-
Blog Post
12 Apr 2022
Citrix and Microsoft: who’s really leading the transformation agenda?
Citrix loves Microsoft and Microsoft loves Citrix - OK, maybe I’m exaggerating to make a point, but that’s the gist of the official lines you get from both companies. But looking in from the ... Continue Reading
-
Feature
12 Apr 2022
Enterprises shore up supply chain resilience with data
Using data to gain better visibility over their supply chains and forge closer connections between disparate links is helping organisations respond to disruptions faster Continue Reading
-
News
12 Apr 2022
Sandworm rolls out Industroyer2 malware against Ukraine
A second generation of the Sandworm-linked Industroyer malware has been identified by ESET researchers and Ukraine’s national CERT Continue Reading
-
E-Zine
12 Apr 2022
Disney combines digital, data and creativity to win advertising opportunities
In this week’s Computer Weekly, we talk to the executive vice-president for client and brand solutions at Disney Advertising Sales about how it is using data to subserve story-telling excellence. We delve into how rising energy costs negatively impacted the UK arm of Sungard Availability Services. And we look at the role of infrastructure as code in edge datacentres. Read the issue now. Continue Reading
-
News
11 Apr 2022
Border IT system fixed after 10-day outage
Post-Brexit border IT system failure fixed after going down at the start of April, allowing traders to once again file customs documents electronically rather than by hand Continue Reading
-
News
11 Apr 2022
Open source CMS platform Directus patches XSS bug
A stored cross-site scripting vulnerability in the Directus platform could have enabled malicious actors to gain access to valuable data Continue Reading
-
Opinion
11 Apr 2022
We must target a broad church to fill vacant cyber roles
The security industry focuses a lot on cyber-specific specialisms and technical skills, but it could really benefit from widening its search. Take it from a social anthropologist Continue Reading
-
News
11 Apr 2022
Raspberry Pi Foundation ditches default username policy
Raspberry Pi owners will no longer be able to use the default ‘pi’ username, as the Raspberry Pi Foundation clamps down on insecure practices Continue Reading
-
News
08 Apr 2022
Ukrainian cyber criminal gets five years in jail
A US court has sentenced Denys Iarmak, who worked as a penetration tester for the FIN7 cyber crime group, to a five-year prison sentence Continue Reading
-
News
08 Apr 2022
Was Spring4Shell a lot of hot air? No, but...
Find out why Spring4Shell was apparently not as impactful a security problem as many had at first feared, and why it’s on the cyber community as a whole to do better Continue Reading
-
News
08 Apr 2022
IT contractors warned as HMRC draws on ‘IR35-adjacent’ legislation in tax avoidance clampdown
IT contractors are being urged to take action now, as details emerge about how HM Revenue & Customs is drawing on some IR35-adjacent legislation to send out five-figure tax bills to individuals who engage with contractor-focused accountants Continue Reading
-
Feature
08 Apr 2022
Storage requirements for AI, ML and analytics in 2022
We look at what is needed for artificial intelligence and machine learning, and the pros and cons of block, file and object storage to store and access very large amounts of often unstructured data Continue Reading
-
News
07 Apr 2022
AirAsia taps Google Cloud to bolster its super-app
AirAsia is setting up a cloud centre of excellence with Google Cloud to shore up its super-app and build capabilities in site reliability engineering and machine learning operations Continue Reading
-
News
07 Apr 2022
Goldacre review outlines recommendations on safer use of health data
The findings of an investigation into use of health data for research and analysis includes a number of proposals to improve innovation in the NHS Continue Reading
-
News
07 Apr 2022
US shuts down Russia’s Cyclops Blink botnet operation
Operation by US authorities has taken the Russia-attributed Cyclops Blink botnet ‘off the board’ Continue Reading
-
E-Zine
07 Apr 2022
CW Middle East: UAE and UK researchers work on ‘trustworthy’ cloud OS for datacentres
Imperial College London is embarking on a three-year project with an Abu Dhabi-based group of researchers to find ways for datacentre operators and cloud providers to secure their infrastructure. Also read how Dubai is positioning itself to reap the benefits of a promising global market for drone technology. Continue Reading
-
Podcast
07 Apr 2022
Pure says unstructured data needs storage scale and performance
Podcast: Pure Storage says huge growth of unstructured data and its diversity means storage has to be able to scale with it and offer performance to gain insights Continue Reading
-
News
06 Apr 2022
APAC organisations to spend more on AI
The higher investments in AI will be led by the region’s banking industry which is harnessing AI systems to mitigate risks and detect fraud Continue Reading
-
News
06 Apr 2022
Apple criticised over unpatched CVEs in Catalina, Big Sur
Apple patched two zero-days in macOS Monterey last week, but did not address the same issue in Catalina or Big Sur, raising questions Continue Reading
-
News
06 Apr 2022
Denonia malware may be first to target AWS Lambda
The newly discovered Denonia malware appears to be custom designed to target AWS Lambda environments, and may be the first of its kind Continue Reading
-
News
06 Apr 2022
Hydra takedown merely shifts cyber criminal problem elsewhere
The seizure of the Hydra dark web marketplace is a positive development in the fight against cyber crime, but will only be a temporary setback for determined criminals Continue Reading
-
Feature
06 Apr 2022
Snapshots best practice: Five key things you need to know
We look at snapshots best practice, including the way they work, why they are not the same as backups, how to avoid heavy processing overheads and key user permissions tweaks Continue Reading
-
News
05 Apr 2022
Structured decentralisation is the key to unlocking Nordic-level innovation
Finnish tech entrepreneurs will be taking the stage at the World Economic Forum to tell the world about the role of trust in Finnish startup success Continue Reading
-
News
05 Apr 2022
Discount retailer The Works hit by cyber attack
A small number of The Works’ bricks-and-mortar stores were forced to close amid a cyber attack of an undisclosed nature Continue Reading
-
News
05 Apr 2022
Triple-threat Borat malware no joke for victims
Unlike its namesake, the newly discovered Borat malware won’t raise a smile for IT security pros Continue Reading
-
News
05 Apr 2022
Saudi Arabian ICT sector hits $32.1bn after strong pandemic response
The Saudi Arabian IT and communications sector is recovering strongly from the Covid-19 pandemic Continue Reading
-
E-Zine
05 Apr 2022
Police use of AI needs overhaul to prevent abuse
In this week’s Computer Weekly, a House of Lords inquiry calls for a rethink on how police forces use AI technologies – we examine the issues. Our new buyer’s guide looks into edge datacentres. And the EU and US agree a new data protection deal to replace Privacy Shield, but will it stand up to scrutiny? Read the issue now. Continue Reading
-
News
04 Apr 2022
Office Wi-Fi may not cope with hybrid work
Continued growth of online meetings is triggering disruption across the employee productivity technology market, research from CCS Insight has found Continue Reading
-
News
01 Apr 2022
Four moves to ‘checkmate’ critical assets thanks to lax cloud security
Malicious actors can compromise 94% of critical assets within four steps of the initial breach point, according to a report Continue Reading
-
News
01 Apr 2022
Apple drops emergency patches for two zero-days
Apple has fixed two zero-day vulnerabilities that appear to have been actively exploited in the wild Continue Reading
-
News
31 Mar 2022
EU Act ‘must empower those affected by AI systems to take action’
Ada Lovelace Institute publishes recommendations on how European institutions can improve the Artificial Intelligence Act by establishing a ‘comprehensive remedies framework’ around those affected by the deployment of AI systems Continue Reading
-
News
31 Mar 2022
Global upheaval shows cyber security isn’t good enough, says GCHQ director
Generational global upheaval has laid bare significant gaps in national cyber strategies, GCHQ chief Jeremy Fleming has said in a speech Continue Reading
-
News
31 Mar 2022
Lapsus$ cyber crime spree continues despite arrests
The arrests of seven people in connection with the Lapsus$ cyber crime group has not dented the gang’s enthusiasm for causing chaos Continue Reading
-
News
31 Mar 2022
Spring4Shell zero-day sprung on security teams
Some are describing a newly disclosed Spring Java framework vulnerability as the next Log4Shell, but what is Spring4Shell, and what can we do about it? Continue Reading
-
News
31 Mar 2022
BCS Pride group calls for end to transphobia in tech
The BCS has called for an end to transphobic abuse and harassment in the technology industry Continue Reading
-
News
30 Mar 2022
One-third of UK firms suffer a cyber attack every week
New statistics from the annual DCMS Cyber security breaches survey reveal the extent and frequency with which UK organisations are being attacked by malicious actors Continue Reading
-
Feature
30 Mar 2022
Boots accelerates its digital accessibility journey
Boots is working with website accessibility software provider Recite Me to make its website more user-friendly and improve the customer experience Continue Reading
-
News
30 Mar 2022
CIO interview: Spencer Clarkson, CTO, Verastar
Digital transformation and unifying customer relationship management systems are driving the business services group forward Continue Reading
-
Feature
30 Mar 2022
Recruitment risks: Avoiding the dangers of fraudulent candidates
Tech companies are seeing an increase in fraudulent job applications, with associated impacts on risk and cyber security. So how can organisations protect themselves from fraudulent applicants while ensuring they recruit the best talent? Continue Reading
-
News
30 Mar 2022
Executive interview: Rajiv Ramaswami, CEO, Nutanix
We speak to the CEO of Nutanix about growing up in India, the switch from engineering to business leader, and mentoring Continue Reading
-
News
29 Mar 2022
NCSC: Not necessarily wise to ditch Kaspersky
UK’s National Cyber Security Centre issues refreshed guidance on organisations’ usage of technology and services of Russian origin, but stops short of advising users to expunge all Russian products from their IT estates Continue Reading
-
News
29 Mar 2022
Wave of Log4j-linked attacks targeting VMware Horizon
Sophos issues a new warning to organisations that have so far failed to patch their VMware Horizon servers against Log4Shell Continue Reading
-
News
29 Mar 2022
Cabinet Office publishes playbook with rules for government digital projects
Digital, Data and Technology guide outlines measures supporting overhaul intended to “get things right at the start” Continue Reading
-
E-Zine
29 Mar 2022
Ten years of the Raspberry Pi
In this week’s Computer Weekly, as the Raspberry Pi reaches its 10th anniversary, we look back on how the low-cost computing device went from schools to supercomputers and even into space. Gartner offers tips on how to motivate IT staff in a hybrid working environment. And we meet the Dutch hackers helping to secure the internet. Read the issue now. Continue Reading