Security Software as a Service
Can we have more testing please
Petty local government bureaucracy alive and well!
BBC bias towards Microsoft proved (not)
On trial - role of the CISO
Microsoft Yahoo - deadline pases
Navigating the Security Conference Circuit
Microsoft/Yahoo – Your Comments
Microsoft Yahoo AGM attack
EDS reports growth in first quarter
Second Life: the business opportunity explained
Microsoft: Yahoo deadline expires
Error messages you never want to see - no. 2
290 patient safety incidents reported under NPfIT scheme
Error messages you never want to see
1-2-3 you’re back in the room
Caption competition and Infosec leaves Olympia for its neighbour
Security still a people problem
Video: Second Life CEO on stepping down
Nigerian 419 scam on LinkedIn
Mobile Internet woes on the eeePC
Weekly video round up - twitter you tweets
Clinton penetrates Obama’s portal
What is good practice? Directors' Guides published
Second Life courtroom drama video
E-crime Unit - will it or won't it?
Businesses build Second Life experience
Some of the good and bad at HC2008 - a summing up
Infosec day two - midday lunchtime
Where are you IBM? (we now know where MS is!)
Stripper misses day in court thanks to computer error
Death by Data Protection III: paralysis from the top.
What's coming up today from Infosec
Identity systems will save the world
Yahoo earnings surge 281.7% in latest results
Reindeer meat and a new industry portal
Infosec 2008 - what's going on on day one
Whitehall advertises for NHS CIO
The Commodore 64 is our life
HC2008 - the lighter side of Healthcare Computing event in Harrogate
Cobol programmers back in demand
BT Openreach and SLAs - not up to scratch?
How to prove ROI on Web 2.0 projects
It's hot at Infosec 2008
Flame fizzles out on CNN attack
Another world, another time
Small-scale NPfIT look-alike in Australia is in trouble
Why I won't be at Infosecurity (but there's a competition if you are)
Phorm - 4 key rules that ISPs must obey
IT workers could swing US elections
Infosecurity Europe 2008
We are the weakest link
O2's mobile broadband service - what you should know...
Web 2.0 spending to increase - but who pays?
Have NPfIT contract talks in the south stalled?
Web 2.0 - creating digital lightening rods
Environment Agency takes phishing rather too literally?
Judge says ministerial statement about ID Card gateway reviews and FOI was "wrong"
Centralisation – Does it Really Help Security?
Laptop repairs? If in doubt hammer IT
Right on the case Mr White
The battle for the Internet
Laptop privacy on the train
Post-It note proves revealing
Career management: How to get headhunted
Daytime TV turns IT contractor to life of crime
Weekly video round-up
Women value chocolate more than data security
Wot a mesh you got me into!
All eyes on the NPfIT go-live at Barts?
Rebuilding the eeePC - Part 3
Bond.com domain name goes for $1 million
What not to do about Social Networking
Rapist poses as council care worker to access its data
CEOs court out by phishing bait
Spam video - how to stop spam harming business productivity
If you work with IBM or MS collabarative technology in the Enterprise, you may be out of work
The Apprentice UK
Rebuilding the eeePC - Part 2
How to hack guide
Choose and Book problems: up to 340 patients affected since Friday
Fingers burned by flaming laptop
Swindells report on NHS IT: is it being held up?
Former NHS CIO: the risks of enforced standardization
Robert Mugabe, spin and the NPfIT
Most read on ComputerWeekly last week
The Telegraph's Matt on Surveillance
Rebuilding the eeePC
More on Linkedin (less ads please)
The Future of Intellectual Property
Phorm public meeting
Barts NPfIT go-live: “a roller-coaster ride”
A week in the field with the eeePC
Positive Approach to Security Requests
Listen in, Directors: privacy matters
London Marathon 2008: See how they run!