Something Wicked This Way Comes
Operation Bot Roast II
New ComputerWeekly.com video
Road Blocks for Road Warriors
E-Petition for action on E-Crime on No10 Website
2007 Data Breach Survey
Don't Forget Your Digital Wallet
From top secret to toilet paper
Cock-up or Conspiracy?
Biggest corporate security threats
Dangers of third party content
What would you ask Tim Berners Lee?
What is good collaboration #1
Is waning interest in HMRC's missing CDs letting government off the hook?
HMRC’s extreme reaction to missing CDs
Tackling the crisis of confidence in the on-line world
Government spin – Whitehall tries to disparage our NHS article
Security is the New Rock And Roll
Will patient data go overseas?
I blame John Humphries
Can business take open source seriously?
Changing threat environment
Innovation is Where You Least Expect It
ComputerWeekly.com - we''ve explained the changes in a new video
Collaborating, its a team thing
Doomed from inception
Knee-jerk Reactions Are Not the Answer
Data breach analysis
Death by Data Protection
Missing CDs – an excuse for ministers to attack the NAO?
Missing CDs - why the NAO wanted millions of child benefit records
No More Mr Nice Guy – Time for CISOs to Get Tough
A brand new ComputerWeekly.com
HMRC - further comment
Intelligent? The computer says no.
HMRC's loss of 25 million personal data records
HMRC Data Incident
HMRC's missing Child Benefit CDs - what went wrong and lessons for NPfIT and ID cards
There but for the grace of God goes your CIO/CFO
Personal Data Breaches Are Unforgivable
From the sublime to the risible
ComputerWeekly.com editor's blog goes live
Grim 2007 Medix survey results on the £12.4bn NHS's National Programme for IT
£5bn Defence Information Infrastructure - leaders talk about progress, problems and lessons
Computer Weekly interviews heads of £5bn Defence Information Infrastructure project
Trusted, sustainable partnership or cynical manipulation?
NPfIT conspirators and a different PR approach to DII problems
Virtual Worlds - Where are the rules?
Security Culture and Social Engineering
The purpose of security metrics
Spam is still a threat
Goodbye lock-in blues
From Poppy day to GIS day
The Old Ones Are the Best
Lions led by donkeys: the 1918 Whitehall time-capsule
The £5bn Defence Information Infrastructure project - was original plan too ambitious?
Human Factors Dominate Today’s Security Problem Space
Database Security - Facts are stubborn things, but statistics are more pliable
Simultaneously Detached and Intimate
A single European Telecoms Market v. The Global Internet
How resilient is your infrastructure
Psychology & Security
Database Log Management Paper
Time to get some focus
Who should be reponsible for on-line security?
BT - good news on the NHS's National Programme for IT
Cognos: and then there was one
Security is the Foundation of Internet Governance
BSkyB puts its legal costs of dispute with EDS at £32m
Bot Master Banged to Rights
Funding for high level ICT skills updating slashed
Salesforce.com Phishing & Security Awareness
The Future is Mobile but will it be Secure?
Malware - continuing threat (Pt. 2)
Targets drive wrong behaviour: People not Systems
Malware - continuing threat (Pt. 1)
HMRC cuts annual IT costs and gives Capgemini contract extension worth more than £1bn
Proving the effectiveness of desktop controls
When it comes to Communications, Smarter beats Dumber
Keeping up with Regulatory Compliance
The mobile industry, social responsibility and accountability
Five million patients benefit from Choose and Book - déjà vu?
How safe is your data? - on-line or off?
Infosec Steering Committee
Google: does Android make sense?
Statistics and the NPfIT "success"
Big bang is dead: Christmas has been cancelled
The NPfIT without Richard Granger - "more scary"
More on the consumerization of IT
The Long and Growing Arm of the Law
Non-company equipment on our networks
CISSP - is it worthwhile?
What happened to the Crosby Review?