• Private data: balancing customer privacy against the need for useful data
  • Opinion: What Facebook should do next
  • The impact of technological change on risk management
  • Security Zone: Setting security boundaries for de-mergers
  • Government spending cuts: can outsourcing save public sector IT jobs?
  • Microsoft Q&A: What the new government could mean for IT staff
  • Apply commercial nous to government IT, say IT leaders
  • Is the future of enterprise Wi-Fi on the edge?
  • Are businesses ready for the MySpace generation?
  • Whitehall focus on long-term IT cuts deflects focus from short-term savings
  • BI: How to make intelligent use of data
  • Software patents – what the European Patent Office ruling means
  • New breed of project managers drive the recovery
  • Lowering IT costs through hosting
  • Opinion: Is IT a utility function?
  • Election to bring more flux for banking
  • A tale of two universes - how the Milky Way provides more milk for some than others
  • Security zone: Application security spans IT and information security
  • Collaboration is key to ensuring digital data security
  • Ensuring online traffic doesn’t hit a dead end
  • What’s in a name? Apple fights for rights to iPad name
  • Living with Windows 7, six months on
  • Where are the opportunities in information security?
  • Gartner: Investigations must be done carefully and correctly
  • ISACA: Rigorous approach is required
  • (ISC)2: Crime scene must be protected
  • BCS: First step is to recognise the threat
  • ISACA Security Advisory Group: Organisations must be forensic ready
  • ISSA UK: Organisations must be prepared
  • Corporate IT Forum: Downturn has changed employee attitudes
  • Innovation will suffer without investment
  • New government must decide quickly how to pay for high-speed broadband
  • Security Zone: Consider human ability in your IT security policy
  • Election 2010: Forum of Private Business says politicians must tackle ‘digital divide’
  • Election 2010: Innovative IT companies need help, says the UK Innovation Initiative
  • Effective way for organisations to tackle ‘porn in the office’
  • Socitm’s seven-point plan for IT in tomorrow’s public services
  • Election 2010: Eurim calls for rebuilding confidence in ICT's competence to deliver
  • Election 2010: Communications the life-blood of enterprise, says Communications Management Assn.
  • Opinion: Google Italy convictions a concern
  • Opinion: An asset with little value can be a big problem
  • Gordon Brown: Labour would create more IT jobs and help Britain become a leading digital economy
  • Nick Clegg: LibDems would scrap ID cards, biometric passports and child database
  • Opinion: How public sector could save £4bn on IT without cutting jobs
  • Regulators turn up the heat on online scammers
  • Automated abattoirs for sacred cows – what IMIS wants from the new government
  • Election 2010: Rural broadband needs urgent attention after 50p tax is axed
  • Opinion: 50p tax goes – what's next for UK's lagging broadband?
  • Opinion: BCS CEO's arguments miss the bigger picture
  • Opinion: Tif sets out IT wish list for new government
  • Opinion: How government CIOs can buy more from SMEs
  • BCS CEO David Clarke: Why call for EGM is misguided
  • Opinion: The impact of Google's trademark victory
  • Legislation to block websites – a move too far?
  • A security expert’s checklist for deploying software as a service
  • Security Zone: Ensuring security in offshoring
  • Opinion: Ensuring a happy marriage between IT and the environment
  • Google vs Louis Vuitton: When is a trade mark not a trade mark?
  • Opinion: Why IT professionals' world view is wrong
  • Opinion: IT industry prepares manifesto to make Britain great again
  • Making the mobile internet accessible for all
  • Moving beyond the cost benefits of outsourcing
  • How can organisations guard against phishing scams?
  • How SMEs can use social networking to get their message across
  • Security Zone: Enterprise architecture is too often a missed opportunity for security
  • Opinion: Is BCS priority the business or its members?
  • Finding space and time for continuous data protection
  • CIO Interview: Esat Sezer of Coca-Cola Enterprises
  • Balancing efficiency with resilience
  • Security Zone: a recipe for project success
  • Take control with software asset management
  • Try before you BI: budgeting and reducing costs on business intelligence
  • The Google Nexus One/HTC Desire versus the IT department
  • Why bank data flow to US came to a SWIFT halt
  • Opinion: Virgins to the banking sector
  • Think Tank: What should corporate IT managers do to ensure data protection?
  • Q&A with Microsoft's head of environmental sustainability
  • Outsourcing: a level playing field?
  • Security Zone: Oracle follows Sun in search of hardware
  • Should suppliers and customers change their ways after BSkyB vs EDS?
  • Portable data security - ebb and flow
  • How will the Carbon Reduction Committment affect IT outsourcing?
  • Information overload: lessons from the Christmas Day terror attack
  • Social media needs a social security strategy
  • E-mail management: keeping the business bloodlines flowing
  • Security Zone: How to complete a security questionnaire
  • How to achieve ERP success: part 2 - the software
  • Preparing your IT security for the mobile information boom
  • Data encryption is simple safeguard against data breaches
  • Do we need a single cyber-security organisation to secure the internet?
  • Opinion: IT systems management on a small business budget
  • Security Zone: why we should be more concerned about password authentication
  • Extract - Grown-Up Digital: Net Geners in collaboration
  • Telcos must transform their businesses to stop slide in profits
  • What is the best thing Santa could bring the IT security manager?
  • VDU eyecare – clearing the confusion
  • The beginning of the end for online tracking?
  • A sorry tale of a CEO and his laptop
  • Save blushes and blame with firewall policy analysis
  • Smart meters demand smart deployment
  • More