Don’t listen to marketing – IT is working
PCI DSS v2.0: How does it affect your web application security testing?
Open University prepares students for the business-focused reality of IT
Top skills for IT managers - Part 3: Critical Thinking and Problem Solving
No excuses for Lockheed Martin cyber attack
Consumerism and productivity: How to deal with employees' devices in the workplace
Seven critical elements to maintaining a balance between regulation and innovation
The cookies monster: How to deal with the new cookies law
Byte Night 2011: IT takes to the streets in the fight against youth homelessness
Can in-memory computing answer the big questions about Big Data?
Opinion: Personal device momentum will challenge traditional mobile sourcing strategies
Dragons' Den star Deborah Meaden backs online micro-finance initiative
Seven steps to successful negotiation for IT buyers
Rationalising software licencing in the virtual age
Security Zone: Best of breed versus single vendor solutions creates challenge and opportunity
Top skills for IT managers - Part 2: Advanced Communication and Interpersonal Skills
How evolved is IT in your company?
CIOs are from Mars, CMOs are from Venus? Not any more
What is the point of BDUK?
Unglamorus batch processing is 'the new sexy' for financial services IT
Gartner: Combine strategy and leadership to maximise the contribution of IT
Security zone: Extending compliance to the cloud
Funding for IT businesses - where and how to get it
IT teams signing up to CARE IT Adventure Challenge
Spectrum auction ignores delivery, quality, timescale issues
Forrester's four steps for CISOs marketing security
Delivering IT for economic recovery
How technology can make or break a carve-out
Top skills for IT managers - Part 1: Establishing a business mindset
How tablets are transforming how SAP runs SAP
Interview: Askar Sheibani, CEO of Comtek - People need to change their ways on e-waste
Getting to grips with software licencing
10 steps to get Internet Explorer 9 going
High touch is just as important as high tech
Check your software licence agreement for these common flaws
Guide for employers on the abolition of the default retirement age (part 1)
Guide for employers on the abolition of the default retirement age (part 2)
Security zone: Mobile malware is already costing you money
Prepare for the mobile wallet
New assurance standard required for cloud confidence
Lessons from the NAO's report on government IT
Rising values must drive change on software patentability issue
Are you a natural risk taker? Take our free personality test to find out
Software engineering, but not as we know it
Security sceptics should 'just say yes'
The business impact of TMMi
Increase in IT jobs continues into 2011
ECJ trade mark ruling lets eBay off the hook
Opinion: Key role for IT in M&A success
Is it time for IT professionals to return to the City?
Review: WikiLeaks - Inside Julian Assange's war on secrecy
IT governance and mobile technology
How can we find the new recruits that IT needs?
Global sourcing trends in 2011
Justifying your cloud investment: high-performance computing
Software as a service can breed dependency so choose suppliers with care
IT skills require industry engagement
Security Zone: DLP – Did we miss the point?
Cloud predictions for 2011: Gains from early experiences come alive
Think Tank: What are the security implications of putting a smart meter in every UK home?
Security Zone: The ISO/IEC 38500 IT Governance Standard
CES 2011: Security and mobile working
IT leads the charge on project management
Innovation out of recession: what’s ahead in 2011
The seven most common project management mistakes CIOs make
Don’t let techno-babble cloud your judgement
Why FTTC isn’t enough and how the UK might do more
Fibre rates – time to repeal the modern equivalent of the window tax
Saving money through software asset management
Government broadband strategy will fail unless fibre rates are challenged
Security Zone: More effort needed to manage third party connections
The legal considerations of cloud computing
CW Security Think Tank: How to prevent security breaches from personal devices in the workplace
Youngsters driving the cloud to tipping point, says Rangaswami
Opinion: Plugging the gaps in the government's broadband strategy
Stopping the cloud taking your IT career away
Why data analytics must change
Women could fast track the alternative IT needs
Refining the language of risk
Security Zone: Cloud computing puts the spotlight on security architecture
Freedom of action: preventing paralysis from risk
Career structures for IT professionals: HR toys or levers for change?
Ten trends you cannot ignore
Which IT suppliers will win in next 18 months?
The new EU cookie rule – so, we need to get consent then?
Will a UK technology hub really rival Silicon Valley?
How to collaborate: Six lessons from BT Expedite
Beyond PCI DSS: Protecting more than just card data
Clearer visibility of product roadmaps improves IT planning
LTE: Will high speed mobile internet mean higher speed business?
Forrester: Harnessing mobile UC to transform the business
Hacking work: the businessman's Trojan
Security Zone: Mobile device management - chore or chance?
Spending Review: Prepare for the insider threat as staff are squeezed
Apps will make the smart grid worthwhile
Exploiting knowledge for project value
Time for the UK to act on cybercrime
Vote in the Computer Weekly IT Blog Awards 2010
The only way is tough – the future of data protection law