Balancing efficiency with resilience
Security Zone: a recipe for project success
Take control with software asset management
Try before you BI: budgeting and reducing costs on business intelligence
The Google Nexus One/HTC Desire versus the IT department
Why bank data flow to US came to a SWIFT halt
Opinion: Virgins to the banking sector
Q&A with Microsoft's head of environmental sustainability
Think Tank: What should corporate IT managers do to ensure data protection?
Outsourcing: a level playing field?
Security Zone: Oracle follows Sun in search of hardware
Should suppliers and customers change their ways after BSkyB vs EDS?
Portable data security - ebb and flow
How will the Carbon Reduction Committment affect IT outsourcing?
Information overload: lessons from the Christmas Day terror attack
Social media needs a social security strategy
E-mail management: keeping the business bloodlines flowing
Security Zone: How to complete a security questionnaire
How to achieve ERP success: part 2 - the software
Preparing your IT security for the mobile information boom
Data encryption is simple safeguard against data breaches
Do we need a single cyber-security organisation to secure the internet?
Opinion: IT systems management on a small business budget
Security Zone: why we should be more concerned about password authentication
Extract - Grown-Up Digital: Net Geners in collaboration
Telcos must transform their businesses to stop slide in profits
What is the best thing Santa could bring the IT security manager?
VDU eyecare – clearing the confusion
The beginning of the end for online tracking?
A sorry tale of a CEO and his laptop
Save blushes and blame with firewall policy analysis
Smart meters demand smart deployment
PCI DSS: the end is more important than the means
Review: HTC HD2 - Is it time to close the Windows?
Review: BlackBerry Storm 2 - More like a shower
Cross border VAT and the slow death of offshore financial services outsourcing
Integrating your Green IT strategy into business objectives
HBOS power failure highlights importance of business continuity planning
Careers clinic: The biggest mistake in job interviews
Five reasons to move to the Middle East
Security Zone: can you prevent scraping or data harvesting?
How to save money and reduce environmental impact through efficient printing
Google Chrome OS: A threat to Windows 7?
Careers clinic: marketing your personal product
Revised Google Book search deal 'a massive disappointment'
Knowledge transfer strategies to beat skills shortages
Using mobility in compliance and business performance
Gartner: Users need to use multiple PCs
A wise Oracle follows the Sun
Guardian jobs database attack demonstrates difficulties of database security
Remedies Directive: public sector IT suppliers beware
Vote in the Computer Weekly IT Blog Awards 2009
Online presence: an essential strategy for the public sector
Online back-up or cloud recovery?
Patches encourage lax security processes
IT security crisis management: looking beyond the magic bullet
Think small to avoid public sector IT disasters
Challenges and benefits of physical IT security
Finance's lack of cloud commitment is a surprise
What happens when cloud data is lost?
How to upgrade storage on the cheap
Microsoft Security Essentials raises baseline security in Windows 7
Why processes, not technology, will drive business improvement
Security Zone: Secure by design?
Desktop OS upgrade options greater than ever
Ten golden rules to avoid delays in ERP projects
Passwords and encryption strengthen printer security
Security managers must keep pace with weak points in connected devices
Security Zone: How to apply master data management
Risk assessment enables targeted security management
Will Cloud Computing lead to several own goals?
Responsibility for security of end-point devices must be shared across the business
Interview: How Firefox won its market share
Merger mania, data disaster?
Controls and compliance – maximising value and reducing costs
Security Zone: Checklist for winning IT security funding
Can social media save local government?
Next generation IT: understanding user context
The role of ICT in transforming education
Five best practices for mitigating insider breaches
Opinion: eBay could innovate to rescue Skype Sale
Google ruling in Louis Vuitton case favours web freedom
Opinion: Google Adwords gets legal boost from Europe
The Obama approach to reducing IT opex
Mixed messages as Microsoft Office comes to the web
Cloud computing faces security storm
Five benefits of virtualisation
Meeting regulations is key security advantage
Protection of customer data makes a strong selling point
Security bridges the divide between IT and business
Seven ways to align security with the business
Strong security builds trust; trust builds business
Good security and security governance can win business
Raise the profile of security's risk management potential
A guide to storage decommissioning
IT rises from the ashes of Lehman Brothers collapse
Benchmarking ISP service: the Harley Davidson standard
Data can be safer in the cloud than on the desktop
Security Zone: Forensics - don’t hamper the investigation
Developing flexible instant messaging guidelines