IT for charity organisations
Charities have to operate at the lowest cost possible, and that includes the way they use IT. IT managers in the third sector have learned how to deploy cost-effective technology to support the critical work that charities and voluntary organisations do, and their experiences can offer relevant case studies for IT managers in other sectors.
-
News
03 Jan 2024
Artificial intelligence to the front in Sweden’s National Technology Strategy
Sweden focuses in on artificial intelligence in its latest far-reaching national IT strategy Continue Reading
-
Feature
07 Sep 2023
Interview: Ashish Gupta, head of EMEA, HCLTech
It’s not just enterprises that changed their operating models during and after Covid, but also the suppliers that took them on the journey, HCLTech Europe’s head explains Continue Reading
-
News
30 Oct 2012
IT security budgets mismatched to hacker targets, study shows
IT security budgets are not being used to provide defence technologies in some areas most likely to be targeted by hackers, a study shows Continue Reading
-
News
16 Oct 2012
Organisations need alternative data protection as security models fail
Organisations' security models are failing - so could it be time to adopt an intelligence-led approach to data protection and fighting cyber crime? Continue Reading
-
News
11 Oct 2012
RSA Europe: Thousands of unprotected virtual servers exposed to the web
Organisations are failing to protect data in virtual environments, says Jason Hart, vice-president cloud solutions, SafeNet Continue Reading
-
News
11 Oct 2012
RSA Europe: Security concerns whole supply chain, says Misha Glenny
Targeted attacks affect the whole supply chain, not just big corporations, author Misha Glenny tells RSA Conference Europe 2012 attendees Continue Reading
-
News
10 Oct 2012
RSA Europe: Cloud key to future information security, says Qualys
Cloud computing is an opportunity information security professionals should not miss, says Philippe Courtot, CEO of security firm Qualys Continue Reading
-
Feature
24 Sep 2012
Tune Raid performance to get the most from your HDDs
Tune Raid performance at the storage controller to match application I/O demands to optimal hard drive (HDD) performance Continue Reading
-
News
18 Sep 2012
Microsoft investigates IE zero-day flaw
Microsoft says it is investigating reports of a vulnerability in Internet Explorer 6, 7, 8, and 9 Continue Reading
-
News
17 Sep 2012
IT security awareness needs to be company-wide, says (ISC)²
Information security awareness needs to be more robust, started as early as possible, continually reinforced and organisation-wide, says Julie Peeler, director, (ISC)² Foundation Continue Reading
-
News
11 Sep 2012
Skills shortage means no unemployment in IT security, says (ISC)2
Zero unemployment in IT security shows a huge shortage of skills in the profession, says Hord Tipton, executive director of (ISC)2 Continue Reading
-
News
07 Sep 2012
UK cookie law compliance mixed, study finds
Three months after the enforcement of the cookie law, only 12% of UK websites have prominent privacy notices and robust cookie controls, a study shows Continue Reading
-
Feature
05 Sep 2012
Setting up a botnet is easier than you think
Acquiring, installing, configuring and using a powerful data-stealing banking Trojan toolkit is not as difficult as it sounds Continue Reading
-
News
03 Sep 2012
Powerful cyber attack tools widely available, say researchers
More low-level cyber criminals are getting access to sophisticated attack tools, say cyber intelligence specialists Continue Reading
-
Opinion
31 Aug 2012
How to survive a data breach
Six practical tips on how to prepare for and survive a data breach Continue Reading
-
News
31 Aug 2012
Businesses worldwide fail to prepare for cyber threats, says Kaspersky Lab
Companies around the world have failed to address cyber threats, according to a survey from security organisation Kaspersky Lab Continue Reading
-
News
22 Aug 2012
Dell expects tough next quarter
Dell expects third-quarter revenue to be down between 2% and 5% on second-quarter levels due to the “uncertain economic environment” Continue Reading
-
News
08 Aug 2012
Good data protection can be cheap and easy, says ICO
The ICO says charities and third sector organisations stand to benefit most from a data protection check-up. Continue Reading
-
News
06 Aug 2012
LinkedIn data breach costs more than $1m
LinkedIn says the forensic investigation and other recovery costs of the data breach in June could have topped $1m. Continue Reading
-
News
27 Jul 2012
Twitter users targeted by Blackhole malware
Twitter users are being targeted by tweets containing malicious links that claim recipients are pictured in an online photo Continue Reading
-
News
26 Jul 2012
Australian telco AAPT confirms Anonymous data breach
Australian telecoms firm AAPT confirms business customer data was breached by hacktivist group Anonymous at an external service provider Continue Reading
-
News
19 Jul 2012
Many global firms unaware of online risk, finds KPMG
Many global organisations could do a lot more to protect their private data and reduce exposure to attacks by hackers, according to KPMG Continue Reading
-
News
19 Jul 2012
Security researchers join forces to bring down Grum botnet
Security researchers have collaborated to take down Grum, the world’s third-largest botnet of hijacked computers Continue Reading
-
News
18 Jul 2012
Microsoft faces substantial EC fine over browser rules breach
Microsoft faces a large fine for failing to offer Windows users a choice of web browser despite apologising to the European Commission (EC) Continue Reading
-
News
17 Jul 2012
Skype works to fix privacy bug as instant messages leak
Internet telephony service Skype has confirmed that a bug in its software has been sending copies of instant messages to unintended recipients Continue Reading
-
News
16 Jul 2012
Sophos combines endpoint security and UTM
Security firm Sophos combines endpoint protection and unified threat management (UTM) products into a single physical or virtual appliance Continue Reading
-
News
13 Jul 2012
Byte Night 2012: Bedding down in Belfast
Byte Night is this year launching a Belfast sleep-out in addition to events in Cambridge, Edinburgh, London and Reading. Continue Reading
-
News
13 Jul 2012
Women in Technology 2012
Women technology experts find their careers just as rewarding as men, but image problems are deterring new female recruits, this exclusive research from Computer Weekly and Mortimer Spinks reveals. Continue Reading
-
Photo Story
10 Jul 2012
The 25 most influential women in UK IT
Find out the results of our Women in Technology Awards. Our awards aimed to focus on role models and discussed the vital part that female IT leaders will take in making a difference to the future of IT. Continue Reading
-
News
09 Jul 2012
Businesses must design more digitally inclusive sites, says disabled charity
Businesses are in danger of losing market share by failing to design more digitally inclusive websites, says disability charity Go ON Gold Continue Reading
-
News
09 Jul 2012
Google Android OS Trojan virus hits 100K devices in China
Trojan malware has hit 100,000 devices using the Google Android operating system (OS) in China, say security researchers Continue Reading
-
News
06 Jul 2012
Virus could cut 20,000 UK computers from web on Monday, FBI warns
The DNS Changer virus could cause 20,000 computers in the UK – of 350,000 worldwide - to lose web access on 9 July, the FBI has warned Continue Reading
-
News
27 Jun 2012
Network security: Is new technology bypassing traditional controls?
Network security practices are among the most mature, but can businesses be sure network traffic is not sneaking past traditional controls? Continue Reading
-
News
27 Jun 2012
FTC sues Wyndham Worldwide hotel group over data breaches
The US Federal Trade Commission (FTC) is suing hotel group Wyndham Worldwide over claims it failed to secure customer data Continue Reading
-
News
27 Jun 2012
Six arrested in the UK in worldwide FBI-led credit card data sting
Six people in the UK and 12 in the US arrested in an FBI-led sting operation that netted a total of 24 credit card cyber fraudsters in 13 countries Continue Reading
-
News
25 Jun 2012
Web surfers keen to compromise own privacy, study finds
Web users voluntarily compromise their own privacy by typing more personal information into online forms than is needed, a study has found Continue Reading
-
News
18 Jun 2012
Asian scientists call for government action on supercomputers
Scientists in India, China, Japan, Korea and India have called on their governments to collaborate on supercomputer technology Continue Reading
-
Photo Story
13 Jun 2012
Boardroom elite: LeaderBoard Triathlon Challenge for Sport Relief
Last weekend the managing directors of some of the biggest companies in UK IT competed in a triathlon at Blenheim Palace for Sports Relief. Continue Reading
-
News
13 Jun 2012
RSPCA mobilises workforce with AMT-SYBEX
Mobile solution enables RSPCA officers to act faster on reports of animal cruelty from the public Continue Reading
-
News
12 Jun 2012
2012: Will this be the year TPM finally comes of age?
Will 2012 be the year that TPM finally delivers on its potential to provide a hardware-based "root of trust" for enterprise information security? Continue Reading
-
News
11 Jun 2012
Flame malware gets kill command
The controllers of Flame, the most powerful cyber weapon discovered to date, have recently sent a kill command that removes the malware from some infected computers Continue Reading
-
News
08 Jun 2012
eHarmony, Last.fm join LinkedIn with password leaks
Online dating site eHarmony and Last.fm have joined LinkedIn with password leaks, as hackers focus on social networks Continue Reading
-
News
08 Jun 2012
Apple faces £1.43m fine in Australian 4G iPad case
Apple has agreed to pay a £1.43m fine for misleading Australians about the 4G capacity of its latest iPad in a case brought by the national consumer watchdog Continue Reading
-
News
06 Jun 2012
Top 10 tips for IPv6 security
Many organisations are being misled about the complexities surrounding IPv6 security, according to security firm Stonesoft Continue Reading
-
News
06 Jun 2012
Majority of UK websites fail to comply with cookie law
Most UK websites are not yet compliant with the newly enforced cookie law, a study has revealed Continue Reading
-
News
28 May 2012
Security researchers discover powerful cyber espionage weapon 'Flame'
Security researchers have discovered a cyber espionage weapon, dubbed 'Flame', with a functionality greater than any other known threat Continue Reading
-
News
28 May 2012
UK regulator PhonepayPlus shuts down Angry Birds smartphone scam
UK users of Android smartphones have been targeted by premium-rate phone scams masquerading as popular apps such as Angry Birds Continue Reading
-
News
25 May 2012
Video: ICO publishes new guidance on cookie law
The Information Commissioner's Office (ICO) has published new guidance on cookie law and revealed the organisations it has approached on the issue Continue Reading
-
News
18 May 2012
Mobile threats demand focus on data protection, says Websense
Business needs to focus on data protection as cyber criminals turn to mobile malware, says Websense. Continue Reading
-
News
17 May 2012
The Pirate Bay is latest site to be hit by DDoS attack
The Pirate Bay has become the latest high-profile website to be hit by a distributed denial-of-service (DDoS) attack Continue Reading
-
News
10 May 2012
Cyber attackers increasingly targeting applications, research shows
Web and mobile applications are the new frontiers in the war against cyber attack, according to an HP cyber security risks report Continue Reading
-
News
09 May 2012
Government snooping plans unveiled
The Queen's Speech has revealed that the government still plans to make it easier for security and police services to spy on e-mails, phone calls and internet activity Continue Reading
-
News
30 Apr 2012
Half of UK networks vulnerable to APTs
Many UK corporate networks are vulnerable to advanced persistent threats (APTs), a survey has revealed. Continue Reading
-
News
26 Apr 2012
Infosec 2012: Unscrubbed hard drives a threat to business, says ICO
Unscrubbed hard drives on computers that are decommissioned and sold on represent a significant risk to business Continue Reading
-
News
25 Apr 2012
Infosec 2012: Internet security body to tackle SSL problems
The Trustworthy Internet Movement (TIM) is to tackle implementation and governance internet communication protocol (SSL) as its first project. Continue Reading
-
News
25 Apr 2012
Infosec 2012: Patching alone can deliver 80% protection
Keeping software up to date with security patches can deliver 80% protection from cyber threats, says security firm Secunia. Continue Reading
-
News
23 Apr 2012
UK firms see competitors as greater cyber attack risk than criminals
More than half of UK firms expect a cyber attack in the next six months, but see competitors as a greater risk than criminals Continue Reading
-
News
11 Apr 2012
Busy security patch month for Microsoft administrators
Microsoft has released six patches, four critical, for 11 vulnerabilities in Office, Windows and various server products in its April security update. Continue Reading
-
Photo Story
02 Apr 2012
Everywoman in Technology Awards 2012: Winners
See all the pictures, including the winners, from the Cisco Everywoman in Technology Awards 2012 Continue Reading
-
News
02 Apr 2012
UK business fears impact of new EU data protection framework
More than half of senior UK IT managers in large enterprises believe the proposed new EU data protection framework will cost their business more money, a survey has revealed Continue Reading
-
News
07 Mar 2012
FBI informer Hector Xavier Monsegur aids in arrest of LulzSec hackers
Authorities in the US, UK and Republic of Ireland have arrested seven suspected members of hacktivist group LulzSec, including Hector Xavier Monsegur, who helped investigators Continue Reading
-
News
01 Mar 2012
RSA 2012: IT security experts urge enterprises to ban smartphone BYOD schemes
Enterprises should ban employees from using their own smartphones for work, a panel of IT security practitioners told the RSA Conference 2012 Continue Reading
-
News
23 Feb 2012
OSSIM update enables cyber threat intelligence sharing
The latest update to the Open Source Security Information Management (OSSIM) base system includes a mechanism for sharing cyber threat intelligence. Continue Reading
-
News
16 Feb 2012
Cisco wants EU to reconsider Microsoft Skype deal
Cisco is calling on European Union authorities to reconsider the unconditional approval of Microsoft’s $8.5bn acquisition of Skype. Continue Reading
-
Opinion
14 Feb 2012
The problem with Open Data
Although clearly a good thing in theory, Open Data risks increasing the digital divide and social inequality unless approached right. Continue Reading
-
News
14 Feb 2012
President of European Parliament critical of Acta
After a weekend of public protests against the controversial Anti-Counterfeiting Agreement (Acta), the president of the European Parliament has added his voice to those of critcs. Continue Reading
-
News
13 Feb 2012
IE update top priority for Patch Tuesday
Microsoft releases nine bulletins addressing 21 vulnerabilities in its monthly Patch Tuesday security update on 14 February Continue Reading
-
News
10 Feb 2012
LinkedIn Q4 revenue more than doubles
Social networking site LinkedIn has reported 2011 fourth quarter revenue of $167.7m, up 105% from Q4 2010; and net income of $6.9m, an increase of 30% Continue Reading
-
News
09 Feb 2012
Cisco back on acquisition trail after record quarter
Cisco Systems has reported record revenues of $11.5bn for the second fiscal quarter that ended 28 January 2012, up 11% on the year-ago quarter, and profits of $2.6bn or 47 cents a share, up 27%. Continue Reading
-
News
01 Feb 2012
Fewer than a third of UK organisations plan mobile security projects
Despite the media hype around the adoption of mobile technologies and the need to secure them, relatively few UK organisations are planning mobile security projects, a survey has revealed Continue Reading
-
News
25 Jan 2012
EC publishes proposed data protection reforms
European Justice Commissioner, Viviane Reding, has unveiled the new European data privacy framework that includes new regulation. Continue Reading
-
News
16 Jan 2012
Apple aims to improve working conditions for technology workforce
Apple has published a list of all suppliers for the first time and says it will allow independent observers into its facilities around the world to monitor working conditions. Continue Reading
-
News
03 Jan 2012
Hacktivists plan to use satellites to by-pass internet censorship
Hacker activists plan to launch communication satellites to overcome the threat of internet censorship. Continue Reading
-
News
12 Dec 2011
Cloud leaves many firewalls wanting – but could automation prove the silver bullet?
Most companies rely on firewalls, but the IT landscape is changing and so must approaches to security. Is there a silver bullet? Continue Reading
-
News
08 Dec 2011
Adobe to release out-of-cycle patch for latest vulnerability
Adobe has issued a security advisory about a newly discovered and still unpatched vulnerability in Adobe Reader and Adobe Acrobat which is being used in "limited, targeted attacks in the wild". Continue Reading
-
Feature
08 Dec 2011
UKtech50: Meet the 50 most influential people in UK IT
Computer Weekly has announced the final listing for the second annual UKtech50, the definitive list of the real movers and shakers in UK IT. Continue Reading
-
News
08 Dec 2011
UKtech50: Meet Mike Lynch, the most influential person in UK IT
Mike Lynch, voted as the most influential person in UK IT, doesn’t like to think about challenges, but about opportunities. Continue Reading
-
News
05 Dec 2011
One in four IT security staff abuse admin rights, survey shows
At least one in four IT security staff use their privileged login rights to look at confidential information, a survey has revealed. Continue Reading
-
News
30 Nov 2011
United Nations Development Programme investigates hacking claims
The United Nations Development Programme (UNDP) is investigating claims from hacker group Team Poison that it extracted over 100 e-mail addresses and login details belonging to UN staff. Continue Reading
-
News
23 Nov 2011
Government mutual will be a beacon for IT procurement
The pension administration mutual being set up by the government will be the first of a wave of new business models that could shake-up central government outsourcing contracts. Continue Reading
-
Feature
18 Nov 2011
How to embed innovation in the corporate culture
This paper from Kurt Salmon identifies the common inhibitors to innovation and how to overcome them, and sets out some important principles that can help. Continue Reading
-
News
17 Nov 2011
Forensics key to effective info security, says E&Y
Intelligence-led security strategies are the most effective in eliminating vulnerabilities and preventing IP theft through enabling informed change, says consultancy firm Ernst & Young. Continue Reading
-
Feature
11 Nov 2011
Computer Weekly Technology Industry Survey
This in-depth research from Computer Weekly and Mortimer Spinks, provides a must-read analysis and insight into UK IT salaries. Continue Reading
-
News
11 Nov 2011
The market landscape for print security
This report is gives an overview of the security risks of the print environment , the market landscape, best practices for a print security strategy. Continue Reading
-
News
10 Nov 2011
Welcome to the new-look ComputerWeekly.com
Computer Weekly has launched its brand new website - the most important online development in the brand’s 45-year history. Continue Reading
-
News
07 Nov 2011
Analysis: Intelligence key to security business case
Information security is becoming an increasingly important part of any business as the value of information assets continually grow, as do the threats from cyber crime and espionage. Continue Reading
-
News
31 Oct 2011
UKtech50: We launch the search for the most influential people in UK IT
Computer Weekly has launched the second annual UKtech50, the definitive list of the real movers and shakers in UK IT - the leaders driving the creation of a high-tech economy. Continue Reading