Opinion
Opinion
-
Outsourcing is not dead or dying – it just needs to be done properly
The collapse of Carillion and the profit warning at Capita have created a false sense of fear about the stability of the outsourcing sector Continue Reading
-
Security Think Tank: Reducing cyber attacker dwell time is critical
Why is reducing cyber attacker dwell time important, and how should it be tackled? Continue Reading
-
Security Think Tank: Reducing dwell has never been more important
Why is reducing cyber attacker dwell time important, and how should this be tackled? Continue Reading
-
Security Think Tank: GDPR compliance one good reason to cut attacker dwell time
Why is reducing cyber attacker dwell time important, and how should this be tackled? Continue Reading
-
GDPR and the right to erasure: hiding in the shadows or welcome shade?
The European Union's new data protection laws introduce a right to be forgotten – but what does it means for corporate IT? Continue Reading
-
After the TSB debacle, is it time for IT people to run retail banking?
Given that high-street banks are effectively little more than a computer system processing algorithms, would they be better off run by tech experts than bankers? Continue Reading
-
Can Huawei untangle the AI mess?
Huawei is building a digital platform with “device-cloud synergy” to support artificial intelligence applications, but enterprises should be wary of being locked into a single AI stack Continue Reading
-
Security Think Tank: Reduce attacker dwell time with defence in depth
Why is reducing cyber attacker dwell time important and how should this be tackled? Continue Reading
-
How a new ISO standard helps you take control of your IT assets
The updated ISO standard 19770-1:2017 offers IT managers a way to bring their hardware and software assets under a single management standard Continue Reading
-
Security Think Tank: Use good practice to address cryptojacking risk
How can organisations best defend against cryptojacking? Continue Reading
-
Blockchain: Paving the way for broad adoption
The foundations have been laid for organisations to begin standardising on the technology, talent and platforms that will drive future blockchain initiatives Continue Reading
-
Protecting your intellectual property in a digital world
Your business is creating innovative computer code, slick user interfaces, and is using digital technology to solve new problems. How do you protect your investment? Continue Reading
-
Moving away from analogue health in a digital world
Healthcare records still rely on faxes, email, mail and paper, but the innovative use of technology will lead to major improvements in medical care Continue Reading
-
Lauri Love escaped extradition to the US - what does that mean for future cases?
The US lost its attempt to extradite Lauri Love to face hacking charges in a landmark case. What will it mean for other UK citizens facing extradition? Continue Reading
-
The seven levers of digital transformation
Organisations that embark on digital transformation projects often run into difficulties. Following the seven principles of digital transformation will help them reap the benefits of digital technology Continue Reading
-
Driving digitisation: open standards in process automation
Organisations often can’t take advantage of advances in digital technology due to the lack of interoperability in their IT systems in different facilities, but open standards promise a way forward Continue Reading
-
Who do you trust to censor social media?
Calls to censor Facebook and its rivals are growing – but society needs to consider carefully the motivations of those making such demands Continue Reading
-
Security Think Tank: Cryptojacking can be costly
How can organisations best defend against cryptojacking? Continue Reading
-
Security Think Tank: Six tips for securing your organisation against cryptojacking
How can organisations best defend against cryptojacking? Continue Reading
-
IoT security cannot be an afterthought: it must be the foundation of design
As technologies for the internet of things mature, developers need to make security by design a fundamental part of their products Continue Reading
-
Why businesses must think like criminals to protect their data
Cyber criminals use three main methods of operation to steal commercial data. Understanding their mindset can help organisations put the right defences in place Continue Reading
-
Security Think Tank: Deal with cryptojacking to avoid security vulnerability
How can organisations best defend against cryptojacking? Continue Reading
-
Security Think Tank: User vigilance key to cryptojacking defence
How can organisations best defend against cryptojacking? Continue Reading
-
Security Think Tank: Use awareness, education and controls to halt cryptojacking
How can organisations best defend against cryptojacking? Continue Reading
-
How the IT sector can help plug the cyber security skills gap
Businesses have a role to play in plugging the cyber security skills gap by engaging with future talent at a young age, providing more role models for under-represented groups, communicating the nature of the threat, and changing their approach to ... Continue Reading
-
SAP licensing – reassuringly expensive?
SAP’s recent settlement with AB InBev has again put audits and licensing under the spotlight. We look at how to get the best value and avoid fines Continue Reading
-
Better public services – a Beveridge for the 21st century
A new 'manifesto' from digital government experts lays out a path to delivering the internet-enabled state that's been promised for years but is yet to become a reality Continue Reading
-
SD-WAN needs software-defined security
Digital transformation is driving organisations to move to the cloud, which requires a new architecture that embraces cloud technology, but that in turn requires a new way of thinking about network security to ensure data is protected Continue Reading
-
Australian firms need to move faster in the digital age
Just over a tenth of IT professionals in Australia say their companies can roll out a new product in less than three months, despite operating in fast-moving markets with digitally savvy customers Continue Reading
-
Security Think Tank: Fileless malware not totally undetectable
What should organisations do at the very least to ensure business computers are protected from fileless malware? Continue Reading
-
Security Think Tank: Awareness is a good starting point to counter fileless malware
What should organisations do at the very least to ensure business computers are protected from fileless malware? Continue Reading
-
How to make the most of your SAP licences
There is no point in paying for something you never use – or worse, using the wrong licence. Doing the bare minimum for SAP licence management is not enough Continue Reading
-
Security Think Tank: Patch, scan and lock down to counter fileless malware
What should organisations do at the very least to ensure business computers are protected from fileless malware? Continue Reading
-
Security Think Tank: Human, procedural and technical response to fileless malware
What should organisations do at the very least to ensure business computers are protected from fileless malware? Continue Reading
-
Security Think Tank: Use layered security and patch management to defeat fileless malware
What should organisations do at the very least to ensure business computers are protected from fileless malware? Continue Reading
-
Security Think Tank: Multi-layered security key to fileless malware defence
What should organisations do, at the very least, to ensure business computers are protected from fileless malware? Continue Reading
-
Diversity matters – International Women’s Day 2018
The tech sector has a poor reputation for workplace diversity - if we are to take advantage of the opportunities of the digital economy, this has to change Continue Reading
-
Security Think Tank: Aim to detect and contain fileless malware attacks quickly
What should organisations do at the very least to ensure business computers are protected from fileless malware? Continue Reading
-
Security Think Tank: Social engineering at the heart of fileless malware attacks
What should organisations do at the very least to ensure business computers are protected from fileless malware? Continue Reading
-
Security Think Tank: How to tackle fileless malware attacks
What should organisations do at the very least to ensure business computers are protected from fileless malware? Continue Reading
-
Apprenticeship reforms are driving tech sector skills success
Apprenticeships and skills minister Anne Milton says apprenticeships are a great way to make sure the tech industry has the skills it needs Continue Reading
-
Taxing tech giants on revenue only ends up with us customers paying more
EU proposals to tax internet companies based on sales in each country fail to apply the tax burden on the right people Continue Reading
-
GDPR gotchas and how to handle them
We look at common problems organisations encounter when dealing with the EU’s General Data Protection Regulation (GDPR), which comes into force on 25 May 2018 Continue Reading
-
A smarter state can only be built on smarter procurement
Digital government has improved, but progress needs to be made when it comes to public sector procurement Continue Reading
-
Hawaii missile alert: Why the wrong guy was fired
In January 2018, an employee at Hawaii’s emergency management agency sent out a false alarm of an imminent missile attack, and was subsequently fired – but perhaps poor system design is really to blame Continue Reading
-
Why police forces need to be honest about mass mobile phone surveillance
Police forces across the UK are covering up their use of sophisticated mass surveillance devices, known as IMSI-catchers - the Bristol Cable and Liberty are campaigning for proper transparency Continue Reading
-
Mobile biometrics set to be game-changer in APAC
Telcos, financial institutions and other industry players risk losing market share if they do not keep up with the demand for security, convenience and mobility Continue Reading
-
Security Think Tank: How to evolve SecOps capacity
How can organisations evolve their security operations teams to do more automation of basic tasks and cope with dynamic IT environments? Continue Reading
-
Does artificial intelligence have a language problem?
As AI 'learns' from human input, the language we use becomes an increasingly important consideration Continue Reading
-
Security Think Tank: Take care of security basics before automating
How can organisations evolve their security operations teams to do more automation of basic tasks and cope with dynamic IT environments? Continue Reading
-
Security Think Tank: How automation can reduce the load on the security operations team
How can organisations evolve their security operations teams to do more automation of basic tasks and cope with dynamic IT environments? Continue Reading
-
3, 2, 1, GDPR: How to be prepared on 25 May
There are seven key areas organisations should review to ensure compliance with the General Data Protection Regulation, and even though the deadline is less than four months away, it is still not too late to start Continue Reading
-
Safer Internet Day: Building online safety practices with young people
Many organisations around the UK are contributing to the important work on making the internet a safer place for everyone Continue Reading
-
How to achieve a healthy, balanced relationship with your ERP provider
Observing the enterprise software market today is like observing a major relationship crisis where one side is failing to listen to the other Continue Reading
-
Security Think Tank: Approaches to strengthening security operations
How can organisations evolve their security operations teams to do more automation of basic tasks and cope with dynamic IT environments? Continue Reading
-
Europe’s shameful role in spy-tech exports that led to torture and jail
Governments in Europe actively assisted in government oppression in Iran, Bahrain and Russia by providing states with sophisticated surveillance equipment. The European Parliament is pressing for changes in the law to restrict exports of ... Continue Reading
-
Security Think Tank: Automating basic security tasks
How can organisations evolve their security operations teams to do more automation of basic tasks and cope with dynamic IT environments? Continue Reading
-
Security Think Tank: Don’t automatically automate security
How can organisations evolve their security operations teams to do more automation of basic tasks and cope with dynamic IT environments? Continue Reading
-
Security Think Tank: Establish best practice before automating security processes
How can organisations evolve their security operations teams to do more automation of basic tasks and cope with dynamic IT environments? Continue Reading
-
Bitcoin is a bubble, but manias can have economic benefits
The UK's railway mania, the tulip bubble, the dot com boom and other collective economic madness – such as bitcoin – might lose people a lot of money, but they often lay down important foundations Continue Reading
-
Security Think Tank: Humans and AI machines in harmony
How can organisations evolve their security operations teams to do more automation of basic tasks and cope with dynamic IT environments? Continue Reading
-
We must avoid the Brexit risks to London's tech community
London's chief digital officer warns of the risks to jobs, innovation and investment if the UK pursues a hard Brexit when leaving the EU Continue Reading
-
Blockchain’s promise goes beyond fintech
By reducing the cost of peer-to-peer data and resource transfer, blockchain can remove the need for third parties and middlemen across industries Continue Reading
-
Zero in on your zero-day vulnerabilities
A zero-day attack comes, by definition, out of the blue. You cannot predict its nature or assess how much damage it might cause, but you can take some basic steps to protect yourself from a potentially crippling cyber strike Continue Reading
-
Why CryptoKitties shows the future of humanity in the robot age
Spending millions on blockchain-based cat collectibles might seem trivial, but it explains why economists aren’t worried about robots taking all our jobs Continue Reading
-
Building on the UK tech sector’s momentum in 2018
The UK’s digital and tech industry made great progress in 2017, and the government aims to further its support in 2018, says digital minister Continue Reading
-
How to boost your personal brand as an IT professional
Seven steps to help you build a personal brand in the workplace, articulate the value you provide and build your professional reputation Continue Reading
-
How to attract investors for your enterprise software startup
Are you looking to find an investor for your enterprise software company? This expert advice explains what investors will be looking to find in an innovative software business seeking backing Continue Reading
-
My brother Lauri Love should have the right to a trial in the UK
Lauri Love should face trial over hacking allegations in a British Court, rather than be extradited to the US, where his extraordinary skills will be lost to society, says his younger sister Continue Reading
-
Opinion: Why the UK’s visa expansion is important to the tech sector
Following the government’s decision to expand the UK’s visa scheme for overseas talent, home secretary Amber Rudd tells Computer Weekly why this will help the UK tech sector Continue Reading
-
Why UK police are learning cyber forensics
The need for the UK police force to conduct forensic investigations on computers is nothing new, but a rapid escalation of cyber crime has demanded a different approach Continue Reading
-
A guide for businesses to China’s first cyber security law
Companies that break China’s new cyber security law may be fined or even have their licence to trade in the country removed Continue Reading
-
Dmarc email validation – we're doing it all wrong
Dmarc is a hugely important way to reduce email fraud – just ask HMRC – but it also makes email marketing campaigns far more effective Continue Reading
-
A history of hacking and hackers
A security professional’s view on criminal hacking has shifted away from the traditional stereotype of the hacker, towards a much more diverse cross-section of wider society Continue Reading
-
Will the review of Gov.uk Verify fix the UK's digital identity problems?
The rumoured review of the UK government’s identity assurance programme provides the ideal opportunity to fix problems and accelerate progress Continue Reading
-
The challenge of our era - digital transformation at Allianz
The insurance firm wants to become "digital by default" and its CIO explains the vital role DevOps and cloud play in its change programme Continue Reading
-
Criminal law: Are Twitter threats taken seriously?
As threats of violence become increasingly common online, law enforcement is taking stronger action against the perpetrators Continue Reading
-
Why now is the time to appoint a chief agility officer
Companies need to innovate and find new ways of getting products to the market more quickly. Appointing a chief agility officer to the board will help Continue Reading
-
How the iPhone shows the value of innovation in a capitalist economy
Ten years of watching the iPhone transform markets around the world demonstrates the economic value of technology innovation Continue Reading
-
Security Think Tank: Focus on high risk by automating low-risk patching
How should organisations address the need to keep software up to date with security patches without it costing too much or being too labour intensive? Continue Reading
-
Security Think Tank: Patching is vital and essentially a risk management exercise
How should organisations address the need to keep software up to date with security patches without it costing too much or being too labour intensive? Continue Reading
-
Rethink risk through the lens of antifragility
Antifragility is an exciting alternative that fuses value and risk, and CIOs and IT executives are well positioned to help Continue Reading
-
Gov.uk Verify and identity assurance - it's time for a rethink
The government's Verify identity platform is not meeting user needs - it's time to step back and review how best to make online identity for public services work Continue Reading
-
What to do first when hit by a cyber attack
What actions should organisations take if they suspect they have suffered a cyber security incident? Continue Reading
-
The rise of the ODMs: Should the branded hardware suppliers be worried?
The use of ODM datacentre hardware makes good economic sense for the hyperscale providers, but what about everyday enterprises? Continue Reading
-
Escaping waterfall government and the myth of 'digital transformation'
An agile approach to digital programmes will not transform Whitehall unless the waterfall approach to policy and decision-making is overhauled too Continue Reading
-
The internet of things: an overview
Despite security and other concerns, there are many benefits associated with embracing the internet of things Continue Reading
-
Security Think Tank: Risk of DNS attacks goes beyond websites
What are the main security risks associated with DNS and how are these best mitigated? Continue Reading
-
How AI is disrupting the role of call centres and call centre staff
Artificial intelligence could eliminate many white-collar jobs in coming decades. Its effects are already being felt in the call centre industry, but there is still no substitute for the human touch Continue Reading
-
Beware of Oracle’s developer Trojan Horse
The Oracle Technology Network allows developers to prototype applications for free, but there is a catch when it is time to deploy Continue Reading
-
Security Think Tank: Top three DNS-related security risks
What are the main security risks associated with the domain name system and how are these best mitigated? Continue Reading
-
Security Think Tank: Communication is key to cyber security in digital era
How can information security professionals help organisations to understand the cyber risks across increasingly digital businesses? Continue Reading
-
Obituary: Jonathan Green-Armytage, former Computer Weekly journalist
Computer Weekly marks the passing of one of the great tech reporters from the 1980s and 1990s Continue Reading
-
Gary McKinnon: Why Lauri Love should be spared the nightmare of extradition
Computer activist Lauri Love should be spared a life sentence in a US jail, says former hacker Gary McKinnon Continue Reading
-
Enterprise NAS performance challenges and how to resolve them
NAS storage can be used for mission critical workloads but NFS-based storage comes with performance challenges. Jim Bahn of Virtual Instruments outlines the main ones Continue Reading
-
A new nearshoring game is emerging
Countries selling themselves as nearshore business services locations need to change their sales pitches to avoid becoming like all the other countries doing the same Continue Reading
-
Consumer identity management is the core of real CRM
IAM + CRM is much more than simply IAM for external users, says Ivan Niccolai Continue Reading
-
Six essential processes for keeping data secure
Data security is increasingly vital for organisations as the countdown begins for compliance with new rules imposed by the EU’s general data protection regulation Continue Reading
-
Was that it? Business as usual for fintechs after Brexit vote
Following the Brexit vote, Fintech Times editor Bird Lovegod describes how financial services IT startups are getting on with business as usual Continue Reading
-
The true cost of running technology
Ministry of Justice digital chief Arif Harbott discusses the importance of disclosing the costs of technology – and why it makes sense to invest to avoid expensive glitches Continue Reading