IT for manufacturing
Manufacturing is an increasingly IT-intensive industry, as FMCG and consumer goods makers try to understand what consumers want and use information and technology to underpin their business strategies. Analysis of how manufacturers and construction firms use IT to operate cost-effectively and at maximum efficiency holds lessons for IT managers in any sector.
-
News
03 Jan 2024
Artificial intelligence to the front in Sweden’s National Technology Strategy
Sweden focuses in on artificial intelligence in its latest far-reaching national IT strategy Continue Reading
-
E-Zine
09 Nov 2023
Heineken lets the data flow
In this month’s CW EMEA ezine, we find out about Heineken’s mission to make the most out of the data it holds through an enterprise-wide data ecosystem. We also look at how the UK has turned its back on the German government-funded Gaia-X data platform, why cyber experts are urging the EU to rethink vulnerability disclosure plans, and how the IT industry is responding to the software developer skills shortfall. Read the issue now. Continue Reading
-
News
19 Apr 2013
Conficker makes way for web-based attacks, says Microsoft
Web attacks emerge as top threat as businesses finally begin to win the battle against Conficker and other worms, says Microsoft Continue Reading
-
News
19 Apr 2013
Microsoft reports strong quarterly results for all divisions
Microsoft reported profit of $6bn for the past quarter, up 17% from a year ago, despite a mixed response to Windows 8 and a decline in PC sales Continue Reading
-
Feature
16 Apr 2013
How to create a good information security policy
Information security policies provide vital support to security professionals, yet few organisations take the time to create decent policies Continue Reading
-
News
15 Apr 2013
Anonymous hacks North Korean websites for a second time
Members of the Anonymous hacktivist collective claim to have again hacked several prominent North Korean websites Continue Reading
-
News
15 Apr 2013
Google reaches deal with EU competition authorities
Google has reportedly reached a deal with European Union (EU) competition authorities over concerns about its business practices Continue Reading
-
News
12 Apr 2013
Google has another go at allaying EU competition concerns
Google has submitted a fresh set of proposals to address European concerns about its business practices and avoid punitive action Continue Reading
-
News
11 Apr 2013
Bots and web apps among top threats to data security, says Check Point
Bots, viruses, breaches and attacks are a constant and real threat to the information security of organisations Continue Reading
-
News
11 Apr 2013
Porn websites pose malware risk, says researcher
Browsing popular pornography internet sites pose a growing risk of malware infection, according to a security researcher Continue Reading
-
News
11 Apr 2013
South Korea accuses North Korea of launching cyber attacks
South Korea blames North Korea for the cyber attacks that shut down thousands of computers at broadcasters and banks two weeks ago Continue Reading
-
News
10 Apr 2013
Mott MacDonald rolls out unified communications
Global engineering firm Mott MacDonald signs Tata Communications for a five-year unified communications deal worth over $20m Continue Reading
-
News
03 Apr 2013
Case Study: 192business switches to tokenisation to speed up business processes
Online payment card verification firm 192business uses tokenisation to speed up its processes and protect credit card details from fraud Continue Reading
-
News
03 Apr 2013
US Army practises poor data security on mobile devices
Pentagon inspector general finds smartphones and tablets the US Army buys are not configured to protect sensitive data and allow remote wipe Continue Reading
-
News
03 Apr 2013
Anonymous threatens to declare cyber war on North Korea
Anonymous hacktivist collective has threatened North Korea with cyber war if leader Kim Jong-un does not resign and install free democracy Continue Reading
-
News
02 Apr 2013
Google closer to action from European privacy regulators
Google is another step closer to action by privacy regulators across Europe for failing to change the way it manages user data Continue Reading
-
News
27 Mar 2013
UK government sets up cyber security fusion cell
A cyber security “fusion cell” for cross-sector threat data sharing aims to put government, industry and information security analysts side-by-side Continue Reading
-
News
26 Mar 2013
Employees ignore security rules, say infosec pros
Most information security professionals believe corporate employees wilfully ignore security rules, survey at RSA Conference 2013 reveals Continue Reading
-
News
25 Mar 2013
Malware in counterfeit software to cost business $114bn in 2013
Dealing with malware in counterfeit software will cost global enterprises an estimated $114bn in 2013, says research firm IDC Continue Reading
-
News
22 Mar 2013
Six security issues to tackle before encrypting cloud data
Concern about security and privacy is likely to drive adoption of cloud encryption, but there are six security issues businesses should tackle Continue Reading
-
News
15 Mar 2013
AstraZeneca appoints new CIO David Smoley
Pharmaceuticals giant AstraZeneca has appointment David Smoley as chief information officer Continue Reading
-
News
13 Mar 2013
US authorities investigate hack of Michelle Obama and other high-profile people
US authorities are investigating hackers who allegedly stole financial information belonging to US first lady Michelle Obama Continue Reading
-
News
11 Mar 2013
Phishing emails sent in pairs to lend authenticity, says training company
Phishing emails are now being deployed in pairs to create the illusion of authenticity, says security awareness training company PhishMe Continue Reading
-
News
11 Mar 2013
Microsoft releases four critical security updates
Microsoft is to release four “critical” patches in its monthly Patch Tuesday security update, according to the advance notice. Continue Reading
-
News
11 Mar 2013
AstraZeneca opts for co-operation after IBM falls out
AstraZeneca has changed its approach to outsourcing to encourage co-operation with suppliers after its deal with IBM failed to deliver Continue Reading
-
News
06 Mar 2013
What is RSA's build, buy, partner strategy?
Computer Weekly takes a closer look at RSA's build, buy, partner strategy Continue Reading
-
Feature
04 Mar 2013
How to tackle big data from a security point of view
Before leaping into big data, companies must be clear what they are trying to achieve, otherwise their investment will be wasted Continue Reading
-
News
28 Feb 2013
RSA 2013: Suppliers need to prepare for new security vulnerability handling standards
Software makers and online service providers need to prepare for two ISO standards on vulnerability handling processes due by the end of 2013 Continue Reading
-
News
26 Feb 2013
RSA 2013: Obama cyber order will have significant effect, says DoHS
President Barack Obama’s executive order on cybersecurity is a “very big deal” says Mark Weatherford, deputy under-secretary for cybersecurity at the US Department of Homeland Security (DoHS). Continue Reading
-
News
22 Feb 2013
Music companies critical of Google’s anti-piracy efforts
Music companies have accused Google of failing to fulfil a pledge not to give prominent rankings in search results to websites offering illegal music downloads. Continue Reading
-
News
15 Feb 2013
Bad outsourcing decisions cause 63% of data breaches
Bad outsourcing decisions nearly two-thirds of data breaches investigated by security firm Trustwave in the past year Continue Reading
-
Feature
11 Feb 2013
How to find the most vulnerable systems on your internal network
Most corporate networks share common vulnerabilities, but many could be mitigated with education in “hacker thinking” for technical staff Continue Reading
-
Feature
07 Feb 2013
Social media: A security challenge and opportunity
Generation Y workers are posing increasing security challenges to their employers as they share data unreservedly Continue Reading
-
News
06 Feb 2013
EU cyber strategy aimed at boosting preparedness and cooperation
The European cyber security strategy addresses insufficient national preparedness and boosting co-operation in the region, says the EC Continue Reading
-
News
06 Feb 2013
Business avoids cloud over fear of government snooping
Almost half of IT professionals are deterred from keeping sensitive data in the cloud because of fear of government intervention and possible legal action, a survey has revealed Continue Reading
-
News
06 Feb 2013
Twitter strengthens login security after hacker attack
Days after a hacking attack, it has emerged that Twitter plans to strengthen its login security with two-factor authentication Continue Reading
-
Feature
04 Feb 2013
How 3D printing impacts manufacturing
With the ability to create on-demand specialist tools, any initial investment in 3D printing technology could quickly pay for itself. Continue Reading
-
News
28 Jan 2013
Why has NAC, like DLP, failed to take off?
Why are organisations not investing in systems that are designed to keep malicious actors out of their networks? Continue Reading
-
News
28 Jan 2013
Procter & Gamble appoints new UK CIO as predecessor moves to Ipsos
Consumer goods giant Procter & Gamble has appointed a new UK CIO following the departure last month of previous incumbent, Dave Ubachs Continue Reading
-
News
25 Jan 2013
Encryption is safe bet, says SafeNet
Encryption is the only thing that can give peace of mind to CIOs and CISOs, says Dave Hansen, president and CEO of security firm SafeNet Continue Reading
-
News
24 Jan 2013
ICO hits Sony with £250,000 data breach penalty
The Information Commissioner’s office (ICO) has fined Sony Computer Entertainment Europe £250,000 for breaching the Data Protection Act Continue Reading
-
News
22 Jan 2013
Why has DLP never taken off?
Why is data loss prevention (DLP) technology not being adopted if it provides the very protection most businesses need? Continue Reading
-
Feature
18 Jan 2013
GE uses big data to power machine services business
GE, one of the UK's largest manufacturers, is using big data analytics with data generated from machine sensors to predict maintenance needs Continue Reading
-
News
14 Jan 2013
Oracle rushes out patches for Java zero days
Oracle has released two out-of-band security updates for the latest zero day vulnerabilities in Java Continue Reading
-
News
11 Jan 2013
Disable Java to protect from latest zero-day
Security researchers are warning of a zero-day vulnerability in all versions of Java, including the latest Java 7 update 10 Continue Reading
-
News
10 Jan 2013
Software piracy international in scope, says Fast
The scale of software piracy is both international in scope and military in its execution, says the Federation Against Software Theft (Fast) Continue Reading
-
E-Zine
07 Jan 2013
IT spending to rise in 2013
Find out what analysts are predicting for technology in Europe this year, including changes in budgets and how companies can reduce costs and improve sustainability. Continue Reading
-
News
07 Jan 2013
Ernst & Young email keyword analysis identifies fraudsters
Fraud investigators have revealed the most common words used in email conversations by employees engaged in rogue trading and fraud Continue Reading
-
Feature
07 Jan 2013
Business priorities: what to protect, monitor and test
How information security professionals can prioritise what to protect, monitor and test in the light of current budget and resource constraints Continue Reading
-
News
02 Jan 2013
Autonomy CEO Mike Lynch co-operates in HP fraud probe
Former CEO and founder of Autonomy Mike Lynch says he will co-operate with a US investigation into fraud alleged by parent firm HP Continue Reading
-
News
28 Dec 2012
Top 10 cyber crime stories of 2012
Ten articles that illustrate some of the major trends in cyber crime in 2012 Continue Reading
-
News
19 Dec 2012
Unilever ramps up social networking for recruitment
Unilever has agreed a five-year HR BPO contract with Accenture that will expand the manufacturer’s recruitment activity into social networking Continue Reading
-
News
18 Dec 2012
Mott MacDonald rolls out Microsoft software globally
Engineering firm Mott MacDonald is rolling out Microsoft products globally over the next year as it moves towards a Microsoft-centric business strategy Continue Reading
-
Feature
12 Dec 2012
How to preserve forensic evidence in the golden hour after a breach
There is a golden hour at the outset where a clear head and good planning can make or break any subsequent forensic investigation Continue Reading
-
News
12 Dec 2012
Ghost Shell hacktivists publish over a million credentials
The Ghost Shell group, an offshoot of the Anonymous hacking collective has published the log-in details from 1.6 million accounts Continue Reading
-
News
12 Dec 2012
Low-level tasks eat up 30% of IT departments' time, report reveals
IT departments spend 30% of their time carrying out basic tasks and are growing frustrated with the lack of time available to focus on transformational work Continue Reading
-
News
10 Dec 2012
UK CIOs see EU regulation as key
A third of UK CIOs are more concerned with EU regulation, such as the data protection directive, than their own local laws, a study has revealed. Continue Reading
-
News
07 Dec 2012
UK government jobs website exploited by hackers
Hackers have been able to exploit security flaws in a new government jobs website to steal personal information about job applicants Continue Reading
-
Feature
06 Dec 2012
How to secure Macs in the enterprise
Apple computers are becoming increasingly used in the enterprise - we look at how to securely introduce Macs in the corporate network Continue Reading
-
News
05 Dec 2012
Unilever prepares for global HANA roll-out
Consumer goods giant Unilever is looking at how it can optimise its global operations using SAP’s HANA in-memory database Continue Reading
-
News
29 Nov 2012
British Film Institute to launch version of the iPlayer
The British Film Institute (BFI) is to launch its own version of the BBC's iPlayer in digitisation plans to give millions access to its film archive Continue Reading
-
News
27 Nov 2012
Zero-day exploit for Yahoo Mail goes on sale
Hacker sells $700 zero-day exploit for Yahoo Mail that allows attacker to use cross-site scripting vulnerability to steal cookies and hijack accounts Continue Reading
-
News
26 Nov 2012
Security needs to be integral part of life, says McAfee
The world is becoming increasingly connected and security and privacy are integral to modern society, says Raj Samani, CTO of McAfee Europe Continue Reading
-
News
23 Nov 2012
Samsung adds iPad mini to patent battle with Apple
Samsung has filed papers at a US court alleging that Apple’s iPad mini infringes eight of its patents in the latest clash between the two companies. Continue Reading
-
News
23 Nov 2012
UKtech50 winner: Warren East, CEO of ARM
ARM CEO and UKtech50 winner Warren East talks to Computer Weekly about fostering the market innovation necessary for the digital age Continue Reading
-
Photo Story
22 Nov 2012
UKtech50 2012 - The most influential people in UK IT
We run down the top 20 names from this year's Computer Weekly UKtech50 list of the 50 most influential people in UK IT Continue Reading
-
News
22 Nov 2012
UKtech50 2012 - The most influential people in UK IT
Computer Weekly has announced the third UKtech50, our annual definitive list of the real movers and shakers in UK IT Continue Reading
-
News
19 Nov 2012
Cyber criminals target Skype, Facebook and Windows users
Cyber criminals targeted users of Skype, Facebook and Windows using multiple Blackhole exploits in October, according to security firm GFI Software Continue Reading
-
News
16 Nov 2012
Nasa to encrypt data after latest breach
Nasa is to encrypt all its mobile computers after the loss of a laptop containing personal information about more than 10,000 staff Continue Reading
-
News
13 Nov 2012
Many UK firms underestimate cost of data breaches, study finds
Many UK organisations are still failing to understand the implications and costs of data breaches, a study has revealed Continue Reading
-
News
12 Nov 2012
Hacking attempts to top one billion in Q4, predicts NCC Group
One billion hacking attempts will be made globally in the final quarter of 2012, according to information assurance firm NCC Group Continue Reading
-
News
09 Nov 2012
Twitter apologises for unnecessary hacking warnings
Twitter has apologised after telling members their accounts had been hacked and forcing them to reset their passwords Continue Reading
-
News
09 Nov 2012
Stuxnet hit Chevron’s systems, the energy giant admits
US energy giant Chevron has revealed that it was hit by the Stuxnet virus in 2010 Continue Reading
-
News
07 Nov 2012
Police arrest man for DDoS attacks on Theresa May sites
Police have arrested a 41-year-old man in connection with a cyber attack on websites connected to home secretary Theresa May Continue Reading
-
News
01 Nov 2012
Parliamentary committee joins criticism of draft communications data bill
Home secretary Theresa May faced stern criticism before a Parliamentary committee hearing evidence on the Draft Communications Data Bill Continue Reading
-
News
31 Oct 2012
Free mobile apps a threat to privacy, study finds
Free mobile apps pose a serious threat to privacy because of their ability to capture large amounts of user information Continue Reading
-
News
30 Oct 2012
IT security budgets mismatched to hacker targets, study shows
IT security budgets are not being used to provide defence technologies in some areas most likely to be targeted by hackers, a study shows Continue Reading
-
Opinion
18 Oct 2012
Security Think Tank: You can’t protect what you don’t know you’ve got
IP theft: who should be tackling it and how? Continue Reading
-
News
17 Oct 2012
Intel sales and profits fall in third quarter
Computer chip maker Intel has reported falls in both sales and profits in the third quarter due to the "tough economic environment” Continue Reading
-
News
16 Oct 2012
Organisations need alternative data protection as security models fail
Organisations' security models are failing - so could it be time to adopt an intelligence-led approach to data protection and fighting cyber crime? Continue Reading
-
News
16 Oct 2012
Home secretary Theresa May rules on hacker Gary McKinnon’s US extradition
Home secretary Theresa May is to rule on self-confessed computer hacker Gary McKinnon's extradition to the US Continue Reading
-
News
11 Oct 2012
RSA Europe: Thousands of unprotected virtual servers exposed to the web
Organisations are failing to protect data in virtual environments, says Jason Hart, vice-president cloud solutions, SafeNet Continue Reading
-
News
11 Oct 2012
RSA Europe: Security concerns whole supply chain, says Misha Glenny
Targeted attacks affect the whole supply chain, not just big corporations, author Misha Glenny tells RSA Conference Europe 2012 attendees Continue Reading
-
News
10 Oct 2012
RSA Europe: Cloud key to future information security, says Qualys
Cloud computing is an opportunity information security professionals should not miss, says Philippe Courtot, CEO of security firm Qualys Continue Reading
-
News
10 Oct 2012
Case study: End of BMC sponsorship a blessing for Toyota Motorsport IT
Toyota Motorsport went to the market for a new ITSM system when a sponsorship deal with BMC came to an end, and has been reaping the benefits ever since Continue Reading
-
News
09 Oct 2012
Case study: Syngenta multi-sourcing key to business growth
Agri-business giant Syngenta has put multi-sourced IT at the heart of its ambitious plan to double its revenues in the next 8 years Continue Reading
-
News
08 Oct 2012
Lamborghini slashes web costs with Amazon Web Services
Supercar maker Lamborghini has revamped and accelerated the performance of its website by running it on Amazon Web Services Continue Reading
-
News
02 Oct 2012
Toyota uses Microsoft for global communications
Toyota Motor Corporation is globally deploying Microsoft software through a mix of cloud and on-premise software for its 200,000 staff Continue Reading
-
News
25 Sep 2012
Security concerns hold back mobile banking adoption
More than two-thirds of smartphone owners have not yet adopted mobile banking apps because of security concerns, a survey has revealed Continue Reading
-
Feature
24 Sep 2012
Tune Raid performance to get the most from your HDDs
Tune Raid performance at the storage controller to match application I/O demands to optimal hard drive (HDD) performance Continue Reading
-
News
21 Sep 2012
Microsoft wins third German patent victory over Google Motorola technology
Microsoft has won a third victory in Germany over Google's Motorola unit in the ongoing patent wars between the two companies Continue Reading
-
News
18 Sep 2012
Microsoft investigates IE zero-day flaw
Microsoft says it is investigating reports of a vulnerability in Internet Explorer 6, 7, 8, and 9 Continue Reading
-
News
17 Sep 2012
IT security awareness needs to be company-wide, says (ISC)²
Information security awareness needs to be more robust, started as early as possible, continually reinforced and organisation-wide, says Julie Peeler, director, (ISC)² Foundation Continue Reading
-
News
11 Sep 2012
Skills shortage means no unemployment in IT security, says (ISC)2
Zero unemployment in IT security shows a huge shortage of skills in the profession, says Hord Tipton, executive director of (ISC)2 Continue Reading
-
Feature
05 Sep 2012
Setting up a botnet is easier than you think
Acquiring, installing, configuring and using a powerful data-stealing banking Trojan toolkit is not as difficult as it sounds Continue Reading
-
News
03 Sep 2012
Powerful cyber attack tools widely available, say researchers
More low-level cyber criminals are getting access to sophisticated attack tools, say cyber intelligence specialists Continue Reading
-
Opinion
31 Aug 2012
How to survive a data breach
Six practical tips on how to prepare for and survive a data breach Continue Reading
-
News
31 Aug 2012
Businesses worldwide fail to prepare for cyber threats, says Kaspersky Lab
Companies around the world have failed to address cyber threats, according to a survey from security organisation Kaspersky Lab Continue Reading
-
News
24 Aug 2012
VMware users can protect against virtual machine malware, says Trend Micro
New malware that attacks VMware virtual machines is no cause for undue concern, but users can take basic steps to protect data, says Trend Micro Continue Reading
-
News
22 Aug 2012
Rigorous software testing gets Curiosity off to a good start
NASA’s Jet Propulsion Lab (JPL) has used static code analysis from Coverity to maximise the quality of the code running on the Curiosity rover Continue Reading
-
News
22 Aug 2012
Dell expects tough next quarter
Dell expects third-quarter revenue to be down between 2% and 5% on second-quarter levels due to the “uncertain economic environment” Continue Reading
-
News
07 Aug 2012
Interview: Warren East, CEO of chip designer ARM
ARM chief discusses the growth of machine to machine technology, patent wars and why he hopes the company will stay independent Continue Reading