IT operations management and IT support
-
News
11 Mar 2024
Vinnova launches National Digital Advancement project
Swedish state innovation initiative invests in a network of regional research and development centres Continue Reading
-
Feature
09 Feb 2024
The rising prominence of hybrid cloud in the Nordics
Many Nordic organisations have opted for hybrid cloud environments, subscribing to the newest services without giving up what they already have. Best practices are beginning to emerge for managing the heterogenous environment Continue Reading
-
News
11 Nov 2022
MoD recruits Immersive Labs to bolster cyber resilience
UK’s Ministry of Defence will run cyber drills and address its security talent gap with Immersive Labs’ CyberPro, Cyber Crisis Simulator and Application Security products Continue Reading
-
News
11 Nov 2022
Lenovo bolsters services play with PCCW Solutions
Lenovo’s acquisition of PCCW Solutions brings sought-after capabilities in hybrid cloud and application modernisation as it expands its services footprint in Asia Continue Reading
-
Opinion
11 Nov 2022
Security Think Tank: To stop ransomware, preparation is the best medicine
You can’t ‘stop’ ransomware, but you can do a lot to keep yourself from becoming ensnared when it strikes Continue Reading
-
Feature
10 Nov 2022
The world's oldest cryptocurrency exchange prefers doing business in Luxembourg
One of the newest niches in fintech, cryptocurrency exchanges may fare very well in Luxembourg Continue Reading
-
Podcast
10 Nov 2022
Inflation-busting IT: A Computer Weekly Downtime Upload podcast
In this podcast, Gartner’s Stewart Buchanan discusses how to fund digital technology initiatives Continue Reading
-
News
09 Nov 2022
Microsoft serves smorgasbord of six zero-days
November’s Patch Tuesday fixes significantly fewer vulnerabilities of late, but includes six actively-exploited zero-days, three of them of critical severity Continue Reading
-
News
09 Nov 2022
Fujitsu expert witness in subpostmaster trial ‘manoeuvred’ into role, public inquiry told
A former Fujitsu technology expert who defended the Horizon system’s robustness in court was unhappy after being ‘manoeuvred’ into acting as an expert witness, public inquiry hears Continue Reading
-
Opinion
09 Nov 2022
Security Think Tank: Anti-ransomware strategies should be as easy as ABC
When developing and implementing ransomware protection strategies, the importance of paying thorough attention to security measures you might consider elementary cannot be understated Continue Reading
-
News
08 Nov 2022
Six subpostmaster convictions referred for appeal in Scotland
Six former subpostmasters in Scotland will have appeals against criminal convictions heard after being referred by Scotland’s Criminal Cases Review Commission Continue Reading
-
Feature
08 Nov 2022
How Imec hopes to industrialise artificial intelligence
Pure research explores the fundamental questions of artificial intelligence, but applied research takes those ideas to industry, making it all worthwhile Continue Reading
-
Opinion
07 Nov 2022
To fight ransomware, we must treat digital infrastructure as critical
Ransomware defence is failing because we don’t view our digital infrastructure in the same way as our physical infrastructure, argues Elastic’s Mandy Andress Continue Reading
-
Feature
07 Nov 2022
Why automating finance is just an integration game
We look at how the software that powers finance departments can help businesses navigate the worsening economic climate Continue Reading
-
News
04 Nov 2022
Microsoft: Nation-state cyber attacks became increasingly destructive in 2022
The willingness of nation-state actors to conduct destructive cyber attacks is a source of grave concern, as Microsoft’s latest annual Digital Defence Report lays bare Continue Reading
-
Opinion
04 Nov 2022
Security Think Tank: Ransomware and CISOs’ balancing act
Ransomware has the potential to cause irreversible business damage, so CISOs should consider not only protection but also response and recovery Continue Reading
-
Definition
03 Nov 2022
legacy system (legacy application)
A legacy system is any outdated computing system, hardware or software that is still in use. Legacy systems include computer hardware, software applications, file formats and programming languages. Continue Reading
-
News
03 Nov 2022
Microsoft pledges $100m in new IT support for Ukraine
Microsoft will continue to offer free-of-charge technology support to Ukraine for the foreseeable future Continue Reading
-
News
03 Nov 2022
Automated threats biggest source of cyber risk for retailers
Threat actors targeting retailers during the coming holiday season are increasingly turning to automated forms of cyber attack, according to a report Continue Reading
-
Podcast
03 Nov 2022
Business workflows: A Computer Weekly Downtime Upload podcast
How ServiceNow is being used to drive business processes across IT and other business areas Continue Reading
-
Definition
02 Nov 2022
intellectual property core (IP core)
An intellectual property core (IP core) is a functional block of logic or data used to make a field-programmable gate array (FPGA) or application-specific integrated circuit for a product. Continue Reading
-
Opinion
02 Nov 2022
Security Think Tank: Know your networks, know your suppliers
To combat the ransomware scourge, we must work harder to monitor and learn from the increasingly complex threat environment, keep a closer eye on supply chains, and share our insights Continue Reading
-
News
02 Nov 2022
Game of ‘hardball’ in Horizon negotiations left subpostmasters exposed to tragedy
‘Hardball’ negotiations between the government, the Post Office and ICL meant subpostmasters were ignored and thrown into a tragedy that could have been averted Continue Reading
-
News
01 Nov 2022
A third of UK cyber leaders want to quit, report says
Nearly a third of UK security leaders are considering leaving their current role, and more than half are struggling to keep on top of their workload Continue Reading
-
News
01 Nov 2022
NCSC looks back on year of ‘profound change’ for cyber
The NCSC ramped up its support for UK plc in the past 12 months, but it was events beyond the UK’s borders that proved the most impactful Continue Reading
-
News
01 Nov 2022
How Elastic is going beyond enterprise search
Elastic has been doubling down on the security and observability capabilities of its open-source platform, going beyond its roots in enterprise search Continue Reading
-
News
31 Oct 2022
Prepare today for potentially high-impact OpenSSL bug
OpenSSL trailed a critical vulnerability patch last week, which will be only the second such flaw ever found in the open source encryption project. Unfortunately, the first was Heartbleed Continue Reading
-
Opinion
31 Oct 2022
Security Think Tank: Container security: why so different?
Done well, container security can be a model for securing the enterprise, and businesses that focus their teams on solving it can help accelerate positive change in other areas Continue Reading
-
News
28 Oct 2022
Post Office warned of Horizon software-induced ‘tragedy’ in 1999
Problems experienced during live trials of the Post Office Horizon system predicted the ‘tragedy’ that unfolded Continue Reading
-
Feature
27 Oct 2022
Will the OCSF create an open and collaborative cyber industry?
The Open Cybersecurity Schema Framework promises to transform security data analysis and collection, but there are challenges around adoption Continue Reading
-
News
27 Oct 2022
Horizon system EPOSS code writers lacked basic programming skills, public inquiry hears
Horizon system code writers lacked basic programming skills, according to the task force set up to investigate reported problems with the controversial software Continue Reading
-
News
26 Oct 2022
New minister asked to pause Fujitsu government contracts
Parliamentarians keep focus on Fujitsu’s role in the Post Office Horizon scandal with demand for pause on government contracts to the supplier Continue Reading
-
News
26 Oct 2022
When technology lets you sleep easy
Indian mattress supplier Duroflex has taken a leaf out of mattress design in its technology implementation to double its growth in an industry dominated by unorganised players Continue Reading
-
News
25 Oct 2022
One in five tech workers subject to workplace surveillance
Digital surveillance is now a common feature of the UK’s post-pandemic economy, says Prospect Union, adding to growing calls for workers to be given a greater say over how technologies are deployed in the workplace Continue Reading
-
News
24 Oct 2022
Government speeds up NHS Digital and NHS England merger
NHS bodies will now merge in early January 2023, aiming to create a single statutory body for NHS data and technology Continue Reading
-
News
21 Oct 2022
Ukrainian and UK IT sectors to deepen collaboration, partnerships
BCS, the Chartered Institute for IT, and the IT Ukraine Association have signed an MoU to deepen collaboration between the UK and Ukrainian IT sectors, and champion new partnerships and growth opportunities Continue Reading
-
Feature
20 Oct 2022
What do the US’s new software security rules mean for UK organisations?
The White House announced recently that all software supplied to the US government and its agencies needs to be secure, so what does this mean for the UK and EU security sectors? Continue Reading
-
News
20 Oct 2022
The Security Interviews: Why now for ZTNA 2.0?
With organisations facing escalating online threats, security teams need to improve their defences using zero-trust network access to preserve the integrity of their systems. Palo Alto Networks’ Simon Crocker shares his views on zero-trust network access Continue Reading
-
News
20 Oct 2022
Cyber professional shortfall hits 3.4 million
Shortage of cyber security professionals continues to grow and shows no signs of abating, says report Continue Reading
-
News
19 Oct 2022
Treat cyber crime as a ‘strategic threat’, UK businesses told
The government’s new National Cyber Advisory Board aims to help elevate cyber discussion and spur action in the business community Continue Reading
-
News
18 Oct 2022
Apache vulnerability a risk, but not as widespread as Log4Shell
A newly disclosed Apache Commons Text vulnerability may put many at risk, but does not appear to be as impactful or widespread as Log4Shell Continue Reading
-
News
18 Oct 2022
Virtually all vulnerable open source downloads are avoidable
Some 96% of known vulnerable open source downloads could have been avoided altogether, according to a report Continue Reading
-
News
18 Oct 2022
Subpostmaster federation failed its members when they needed it most
A dereliction of duty saw subpostmaster federation ignore its members when IT problems hit and allowed the Post Office destroy their lives Continue Reading
-
News
17 Oct 2022
Global IT and business services spending slows amid economic fears
Spending on IT and business services is declining amid economic fears, with the possibility of a further fall on the horizon Continue Reading
-
News
14 Oct 2022
Office 365 email encryption flaw could pose risk to user privacy
A vulnerability in Microsoft Office 365 Message Encryption could leave the contents of emails dangerously exposed, but with no fix coming it’s up to users to decide how at risk they are Continue Reading
-
News
13 Oct 2022
Unsung Heroes Awards celebrate diversity in cyber community
The seventh annual Security Serious Unsung Heroes Awards recognise those trying to improve diversity and mental health in cyber for the first time Continue Reading
-
News
13 Oct 2022
Perpetrators of subpostmaster suffering in Horizon scandal must face public inquiry
Victims demand that the perpetrators of the Post Office Horizon IT scandal face the public inquiry Continue Reading
-
News
13 Oct 2022
Gartner: Remote work, zero trust, cloud still driving cyber spend
Security leaders are eager to spend on categories including remote and hybrid cyber offerings, zero-trust network access, and cloud Continue Reading
-
News
12 Oct 2022
Finance regulator cracks down on use of messaging apps
The Financial Conduct Authority is taking a closer look at how staff at banks are using WhatsApp in work Continue Reading
-
News
12 Oct 2022
NCSC urges organisations to secure supply chains
NCSC’s latest guidance package centres supply chain security, helping medium to large organisations assess and mitigate cyber risks from suppliers Continue Reading
-
News
12 Oct 2022
Santander and Google offer tech to help businesses smooth move to cloud
Dual Run service from Google will be built on top of Santander technology known as Gravity Continue Reading
-
News
12 Oct 2022
Microsoft fixes lone zero-day on October Patch Tuesday
Microsoft patched a solitary zero-day vulnerability in its latest monthly drop, but fixes for two others disclosed in the past few weeks are nowhere to be seen Continue Reading
-
News
11 Oct 2022
Post Office scandal inquiry restarts with call for a pause amid disclosure controversy
The statutory public inquiry into the Post Office Horizon scandal has begun phase two with a request for an adjournment amid allegations that the Post Office is failing to meet its obligation to disclose all relevant documents Continue Reading
-
Opinion
10 Oct 2022
Currency markets causing choppy waters for UK outsourcing
Anthony Drake, director at tech advisory ISG, explains how the UK government’s botched mini-Budget announcement raised the cost of IT outsourcing Continue Reading
-
News
10 Oct 2022
Ukraine and EU explore deeper cyber collaboration
A Ukrainian delegation has met with officials from the EU’s ENISA cyber agency to explore deeper cooperation on cyber security issues Continue Reading
-
Opinion
10 Oct 2022
Security Think Tank: Design security in to reap container benefits
Provided container security basics are built into your development and runtime environment from the start, containerised services and applications can provide rapid – and secure – achievement of business objectives Continue Reading
-
News
06 Oct 2022
SMEs in Europe ready to invest in real-time payment capabilities
Small and medium-sized enterprises are losing business because of the time it takes to receive payments, with many considering API-based services to address the problem Continue Reading
-
News
06 Oct 2022
JPMorgan’s UK digital bank app outage locks customers out
App-based Chase Bank suffered tech outage that left customers unable to access its services Continue Reading
-
Opinion
05 Oct 2022
Three ways that APIs can fail
It’s all very well having an API strategy, but software teams need to be ready for when things start going wrong Continue Reading
-
Opinion
03 Oct 2022
How to protect against SMS mobile security weakness
The simple messaging service provides two-factor authentication in banking and e-commerce, but what happens if your SIM card is stolen? Continue Reading
-
News
29 Sep 2022
Five startups to join NCSC for Startups initiative
The NCSC has invited five startups to join its NCSC for Startups programme to help the government with pressing cyber challenges facing the UK Continue Reading
-
News
29 Sep 2022
KPMG: IT chiefs vote for innovation, but are they forgetting tech debt?
New study from KPMG shows businesses are keen to adopt new technologies to drive improvements to customer experience Continue Reading
-
Feature
28 Sep 2022
AIOps for storage: Potential huge benefits, but lots of lock-in
Applying artificial intelligence and machine learning to storage can help to predict bottlenecks, diagnose I/O issues and recommend upgrades, but suppliers’ products are largely limited to their own hardware Continue Reading
-
Opinion
28 Sep 2022
Security Think Tank: Three steps to a solid DevSecOps strategy
Read about how buyers can manage third-party risk when procuring applications, how to secure the software development process, and even how to affect cultural change among developers not used to thinking cyber first Continue Reading
-
News
28 Sep 2022
Most hackers exfiltrate data within five hours of gaining access
Insights from more than 300 sanctioned adversaries, otherwise known as ‘ethical’ hackers, reveal that around two-thirds are able to collect and exfiltrate data within just five hours of gaining access Continue Reading
-
News
26 Sep 2022
More than 30 startups to join Plexal’s Cyber Runway accelerator
Now in its second year, the Cyber Runway accelerator has been designed to support firms at various stages of growth, as well as help the cyber security sector to improve on its diversity, inclusion and regional representation Continue Reading
-
Opinion
23 Sep 2022
It’s time for engineering teams to own DevSecOps
It may seem counterintuitive, but maybe organisations should consider delegating responsibility for DevSecOps to engineering teams, not security teams, argues Elastic’s Mandy Andress Continue Reading
-
Definition
22 Sep 2022
non-uniform memory access (NUMA)
Non-uniform memory access, or NUMA, is a method of configuring a cluster of microprocessors in a multiprocessing system so they can share memory locally. Continue Reading
-
News
22 Sep 2022
Tech Nation announces 13 startups for 11th Future Fifty cohort
Thirteen high-growth startups set to join Tech Nation’s 11th annual Future Fifty programme to help them scale further Continue Reading
-
News
22 Sep 2022
Nordic private equity firms pursue cyber security acquisitions
Increasing interest in the security sector from Nordic private equity firms is a reflection of growing threats and increasing enterprise security budgets Continue Reading
-
News
22 Sep 2022
Inside SolarWinds’ observability playbook
SolarWinds’ CEO Sudhakar Ramakrishna talks up the company’s observability playbook and offers a glimpse into its technology roadmap Continue Reading
-
News
22 Sep 2022
American Express recruiting thousands of tech professionals
Amex will add 5,000 IT professionals to its workforce in 2022 as digital products and services become the staple of the finance sector Continue Reading
-
News
21 Sep 2022
15-year-old Python bug present in 350,000 open source projects
A Python tarfile vulnerability first disclosed in 2007 still persists to this day, according to analysis from Trellix Continue Reading
-
News
20 Sep 2022
India ramps up on AI amid talent and scalability challenges
Indian organisations are speeding up deployments of AI across multiple sectors, but legacy systems, siloed data and a shortage of AI-specific talent will stand in the way of greater adoption Continue Reading
-
News
19 Sep 2022
How Mondelez is driving change with tech
From empowering citizen developers to deploying drones to monitor the health of cocoa trees, Mondelez has been firing on all cylinders to disrupt the old ways of doing things Continue Reading
-
News
16 Sep 2022
Barnet Council awards Capita contract extension
Barnet Council has awarded Capita a contract extension as part of its transition away from a large contract with the supplier Continue Reading
-
News
16 Sep 2022
Six new vulnerabilities added to CISA catalogue
CISA adds six new vulnerabilities to its most-wanted list, including one that dates back to 2010 Continue Reading
-
Podcast
16 Sep 2022
Energy crisis IT impact: Computer Weekly Downtime Upload podcast
In this special edition of the Computer Weekly Downtime Upload podcast, Gartner analyst Tiny Haynes discusses datacentre energy management. Continue Reading
-
News
15 Sep 2022
SAP maintenance fee increase: What you need to know
SAP has written to its customers informing them of a price increase on annual maintenance fees. What are your options? Continue Reading
-
News
15 Sep 2022
Nominations closing soon for annual cyber awards
Nominations for the annual Security Serious Unsung Heroes Awards closes 16 September Continue Reading
-
News
15 Sep 2022
Organisations failing to account for digital trust
The vast majority of businesses are well aware of the importance of digital trust, yet very few have a dedicated staff role responsible for it, report finds Continue Reading
-
News
15 Sep 2022
Full-stack observability top priority for IT teams
Annual forecast reveals observability – the ability to see everything in the tech stack that could affect customer experience – has become a board-level imperative, but only a quarter of organisations have achieved it Continue Reading
-
News
14 Sep 2022
FormBook knocks Emotet off top of malware chart
FormBook emerged as the most widely seen malware in August, according to Check Point’s latest data Continue Reading
-
News
14 Sep 2022
Microsoft patches 64 vulnerabilities on September Patch Tuesday
Microsoft drops fixes for five critical vulnerabilities and one zero-day in its latest monthly update Continue Reading
-
News
13 Sep 2022
Cloud compromise a doddle for threat actors as victims attest
Two separate studies into the state of public cloud security reveal insight into the ease with which threat actors can compromise vast numbers of targets, and some of the challenges security teams are facing in the cloud Continue Reading
-
News
13 Sep 2022
JP Morgan acquires fintech for payments modernisation
JP Morgan acquires cloud-native payments technology as it modernises its IT infrastructure Continue Reading
-
News
13 Sep 2022
Blancco works with charity to provide IT for African schools
Blancco is providing data sanitisation and erasure software to The Turing Trust so that old IT equipment can be securely reused by school children in Sub-Saharan Africa, instead of adding to world’s growing e-waste problem Continue Reading
-
News
12 Sep 2022
Mistakenly transferred $504m to be returned to Citigroup
Judge rules that creditors should return $504m that was accidentally transferred to them by Citigroup Continue Reading
-
News
12 Sep 2022
CISOs should spend on critical apps, cloud, zero-trust, in 2023
Faced with a global recession next year, security buyers should try to direct investment towards technology that protects customer-facing and revenue-generating workloads, say analysts Continue Reading
-
Feature
12 Sep 2022
RPA’s day has come – the intelligent evolution of a productivity bot
By trying to emulate humans for tasks such as data entry, robotic process automation has found a niche home in many an enterprise back office Continue Reading
-
News
09 Sep 2022
Third of IT decision-makers rely on gut feel when choosing network operator
Study from customer experience technology provider shows lack of transparency is cited as the most consistent quality failure of network providers Continue Reading
-
News
09 Sep 2022
Interview: Keeping an IT business going during the Russian invasion
After heading home and discovering that his country had been invaded, Konstantin Klyagin was forced to make life-changing family and business decisions Continue Reading
-
E-Zine
09 Sep 2022
CW Europe: Why Russia could become the world’s biggest market for illegal IT
Faced with international sanctions and the departure of many global IT suppliers from Russia, companies there are seeking alternative, and sometimes illegal, routes to access IT products. Also read how new requirements are driving scientists and engineers in Europe back to the lab to start developing 6G technology. Continue Reading
-
News
08 Sep 2022
Chinese APT using PlugX malware on espionage targets
China’s Bronze President APT is once again targeting government officials of interest to its paymasters, this time using forged diplomatic correspondence, according to the Secureworks Counter Threat Unit Continue Reading
-
News
08 Sep 2022
The changing role of CIO in Sweden
New technologies and evolving business models are changing the missions of IT leaders around the world – and in most cases, the result is slightly different from one country to another Continue Reading
-
News
07 Sep 2022
August ’22 a bumper month for high-impact vulnerabilities
Bugs in products from Apple, Google, Microsoft and VMware dominated the threat landscape in August, says Recorded Future Continue Reading
-
News
07 Sep 2022
Prince’s Trust teams with threat management specialist in skills push
Prince’s Trust hopes to address shortfall in cyber professionals and improve diversity in the industry Continue Reading
-
News
07 Sep 2022
Hotel group IHG confirms cyber attack after two-day outage
IHG, the operator of hotel chains Crowne Plaza, Holiday Inn, Intercontinental and Kimpton, says it has been targeted by an unknown threat actor Continue Reading
-
News
07 Sep 2022
Cyber threats to Europe’s grid: Utilities rethink strategy
The separation of operational and information technology at utilities across Europe is opening doors for cyber criminals Continue Reading
-
News
06 Sep 2022
Bus company Go-Ahead fighting off cyber attack
Go-Ahead Group, which operates bus companies around the UK, says it is in the process of dealing with a cyber attack that may cause disruption to services Continue Reading
-
News
05 Sep 2022
How Okta is regaining customer trust after a cyber attack
In early 2022, cyber firm Okta was among several tech companies hit by the Lapsus$ gang. Vice-president of customer trust Ben King talks about how he has been working behind the scenes to rebuild confidence after the incident Continue Reading
-
News
02 Sep 2022
Dutch government finally allowed to use public cloud
Public cloud is finally within reach for Dutch public services. Previously, the Dutch government was only allowed to use private clouds due to risks concerning privacy and security Continue Reading