IT operations management and IT support
-
News
11 Mar 2024
Vinnova launches National Digital Advancement project
Swedish state innovation initiative invests in a network of regional research and development centres Continue Reading
-
Feature
09 Feb 2024
The rising prominence of hybrid cloud in the Nordics
Many Nordic organisations have opted for hybrid cloud environments, subscribing to the newest services without giving up what they already have. Best practices are beginning to emerge for managing the heterogenous environment Continue Reading
-
14 Jun 2022
Macs in the enterprise – what you need to know
With Apple Mac hardware and operating systems in business becoming more commonplace, how should IT teams best manage users? Continue Reading
-
News
13 Jun 2022
New warning over tech suppliers in thrall to hostile governments
Ukraine war could lead to shakeup of dual-use tech exports, says former UK intelligence officer Continue Reading
-
News
13 Jun 2022
Qatar bolsters cyber security in preparation for World Cup
With hackers honing their cyber weapons to target the upcoming football World Cup, Qatar is busy developing countermeasures and raising awareness Continue Reading
-
News
10 Jun 2022
Researchers find eight CVEs in single building access system
A series of eight vulnerabilities in Carrier LenelS2 building access panels could enable malicious actors to obtain physical access to their targets Continue Reading
-
News
09 Jun 2022
SolarWinds CEO offers to commit staffers to government cyber agencies
A new proposal from SolarWinds’ outspoken CEO, Sudhakar Ramakrishna, could see software companies commit key staff to work with government cyber agencies to improve cooperation and incident response Continue Reading
-
News
09 Jun 2022
IBM winding down its Russian business
After three months in suspension, IBM’s operations in Russia are being wound down, CEO tells staff Continue Reading
-
News
08 Jun 2022
NHS invites suppliers to apply to join latest tech marketplace
Health service launches new IT framework for suppliers offering technologies that can transform GP operations Continue Reading
-
News
08 Jun 2022
Danish recruiter provides advice on a crazy market for tech jobs
Global trends make it difficult for Danish companies to hire people with IT skills, and a Danish recruiter is providing both companies and developers with some much-needed advice Continue Reading
-
News
08 Jun 2022
ProxyLogon, ProxyShell may have driven increase in dwell times
The median network intruder dwell time was up 36% to 15 days last year, thanks to massive exploitation of the ProxyLogon and ProxyShell vulnerabilities by IABs, according to new Sophos data Continue Reading
-
News
08 Jun 2022
P27 advance could replace multiple national clearing systems in Nordics
Nordic payments project promises to make payments to other countries as easy as sending a text message Continue Reading
-
News
07 Jun 2022
Weak IT and SecOps collaboration in ANZ opens doors to cyber attacks
The weak collaboration between IT and security teams in Australia and New Zealand is exposing their organisations to data loss, business disruption and other potential consequences of cyber attacks Continue Reading
-
News
07 Jun 2022
Prison and Probation Service’s tagging ambition ‘outstripped its ability to deliver’
HM Prison and Probation Service’s programme to transform the tagging of offenders has failed to deliver after software platform was scrapped Continue Reading
-
Feature
06 Jun 2022
IT departments need holistic circular economies to fight climate change
With sustainability moving up the boardroom agenda, IT managers should revamp procurement strategies to align with the principles of the circular economy, but what does this mean for managing the IT lifecycle? Continue Reading
-
News
01 Jun 2022
Environmental social governance law enhances Danish tech’s impact
A new environmental and social law in Denmark could help the country’s tech startup ecosystem to differentiate Continue Reading
-
Opinion
31 May 2022
The importance of making information security more accessible
Robin Smith, CSO of Aston Martin Lagonda, talks about how an accessible approach to cyber is helping him to keep the organisation secure Continue Reading
-
News
30 May 2022
Majority of organisations are hiring more IT staff to work remotely
IT leaders are increasingly recruiting staff to work remotely as changing working methods brought by the Covid-19 pandemic look set to stay Continue Reading
-
News
30 May 2022
Iceland’s natural and digital approach to healthcare disrupts global sector
Iceland has the perfect blend of natural health remedies and tech startup entrepreneurship to shake up the world healthcare sector Continue Reading
-
Opinion
30 May 2022
Log4Shell: How friendly hackers rose to the challenge
HackerOne CISO Chris Evans looks back at how the security community successfully rose to the challenge of Log4Shell, and saved end-user organisations millions Continue Reading
-
Feature
27 May 2022
Macs in the enterprise – what you need to know
A guide to managing Apple Mac hardware and operating systems in the enterprise Continue Reading
-
News
26 May 2022
Global business insurer saves 50,000 hours through RPA
QBE started its robotic process automation journey in 2017 and has already saved 50,000 hours, enabling staff to focus on customer care Continue Reading
-
Opinion
26 May 2022
Security Think Tank: Core security processes must adapt in a complex landscape
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these attack pathways better in order to fight back Continue Reading
-
News
26 May 2022
Dutch companies struggle to fill tech jobs
There are plenty of IT job vacancies in the Netherlands, but a shortage of IT professionals Continue Reading
-
News
26 May 2022
The barristers that broke their backs to break the Post Office’s shield of lies
Computer Weekly spoke to the barristers at Henderson Chambers that fought the Post Office in the High Court to expose the widest miscarriage of justice in UK history Continue Reading
-
Definition
25 May 2022
binary
Binary describes a numbering scheme in which there are only two possible values for each digit -- 0 or 1 -- and is the basis for all binary code used in computing systems. Continue Reading
-
News
24 May 2022
Ransomware volumes grew faster than ever in 2021
Verizon’s annual DBIR assessment of the security landscape highlights an unprecedented boom in ransomware volumes, to the surprise of nobody Continue Reading
-
News
23 May 2022
Netherlands approves beyond-visual-line-of-sight inspection drones
Drones can automate the traditionally challenging job of inspecting industrial sites, including hard-to-reach infrastructure Continue Reading
-
News
23 May 2022
Government has no plans to review controversial court rules on computer evidence
Government accused of ‘passing the buck’ and ‘not knowing what it is talking about’ after stating it has no plans to review court rules on computer evidence Continue Reading
-
News
23 May 2022
Did the Conti ransomware crew orchestrate its own demise?
Analysts examining the shutdown of the Conti ransomware syndicate suggest the cyber crime collective orchestrated its own demise Continue Reading
-
Opinion
23 May 2022
Security Think Tank: Understanding attack paths is a question of training
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these attack pathways better in order to fight back Continue Reading
-
News
23 May 2022
How Ivanti views patch management with a security lens
Bringing development, operations and security teams together will help organisations to improve their visibility of IT assets and vulnerabilities while keeping threat actors at bay Continue Reading
-
News
20 May 2022
Applying international law to cyber will be a tall order
Many in the security community have voiced their support for the UK government’s ambitions to work towards agreement with other countries on the application of international law to cyber space, but not without some reservations Continue Reading
-
News
20 May 2022
Third of organisations to outsource more IT amid talent shortage
Cutting costs is not the main reason for outsourcing IT in the UK, according to a major study Continue Reading
-
News
20 May 2022
Microsoft drops emergency patch after Patch Tuesday screw up
Microsoft fixed a certificate mapping issue that caused server authentication failures on domain controllers for users that had installed the most recent Patch Tuesday updates Continue Reading
-
News
20 May 2022
Government will legislate to protect access to cash amid digital revolution
The government is giving the Financial Conduct Authority more powers to force banks to ensure cash withdrawal and deposit services are within easy reach of customers Continue Reading
-
News
19 May 2022
Nature of cyber war evolving in real time, says Microsoft president
The past three months have seen the rapid evolution of the very nature warfare to incorporate cyber attacks, Microsoft’s Brad Smith tells the audience at its Envision conference in London Continue Reading
-
News
19 May 2022
Deliveroo accused of ‘soft union busting’ with GMB deal
Smaller grassroots unions have criticised Deliveroo and GMB for making a “hollow” deal that will ultimately undermine workers’ self-organising efforts Continue Reading
-
News
19 May 2022
Red teaming will be standard in Dutch governmental organisations by 2025
The Dutch government wants to include the testing of the digital security of systems, processes and people – also known as red teaming – in all of its governmental organisations’ test planning and budgeting by 2025 at the latest Continue Reading
-
Opinion
19 May 2022
Security Think Tank: Yes, zero trust can help you understand attack paths
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these attack pathways better in order to fight back Continue Reading
-
News
19 May 2022
Relentless branch closures at Lloyds Bank continue as digital banking takes hold
UK bank branches are being shuttered in large numbers as consumers choose online banking, with Lloyds Banking Group announcing more closures Continue Reading
-
Opinion
18 May 2022
Security Think Tank: To follow a path, you need a good map
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these attack pathways better in order to fight back Continue Reading
-
News
17 May 2022
Post Office scandal victim calls for government’s role in silencing victims to be investigated
Victims of the Post Office Horizon scandal in Scotland raise further questions about Post Office and government conduct Continue Reading
-
News
17 May 2022
(ISC)² to train 100,000 cyber pros in UK
Security association (ISC)² unveils ambitious UK training programme Continue Reading
-
News
17 May 2022
Controversial Post Office IT system to be replaced by 2025
Work is ongoing by the Post Office to replace the controversial Horizon retail and accounting system used in nearly 12,000 branches Continue Reading
-
Definition
13 May 2022
troubleshooting
Troubleshooting is a systematic approach to problem-solving that is often used to find and correct issues with complex machines, electronics, computers and software systems. Continue Reading
-
News
13 May 2022
Santander has so far moved 80% of IT infrastructure to cloud
Spanish banking giant Santander continues its journey into the cloud as it strives to be cloud native Continue Reading
-
News
12 May 2022
App-based Starling Bank doubles its Cardiff workforce
Digital bank is recruiting nearly 500 people, including data scientists and engineers, to its Cardiff operation Continue Reading
-
News
12 May 2022
Amdocs unveils digital transformation and SaaS support
Software and services provider supports media and communications base with offerings designed to deliver integration of streaming services for leading UK cableco Continue Reading
-
Opinion
12 May 2022
Security Think Tank: Your path to understanding attack paths
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these attack pathways better in order to fight back Continue Reading
-
News
11 May 2022
Cyber accreditation body Crest forges new training partnerships
Crest says partnerships with Hack The Box and Immersive Labs will enhance its members’ defensive and offensive security skills Continue Reading
-
News
11 May 2022
Microsoft fixes three zero-days on May Patch Tuesday
It’s the second-to-last Patch Tuesday as we know it, and Microsoft has fixed a total of 75 bugs, including three zero-days Continue Reading
-
News
10 May 2022
CCRC to contact 88 more former subpostmasters with potentially wrongful convictions
The Criminal Cases Review Commission is to contact 88 more potentially wrongfully convicted Post Office workers Continue Reading
-
News
10 May 2022
NCSC pins Viasat cyber attack on Russia
UK authorities have attributed the 24 February cyber attack on the network of satellite comms company Viasat to Russia Continue Reading
-
News
10 May 2022
Post Office scandal inquiry chair brings forward urgent compensation hearings
The chair of the Post Office Horizon scandal inquiry has brought forward hearings about compensation as victims warn that at this rate “people will die” before they get anything Continue Reading
-
News
10 May 2022
CyberUK 22: NCSC refreshes cloud security guidance
The National Cyber Security Centre is revising its cloud guidance as increasing uptake of potentially vulnerable cloud services puts more organisations at risk of compromise Continue Reading
-
News
10 May 2022
European retailers see embedded finance as a revenue builder
Retailers and e-commerce businesses are working with tech suppliers to embed financial products and services in their customer offerings Continue Reading
-
News
09 May 2022
Tech Data enhances managed print offering
Distributor adds more depth to its OpenMPS cloud-based offering after getting partner feedback Continue Reading
-
News
09 May 2022
Post Office scandal victims in Scotland to tell their stories, raising questions of law
Inquiry into Post Office scandal moves to Scotland, with differences in English and Scottish law raising further serious questions about subpostmaster prosecutions Continue Reading
-
News
06 May 2022
Interview: Success in Belgium’s high-tech job market
Veteran executive recruiter shares his perspective on the Belgian job market, both for outsiders seeking work in the country and for young Belgian nationals just beginning their careers Continue Reading
-
Feature
05 May 2022
How to retain cyber talent in the Great Resignation
The cyber security industry is experiencing alarming rates of resignations, leaving organisations vulnerable to cyber attacks. How can we better retain cyber talent? Continue Reading
-
Opinion
05 May 2022
Security Think Tank: Identify, assess and monitor to understand attack paths
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these attack pathways better in order to fight back Continue Reading
-
Opinion
04 May 2022
Security Think Tank: Defenders must get out ahead of complexity
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to better understand these attack pathways to fight back Continue Reading
-
News
03 May 2022
Five TLS comms vulnerabilities hit Aruba, Avaya switching kit
Five new vulnerabilities in the implementation of transport layer security communications leave several popular switches vulnerable to remote code execution Continue Reading
-
Opinion
03 May 2022
Security Think Tank: Solving for complexity in the network
The modern-day abundance of IT platforms, apps and tools gives the bad guys ample opportunity to move rapidly through the network to hit critical assets. Security teams must understand these attack pathways better in order to fight back Continue Reading
-
News
03 May 2022
Post Office scandal CEO could be stripped of CBE
Honours Forfeiture Committee to review Paula Vennells’ CBE in the light of Post Office scandal Continue Reading
-
Definition
29 Apr 2022
horsepower (hp)
Horsepower (hp) is a unit of measurement in the foot-pound-second (fps or ft-lb/s) or English system, sometimes used to express the rate at which mechanical energy is expended. Continue Reading
-
News
27 Apr 2022
Log4Shell, ProxyLogon, ProxyShell among most exploited bugs of 2021
These 15 CVEs were the most commonly exploited last year, and if you haven’t mitigated against them, now is the time Continue Reading
-
News
27 Apr 2022
Ransomware victims paying out when they don’t need to
Sophos’s annual State of Ransomware report shows dramatic increases in the impact of ransomware attacks, but also finds many organisations are paying ransoms when they don’t need to Continue Reading
-
News
27 Apr 2022
Government digital ignorance puts Dutch economy at risk
In this interview, Michiel Steltman, managing director of Digital Infrastructure Netherlands, tells Computer Weekly why the Dutch digital economy is at risk due to a lack of knowledge and understanding at government level Continue Reading
-
News
27 Apr 2022
Police question former Fujitsu worker again in Post Office scandal perjury investigation
Police have interviewed a former Fujitsu employee for the third time in the investigation into potential perjury during trials of wrongfully convicted subpostmasters Continue Reading
-
News
26 Apr 2022
Global digital wallet transactions set to soar
Payments using mobile phones are set to soar globally as suppliers expand the services available, according to research Continue Reading
-
News
26 Apr 2022
Odense Robotics helps develop key export for Denmark
Robotics seen as a future export sector for Denmark as investment startups build their skills in public sector projects Continue Reading
-
News
25 Apr 2022
Government appoints head of technology transfer unit
Government announces a CEO to lead its initiatives around commercialising its knowledge assets Continue Reading
-
News
25 Apr 2022
Sophos soaks up SOC.OS
Sophos says acquisition of BAE spinout SOC.OS will enhance its managed threat and extended detection and response services Continue Reading
-
News
22 Apr 2022
UAE bolsters cyber security
The United Arab Emirates has successfully improved its security posture amid mounting cyber threats Continue Reading
-
News
22 Apr 2022
Finance regulator identifies challenger bank financial crime weaknesses
Financial Conduct Authority review finds challenger banks need to do more to prevent their platforms being used to commit financial crime, such as money laundering Continue Reading
-
News
21 Apr 2022
Five Eyes in new Russia cyber warning
Latest cross-body alert warns of Russian threat to utilities and other core elements of national infrastructure Continue Reading
-
News
21 Apr 2022
Tech to account for over half of regulatory compliance spending
By 2026, regtech will account for more than half of the money that businesses spend on compliance with regulations Continue Reading
-
News
21 Apr 2022
European cities moving fast to change business of parking
German cities are using the latest smart parking technology to reduce traffic and car pollution while collecting more fees for parking Continue Reading
-
News
21 Apr 2022
Dutch schools struggle with digitisation
Now is the time for schools in the Netherlands to determine how the opportunities of distance and digital learning resources can be made to work and how the risks involved can be mitigated Continue Reading
-
News
20 Apr 2022
AWS fixes vulnerabilities in Log4Shell hot patch
AWS issues fixes for a series of Log4Shell hot patches after they turned out to leave its services vulnerable to further exploitation Continue Reading
-
News
20 Apr 2022
Nationwide Building Society streamlines payment dispute process through software
Building society has speeded up the resolution of customer disputes over Visa payments by using Pegasystems software Continue Reading
-
News
20 Apr 2022
Financial Ombudsman Service chooses TCS as digital transformation partner
Tata Consultancy Services will build and implement key systems as part the Financial Ombudsman Service’s digital transformation Continue Reading
-
News
19 Apr 2022
Median threat actor ‘dwell time’ dropped during 2021
Security teams appear to be getting better at detecting attackers within their networks, according to a report Continue Reading
-
News
19 Apr 2022
Windows 7 and XP still more popular than Windows 11
Lansweeper audit of Windows devices finds more people are running unsupported Windows operating systems than the newest release Continue Reading
-
Feature
14 Apr 2022
Refugee support group works with tech startup on reporting system
Computer Weekly speaks to a refugee support group about its ongoing collaboration with an academic tech startup to develop a digital human rights reporting system for refugees Continue Reading
-
News
14 Apr 2022
Zhadnost DDoS botnet deployed against Finland
A coordinated DDoS attack hit two government ministries in Finland at the same time as Ukrainian president Volodymyr Zelensky delivered a virtual address to the Finnish parliament Continue Reading
-
News
14 Apr 2022
Incontroller ICS malware has ‘rare, dangerous’ capabilities, says Mandiant
Mandiant joins a growing chorus of warnings over novel nation state threats to ICS systems Continue Reading
-
News
13 Apr 2022
Microsoft patches two zero-days, 10 critical bugs
Patch Tuesday is here once again. This month, security teams must fix two privilege escalation zero-days in the Windows Common Log File System Driver and the Windows User Profile Service Continue Reading
-
News
13 Apr 2022
Criminals researched hacking TTPs post-breach in ‘messy’ cyber attack
Sophos shares details of a cyber attack that saw attackers hang out in their victim environment for five months while they prepared to sow further mischief Continue Reading
-
News
13 Apr 2022
More ANZ organisations warm to DevSecOps
About four in 10 organisations in Australia and New Zealand are undertaking the transition to development, security and operations, while a further 36% plan to do so in 2022, study finds Continue Reading
-
News
12 Apr 2022
Universal IAM policy failings put cloud environments at risk
Almost all organisations lack appropriate IAM policy controls to effectively secure their data in the cloud, according to a damning study Continue Reading
-
News
12 Apr 2022
PassiveLogic to get more active in smart building tech with $15m funding
Global alternative asset manager partners with provider of autonomous building systems and foundation technology for smart cities to bring the first general-purpose autonomous platform to the building market Continue Reading
-
News
12 Apr 2022
Sandworm rolls out Industroyer2 malware against Ukraine
A second generation of the Sandworm-linked Industroyer malware has been identified by ESET researchers and Ukraine’s national CERT Continue Reading
-
News
11 Apr 2022
Border IT system fixed after 10-day outage
Post-Brexit border IT system failure fixed after going down at the start of April, allowing traders to once again file customs documents electronically rather than by hand Continue Reading
-
News
11 Apr 2022
Open source CMS platform Directus patches XSS bug
A stored cross-site scripting vulnerability in the Directus platform could have enabled malicious actors to gain access to valuable data Continue Reading
-
Opinion
11 Apr 2022
Building distributed systems requires effective developer teams
Technologies edge computing and containerisation call for teams capable of building distributed systems Continue Reading
-
Opinion
11 Apr 2022
We must target a broad church to fill vacant cyber roles
The security industry focuses a lot on cyber-specific specialisms and technical skills, but it could really benefit from widening its search. Take it from a social anthropologist Continue Reading
-
News
11 Apr 2022
Raspberry Pi Foundation ditches default username policy
Raspberry Pi owners will no longer be able to use the default ‘pi’ username, as the Raspberry Pi Foundation clamps down on insecure practices Continue Reading
-
Feature
11 Apr 2022
The role of infrastructure as code in edge datacentre computing
As datacentre computing is pushed to the edge of the organisation’s network, IT has to address the overheads associated with remote server management Continue Reading
-
News
08 Apr 2022
Was Spring4Shell a lot of hot air? No, but...
Find out why Spring4Shell was apparently not as impactful a security problem as many had at first feared, and why it’s on the cyber community as a whole to do better Continue Reading