IT strategy
IT strategy (information technology strategy) is a comprehensive plan that outlines how technology should be used to meet IT and business goals.. See complete definition.
-
News
13 May 2024
Norway bolsters digital transformation drive
Norway’s government backs digital transformation with major capital investment this year Continue Reading
-
E-Zine
07 Dec 2023
CW EMEA: Prepare for cyber war
When the war between Hamas and Israel began in October, cyber security professionals and major government and private organisations braced for an inevitable accompanying online war. In this issue of CW EMEA, we outline cyber war, patterns of threat activity, and find out what security teams can do to protect their organisations. We also look at Finland’s advances in quantum computing, how Belgian researchers have developed technology to help datacentres process data faster, and the secrets of KPN’s successful business transformation. Read the issue now. Continue Reading
-
News
23 Jun 2022
SolarWinds unveils new development model to avoid a repeat of Sunburst
SolarWinds has unveiled a new, secure-by-design software development model to protect itself from a repeat of the infamous 2020 cyber attack on its systems, and serve as a blueprint for the industry Continue Reading
-
Opinion
23 Jun 2022
Security Think Tank: Supply chain security demands systematic approach
Supply chain security measures need to be systematic and assessed so as to minimise the complexity and cost to the business Continue Reading
-
News
22 Jun 2022
CIO interview: Simon Liste, chief information technology officer, Pension Protection Fund
While aspects of the PPF’s three-year digital transformation plan were delayed by the pandemic, the organisation is now pressing ahead with widespread improvements to IT Continue Reading
-
News
22 Jun 2022
How TDCX is building a people-centric business
Every digital tool deployed by the Singapore-based services firm is aimed at augmenting the performance and experience of its employees, says TDCX’s group CIO, Byron Fernandez Continue Reading
-
Opinion
22 Jun 2022
Security Think Tank: Balanced approach can detangle supply chain complexity
Achieving an appropriate balance between people, processes and technology can help to detangle the complexities of the supply chain and create better security practices Continue Reading
-
Podcast
21 Jun 2022
Podcast: The legacy and modern apps that drive object storage
We talk to object (and file) storage vendor Scality about the ways the application and development environment is changing and how that is driving object storage Continue Reading
-
News
21 Jun 2022
Government won’t regulate on professional cyber standards
The government has elected not to proceed with regulatory intervention to embed standards and pathways across the cyber profession Continue Reading
-
News
21 Jun 2022
Norwegian recruiters struggle to keep up with demand for IT specialists
The growing importance of IT in all industries, along with a shortage in skills, make for an excellent high-tech job market for candidates in Norway Continue Reading
-
News
21 Jun 2022
CNI leaders’ attitude to ransomware lackadaisical at best
A survey of security decision-makers in sectors regarded as critical national infrastructure reveals a disappointing attitude to ransomware threats Continue Reading
-
News
21 Jun 2022
CIO interview: Mark Bramwell, CIO, Saïd Business School
After seven years in the job, there are still fresh challenges for the IT leader, including a second digital strategy to deliver Continue Reading
-
Opinion
21 Jun 2022
Supply chain security goes deep – forget this at your peril
It may have hit the headlines as an IT issue, but supply chain security goes far deeper into an organisation than just technology Continue Reading
-
E-Zine
21 Jun 2022
Dreams come true – how data and communication saved a failing company
In this week’s Computer Weekly, the former CEO of bed retailer Dreams explains how digital, data and communication helped turn round a failing company. The UK government has a new digital strategy – but it all seems rather familiar. And we talk to the tech firms trialling a four-day working week. Read the issue now. Continue Reading
-
News
20 Jun 2022
Tribunal rules in favour of HMRC as it pursues umbrella company for £11m in unpaid tax
Umbrella firm Exchequer Solutions said it plans to appeal against the outcome of a First-Tier Tribunal, which claims it owes in excess of £11m in unpaid tax relating to its handling of contractor expenses Continue Reading
-
News
20 Jun 2022
Lords move to protect cyber researchers from prosecution
A cross-party group in the House of Lords has proposed an amendment to the Product Security and Telecommunications Infrastructure Bill that would address concerns about security researchers or ethical hackers being prosecuted in the course of their work Continue Reading
-
News
20 Jun 2022
Complex Russian cyber threat requires we go back to basics
The situation in Russia is anything but simple, but it is the fundamentals of cyber security hygiene that pose the best defence against the country’s digital threat, as Mandiant’s Jamie Collier explains Continue Reading
-
News
17 Jun 2022
Tech sector sustainability efforts need full ecosystem approach
Reorienting the tech sector around collaboration rather than competition and reassessing the industry’s conventional wisdom around economic growth is essential to improving sustainability on the timescale needed, London Tech Week attendees are told Continue Reading
-
Feature
17 Jun 2022
Data gravity: What is it and how to manage it
Data gravity can attract increasing amounts of data, and brings with it onerous management overheads. We look at how to mitigate data gravity in datacentre and cloud Continue Reading
-
News
17 Jun 2022
Government responds to Data Reform Bill consultation
Westminster claims its new data laws will boost British benefits, protect consumers, and seize the ‘benefits’ of Brexit Continue Reading
-
News
17 Jun 2022
MoD sets out strategy to develop military AI with private sector
The UK Ministry of Defence has outlined its intention to work closely with the private sector to develop and deploy a range of artificial intelligence-powered technologies, committing to ‘lawful and ethical AI use’ Continue Reading
-
News
16 Jun 2022
Loan charge MPs want contractor adviser community to participate in latest call for evidence
Loan Charge and Taxpayer Fairness All-Party Parliamentary Group seeks input from accountants, lawyers and tax advisers who work with contractors in-scope of the loan charge policy Continue Reading
-
News
16 Jun 2022
TalkTalk hacker Daniel Kelley gives up his black hat for good
After serving a four-year prison sentence for his role in the 2015 TalkTalk hack and other cyber offences, Daniel Kelley now wants to pursue a legitimate cyber security career Continue Reading
-
Opinion
16 Jun 2022
Privacy-enhancing technologies – myths and misconceptions
As the UK and US prepare to open a joint privacy-enhancing technology (PET) prize challenge, expert Ellison Anne Williams busts some myths and misconceptions around this emerging area Continue Reading
-
News
16 Jun 2022
Dundee security research centre opens with support from SBRC
An £18m hub at Abertay University in Dundee forms the centrepiece of Scotland’s first security research cluster Continue Reading
-
Opinion
16 Jun 2022
Security Think Tank: Best practices for boosting supply chain security
In a highly connected world, managing the supply chain landscape requires an adaptation of the ‘traditional’ approach to managing cyber risk Continue Reading
-
News
15 Jun 2022
$2k to access your organisation on the dark web
Dark web brokers will sell access to company networks and systems for an average of $2,000 to $4,000 Continue Reading
-
News
15 Jun 2022
Patch Tuesday dogged by concerns over Microsoft vulnerability response
The last Patch Tuesday in its current form is overshadowed by persistent concerns about how Microsoft deals with vulnerability disclosure Continue Reading
-
News
15 Jun 2022
UK tech job opportunities at 10-year high
Rapid adoption of digital technology, along with the sector’s growing success, has driven tech hiring to heights not seen since the London Olympics Continue Reading
-
News
15 Jun 2022
Public sector bodies accused of freezing out SME IT consultancies over IR35 compliance fears
After details emerged about the multimillion-pound tax bills and penalties some public sector organisations have incurred due to IR35 compliance failings, it is claimed some government departments are cutting their SME consultancy partners loose Continue Reading
-
Opinion
15 Jun 2022
Security Think Tank: Basic steps to secure your supply chain
When it comes to supply chain security, there are some core things you should be doing – but remember, the devil is in the detail Continue Reading
-
News
14 Jun 2022
CIO interview: Morten Holm Christiansen, Haldor Topsoe
There’s no point digitising if there is no benefit to the customer, says the Danish chemicals giant’s head of IT Continue Reading
-
News
14 Jun 2022
MS Azure Synapse vulnerability fixed after six-month slog
Microsoft patched a critical Azure Synapse vulnerability twice, but each time the researcher who discovered it was able to bypass it with ease, leading to a lengthy saga Continue Reading
-
Blog Post
14 Jun 2022
A breathless week for digital government and government digital
If you have worked in the tech or digital world for less than five years, the past week must have been very exciting for you. First, you would have read about the new digital government strategy ... Continue Reading
-
News
14 Jun 2022
Swedish recruiters prepare for a tsunami of AI projects
Several programmes are underway in Sweden to attract and retain AI talent to meet a swelling demand in the job market Continue Reading
-
E-Zine
14 Jun 2022
Managing Apple Macs in the enterprise
In this week’s Computer Weekly, with more people working remotely, the use of Apple Macs in the enterprise is growing – we look at how to manage them securely. Our latest buyer’s guide examines security in the supply chain. And 10 years on from the London Olympics, we find out how data innovation is revitalising its legacy. Read the issue now. Continue Reading
-
Podcast
14 Jun 2022
Podcast: SaaS data protection vulnerability and how to manage it
We talk to backup and data management supplier Cohesity about the added vulnerabilities of software-as-a-service data in a hybrid cloud environment and how best to manage multiple data sources Continue Reading
-
Opinion
13 Jun 2022
Data leaders need to overcome their fears and unlock their creativity
Author and data management consultant Caroline Carruthers argues that data leaders need to tap into their creativity to make their analytical work pay off Continue Reading
-
News
13 Jun 2022
UK, US prepare to launch PET project
A transatlantic prize challenge to accelerate development of privacy-enhancing technologies is set to begin Continue Reading
-
News
13 Jun 2022
Government recommits to UK’s cyber future in Digital Strategy
New strategy leans heavily on cyber security but stops short of announcing any initiatives that have not already been launched or heavily trailed Continue Reading
-
News
13 Jun 2022
New warning over tech suppliers in thrall to hostile governments
Ukraine war could lead to shakeup of dual-use tech exports, says former UK intelligence officer Continue Reading
-
News
13 Jun 2022
Health data strategy to exorcise ghosts of GPDPR
Government publishes a revised data in health strategy, with an emphasis firmly on preserving the integrity and privacy of patients’ confidential information Continue Reading
-
News
13 Jun 2022
What’s new about the new digital government strategy?
There’s a new plan for improving the UK’s digital public services – and we’ve heard a lot of it before. But among all the hyperbole, there is a welcome realism in the latest approach to transforming government Continue Reading
-
News
13 Jun 2022
Qatar bolsters cyber security in preparation for World Cup
With hackers honing their cyber weapons to target the upcoming football World Cup, Qatar is busy developing countermeasures and raising awareness Continue Reading
-
Opinion
10 Jun 2022
Security Think Tank: Don’t trust the weakest link? Don’t trust any link
Your security model shouldn’t fall apart just because a part of your business, or a partner, has weak security. This is why information-centric security is a must Continue Reading
-
News
10 Jun 2022
Snake Keylogger climbing malware charts, says Check Point
Cyber criminals behind Snake Keylogger campaigns have been switching up their tactics in the past few weeks, say researchers Continue Reading
-
News
09 Jun 2022
CIO interview: Yiannis Levantis aims at total quality for Unipart IT
Unipart has a heritage in quality manufacturing and services that CIO Yiannis Levantis is building on, in part by harnessing SAP’s cloud-based business transformation service Rise Continue Reading
-
News
09 Jun 2022
UK government promises £1bn savings from latest digital strategy
Three-year roadmap aims to transform online public services, targeting 50 top services for improvement – but contains much that has been previously promised in the past Continue Reading
-
News
09 Jun 2022
SolarWinds CEO offers to commit staffers to government cyber agencies
A new proposal from SolarWinds’ outspoken CEO, Sudhakar Ramakrishna, could see software companies commit key staff to work with government cyber agencies to improve cooperation and incident response Continue Reading
-
News
09 Jun 2022
Trade body calls for public-private sector collab on digital ID
TechUK has published a report outlining 10 key recommendations it believes are urgently needed to enable the rapid creation of an effectively regulated digital identity marketplace Continue Reading
-
E-Zine
09 Jun 2022
CW Europe: Russia escalates cyber war on Ukraine
Microsoft has given details of cyber attacks on Ukrainian civilian communications, nuclear safety authorities, and the exploitation of the destruction of Mariupol in a phishing campaign. Also read about a report on the European Artificial Intelligence Act that suggests a limited ban on predictive policing systems. Continue Reading
-
Feature
09 Jun 2022
Cloud-to-cloud backup: When native cloud protection is not enough
There is a certain amount of protection built into cloud services, but it has its limits and full data protection requires that cloud data is secured with cloud-to-cloud backup Continue Reading
-
News
08 Jun 2022
China using top consumer routers to hack Western comms networks
An advisory from US cyber authorities shares details of multiple vulnerabilities exploited by Chinese state actors to hack into Western telecoms networks Continue Reading
-
News
08 Jun 2022
Pure FlashBlade//S and Evergreen//Flex boost as-a-service push
FlashBlade//S brings two new arrays in which customers can upgrade controllers and capacity, while //Flex allows capacity to be bought and moved across any QLC or TLC Pure array Continue Reading
-
News
08 Jun 2022
ProxyLogon, ProxyShell may have driven increase in dwell times
The median network intruder dwell time was up 36% to 15 days last year, thanks to massive exploitation of the ProxyLogon and ProxyShell vulnerabilities by IABs, according to new Sophos data Continue Reading
-
News
07 Jun 2022
CIO interview: Lee Cowie, chief technology officer, Merlin Entertainments
The theme park giant faced an enormous challenge during Covid with its venues closed, but digital technology came to the rescue and is now opening up new opportunities Continue Reading
-
News
07 Jun 2022
Software house Mega achieves holistic SaaS security with Synopsys
Mega International, a supplier of IT management software, turned to Synopsys’s Coverity and Black Duck products to reassure both itself and its customers that its software-as-a-service offerings were built to the best possible security standards Continue Reading
-
E-Zine
07 Jun 2022
Using technology to reinvent shopping
In this week’s Computer Weekly, after the pandemic led to a boom in e-commerce, we look at how retailers are turning to tech to revitalise their stores. We examine the issues around using algorithmic automation to manage employees. And we find out how data science is supporting drug discovery at Novartis. Read the issue now. Continue Reading
-
Opinion
01 Jun 2022
What does the EU’s NIS 2 cyber directive cover?
We run the rule over the European Union’s updated NIS2 security directive Continue Reading
-
Opinion
31 May 2022
The importance of making information security more accessible
Robin Smith, CSO of Aston Martin Lagonda, talks about how an accessible approach to cyber is helping him to keep the organisation secure Continue Reading
-
Podcast
31 May 2022
Podcast: How to get truly portable Kubernetes storage
We talk to NetApp CTO Grant Caley about what is needed from storage to really deliver in a world of Kubernetes containerisation and microservices portability in hybrid cloud working Continue Reading
-
Feature
31 May 2022
Attack of the clones: the rise of identity theft on social media
The proliferation of social media has resulted in the rise of identity theft on these platforms, with accounts copied for fraudulent or malicious purposes. What can be done to mitigate it? Continue Reading
-
E-Zine
31 May 2022
Trial and error – why the law on computer evidence must change
In this week’s Computer Weekly, the Post Office IT scandal highlighted the problem with computer evidence – we examine the need for legal reform. We assess the nuclear option for sustainable datacentre power. And we find out how IT experts can improve their soft skills and boost their career prospects as a result. Read the issue now. Continue Reading
-
Opinion
30 May 2022
Log4Shell: How friendly hackers rose to the challenge
HackerOne CISO Chris Evans looks back at how the security community successfully rose to the challenge of Log4Shell, and saved end-user organisations millions Continue Reading
-
News
30 May 2022
UAE residents think 3D printing will have the most positive impact on society
People in the UAE believe next-generation technologies such as 3D printing and artificial intelligence will become widespread in the country Continue Reading
-
Opinion
30 May 2022
Strong internal foundations are key to withstanding external threats
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these attack pathways better in order to fight back Continue Reading
-
News
30 May 2022
Analysts weigh in on Broadcom-VMware deal
VMware customers in APAC will need to assess their exposure amid uncertainty over the impact of the mega deal on the market Continue Reading
-
Opinion
27 May 2022
Consistency is key to mitigate outsourcing risk
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these attack pathways better in order to fight back Continue Reading
-
News
26 May 2022
Consultation launched on datacentre, cloud security
The government is seeking views on how to boost the security and resilience of the UK’s datacentres and online cloud platforms Continue Reading
-
News
26 May 2022
Global business insurer saves 50,000 hours through RPA
QBE started its robotic process automation journey in 2017 and has already saved 50,000 hours, enabling staff to focus on customer care Continue Reading
-
Opinion
26 May 2022
Security Think Tank: Core security processes must adapt in a complex landscape
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these attack pathways better in order to fight back Continue Reading
-
News
26 May 2022
Two-thirds of UK organisations defrauded since start of pandemic
Nearly two out of three UK companies say they have experienced some form of fraud or economic crime in the past two years, according to a report Continue Reading
-
News
26 May 2022
Most CFOs being left out of ransomware conversations
Barely a tenth of CFOs are actively involved in planning for cyber attacks, according to a report Continue Reading
-
E-Zine
26 May 2022
CW Nordics: How the Estonian government created a digital assistant to support citizens
As Estonia finalises the initial version of its government services digital assistant for launch, the man heading the project describes the birth of Bürokratt and beyond. Also read about Helsinki's role in a pan-EU project to introduce drone technology into emergency medical services. Continue Reading
-
News
26 May 2022
SoftIron readies Sydney manufacturing facility
Software-defined storage supplier SoftIron is making hardware appliances in Australia to improve supply chain resilience and address security concerns of government customers Continue Reading
-
News
24 May 2022
Ransomware volumes grew faster than ever in 2021
Verizon’s annual DBIR assessment of the security landscape highlights an unprecedented boom in ransomware volumes, to the surprise of nobody Continue Reading
-
E-Zine
24 May 2022
Set innovation free and make great ideas a reality
In this week’s Computer Weekly, we look at Gartner’s call to innovate – and innovation across retail, the circular economy and the automotive sector. We talk to Verastar’s CTO about customer engagement in its small business services. And we examine how poor data quality is frustrating corporate desires to be data driven. Read the issue now. Continue Reading
-
News
23 May 2022
Did the Conti ransomware crew orchestrate its own demise?
Analysts examining the shutdown of the Conti ransomware syndicate suggest the cyber crime collective orchestrated its own demise Continue Reading
-
Opinion
23 May 2022
Security Think Tank: Understanding attack paths is a question of training
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these attack pathways better in order to fight back Continue Reading
-
News
20 May 2022
Applying international law to cyber will be a tall order
Many in the security community have voiced their support for the UK government’s ambitions to work towards agreement with other countries on the application of international law to cyber space, but not without some reservations Continue Reading
-
News
20 May 2022
Third of organisations to outsource more IT amid talent shortage
Cutting costs is not the main reason for outsourcing IT in the UK, according to a major study Continue Reading
-
News
20 May 2022
Microsoft drops emergency patch after Patch Tuesday screw up
Microsoft fixed a certificate mapping issue that caused server authentication failures on domain controllers for users that had installed the most recent Patch Tuesday updates Continue Reading
-
News
20 May 2022
Former Welsh steelworks becomes ‘living’ cyber lab
ResilientWorks security centre in Ebbw Vale provides an education hub for students and a testbed for industry Continue Reading
-
News
20 May 2022
Chinese cyber spooks exploit western sanctions on Russia
The actor behind an ongoing Chinese espionage campaign targeting Russian defence research bodies is taking advantage of the Ukraine war in their phishing lures Continue Reading
-
News
19 May 2022
Defensive cyber attacks may be justified, says attorney general
Speaking ahead of a speech at the Chatham House think tank, the UK’s attorney general has suggested defensive cyber attacks against hostile countries may be legally justifiable Continue Reading
-
News
19 May 2022
Nature of cyber war evolving in real time, says Microsoft president
The past three months have seen the rapid evolution of the very nature warfare to incorporate cyber attacks, Microsoft’s Brad Smith tells the audience at its Envision conference in London Continue Reading
-
News
19 May 2022
Red teaming will be standard in Dutch governmental organisations by 2025
The Dutch government wants to include the testing of the digital security of systems, processes and people – also known as red teaming – in all of its governmental organisations’ test planning and budgeting by 2025 at the latest Continue Reading
-
Opinion
19 May 2022
Security Think Tank: Yes, zero trust can help you understand attack paths
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these attack pathways better in order to fight back Continue Reading
-
Opinion
18 May 2022
Security Think Tank: To follow a path, you need a good map
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these attack pathways better in order to fight back Continue Reading
-
News
17 May 2022
(ISC)² to train 100,000 cyber pros in UK
Security association (ISC)² unveils ambitious UK training programme Continue Reading
-
News
17 May 2022
Video effects firm cuts costs by 20% and goes hybrid with Hammerspace
Jellyfish Pictures saves on rising power and office space costs, as well as Brexit difficulties, by using Hammerspace to allow access to large files from any geographic location Continue Reading
-
News
17 May 2022
Hammerspace the ‘missing link’ for a cloud still lacking
The cloud can’t enable true multi-region working so Hammerspace helps make data visible globally and aggregate it as needed between locations with workflows set via customer policy Continue Reading
-
E-Zine
17 May 2022
Digitally transforming UK power networks for renewable energy
In this week’s Computer Weekly, we find out how the UK’s power networks need to be digital transformed to be ready for renewable energy – and the role of open source. Wi-Fi 6 was meant to give a boost to wireless connectivity – we examine why adoption has stalled. And we look at what a quantum datacentre might be like. Read the issue now. Continue Reading
-
News
16 May 2022
Europol gears up to collect big data on European citizens after MEPs vote to expand policing power
The European Parliament has voted to expand Europol’s role, legalising its processing of bulk datasets containing personal information and endorsing research into predictive policing technologies Continue Reading
-
News
16 May 2022
Gartner Data & Analytics Summit: Unleash innovation on emergence from pandemic
Analysts at the Gartner Data & Analytics Summit in London urged D&A leaders to unleash innovation as their organisations emerge from the shadow of the pandemic Continue Reading
-
Blog Post
15 May 2022
Building a culture for transformation: The Unipart way
This is a guest blogpost by Ian Wahlers, Chief Operations Officer SAP UK & Ireland Last month, Unipart, a long-standing customer of SAP announced it is joining the RISE with SAP programme, ... Continue Reading
-
News
13 May 2022
Open source community sets out path to secure software
A 10-point plan to improve the security and resilience of open source software was presented this week at a summit in the US Continue Reading
-
News
12 May 2022
Parasol data breach: Leaked email claims Optionis is denying responsibility for incident
Parent company of the Parasol umbrella firm that suffered a cyber attack and data breach earlier this year is denying responsibility for the incident, as legal action against the firm heats up Continue Reading
-
News
12 May 2022
GPDPR data scrape a ‘mistake’, says leading scientist
Giving evidence to the Science and Technology Committee, academic, physician and science writer Ben Goldacre has expressed serious misgivings about the on-hold GPDPR NHS data scrape Continue Reading
-
Feature
12 May 2022
The limits and risks of backup as ransomware protection
Backups can provide a sound means of recovery from ransomware infection, but they are not 100% certain to foil attackers. We look at the limits and risks of depending on backups Continue Reading
-
News
12 May 2022
Rackspace mulls over business unit sell-off following strategic review of company
A statement by the CEO of Rackspace suggests the company could be heading for another period of change, following a strategic review of its business Continue Reading
-
E-Zine
12 May 2022
CW Benelux: Meta shelves hyperscale datacentre plan in Netherlands
Meta’s plan for a hyperscale datacentre in the Netherlands which was to serve the metaverse world has been halted following a campaign by environmentalists and the Dutch parliament’s call for the government to do everything in its power to stop the facility being built. Also read how the Dutch arm of customer services supplier Teleperformance has led the entire organisation to adopt robotic process automation software. Continue Reading