IT strategy
IT strategy (information technology strategy) is a comprehensive plan that outlines how technology should be used to meet IT and business goals.. See complete definition.
-
News
13 May 2024
Norway bolsters digital transformation drive
Norway’s government backs digital transformation with major capital investment this year Continue Reading
-
E-Zine
07 Dec 2023
CW EMEA: Prepare for cyber war
When the war between Hamas and Israel began in October, cyber security professionals and major government and private organisations braced for an inevitable accompanying online war. In this issue of CW EMEA, we outline cyber war, patterns of threat activity, and find out what security teams can do to protect their organisations. We also look at Finland’s advances in quantum computing, how Belgian researchers have developed technology to help datacentres process data faster, and the secrets of KPN’s successful business transformation. Read the issue now. Continue Reading
-
News
11 May 2022
Nerbian RAT enjoys using Covid-19 phishing lures
The world is slowly coming to terms with Covid-19, but fear of the coronavirus is no less useful to cyber criminals because of it, as Proofpoint researchers have discovered Continue Reading
-
News
11 May 2022
Emotet has commanding lead on Check Point monthly threat chart
Emotet remains by some margin the most prevalent malware, according to Check Point’s latest monthly statistics Continue Reading
-
News
11 May 2022
CyberUK 22: Five Eyes focuses on MSP security
The western intelligence community has set out practical steps IT service providers and their customers can take to protect themselves Continue Reading
-
News
11 May 2022
Pure to offer on-prem object storage as Snowflake data source
Pure Storage partnership with Snowflake will see the cloud data warehousing platform make use of on-prem FlashBlade fast file and object storage as a source for analytics data Continue Reading
-
News
11 May 2022
CyberUK 22: Data-sharing service to protect public from scams
A new data-sharing service set up by the NCSC and industry partners will give ISPs access to real-time threat data that they can use to block fraudulent websites Continue Reading
-
News
11 May 2022
Analysts confirm return of REvil ransomware gang
Secureworks CTU analysis has found that the REvil ransomware is undergoing active development, possibly heralding a new campaign of cyber attacks Continue Reading
-
News
11 May 2022
Cyber accreditation body Crest forges new training partnerships
Crest says partnerships with Hack The Box and Immersive Labs will enhance its members’ defensive and offensive security skills Continue Reading
-
News
11 May 2022
Microsoft fixes three zero-days on May Patch Tuesday
It’s the second-to-last Patch Tuesday as we know it, and Microsoft has fixed a total of 75 bugs, including three zero-days Continue Reading
-
News
11 May 2022
Queen’s Speech: Employment Bill omission suggests further delays to umbrella market regulation
Contracting market stakeholders were hoping for some clarification on the delivery timeline for umbrella market regulation in the Queen’s Speech, but none was forthcoming Continue Reading
-
News
10 May 2022
CyberUK 22: Cyber leaders affirm UK’s whole-of-society strategy
On the opening day of CyberUK 2022, GCHQ director Jeremy Fleming and NCSC CEO Lindy Cameron have spoken of their commitment to the government’s ambition for a whole-of-society cyber strategy Continue Reading
-
News
10 May 2022
NCSC pins Viasat cyber attack on Russia
UK authorities have attributed the 24 February cyber attack on the network of satellite comms company Viasat to Russia Continue Reading
-
News
10 May 2022
CyberUK 22: NCSC refreshes cloud security guidance
The National Cyber Security Centre is revising its cloud guidance as increasing uptake of potentially vulnerable cloud services puts more organisations at risk of compromise Continue Reading
-
News
10 May 2022
CyberUK 22: Wales splashes £9.5m on cyber innovation hub
A new innovation hub hopes to spur on cyber security innovation in Wales Continue Reading
-
E-Zine
10 May 2022
The spies who hack you – the growing threat of spyware
In this week’s Computer Weekly, after 10 Downing Street was hit by a spyware attack, fears about targeted mobile phone hacks are increasing. Our salary survey highlights the diversity challenge in IT, with men’s support for women in IT declining. And we look at how datacentre heat reuse can help reduce carbon emissions. Read the issue now. Continue Reading
-
News
09 May 2022
CyberUK 22: NCSC’s ACD programme blocks 2.7 million scams
On the opening day of its annual CyberUK event, the NCSC reveals how organisations around the country have used its Active Cyber Defence programme to their advantage Continue Reading
-
News
09 May 2022
Tech Data enhances managed print offering
Distributor adds more depth to its OpenMPS cloud-based offering after getting partner feedback Continue Reading
-
News
09 May 2022
Malaysian government inks agreement with Google Cloud
The cloud framework agreement with Google will make it easier for Malaysia’s public sector agencies to access Google Cloud services through a single government contract Continue Reading
-
Feature
05 May 2022
How to retain cyber talent in the Great Resignation
The cyber security industry is experiencing alarming rates of resignations, leaving organisations vulnerable to cyber attacks. How can we better retain cyber talent? Continue Reading
-
Feature
05 May 2022
Disaster recovery is an essential service for EDF with Phenix-IT
EDF has built disaster recovery tracking, planning and testing software on a six-month upgrade cycle based on governance, risk and compliance functionality in Mega’s Hopex platform Continue Reading
-
Opinion
05 May 2022
Security Think Tank: Identify, assess and monitor to understand attack paths
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these attack pathways better in order to fight back Continue Reading
-
Opinion
04 May 2022
Following the customer: How tech leaders can learn from Alphabet and Meta
Why tech leaders should think about the changing needs of their customers Continue Reading
-
News
04 May 2022
Inside UnaBiz’s bid for Sigfox
Singapore-based UnaBiz has made a successful bid for the French low-power wide area network technology supplier, in a deal that will advance its vision of a unified IoT world Continue Reading
-
Opinion
04 May 2022
Security Think Tank: Defenders must get out ahead of complexity
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to better understand these attack pathways to fight back Continue Reading
-
Opinion
03 May 2022
Security Think Tank: Solving for complexity in the network
The modern-day abundance of IT platforms, apps and tools gives the bad guys ample opportunity to move rapidly through the network to hit critical assets. Security teams must understand these attack pathways better in order to fight back Continue Reading
-
E-Zine
03 May 2022
A prescription for digital accessibility at Boots
In this week’s Computer Weekly, millions of people have difficulties when using websites – we find out how Boots is making its e-commerce offering fully accessible. Our new buyer’s guide examines communications as a service. And we talk to Trainline’s CTO about how the rail app provider survived and thrived post-pandemic. Read the issue now. Continue Reading
-
Feature
02 May 2022
Next generation of collaboration and communication services
Future comms systems may look and feel rather different from what exists today – we look at the journey for communications services Continue Reading
-
E-Zine
30 Apr 2022
Dicas para diferentes sistemas operacionais
Como você lida com os requisitos de gerenciamento, segurança e atualização dos sistemas operacionais corporativos mais comuns? Aqui estão algumas dicas. Continue Reading
-
Podcast
29 Apr 2022
Podcast: War, geo-political risk, data storage and compliance
We talk to Mathieu Gorge, CEO of Vigitrust, about impacts on compliance and data storage from instability in geo-political events, such as the Russian invasion of Ukraine Continue Reading
-
News
29 Apr 2022
CIO interview: Jeffrey Wood, deputy director of ICT, Princess Alexandra Hospital NHS Trust
A move to a brand-new hospital site offers the NHS trust a chance to introduce a range of new innovations, building on the digital transformation delivered over the past few years Continue Reading
-
Feature
29 Apr 2022
Electric vehicle transition comes with uneven costs
Governments, car makers and tech companies are promoting electric vehicles, but are they considering the uneven social and environmental costs from extracting the critical minerals needed to make batteries? Continue Reading
-
News
28 Apr 2022
Ransomware recovery costs dwarf actual ransoms
The cost of recovering from a ransomware attack far outweighs the ransoms now being demanded by cyber criminals, according to recent data Continue Reading
-
News
28 Apr 2022
Naver outlines global AI ambitions
South Korean internet giant Naver has built a global research network to advance and apply its artificial intelligence capabilities across its services Continue Reading
-
Podcast
28 Apr 2022
Metaverse, women in software – Computer Weekly Downtime Upload podcast
Cliff Saran joins Clare and Brian, in Caroline’s absence, to discuss the metaverse, Windows 11, the Makers Women in Software Power List, and how CIOs do technology in 2022 Continue Reading
-
News
28 Apr 2022
Russia plumbs new depths in cyber war on Ukraine
Microsoft details cyber attacks on Ukrainian civilian communications, nuclear safety authorities, and the exploitation of the destruction of Mariupol in a phishing campaign Continue Reading
-
News
27 Apr 2022
Log4Shell, ProxyLogon, ProxyShell among most exploited bugs of 2021
These 15 CVEs were the most commonly exploited last year, and if you haven’t mitigated against them, now is the time Continue Reading
-
News
27 Apr 2022
Russia-supporting cyber crime gang claims Coca-Cola as victim
Stormous cyber crime collective claims to have stolen 161GB of data from Coca-Cola, and says it plans to sell it off Continue Reading
-
Feature
27 Apr 2022
Cloud-first strategy forces big shift on IT infrastructure, skills
More and more, IT infrastructure is in the cloud. As organizations adopt cloud-first strategies, forward-looking CIOs are refocusing their teams on new roles and tasks. Continue Reading
-
News
27 Apr 2022
Ransomware victims paying out when they don’t need to
Sophos’s annual State of Ransomware report shows dramatic increases in the impact of ransomware attacks, but also finds many organisations are paying ransoms when they don’t need to Continue Reading
-
News
27 Apr 2022
Government digital ignorance puts Dutch economy at risk
In this interview, Michiel Steltman, managing director of Digital Infrastructure Netherlands, tells Computer Weekly why the Dutch digital economy is at risk due to a lack of knowledge and understanding at government level Continue Reading
-
Opinion
26 Apr 2022
Digital begins in the boardroom
Successful organisations need a digitally savvy board to shape their business agenda Continue Reading
-
News
26 Apr 2022
Emotet tests new tricks to thwart enhanced security
The operators of the Emotet botnet seem to be trying to find a way to get around recent changes made by Microsoft to better protect its users Continue Reading
-
News
26 Apr 2022
Odense Robotics helps develop key export for Denmark
Robotics seen as a future export sector for Denmark as investment startups build their skills in public sector projects Continue Reading
-
E-Zine
26 Apr 2022
The latest salary trends for IT professionals
In this week’s Computer Weekly, the results of our annual salary survey show pay returning to pre-pandemic levels and work-life balance a growing consideration. As sustainability becomes a critical issue, we look at how datacentres can meet emissions targets. And we find out how IT leaders can help protect children online. Read the issue now. Continue Reading
-
News
25 Apr 2022
US mobile network emerges as latest Lapsus$ victim
Lapsus$ extortion gang hit T-Mobile and attempted to perform SIM-swapping attacks and code theft Continue Reading
-
News
25 Apr 2022
Government appoints head of technology transfer unit
Government announces a CEO to lead its initiatives around commercialising its knowledge assets Continue Reading
-
News
25 Apr 2022
Sophos soaks up SOC.OS
Sophos says acquisition of BAE spinout SOC.OS will enhance its managed threat and extended detection and response services Continue Reading
-
News
22 Apr 2022
What’s up with Conti and REvil, and should we be worrying?
New intelligence on some of the world’s most prolific ransomware gangs suggests recent disruption to their activities was like water off a duck’s back Continue Reading
-
Feature
22 Apr 2022
Snapshots vs backup: Use both for optimum RPOs
We look at snapshots and backup, the key difference, their pros and cons and how best to use the two approaches in an integrated data protection strategy for optimal RPO Continue Reading
-
News
22 Apr 2022
UAE bolsters cyber security
The United Arab Emirates has successfully improved its security posture amid mounting cyber threats Continue Reading
-
Feature
21 Apr 2022
10 critical people skills today's CIOs and IT leaders need
Learn about 10 of the most important soft skills -- from communication to empathy -- and why they are critical to successful technology leadership. Continue Reading
-
News
21 Apr 2022
Zoom adds new round of cyber security enhancements
Videoconferencing platform Zoom adds multiple third-party security certifications and service enhancements Continue Reading
-
News
21 Apr 2022
Five Eyes in new Russia cyber warning
Latest cross-body alert warns of Russian threat to utilities and other core elements of national infrastructure Continue Reading
-
News
21 Apr 2022
Impact of Lapsus$ attack on Okta less than feared
Okta’s investigation into Lapsus$ breach of its systems via a Sitel workstation has concluded that the impact was significantly less than the maximum potential Continue Reading
-
News
20 Apr 2022
How Veeam helped grocery chain Franprix escape its backup hell
French supermarket chain had backup windows that ran well into the next working day and restoring deleted files could take days. It chose Veeam in a contest with Cohesity Continue Reading
-
News
20 Apr 2022
AWS fixes vulnerabilities in Log4Shell hot patch
AWS issues fixes for a series of Log4Shell hot patches after they turned out to leave its services vulnerable to further exploitation Continue Reading
-
News
20 Apr 2022
How PropertyGuru is approaching technology integration
Property tech firm PropertyGuru has invested in capabilities such as DevOps and authentication that can be applied across different platforms that it has acquired over time Continue Reading
-
News
20 Apr 2022
Financial Ombudsman Service chooses TCS as digital transformation partner
Tata Consultancy Services will build and implement key systems as part the Financial Ombudsman Service’s digital transformation Continue Reading
-
News
19 Apr 2022
Median threat actor ‘dwell time’ dropped during 2021
Security teams appear to be getting better at detecting attackers within their networks, according to a report Continue Reading
-
Feature
19 Apr 2022
Positive benefits in the new experience economy
While creating a positive employee experience (EX) has been on the agenda of companies for years, the concept – and that of the experience economy in general – has come of age in the Covid-defined working arena Continue Reading
-
News
18 Apr 2022
Singtel expands datacentre footprint in Indonesia
Singtel’s datacentre platform will host selected datacentre assets from Indonesia’s Telkom as part of the telco’s move to grow its datacentre footprint in key regional markets Continue Reading
-
News
14 Apr 2022
Kyndryl kindles cyber incident recovery pact with Dell
IBM spin-out Kyndryl hops into bed with Dell Technologies in a joint cyber resilience proposition Continue Reading
-
News
14 Apr 2022
Multi-ERP systems are on the menu for SAP implementations
Organisations using SAP may build future ERP systems from composable building blocks from multiple software providers Continue Reading
-
News
14 Apr 2022
Zhadnost DDoS botnet deployed against Finland
A coordinated DDoS attack hit two government ministries in Finland at the same time as Ukrainian president Volodymyr Zelensky delivered a virtual address to the Finnish parliament Continue Reading
-
News
14 Apr 2022
Incontroller ICS malware has ‘rare, dangerous’ capabilities, says Mandiant
Mandiant joins a growing chorus of warnings over novel nation state threats to ICS systems Continue Reading
-
News
13 Apr 2022
Hybrid work catching on in India
More tech workers in India now enjoy flexi-work arrangements and higher salaries, but talent retention remains an issue in the subcontinent, study finds Continue Reading
-
News
13 Apr 2022
WatchGuard firewall users urged to patch Cyclops Blink vulnerability
The US authorities have seen fit to add the WatchGuard vulnerability used by Sandworm to build the Cyclops Blink botnet to its list of must-patch vulnerabilities Continue Reading
-
News
13 Apr 2022
Microsoft patches two zero-days, 10 critical bugs
Patch Tuesday is here once again. This month, security teams must fix two privilege escalation zero-days in the Windows Common Log File System Driver and the Windows User Profile Service Continue Reading
-
News
13 Apr 2022
Criminals researched hacking TTPs post-breach in ‘messy’ cyber attack
Sophos shares details of a cyber attack that saw attackers hang out in their victim environment for five months while they prepared to sow further mischief Continue Reading
-
News
12 Apr 2022
Universal IAM policy failings put cloud environments at risk
Almost all organisations lack appropriate IAM policy controls to effectively secure their data in the cloud, according to a damning study Continue Reading
-
Blog Post
12 Apr 2022
Citrix and Microsoft: who’s really leading the transformation agenda?
Citrix loves Microsoft and Microsoft loves Citrix - OK, maybe I’m exaggerating to make a point, but that’s the gist of the official lines you get from both companies. But looking in from the ... Continue Reading
-
Feature
12 Apr 2022
Enterprises shore up supply chain resilience with data
Using data to gain better visibility over their supply chains and forge closer connections between disparate links is helping organisations respond to disruptions faster Continue Reading
-
News
12 Apr 2022
Sandworm rolls out Industroyer2 malware against Ukraine
A second generation of the Sandworm-linked Industroyer malware has been identified by ESET researchers and Ukraine’s national CERT Continue Reading
-
E-Zine
12 Apr 2022
Disney combines digital, data and creativity to win advertising opportunities
In this week’s Computer Weekly, we talk to the executive vice-president for client and brand solutions at Disney Advertising Sales about how it is using data to subserve story-telling excellence. We delve into how rising energy costs negatively impacted the UK arm of Sungard Availability Services. And we look at the role of infrastructure as code in edge datacentres. Read the issue now. Continue Reading
-
News
11 Apr 2022
Border IT system fixed after 10-day outage
Post-Brexit border IT system failure fixed after going down at the start of April, allowing traders to once again file customs documents electronically rather than by hand Continue Reading
-
News
11 Apr 2022
Open source CMS platform Directus patches XSS bug
A stored cross-site scripting vulnerability in the Directus platform could have enabled malicious actors to gain access to valuable data Continue Reading
-
Opinion
11 Apr 2022
We must target a broad church to fill vacant cyber roles
The security industry focuses a lot on cyber-specific specialisms and technical skills, but it could really benefit from widening its search. Take it from a social anthropologist Continue Reading
-
News
11 Apr 2022
Raspberry Pi Foundation ditches default username policy
Raspberry Pi owners will no longer be able to use the default ‘pi’ username, as the Raspberry Pi Foundation clamps down on insecure practices Continue Reading
-
News
08 Apr 2022
Ukrainian cyber criminal gets five years in jail
A US court has sentenced Denys Iarmak, who worked as a penetration tester for the FIN7 cyber crime group, to a five-year prison sentence Continue Reading
-
News
08 Apr 2022
Was Spring4Shell a lot of hot air? No, but...
Find out why Spring4Shell was apparently not as impactful a security problem as many had at first feared, and why it’s on the cyber community as a whole to do better Continue Reading
-
News
08 Apr 2022
IT contractors warned as HMRC draws on ‘IR35-adjacent’ legislation in tax avoidance clampdown
IT contractors are being urged to take action now, as details emerge about how HM Revenue & Customs is drawing on some IR35-adjacent legislation to send out five-figure tax bills to individuals who engage with contractor-focused accountants Continue Reading
-
Feature
08 Apr 2022
Storage requirements for AI, ML and analytics in 2022
We look at what is needed for artificial intelligence and machine learning, and the pros and cons of block, file and object storage to store and access very large amounts of often unstructured data Continue Reading
-
News
07 Apr 2022
AirAsia taps Google Cloud to bolster its super-app
AirAsia is setting up a cloud centre of excellence with Google Cloud to shore up its super-app and build capabilities in site reliability engineering and machine learning operations Continue Reading
-
News
07 Apr 2022
Goldacre review outlines recommendations on safer use of health data
The findings of an investigation into use of health data for research and analysis includes a number of proposals to improve innovation in the NHS Continue Reading
-
News
07 Apr 2022
US shuts down Russia’s Cyclops Blink botnet operation
Operation by US authorities has taken the Russia-attributed Cyclops Blink botnet ‘off the board’ Continue Reading
-
E-Zine
07 Apr 2022
CW Middle East: UAE and UK researchers work on ‘trustworthy’ cloud OS for datacentres
Imperial College London is embarking on a three-year project with an Abu Dhabi-based group of researchers to find ways for datacentre operators and cloud providers to secure their infrastructure. Also read how Dubai is positioning itself to reap the benefits of a promising global market for drone technology. Continue Reading
-
Podcast
07 Apr 2022
Pure says unstructured data needs storage scale and performance
Podcast: Pure Storage says huge growth of unstructured data and its diversity means storage has to be able to scale with it and offer performance to gain insights Continue Reading
-
News
06 Apr 2022
APAC organisations to spend more on AI
The higher investments in AI will be led by the region’s banking industry which is harnessing AI systems to mitigate risks and detect fraud Continue Reading
-
News
06 Apr 2022
Apple criticised over unpatched CVEs in Catalina, Big Sur
Apple patched two zero-days in macOS Monterey last week, but did not address the same issue in Catalina or Big Sur, raising questions Continue Reading
-
News
06 Apr 2022
Denonia malware may be first to target AWS Lambda
The newly discovered Denonia malware appears to be custom designed to target AWS Lambda environments, and may be the first of its kind Continue Reading
-
News
06 Apr 2022
Hydra takedown merely shifts cyber criminal problem elsewhere
The seizure of the Hydra dark web marketplace is a positive development in the fight against cyber crime, but will only be a temporary setback for determined criminals Continue Reading
-
Feature
06 Apr 2022
Snapshots best practice: Five key things you need to know
We look at snapshots best practice, including the way they work, why they are not the same as backups, how to avoid heavy processing overheads and key user permissions tweaks Continue Reading
-
News
05 Apr 2022
Structured decentralisation is the key to unlocking Nordic-level innovation
Finnish tech entrepreneurs will be taking the stage at the World Economic Forum to tell the world about the role of trust in Finnish startup success Continue Reading
-
News
05 Apr 2022
Discount retailer The Works hit by cyber attack
A small number of The Works’ bricks-and-mortar stores were forced to close amid a cyber attack of an undisclosed nature Continue Reading
-
News
05 Apr 2022
Triple-threat Borat malware no joke for victims
Unlike its namesake, the newly discovered Borat malware won’t raise a smile for IT security pros Continue Reading
-
News
05 Apr 2022
Saudi Arabian ICT sector hits $32.1bn after strong pandemic response
The Saudi Arabian IT and communications sector is recovering strongly from the Covid-19 pandemic Continue Reading
-
E-Zine
05 Apr 2022
Police use of AI needs overhaul to prevent abuse
In this week’s Computer Weekly, a House of Lords inquiry calls for a rethink on how police forces use AI technologies – we examine the issues. Our new buyer’s guide looks into edge datacentres. And the EU and US agree a new data protection deal to replace Privacy Shield, but will it stand up to scrutiny? Read the issue now. Continue Reading
-
News
04 Apr 2022
Office Wi-Fi may not cope with hybrid work
Continued growth of online meetings is triggering disruption across the employee productivity technology market, research from CCS Insight has found Continue Reading
-
News
01 Apr 2022
Four moves to ‘checkmate’ critical assets thanks to lax cloud security
Malicious actors can compromise 94% of critical assets within four steps of the initial breach point, according to a report Continue Reading
-
News
01 Apr 2022
Apple drops emergency patches for two zero-days
Apple has fixed two zero-day vulnerabilities that appear to have been actively exploited in the wild Continue Reading
-
News
31 Mar 2022
EU Act ‘must empower those affected by AI systems to take action’
Ada Lovelace Institute publishes recommendations on how European institutions can improve the Artificial Intelligence Act by establishing a ‘comprehensive remedies framework’ around those affected by the deployment of AI systems Continue Reading