IT strategy
IT strategy (information technology strategy) is a comprehensive plan that outlines how technology should be used to meet IT and business goals.. See complete definition.
-
News
13 May 2024
Norway bolsters digital transformation drive
Norway’s government backs digital transformation with major capital investment this year Continue Reading
-
E-Zine
07 Dec 2023
CW EMEA: Prepare for cyber war
When the war between Hamas and Israel began in October, cyber security professionals and major government and private organisations braced for an inevitable accompanying online war. In this issue of CW EMEA, we outline cyber war, patterns of threat activity, and find out what security teams can do to protect their organisations. We also look at Finland’s advances in quantum computing, how Belgian researchers have developed technology to help datacentres process data faster, and the secrets of KPN’s successful business transformation. Read the issue now. Continue Reading
-
News
22 Feb 2022
UK organisations swift to chide phishing victims
While UK organisations are doing better at security training, many are quick to punish employees who fall victim to phishing attacks, whether real or simulated Continue Reading
-
Opinion
22 Feb 2022
Security Think Tank: Good training is all about context
In-house or outsourced? What makes a good security training programme, and what questions should buyers ask when procuring training as a service? Continue Reading
-
E-Zine
22 Feb 2022
Think nation-state cyber attacks won’t hit you? Think again…
In this week’s Computer Weekly, with Russian state cyber attacks in the news, we find out why security professionals in every organisation need to remain alert. Our buyer’s guide looks at the tools and programmes helping improve IT training. And we look at how the traditional sport of golf is undergoing a digital transformation. Read the issue now. Continue Reading
-
News
21 Feb 2022
Zoom gains NCSC Cyber Essentials Plus and NHS security badges
Video platform Zoom has added a number of UK-specific cyber certifications to help it demonstrate its platform is safeguarded against common threats Continue Reading
-
News
21 Feb 2022
Backup heads to cloud as ransomware hits 76% and RTOs/RPOs fail
Veeam survey finds most can’t recover the data they want or do it in time, ransomware is now a ‘disaster’, use of the cloud is increasing, but the datacentre is still very important Continue Reading
-
News
21 Feb 2022
UK joins US in pinning Ukraine DDoS attacks on Russia
A series of DDoS attacks on Ukrainian defence and banking organisations last week is now being firmly attributed to Russian action Continue Reading
-
Feature
21 Feb 2022
Storage and 5G: Big impacts likely as wide-area topologies evolve
Enterprise 5G will boost the need for storage generally. It will also push capacity needs closer to the edge and create new locations for processing and storage Continue Reading
-
News
21 Feb 2022
Telstra and TPG Telecom strike network sharing deal
Australia’s Telstra and TPG Telecom have joined forces to share their mobile networks and spectrum in a landmark deal that will expand coverage for both telcos Continue Reading
-
News
18 Feb 2022
UK organisations untroubled by Trickbot surge
A surge in Trickbot infections is targeting some of the world’s most prominent brands, but UK organisations seem thankfully unaffected Continue Reading
-
News
18 Feb 2022
CIO interview: Adam Miller, group head of IT, Markerstudy Group
The insurer and Auto Windscreens owner is using cloud-based virtual desktops to ease acquisitions and support home working during the pandemic – and its IT chief has a growing range of projects on the go Continue Reading
-
E-Zine
18 Feb 2022
CW APAC: Trend Watch - enterprise 5G
Businesses are increasingly embracing the positive effects of 5G. In this handbook, focused on enterprise 5G in the Asia-Pacific region, Computer Weekly looks at what the technology means for Australian enterprises, how Singapore is deploying 5G trials, why an Indian telco has turned to OpenStack and what AWS looks set to achieve through its launch of AWS Private 5G. Read the issue now. Continue Reading
-
Feature
17 Feb 2022
It takes a village: Protecting kids online is everyone’s responsibility
The rapid uptake of smartphones among children has contributed to the increasing number of cases of cyber bullying and online grooming. Is this an educational issue or a cultural problem, and can modern enterprise help? Continue Reading
-
News
16 Feb 2022
DDoS attacks hit Ukrainian defence ministry and banks
A further wave of cyber attacks has taken place against targets in Ukraine amid heightened tension in the region Continue Reading
-
News
16 Feb 2022
BlackCat ransomware gang claims responsibility for Swissport attack
Ransomware gang is trying to offload 1.6TB of data stolen from aviation services firm Continue Reading
-
News
16 Feb 2022
CIO interview: Steve Williams, M&A lead and IT director, Waterstons
Steve Williams is applying decades of CIO experience to the advice he gives businesses during major mergers and acquisitions Continue Reading
-
News
16 Feb 2022
Cloud Security Alliance publishes guidelines to bridge compliance and DevOps
The Cloud Security Alliance has published a report detailing practices that organisations can adopt to bridge the gap between compliance and software development and operations Continue Reading
-
News
16 Feb 2022
Nordic countries lack a unified approach to AI
Nordic countries need to work together on a pan-regional artificial intelligence strategy Continue Reading
-
News
15 Feb 2022
The Citrix deal and what it means for Tibco
The investment firm behind Tibco has been on a spending spree, bolstering its product portfolio and offering new ways to access and connect to data Continue Reading
-
News
15 Feb 2022
Botched third-party configuration exposes Internet Society data to web
Personal data on members of The Internet Society was exposed after a supplier failed to secure its Azure storage Continue Reading
-
News
15 Feb 2022
Nebulon gets Ansible collection for datacentre deployment
Provider of cloud-managed and hardware-accelerated – formerly ‘cloud-defined’ – storage makes further moves towards its smartInfrastructure vision, with Terraform support coming Continue Reading
-
News
15 Feb 2022
TA2451 targets aviation and transport sector with tailored lures
Newly designated cyber criminal group favours highly specific lures and a tried-and-tested modus operandi to compromise targets in the aviation, aerospace and transport sectors Continue Reading
-
News
15 Feb 2022
Australian public sector facing transformation challenges
Public sector organisations in Australia are facing organisational and technological challenges in driving back-office innovation and digital-first strategies, new study finds Continue Reading
-
News
15 Feb 2022
China emerges as leader in vulnerability exploitation
Threat actors linked to China are emerging as a significant force in the weaponisation of newly discovered CVEs Continue Reading
-
E-Zine
14 Feb 2022
On a mission to track space junk
In this week’s Computer Weekly, we talk to the space experts tracking orbital debris using graph database technology. We meet the startups taking very different approaches in trying to develop commercial quantum computers. And we ask why it’s so difficult to build a data science team and how to overcome the challenges. Read the issue now. Continue Reading
-
Feature
14 Feb 2022
Evolving a data integration strategy
Linking IT systems together is never going away, but the approach CIOs adopt is key to ensuring relevant data feeds the decision-making process Continue Reading
-
News
11 Feb 2022
UK government publishes plans to improve health and social care integration
A white paper outlines measures including digital care records under move to help individuals receive “better, more joined-up care” Continue Reading
-
News
11 Feb 2022
Why security professionals should pay attention to what Russia is doing
Even though the average organisation is an unlikely target for a Russian state cyber attack, here's why security teams still need to watch what Russian threat groups are up to Continue Reading
-
News
11 Feb 2022
Lords to scrutinise UK plans to become a science and tech ‘superpower’
House of Lords Science and Technology Committee inquiry will investigate the government’s strategy to advance its science and tech ambitions, how it will be delivered and its feasibility Continue Reading
-
News
10 Feb 2022
Interview: Eddie Copeland, director, London Office of Technology and Innovation
The leader of the London Office of Technology and Innovation discusses local government’s response to the pandemic and its priorities for collaborative work around data and innovation in 2022 Continue Reading
-
Opinion
10 Feb 2022
Phishing tests are a useful exercise, but don’t overdo it
The vast majority of cyber attacks start with a phish, so it’s not surprising that phishing tests form part of cyber training plans. But sometimes these tests go too far. Cyberis’ Gemma Moore looks at how to avoid the pitfalls Continue Reading
-
E-Zine
10 Feb 2022
CW Benelux: Unesco members adopt AI ethics recommendation
Unesco member state have adopted an AI ethics recommendation that seeks to define a common set of values and principles to guide the development of ethical AI globally. Also read about a large-scale national cyber exercise in the Netherlands, and the Estonian government’s Siri-like digital assistant. Continue Reading
-
News
09 Feb 2022
Linux-based clouds an open door for attackers, says VMware
Its prevalence as a cloud operating system means Linux is becoming a meal ticket for malicious actors, but the security industry does not seem to have cottoned on to this yet, says VMware Continue Reading
-
News
09 Feb 2022
Ransomware ever more sophisticated and impactful, warns NCSC
UK’s National Cyber Security Centre teams up with US and Australian partners in a joint advisory warning organisations of the increasing sophistication exhibited by criminal ransomware gangs Continue Reading
-
News
09 Feb 2022
Data strategy highlights geospatial data challenges
A new assessment discusses the importance of data sharing, a lack of standards and the skills gap Continue Reading
-
News
09 Feb 2022
Microsoft stomps on 48 bugs in February Patch Tuesday update
It’s a light Patch Tuesday for February 2022, as Microsoft issues fixes for just 48 CVEs, including a solitary zero-day Continue Reading
-
Opinion
09 Feb 2022
Five key tech trends for digital leaders in 2022
The past two years have seen a surge in investment that will bring new challenges to digital leaders over the next year Continue Reading
-
Feature
09 Feb 2022
Posix vs object storage: How much longer for Posix?
We look at Posix compliance in storage and why it is being challenged by object storage and the need to scale much further than Posix-oriented storage was ever intended to Continue Reading
-
News
08 Feb 2022
DPD delivers swift fix for serious API flaw
API vulnerability potentially left PII on DPD Group’s customers dangerously exposed, but was rapidly fixed on disclosure Continue Reading
-
News
08 Feb 2022
The Security Interviews: Building the UK’s future cyber ecosystem
As the government lays out the next iteration of its Cyber Security Strategy, we speak to Plexal and Lorca’s Saj Huq about his work building a cyber ecosystem to support the UK’s future ambitions Continue Reading
-
News
08 Feb 2022
Tiger offers lightweight file access for hybrid cloud
Roar data, anyone? Tiger offers local access to cloud data, with only parts of the file being worked on downloaded and file locking in cloud buckets to ensure integrity Continue Reading
-
News
08 Feb 2022
Right to disconnect and less monitoring key to better remote work
The World Health Organisation and International Labour Organisation warn against invasive workplace surveillance and promote right to disconnect in joint briefing on how to promote healthy and safe remote working Continue Reading
-
Feature
08 Feb 2022
Cloud-era disaster recovery planning: Staff training, incident and media management
In the third in a series on cloud-era disaster recovery, we set out the key components of DR staff awareness and training programmes, as well as incident management and dealing with the media Continue Reading
-
News
07 Feb 2022
CIO interview: Brian Roche, director of IT, George Best Belfast City Airport
Data analytics, the internet of things and open source software are central to the Northern Irish airport’s aim to create a seamless, tech-enabled journey for passengers Continue Reading
-
News
07 Feb 2022
Airport services firm thwarts attempted ransomware heist
Aviation services provider Swissport says its systems are mostly back up and running after a ransomware attack Continue Reading
-
E-Zine
07 Feb 2022
Exploring the metaverse
In this week’s Computer Weekly, the metaverse is set to become a highly competitive commercial playground –profitable markets but also high-profile failures will follow. IT contractors have been hit by cyber attacks on the firms that pay their wages – we examine the impact. And we ask if it’s time to plan for quantum computing. Read the issue now. Continue Reading
-
News
07 Feb 2022
TV provider MediaHub boots SAN and NAS for Scality object storage
Sydney-based TV content provider MediaHub got tired of performance issues and scaling difficulties with SAN and NAS, so powered its as-a-service offer with Scality object storage Continue Reading
-
Feature
07 Feb 2022
Four emerging data integration trends to assess
To accelerate their performance in data integration, companies are evaluating and adopting a range of contributing technologies Continue Reading
-
News
04 Feb 2022
Cyber attacks on European oil facilities spreading
Following a cyber attack on distribution facilities in Germany, more incidents have been reported in Belgium and the Netherlands, but it is too early to necessarily draw a link between them Continue Reading
-
News
03 Feb 2022
Brookson and Parasol cyber attacks: Contractor complaints about delayed payments continue
Several weeks on from the suspected ransomware attack that blighted two of the umbrella industry’s biggest players, contractors are still chasing their missing money Continue Reading
-
Opinion
02 Feb 2022
Security Think Tank: How to build a human firewall
In-house or outsourced? What makes a good security training programme, and what questions should buyers ask when procuring training as a service? Continue Reading
-
News
02 Feb 2022
Mechanism underlying cookie popups found in breach of GDPR
A fundamental element of the mechanism by which the advertising industry requests tracking consent from web users has been found in breach of the General Data Protection Regulation Continue Reading
-
News
02 Feb 2022
Zero-trust to soar in 2022, but dogged by implementation challenges
IT leaders are keen to invest in zero-trust, but face issues around a lack of expertise, and selling the concept into the C-suite Continue Reading
-
News
02 Feb 2022
British Council data exposed by third-party cyber failure
The British Council entrusted confidential data on its students to a third-party and was let down Continue Reading
-
Feature
02 Feb 2022
What neurodivergent people really think of working in cyber security
Many firms are filling cyber security skills gaps by hiring neurodivergent talent – but more support is needed for neurodivergent cyber security professionals, writes autistic tech journalist Nicholas Fearn Continue Reading
-
News
01 Feb 2022
Check Point buys Spectral to safeguard cloud development
Check Point’s latest acquisition of Israel-based startup Spectral expands its developer-centric security toolset Continue Reading
-
News
01 Feb 2022
UK’s Advanced Research and Invention Agency appoints first CEO
The government has named the first CEO of the UK’s Advanced Research and Invention Agency Continue Reading
-
News
01 Feb 2022
German fuel supplier taken offline in cyber attack
Cyber attack against Germany’s Oiltanking, a major fuel logistics company, affects 13 distribution terminals across Germany, in an incident with echoes of last year’s hit on Colonial Pipeline Continue Reading
-
News
01 Feb 2022
Dutch software engineers join campaign for research funding
Software researchers from all over Europe are sounding the alarm: to maintain a strong international competitive position, more financial resources must be committed to software research Continue Reading
-
News
01 Feb 2022
Over one-fifth of ransomware attacks target financial sector
Newly published data reveals a significant uptick in cyber attacks against the financial services sector during the third quarter of 2021 Continue Reading
-
E-Zine
01 Feb 2022
How Ocado pushes technological boundaries
In this week’s Computer Weekly, we talk to Ocado’s CTO about how the e-commerce company pushes technological boundaries. Our latest buyer’s guide looks at the importance and technical challenges of data integration. There’s a growing dispute over the use of end-to-end encryption – we look at the differing perspectives. Read the issue now. Continue Reading
-
News
31 Jan 2022
Nebulon SmartInfrastructure brings cloud-defined storage to datacentre
Cloud-defined storage allows customers to build private clouds on-site, with pools of storage built from commodity hardware, Nebulon PCIe cards and its browser-based console Continue Reading
-
News
31 Jan 2022
Data on children of armed forces personnel exposed in breach
Data on 4,142 children of serving armed forces personnel was exposed in a data breach at the Ministry of Defence Continue Reading
-
Opinion
31 Jan 2022
Understand your cyber training ‘need’ before committing to a programme
In-house or outsourced? What makes a good security training programme, and what questions should buyers ask when procuring training-as-a-service? Continue Reading
-
News
31 Jan 2022
Google inks $1bn deal with Bharti Airtel
The wide-ranging deal covers Google’s equity investment in Airtel, as well as efforts to spur cloud adoption and lower barriers to smartphone ownership Continue Reading
-
Feature
28 Jan 2022
Maidstone and Tunbridge Wells NHS Trust advances digital-first strategy
Trust is making progress with its 10-year plan, centred around an electronic patient records system Continue Reading
-
News
27 Jan 2022
CISOs must get out in front of Ukraine cyber crisis, says NCSC
The National Cyber Security Centre is urging UK organisations to take steps to bolster their cyber security resilience in response to the ongoing Ukraine crisis Continue Reading
-
News
27 Jan 2022
Novel phishing campaign highlights need for MFA, says Microsoft
Microsoft details a new multi-stage phishing campaign that only affects victims without multifactor authentication in place Continue Reading
-
News
27 Jan 2022
Microsoft uses Q2 2022 earnings to delve into metaverse
Company’s CEO sees a role for Microsoft that takes the metaverse beyond gaming and into the business sphere Continue Reading
-
News
27 Jan 2022
Nightmare Log4Shell scenario averted by prompt, professional action
Prompt and professional community response to the Log4Shell disclosure means the dangerous and widespread vulnerability has not been exploited to the extent many had feared Continue Reading
-
Feature
27 Jan 2022
Refrigeration firm freezes legacy backup for one Cohesity cluster
France-based Clauger had reached limits of capacity and complexity with multi-supplier legacy backup, so moved to one Cohesity cluster and gained restores that took mere minutes Continue Reading
-
Feature
27 Jan 2022
Navigating PIPL: European businesses plot their next steps into China
How does China’s strict new Personal Information Protection Law impact European businesses? Continue Reading
-
Feature
27 Jan 2022
Cloud-era disaster recovery planning: Setting strategy and developing plans
In the second in a series on cloud-era disaster recovery, we look at how to formulate a DR strategy and develop detailed DR plans for your organisation, while taking cloud services into account Continue Reading
-
Opinion
27 Jan 2022
Security Think Tank: Focus on ‘nudging’ to build effective cyber training
In-house or outsourced? What makes a good security training programme, and what questions should buyers ask when procuring training-as-a-service? Continue Reading
-
News
27 Jan 2022
Umbrella company cyber attacks prompt fresh calls for sector regulation to protect contractors
With the umbrella company industry increasingly finding itself under attack from cyber criminals, contracting market stakeholders embark on a fresh round of calls for the industry to be regulated Continue Reading
-
News
26 Jan 2022
More intel emerges on WhisperGate malware that hit Ukraine
Security experts have been poring over the WhisperGate malware with which alleged Russia-backed entities targeted Ukrainian government websites Continue Reading
-
News
26 Jan 2022
Storage tech brief: Look out for PCIe gen 5 drives in 2022
PCIe 5.0 will offer bandwidth up to 128GBps per drive. We look at what’s available and when, including in the new EDSFF form factor, as well as looking forward to PCIe gen 6 Continue Reading
-
News
26 Jan 2022
PwnKit bug endangers Linux distributions worldwide
Qualys researchers share intel on a memory corruption vulnerability in a program installed by default on every major Linux distribution Continue Reading
-
News
26 Jan 2022
MPs to debate landmark IoT security law
Proposed bill mandates tighter protections for connected products, and adds new rules for broadband roll-out into the bargain Continue Reading
-
News
25 Jan 2022
More evidence needed to establish 5G’s green credentials
Research paper from UK university cautions that received wisdom of sustainability associated with next-generation mobile technology is not currently backed up by a strong, publicly available, fully transparent evidence base Continue Reading
-
News
25 Jan 2022
Prepare, but don’t panic, over supposed Russian cyber threat
A fresh alert from the US Department of Homeland Security may have IT security teams jumpy over the possibility that their organisations could be targeted by Russian state actors Continue Reading
-
News
25 Jan 2022
Cyber Essentials programme gets biggest update since launch
NCSC implements a thorough revision of its Cyber Essentials scheme to reflect the changing security landscape Continue Reading
-
News
25 Jan 2022
UK government launches internal cyber strategy
Multi-pronged government security strategy is designed to protect both core systems and public services Continue Reading
-
News
25 Jan 2022
UK launches international data transfer council
Businesses, academics and trade bodies convene to help the UK seize data-sharing opportunities Continue Reading
-
News
25 Jan 2022
Twitter to expand Singapore engineering hub
Twitter will double its engineering workforce in Singapore by 2023, as part of its regional expansion plans Continue Reading
-
News
25 Jan 2022
CIO interview: Michael Cole, CTO, European Tour and Ryder Cup
The highly traditional sport of golf is proving to be an innovator in its field, with internet of things technology and cloud adoption transforming tournaments after Covid Continue Reading
-
E-Zine
25 Jan 2022
Why watching your remote workers doesn’t work
In this week’s Computer Weekly, the surge in home working led many firms to mandate use of surveillance software – we look at why it hasn’t worked. It’s an important year for public sector IT – we examine the trends for 2022. And with robotic process automation (RPA) booming, a Swedish bank explains the benefits. Read the issue now. Continue Reading
-
Definition
24 Jan 2022
Ethereum
Ethereum is an open source, distributed software platform based on blockchain technology. Continue Reading
-
Feature
24 Jan 2022
EDSFF brings built-for-NVMe connectivity to the datacentre
Aimed at enterprise use cases, EDSFF offers incredible flash density in shared storage and hyperscale deployments, but storage products that use it are still thin on the ground Continue Reading
-
News
24 Jan 2022
CIO interview: Sheri Rhodes, CIO, Workday
The coronavirus pandemic has accelerated digital change for many businesses – and even for cloud software leader Workday, there are always new things to learn and introduce Continue Reading
-
News
24 Jan 2022
Outdated systems core to DWP £1bn pension underpayment blunders
Old software is among the main reasons behind the pension errors affecting 134,000 people, says a House of Commons committee report Continue Reading
-
News
21 Jan 2022
Mandiant analysts: Russia-backed APTs likely to ramp up attacks
More cyber attacks like those perpetrated against targets in Ukraine are to be expected, and they may become more destructive Continue Reading
-
News
21 Jan 2022
Cyber pros: Don’t revel in REvil’s downfall just yet
The arrests of REvil’s alleged kingpins is a welcome step, but as with any disruption to cyber criminal activity, it is never wise to assume law enforcement action means the threat has passed entirely Continue Reading
-
20 Jan 2022
Top IT predictions in APAC in 2022
Operationalising zero trust, talent retention and containerisation are just some of the key trends that will shape Asia-Pacific’s technology landscape in 2022 Continue Reading
-
E-Zine
20 Jan 2022
CW APAC: CIO trends
IT leaders would be wise to embrace the technology expected to become prevalent in 2022. In this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly looks at the top IT predictions for the year ahead, how India is preparing for a hybrid future, the benefits of digitising manual processes and Krungsri Bank’s reasons for adopting open APIs Continue Reading
-
News
20 Jan 2022
Updated cyber security regulations proposed for managed services sector
The Network and Information Systems regulations are to be updated to include MSPs and outsourcers, following a spate of supply chain attacks Continue Reading
-
News
20 Jan 2022
Data of 515,000 vulnerable people stolen in Red Cross attack
The International Committee of the Red Cross is probing a cyber attack that has already seen the personal data of hundreds of thousands of the world’s most vulnerable people compromised Continue Reading
-
News
20 Jan 2022
MoonBounce firmware bootkit shows advances in malicious implants
MoonBounce firmware bootkit shows evident technical improvements over others, making it a more dangerous threat to organisations. It is being used by Chinese state-backed actors Continue Reading
-
Opinion
20 Jan 2022
Security Think Tank: Cyber training is useless without staff empowerment
In-house or outsourced? What makes a good security training programme, and what questions should buyers ask when procuring training as a service? Continue Reading
-
News
20 Jan 2022
NCSC for Startups programme seeks ransomware-busters
Innovative ideas for ransomware-busting technology are being sought by the UK’s National Cyber Security Centre and startup incubator Plexal Continue Reading
-
News
20 Jan 2022
UK SMEs to receive tech skills and software boost
A new government scheme aimed at helping businesses improve their productivity and sales online has opened for applications Continue Reading