IT operations management and IT support
-
News
11 Mar 2024
Vinnova launches National Digital Advancement project
Swedish state innovation initiative invests in a network of regional research and development centres Continue Reading
-
Feature
09 Feb 2024
The rising prominence of hybrid cloud in the Nordics
Many Nordic organisations have opted for hybrid cloud environments, subscribing to the newest services without giving up what they already have. Best practices are beginning to emerge for managing the heterogenous environment Continue Reading
-
Feature
29 Dec 2022
High tech meets agriculture in Denmark
Thanks to a few strategic investments, Denmark may one day become a major exporter of farming technology Continue Reading
-
Feature
29 Dec 2022
Cyber security professionals share their biggest lessons of 2022
In the run-up to 2023, cyber security professionals are taking the time to reflect on the past few months and share their biggest lessons of 2022 Continue Reading
-
News
29 Dec 2022
Top 10 Nordic IT stories of 2022
Here are Computer Weekly's top 10 Nordic IT articles of 2022 Continue Reading
-
Opinion
29 Dec 2022
How does red teaming test the ultimate limits of cyber security?
An expert ethical hacker reveals how he goes about carrying out a red team exercise Continue Reading
-
Opinion
28 Dec 2022
Why the current fraud model is broken, and how to fix it
Scammers and fraudsters are catching up with the good guys; a new technological approach is needed to fight skyrocketing volumes of digital fraud, says Darwinium founder Alisdair Faulkner Continue Reading
-
News
28 Dec 2022
Top 10 Middle East IT stories of 2022
Here are Computer Weekly's top 10 Middle East IT articles of 2022 Continue Reading
-
News
23 Dec 2022
Top 10 financial services IT stories of 2022
Here are Computer Weekly’s top 10 financial services IT articles of 2022, looking back at the moves and changes over the past year Continue Reading
-
News
23 Dec 2022
Top 10 Benelux IT stories of 2022
Here are Computer Weekly’s top 10 Benelux articles of 2022 Continue Reading
-
News
22 Dec 2022
Top 10 cyber security stories of 2022
The war in Ukraine loomed large over the cyber security news agenda, but 2022 also saw growing awareness of open source security, discussion around cyber insurance, and more besides Continue Reading
-
Feature
21 Dec 2022
A sticky story: How, and why, hackers love stickers on laptops
We’ve all seen laptops adorned with security stickers and in-jokes, but how did this cyber community trend get started, what does it signify, and what does it say about the humans behind the screens? Continue Reading
-
News
20 Dec 2022
Four-day working week set to stay at Atom bank
Challenger bank Atom has formalised a four-day working week policy after a successful trial Continue Reading
-
News
20 Dec 2022
TSB hit with huge fine after IT migration disaster
TSB has been fined nearly £50m due to failings during its IT migration catastrophe Continue Reading
-
Blog Post
20 Dec 2022
Dealing with the growing problem of edge and IoT sprawl
Amidst all the hype regarding the massive growth potential for IoT and for edge computing in general, there is an elephant in the room, and that’s edge sprawl. It’s as if the edge evangelists are ... Continue Reading
-
Opinion
19 Dec 2022
Security Think Tank: 2022 brought plenty of learning opportunities in cyber
At the end of another busy 12 months, Turnkey Consulting’s Andrew Morris sums up some of the most important takeaways for cyber pros Continue Reading
-
News
16 Dec 2022
UK unis implement new IP traffic policies to combat ransomware
Jisc will introduce new measures to protect UK universities and research institutions from ransomware attacks that exploit the Remote Desktop Protocol remote-access feature Continue Reading
-
Blog Post
16 Dec 2022
How to build your tech budget for 2023
This is a guest post by Chrystal Taylor, head geek at SolarWinds As the year comes to a close, discussions about next year’s financials and budgets are rising among business leadership. But with ... Continue Reading
-
News
15 Dec 2022
Digital Ethics Summit: Who benefits from new technology?
Experts at the 2022 Digital Ethics Summit say expedited development cycles and obviously over-hyped PR material, in tandem with the public’s near-total exclusion from conversations around technology, is creating distrust towards the tech sector Continue Reading
-
News
14 Dec 2022
Criminal Cases Review Commission calls on more convicted subpostmasters to come forward
The Criminal Cases Review Commission wants more former subpostmasters to come forward if they think they were prosecuted by the Post Office based on data from the error-prone Horizon computer system Continue Reading
-
News
14 Dec 2022
Ethical hackers flex their muscles in 2022
Ethical hackers working through HackerOne programmes found 21% more vulnerabilities in 2022 than in 2021 Continue Reading
-
News
14 Dec 2022
Microsoft and London Stock Exchange agree £2.3bn 10-year cloud deal
The London Stock Exchange is building on its acquisition of financial data provider Refinitiv through a deal with Microsoft Continue Reading
-
News
14 Dec 2022
Microsoft fixes two zero-days in final Patch Tuesday of 2022
December’s Patch Tuesday is typically a light month for Microsoft, and this year proved no exception, but there are still several critical issues worth addressing, and two zero-days for defenders to pore over Continue Reading
-
News
14 Dec 2022
NAO: BBC digital transformation plan at risk from lack of resources
Financial watchdog warns broadcaster that it may lack resources to achieve its desired digital ambitions, with particular worry over best practice in acquiring, storing and securing personal data and potential exposure to reputational risks Continue Reading
-
Opinion
14 Dec 2022
Security Think Tank: How much digital trust can you place on zero-trust?
The events of the past couple of years have highlighted many considerations that should be taken into consideration when pursuing a zero-trust strategy, says ISACA’s Steven Sim Kok Leong Continue Reading
-
News
13 Dec 2022
The nature of the CISO role will be in flux in 2023
As cyber risk outpaces organisational defences, and cyber attacks and breaches cause more and more damage, the nature of the CISO role is entering a state of flux, according to a report Continue Reading
-
News
13 Dec 2022
More Uber data exposed in possible supply chain attack
A second incident affecting ride-sharing app Uber appears to have originated through a third party in a supply chain attack Continue Reading
-
News
13 Dec 2022
Special educational needs students use virtual reality to help navigate real world
Students on the autistic spectrum are using virtual reality to help them prepare for real-world interaction Continue Reading
-
Opinion
12 Dec 2022
Security Think Tank: Embrace prioritisation, people, imperfections
Security and IT professionals should try to make peace with their imperfections in 2023, says Nominet CISO Paul Lewis Continue Reading
-
News
09 Dec 2022
CIISec, DCMS to fund vocational cyber courses for A-level students
The Chartered Institute of Information Security and the Department for Digital, Culture, Media and Sport plan to fund vocational cyber qualifications for 300 teenagers Continue Reading
-
News
09 Dec 2022
Iranian APT seen exploiting GitHub repository as C2 mechanism
A subgroup of the Iran-linked Cobalt Mirage APT group has been caught taking advantage of the GitHub open source project as a means to operate its latest custom malware Continue Reading
-
News
09 Dec 2022
Digital bank to recruit 1,000 tech experts in Manchester
App-based bank Starling is adding 1,000 people to its workforce with technology professionals being recruited for its new operation in Manchester Continue Reading
-
News
09 Dec 2022
IT system limitations a factor in passport delays
Limitations in the UK’s passport office IT system led to delays in applicants receiving their documents during a recent period of high demand Continue Reading
-
Opinion
09 Dec 2022
Security Think Tank: 2022 changed how we thought about resilience
Increasing cyber resilience is at the heart of the people-processes-technology triangle, and 2022 saw shifts in all three of these aspects, says PA Consulting’s Sharon Shochat Continue Reading
-
News
07 Dec 2022
Rackspace email outage confirmed as ransomware attack
An ongoing outage affecting Rackspace email customers is the result of a ransomware attack Continue Reading
-
Opinion
07 Dec 2022
Security Think Tank: As cyber pros, we need to articulate our needs better
There is always a lot to learn about security, but one of the most important lessons may not relate to technology at all, says Petra Wenham Continue Reading
-
News
07 Dec 2022
Post Office scandal – “cock-up or cook-up”?
The second phase of the Post Office Horizon IT scandal raised more questions over who did what, when and where, with shocking revelations at every turn Continue Reading
-
News
06 Dec 2022
EU fails to protect human rights in surveillance tech transfers
Transfers of surveillance technology from the European Union to African governments are carried out without due regard for the human rights impacts, the European Ombudsman has found after a year-long investigation into the European Commission’s management of an aid fund Continue Reading
-
News
06 Dec 2022
Don’t become an unwitting tool in Russia’s cyber war
Researchers have turned up evidence that enterprise networks are being co-opted by Russian threat actors to launch attacks against targets in Ukraine. How can you avoid becoming an unwitting tool in a state-backed attack? Continue Reading
-
News
06 Dec 2022
Finland connects a quantum computer to a supercomputer
VTT and CSC recently connected a quantum computer with Europe’s fastest supercomputer to enable a hybrid service for researchers Continue Reading
-
News
05 Dec 2022
How HashiCorp is driving cloud provisioning and management
HashiCorp CEO Dave McJannet talks up how the company is supporting cloud provisioning in a hybrid environment and its investments in Asia-Pacific to capitalise on the region’s growth potential Continue Reading
-
News
05 Dec 2022
French cyber consultancy Hackuity sets up UK operation
Risk-based vulnerability management company is to establish a UK base of operations in the hope of expanding its enterprise client base Continue Reading
-
News
02 Dec 2022
Twitter ‘replacement’ Hive Social shuts off service in privacy alert
Hive Social, a recently established social media network, has temporarily closed its servers to address deep structural privacy issues identified by ethical hackers Continue Reading
-
Opinion
01 Dec 2022
Ransomware: Is there hope beyond the overhyped?
Up-and-coming cyber concepts attack surface management and security mesh architectures seem to hold some promise in tackling ransomware, but they are a little way off maturity Continue Reading
-
News
30 Nov 2022
Microsoft 365 banned in German schools over privacy concerns
German schools cannot legally use Microsoft Office 365 over lack of clarity about how data is collected, shared and used, as well as the potential for unlawful transfer of European citizens’ personal data to the US Continue Reading
-
News
30 Nov 2022
Subpostmaster federation deliberately kept public in dark over computer problems
The federation representing subpostmasters deliberately suppressed information about computer errors that could have saved its members from devastating life-changing events Continue Reading
-
News
30 Nov 2022
Latest LockBit ransomware versions have wormable capabilities
Sophos researchers have reverse-engineered the Lockbit 3.0 ransomware, shedding new light on its evolving capabilities and firming up links with BlackMatter Continue Reading
-
News
30 Nov 2022
Parity AI talks about auditing recruitment algorithms for bias
Algorithmic auditing firm Parity speaks to Computer Weekly about the process of auditing artificial intelligence for bias, following its partnership with AI-powered recruitment platform Beamery Continue Reading
-
Opinion
30 Nov 2022
Think technology, process, human risk to manage ransomware
Effective ransomware handling boils down to three core areas – technology, process and human risk Continue Reading
-
Opinion
29 Nov 2022
Chartered status and aligned standards are crucial for the UK's cyber sector
As the UK moves closer to ushering in the world’s first chartered cyber professionals, the UK Cyber Security Council’s Simon Hepburn outlines the sector’s defining moment Continue Reading
-
News
29 Nov 2022
Digital Transformation Week Amsterdam: HSBC discusses low-code in financial services
A member of HSBC’s global transformation team has shared her views on low-code with an audience in Amsterdam Continue Reading
-
Feature
29 Nov 2022
How gamifying cyber training can improve your defences
Security training is the cornerstone of any cyber defence strategy. With ever-escalating online threats, it is now more important than ever that this training is an engaging experience Continue Reading
-
News
28 Nov 2022
How MongoDB is driving growth in ANZ
MongoDB, which counts the likes of Bendigo and Adelaide Bank as clients, has been driving skills development and investing in local manpower in Australia and New Zealand Continue Reading
-
Feature
28 Nov 2022
Ransomware: Practical tips to improve resiliency
With ransomware attacks on organisations increasing, the question is not if an attack will happen, but when. We look at ways to minimise the impact of such an attack Continue Reading
-
News
25 Nov 2022
Data management, backup becoming the CISO's responsibility
More and more CISOs are taking on responsibility for wider data management strategies, and this trend looks set to grow next year Continue Reading
-
Opinion
24 Nov 2022
Your staff are the frontline in your ransomware fight
As part of a solid cyber defence plan, the CISO must make sure that the frontline within the organisation is prepared for an attack, says Theodore Wiggins of Airbus Protect Continue Reading
-
News
23 Nov 2022
AI accountability held back by ‘audit-washing’ practices
Algorithmic auditing will be useless in holding artificial intelligence accountable until there are common standards, approaches and goals that scrutinise systems at each stage of development and deployment, says think-tank Continue Reading
-
News
23 Nov 2022
How Photobox keeps site reliability in the picture
Photobox’s site reliability head discusses how the photo book and personalised gifts site manages a complex microservices architecture Continue Reading
-
News
23 Nov 2022
Red team tool developer slams ‘irresponsible’ disclosure
UK security firm MDSec defends its Nighthawk command and control penetration testing framework after suggestions were made that it could be appropriated by threat actors Continue Reading
-
News
23 Nov 2022
Netherlands wants watchdog to reduce bias in artificial intelligence
Dutch government will take swift action to prevent citizens getting into trouble due to the misuse of algorithms Continue Reading
-
News
23 Nov 2022
Dutch national cyber security strategy aims to protect digital society
Cabinet sets up national cyber security strategy to make the Netherlands digitally secure Continue Reading
-
News
22 Nov 2022
IT services sector hiring slows to pre-pandemic levels
IT services firms have slowed their recruitment after a major acceleration in hiring during the Covid-19 pandemic Continue Reading
-
News
22 Nov 2022
Killnet DDoS hacktivists target Royal Family and others
Russia-aligned hacktivists targeted multiple UK websites, including those of the Royal Family, in a new campaign of DDoS attacks Continue Reading
-
News
22 Nov 2022
C-suite mystified by cyber security jargon
Malware, supply chain attack, zero-day, IoC, TTP and Mitre ATT&CK are just some of the everyday terms that security pros use that risk making the world of cyber incomprehensible to outsiders Continue Reading
-
22 Nov 2022
Cracking the code for a modern approach to enterprise software development
Overworked IT departments need a better way to deliver digitally enabled products and services at the speed that the business requires. We report from the Gartner Symposium in Barcelona. Continue Reading
-
News
21 Nov 2022
EDF UK deploys Riverbed’s Alluvio Aternity to tackle IT issues
Monitoring software links into ServiceNow and PowerShell scripts are being used to automate remediation Continue Reading
-
News
21 Nov 2022
Bug Bounty Calculator helps organisations fine-tune their payouts
Newly launched comparison tool will supposedly help operators of vulnerability disclosure or bug bounty programmes to ensure their payments match market rates and expectations, and attract the right sort of attention Continue Reading
-
News
18 Nov 2022
Is Elon Musk’s Twitter safe, and should you stop using it?
With a litany of security and compliance issues exposed and in many cases caused by Elon Musk’s takeover of social media platform Twitter, some may be asking if it’s still safe or appropriate to use Continue Reading
-
News
18 Nov 2022
New gold standard to protect good faith hackers
HackerOne’s new Gold Standard Safe Harbour statement will supposedly act as a guarantee for good faith hacking Continue Reading
-
News
18 Nov 2022
CyberPeace Institute helps NGOs improve their security resilience
Adrien Ogée of the CyberPeace Institute talks about his work supporting NGOs and humanitarian organisations, and how the security community at large can help protect the world’s most vulnerable people Continue Reading
-
News
17 Nov 2022
Another Log4Shell warning after Iranian attack on US government
The breach of a US federal body by an Iranian threat actor exploiting the Adobe Log4j Log4Shell vulnerability has prompted a fresh flurry of patching Continue Reading
-
Opinion
17 Nov 2022
Gartner: Three key tasks needed to decommission applications
A guide to slimming down a full portfolio of applications that are expensive to maintain and difficult to adapt to business needs Continue Reading
-
News
16 Nov 2022
Team working on controversial Post Office Horizon EPOSS software was the ‘joke of the building’
Former members of the ICL team developing software for the Post Office Horizon EPOSS system were unqualified and engaged in poor software development practices, public inquiry told Continue Reading
-
News
16 Nov 2022
Agility, business more important than cost, network management for IT teams
Cisco report finds new rules applying in a multicloud world, with IT decision-makers regarding security as the top networking challenge when managing distributed and hybrid workloads Continue Reading
-
News
16 Nov 2022
Global network fragmentation a source of increasing risk
Risk consultancy’s report says the weaponisation of cyber space and geopolitical clashes herald a breakdown of global networks into distinct regional or national architectures Continue Reading
-
News
15 Nov 2022
Post Office changed view of Horizon problems before roll-out, because of a ‘sunk cost fallacy’
Insider tells public inquiry that the Post Office continued to roll out the controversial Horizon system despite a ‘considerable’ number of errors, because it was too committed Continue Reading
-
News
15 Nov 2022
A modern approach to enterprise software development
Overworked IT departments need a better way to deliver digitally enabled products and services at the speed the business requires Continue Reading
-
News
15 Nov 2022
Inside Singapore’s public sector IT strategy
Adopting a platform approach with products that can scale across the board and building a strong engineering bench are some of the key aspects in Singapore’s public sector IT strategy Continue Reading
-
News
15 Nov 2022
Met Police removes nearly two-thirds of people from gangs matrix
Legal action by human rights group Liberty forces Met Police to overhaul its gangs violence matrix database Continue Reading
-
News
14 Nov 2022
Sadiq Khan launches Data for London Advisory Board
Board will look at how to join up and share data between public and private London organisations in an effort to build a stronger data economy and improve public services Continue Reading
-
News
14 Nov 2022
CaixaBank robot answers the most customer questions
AI-based virtual assistant at Spanish bank is now used by over four million customers Continue Reading
-
Opinion
14 Nov 2022
Security Think Tank: Let’s be transparent about ransomware
Greater transparency regarding ransomware attacks, including details about attack methods used and what kinds of assets were compromised, would likely help the community prevent future attacks Continue Reading
-
Feature
11 Nov 2022
An encouraging new conversation around sustainable IT, says Nordic CIO
What started as a whisper a decade ago has become distinctly audible chatter among IT leaders sharing best practices on how to protect the environment Continue Reading
-
News
11 Nov 2022
MoD recruits Immersive Labs to bolster cyber resilience
UK’s Ministry of Defence will run cyber drills and address its security talent gap with Immersive Labs’ CyberPro, Cyber Crisis Simulator and Application Security products Continue Reading
-
News
11 Nov 2022
Lenovo bolsters services play with PCCW Solutions
Lenovo’s acquisition of PCCW Solutions brings sought-after capabilities in hybrid cloud and application modernisation as it expands its services footprint in Asia Continue Reading
-
Opinion
11 Nov 2022
Security Think Tank: To stop ransomware, preparation is the best medicine
You can’t ‘stop’ ransomware, but you can do a lot to keep yourself from becoming ensnared when it strikes Continue Reading
-
Feature
10 Nov 2022
The world's oldest cryptocurrency exchange prefers doing business in Luxembourg
One of the newest niches in fintech, cryptocurrency exchanges may fare very well in Luxembourg Continue Reading
-
Podcast
10 Nov 2022
Inflation-busting IT: A Computer Weekly Downtime Upload podcast
In this podcast, Gartner’s Stewart Buchanan discusses how to fund digital technology initiatives Continue Reading
-
News
09 Nov 2022
Microsoft serves smorgasbord of six zero-days
November’s Patch Tuesday fixes significantly fewer vulnerabilities of late, but includes six actively-exploited zero-days, three of them of critical severity Continue Reading
-
News
09 Nov 2022
Fujitsu expert witness in subpostmaster trial ‘manoeuvred’ into role, public inquiry told
A former Fujitsu technology expert who defended the Horizon system’s robustness in court was unhappy after being ‘manoeuvred’ into acting as an expert witness, public inquiry hears Continue Reading
-
Opinion
09 Nov 2022
Security Think Tank: Anti-ransomware strategies should be as easy as ABC
When developing and implementing ransomware protection strategies, the importance of paying thorough attention to security measures you might consider elementary cannot be understated Continue Reading
-
News
08 Nov 2022
Six subpostmaster convictions referred for appeal in Scotland
Six former subpostmasters in Scotland will have appeals against criminal convictions heard after being referred by Scotland’s Criminal Cases Review Commission Continue Reading
-
Feature
08 Nov 2022
How Imec hopes to industrialise artificial intelligence
Pure research explores the fundamental questions of artificial intelligence, but applied research takes those ideas to industry, making it all worthwhile Continue Reading
-
Opinion
07 Nov 2022
To fight ransomware, we must treat digital infrastructure as critical
Ransomware defence is failing because we don’t view our digital infrastructure in the same way as our physical infrastructure, argues Elastic’s Mandy Andress Continue Reading
-
Feature
07 Nov 2022
Why automating finance is just an integration game
We look at how the software that powers finance departments can help businesses navigate the worsening economic climate Continue Reading
-
News
04 Nov 2022
Microsoft: Nation-state cyber attacks became increasingly destructive in 2022
The willingness of nation-state actors to conduct destructive cyber attacks is a source of grave concern, as Microsoft’s latest annual Digital Defence Report lays bare Continue Reading
-
Opinion
04 Nov 2022
Security Think Tank: Ransomware and CISOs’ balancing act
Ransomware has the potential to cause irreversible business damage, so CISOs should consider not only protection but also response and recovery Continue Reading
-
Definition
03 Nov 2022
legacy system (legacy application)
A legacy system is any outdated computing system, hardware or software that is still in use. Legacy systems include computer hardware, software applications, file formats and programming languages. Continue Reading
-
News
03 Nov 2022
Microsoft pledges $100m in new IT support for Ukraine
Microsoft will continue to offer free-of-charge technology support to Ukraine for the foreseeable future Continue Reading
-
News
03 Nov 2022
Automated threats biggest source of cyber risk for retailers
Threat actors targeting retailers during the coming holiday season are increasingly turning to automated forms of cyber attack, according to a report Continue Reading
-
Podcast
03 Nov 2022
Business workflows: A Computer Weekly Downtime Upload podcast
How ServiceNow is being used to drive business processes across IT and other business areas Continue Reading
-
Definition
02 Nov 2022
intellectual property core (IP core)
An intellectual property core (IP core) is a functional block of logic or data used to make a field-programmable gate array (FPGA) or application-specific integrated circuit for a product. Continue Reading