delivering profits
Feature | ComputerWeekly.comComputer Weekly wins top honour
News | ComputerWeekly.comComputerWeekly was last week declared the UK's campaigning magazine of the year at the publishing industry's annual awards for...
Atos wins DWP deal extension
News | ComputerWeekly.comThe Department for Work and Pensions has renewed a contract with IT services company Atos Origin to deliver medical advice and...
ControlGuard targets rogue devices
News | ComputerWeekly.comControlGuard Access Manager is an effective tool for controlling what devices users can add to their workstations and how they are used.
Fast Guide: VoIP encryption
News | ComputerWeekly.comA guide to encryption within VoIP networks
Dell and EMC: Five more years
News | ComputerWeekly.comDell leans on EMC for support in the face of an SEC investigation and possible delisting from NASDAQ.
How do I establish recovery priority for my applications?
News | ComputerWeekly.comIf it's at the IT level, it comes from a data perspective. When you start moving up a little bit into the business side, people start looking at the ...
Shifting services back indoors
News | ComputerWeekly.comAlmost a quarter of blue chip firms in the UK are so disillusioned with outsourcing they are hauling their services back in-house.
How to break into a computer that is right at your fingertips
News | ComputerWeekly.comStressing the importance of physical security, Joel Dubin explains how a hacker can bypass a BIOS password and break into a computer.
Blair steps into Chinook battle
News | ComputerWeekly.com
Tony Collins
The Prime Minister, Tony Blair, will personally look into the circumstances of the crash of a Chinook helicopter...
Oracle bundles Fusion tools into one-stop SOA suite
News | ComputerWeekly.comOracle is offering a one-stop shop to customers seeking to build a service-oriented architecture (SOA) by bundling together several middleware ...
Demand for development skills soars as firms seek business edge
News | ComputerWeekly.comComputer Weekly salary survey shows IT departments eager to secure skills for the future.
ID theft and national security
News | ComputerWeekly.comCheck out what some ITKnowledge Exchange members had to say about this controversial issue.
HP slashes jobs and shuts enterprise divison
News | ComputerWeekly.comHP has announced 14,500 redundancies and will close down its separate enterprise sales division as part of its attempt to streamline operations and ...
TNT to provide staff with e-mail smartphones rather than laptops
News | ComputerWeekly.comLogistics company TNT is to provide up to 700 staff worldwide with mobile e-mail, using the Nokia Communicator 9500 smartphone as...
Spyware removal checklist
News | ComputerWeekly.comA step-by-step guide on how to remove spyware using antispyware tools including Spybot -- Search and Destroy, and HijackThis.
Quiz: Web attack prevention and defense
News | ComputerWeekly.comTest your knowledge of the material covered in Web attack prevention and defense, including the fundamentals of securing a Web server.
Quiz: Identify and analyze Web server attacks, answer No. 5
News | ComputerWeekly.comQuiz: Identify and analyze Web server attacks, answer No. 5
Quiz: Secure Web directories and development, answer No. 3
News | ComputerWeekly.comQuiz: Secure Web directories and development, answer No. 3
Quiz: Identify and analyze Web server attacks, answer No. 4
News | ComputerWeekly.comQuiz: Identify and analyze Web server attacks, answer No. 4
Quiz: Secure Web directories and development, answer No. 4
News | ComputerWeekly.comQuiz: Secure Web directories and development, answer No. 4
Pre-CISSP: Options for the security newbie
News | ComputerWeekly.comShon Harris advises novice security practitioners on the value of entry-level certifications -- and good, old-fashioned experience -- in preparation ...
NHS trust creates wireless record
News | ComputerWeekly.comUniversity College London Hospitals (UCLH) NHS Trust has created the UK's largest single wireless network to support 7,000 users across eight ...
Ofcom liberates BT to offer bespoke pricing
News | ComputerWeekly.comOfcom has announced proposals to allow BT to offer large business customers bespoke call prices, which should lead to discounts for some companies.
IT professionals set for annual charity sleep-out
Feature | ComputerWeekly.comSenior IT professionals are gearing up to on London's Embankment near Tower Bridge on Friday 23 September 2005. The aim is to raise more than ...
How to win the jobs game
Opinion | ComputerWeekly.comMany readers have been disappointed by recruitment agents. All the more reason to develop the relationship
five star reception
Feature | ComputerWeekly.comaccess all routes
Feature | ComputerWeekly.comLogicaCMG on Met payroll
News | ComputerWeekly.comThe Metropolitan Police Authority has selected LogicaCMG to provide a £31m fully-managed payroll and pension administration...
Met Police gets LogicaCMG on payroll
News | ComputerWeekly.comThe Metropolitan Police Authority (MPA) has selected LogicaCMG to provide a £31m fully-managed payroll and pension administration...
Lead from the top
Feature | ComputerWeekly.comThe starting line for effective data security is at board level, writes John Kavanagh in this review of current thinking and...
Top tools for testing your online security, part 2
News | ComputerWeekly.comMichael Cobb explains what tools are helpful in maintaining Web security, including security scanners, benchmarking tools, monitoring services and ...
Spike ** LogicaCMG to manage Met payroll
News | ComputerWeekly.comThe Metropolitan Police Authority (MPA) has selected LogicaCMG to provide a £31m fully-managed payroll and pension administration...
Your shout: Security and skills
Opinion | ComputerWeekly.comHave your say at computerweekly.com
Seeing the big picture
Opinion | ComputerWeekly.comInformation security is about securely bringing together the organisation's two most important assets - information and people.
Quiz: Secure Web directories and development, answer No. 5
News | ComputerWeekly.comQuiz: Secure Web directories and development, answer No. 5
Quiz: Secure Web directories and development, answer No. 2
News | ComputerWeekly.comQuiz: Secure Web directories and development, answer No. 2
Sarbox draining corporate security budgets
News | ComputerWeekly.comCorporate investment to comply with the Sarbanes-Oxley data security legislation has come at the expense of dealing with other security threats, ...
Pop quiz: E-mail security
News | ComputerWeekly.comFind out how much you know about securing your organization's e-mail.
Sarbox challenge drains security budgets
News | ComputerWeekly.comInternational corporate spending on compliance with the Sarbanes-Oxley data security legislation has come at the expense of dealing with other ...
Inside MSRC: Debunking Excel exploits
Feature | ComputerWeekly.comMicrosoft's Christopher Budd puts the magnifying glass to Microsoft's July bulletinsand says one alleged Excel exploit isn't what it seems.
HP extends automated change and configuration to the datacentre
News | ComputerWeekly.comA technology agreement with partner Voyence will enable HP to offer datacentre managers an automated network change and configuration management ...
Cardiff launches intelligent document system
News | ComputerWeekly.comCardiff, a division of Autonomy Corporation, has launched a new system to allow firms to get more out of their on-screen documents.
Mozilla fixes several Firefox flaws
News | ComputerWeekly.comSeveral flaws could be used for man-in-the-middle, spoofing and cross-site scripting attacks. Mozilla has released Firefox 1.5.0.7 to address the ...
September 11: How Merrill Lynch recovered
News | ComputerWeekly.comMerrill Lynch lost two data centres during the 11 September terrorist attacks in New York. The site is now functioning as a...
Symantec fixes NetBackup Puredisk flaw
News | ComputerWeekly.comAn unauthorised user could launch malicious code by exploiting a flaw in Symantec's Veritas NetBackup PureDisk product. But a fix is available.
Jamie Gruener's position on API sharing
News | ComputerWeekly.comKey questions on API sharing answered
Somerfield speeds up product development with online system
News | ComputerWeekly.comSupermarket chain Somerfield will this week go live with the first stage of an initiative to computerise its new product...
Virtual SAN purchase considerations
News | ComputerWeekly.comThe specific considerations for key virtual SAN products plus a series of specifications to help make on-the-spot product comparisons between vendors.
Security Blog Log: The never-ending PatchGuard debate
News | ComputerWeekly.comThis week, security vendor fright over the Windows Vista PatchGuard feature permeates the blogosphere. Is Microsoft the boogeyman, or just ...
Virtual SAN product specifications
News | ComputerWeekly.comProduct snapshots that highlight key specifications for a cross-section of VSAN platforms selected based on input from industry analysts and ...
Victory! Lords confirm CW stand - software flaw could have caused Chinook crash
News | ComputerWeekly.comAn historic House of Lords report has this week vindicated a five-year campaign by Computer Weekly for justice after the crash of...
MPs from all parties unite in fight to clear Chinook pilots
News | ComputerWeekly.comThis week the Tories led an unprecedented all-party move to get the Government to clear the names of the pilots blamed for the...
Instant messaging attacks rise in October
News | ComputerWeekly.comIn October alone, security firm Akonix Systems tracked 88 attacks that used instant messaging programs to spread. Attackers are also exploiting P2P ...
MoD refuses to concede error in Chinook verdict
News | ComputerWeekly.comThe Ministry of Defence (MoD), citing a new series of simulations by Boeing, has refused to clear the names of two pilots blamed...
Achieving the goal of CIO
Feature | ComputerWeekly.comWhat exactly does a chief information officer do?Paul Burfitt, global CIO at AstraZeneca, analysed the various aspects of his job...
Best practices for enabling and maintaining compliance
News | ComputerWeekly.comAs part of our Storage Decisions conference preview series, Shaun Mahoney, senior storage engineer for Citigroup, Randy Wilson, assistant vice ...
Computer Weekly's evidence to the Public Accounts Committee
Feature | ComputerWeekly.comWe write to the Public Accounts Committee in relation to its consideration of the Chinook's FADEC computerised engine control...
Chinook report slams flawed MoD procurement methods
Feature | ComputerWeekly.comPublic Accounts Committee report into fatal crash of a Chinook Mk2 helicopter focused on a report by independent contractor EDS-Scicon, which was ...
New Mac OS X flaw exposed
News | ComputerWeekly.comA Mac OS X flaw was exposed as part of the Month of Kernel Bugs. Also, a new Web site vows to follow the lead of researchers LMH and H.D. Moore with ...
BakBone brushes up replication software
News | ComputerWeekly.comBakBone's NetVault Replicator version 5.0 includes automatic configuration of replication for remote sites, a capacity planning tool and a higher ...
Am I out of luck if I have a "mixed" email system (e.g., Exchange and Notes)?
News | ComputerWeekly.comThat's a "real-life" situation that we run into many times when we've gone out and worked with companies. We might be called in by a company that has...
School district expels outsourced backup, enrolls CDP
Feature | ComputerWeekly.comRevere School District dumps tape and outsourced backup, and deploys SonicWall's continuous data protection product.
Zantaz buys data classification partner Singlecast
News | ComputerWeekly.comEmail archiving player Zantaz has purchased data classification startup Singlecast, which can categorise and apply policies to data before an email ...
Security Bytes: Hackers target the Terminator
News | ComputerWeekly.comIn other news, Symantec upgrades its Norton product line and the Anti-Phishing Working Group says phishing activity soared this summer.
Achieving compliance: a real-world roadmap
News | ComputerWeekly.comA security manager's responsibilities extend beyond the technical aspects of the job. These days, effective governance and compliance are just as ...
Top tech tips from SearchStorage.com
News | ComputerWeekly.comCheck out the top tips on backup, SAN, NAS and storage management from SearchStorage.com.
Government blocks judicial review of Chinook disaster
News | ComputerWeekly.comThe Government has made it impossible for the families of two pilots blamed for the crash of Chinook helicopter ZD576 to seek a...
MoD's Chinook tactics spark a constitutional row
News | ComputerWeekly.comChinook: The MoD's actions over the crash of Chinook ZD576 could have legal ramifications
What storage managers are buying and why, page 2
News | ComputerWeekly.comVoIP outsourcing: Save money and gain flexibility
News | ComputerWeekly.comVoIP outsourcing is the way to go for organisations looking to deploy voice services quickly and flexibly without a major investment in skills and ...
Messaging Security School
News | ComputerWeekly.comSearchSecurity.com's Messaging Security School has brought together some of the most knowledgeable experts in the messaging security field to offer ...
Top network security tips of 2006
Feature | ComputerWeekly.comThe top Windows networking security tips of 2006 cover a range of topics, including network isolation, open source Windows security tools, VPN ...
Oracle fixes 101 flaws
News | ComputerWeekly.comAttackers could exploit 45 of the 101 flaws remotely without a username or password. Meanwhile, the new CPU offers more detail on the number of flaws...
Caught red handed by latest police IT
News | ComputerWeekly.comNmap Technical Manual
Feature | ComputerWeekly.comBy now, most infosec pros have heard of Nmap, and most would agree that even though the popular freeware tool is invaluable, installing, configuring ...
NHS IT - A personal view
Opinion | ComputerWeekly.comThe media last week was full of comment on the "problems" at the NHS IT project as Accenture ducked out. Yet again, the comment portrayed the project...
Microsoft to fold security into Windows division
News | ComputerWeekly.comThe software giant said the move would make future Windows development efforts more efficient. The changes take effect after Microsoft releases Vista.
Alliance and Leicester to overhaul core systems
Feature | ComputerWeekly.comAlliance & Leicester has announced plans replace many of its core banking systems with Accenture’s Alnova Financial Solutions banking platform under ...
Microsoft to fix Visual Studio, Windows flaws
News | ComputerWeekly.comMicrosoft plans to release five security updates to address vulnerabilities in Windows and a flaw in Visual Studio as part of its monthly security ...
How to scour the world when outsourcing
Feature | ComputerWeekly.com
Thanks to Y2K compliance programmes, it is now perfectly acceptable for a firm to consider moving all or part of its systems ...
Storage Decisions Session Downloads: Smart Shopper Track (LV 2006)
Feature | ComputerWeekly.comVery few storage managers have carte blanche when it comes to storage spending. Sessions in our "Smart Shopper track" help managers get the most bang...
Exploiting Software: How to Break Code, Chapter 7 -- Buffer Overflow
News | ComputerWeekly.comThis excerpt is from Chapter 7, Buffer Overflow of Exploiting Software: How to Break Code written by Greg Hoglund and Gary McGraw.
Did MoD deceive RAF inquiry?
News | ComputerWeekly.comNew information shows that the Ministry of Defence withheld information from an air chief marshal about software flaws that could...
Chinook: a breach of natural justice
News | ComputerWeekly.comMPs slam MoD over 1994 crash whitewash. Software, not pilot error, could have killed 29
Chinook tragedy demands reform
News | ComputerWeekly.com
The Public Accounts Committee report into the Mull of Kintyre helicopter crash vindicates Computer Weekly's three-year campaign ...
Revamped Cisco WAFS worth the wait, users say
News | ComputerWeekly.comMonths late, Cisco has finally released a combined Wan optimisation and WAFS product, while startups like Riverbed have been snapping up the ...
New Microsoft Word zero-day exploit discovered
News | ComputerWeekly.comTrojan.MDropper-Q is exploiting a vulnerability in Microsoft's word-processing application that could allow attackers to take control of certain ...
IT man on the 5am ferry as Horizon reaches Orkney
News | ComputerWeekly.com
James Rogers
Post Offices in two of the most isolated parts of the UK are the latest to go live as part of the Horizon ...
Proofpoint delivers strong messaging security
News | ComputerWeekly.comProofpoint Messaging Security Gateway is a highly recommended, affordable solution for big enterprises that need protection from email-based attacks.
Storage Decisions Session Downloads (NYC 2006)
Feature | ComputerWeekly.comTake a look at the sessions that floored at the Storage Decisions conference in New York City, September 27-29, 2006.
How to manage encryption keys
News | ComputerWeekly.comEncryption is an effective way to secure data, but the encryption keys used must be carefully managed to ensure data remains protected and accessible...
Top client security tips of 2006
Feature | ComputerWeekly.comA network user without the proper know-how is a ticking time bomb when it comes to security. Check out our top five client hardening tips of 2006 to ...
Secure network perimeter to result from Symantec-Juniper deal
News | ComputerWeekly.comJuniper and Symantec announced a deal to integrate Symantec's client security software with Juniper's security hardware. The result will allow ...
Flaw found in Firefox 2.0
News | ComputerWeekly.comAttackers could exploit the security flaw to crash versions 1.5.0.7 and 2.0 of the browser, according to various security advisories.
Security Bytes: Data breach affects 100,000 military personnel
News | ComputerWeekly.comMeanwhile: Phishers use a phone trick to dupe PayPal users; the PCI security standard will get more teeth and a survey illustrates an increase in ...
UK IT leaders plan a night under the stars for charity
Feature | ComputerWeekly.comAbout 250 senior IT professionals will take part in the annual Byte Night charity sleep-out on London’s Embankment on 22 September in an effort to ...
NetApp taps SAP for datacentre
News | ComputerWeekly.comNetwork Appliance (NetApp) has added to its technology collaboration SAP offering SAP compliance and certification for its datacentre offerings.
More from SearchSecurity -- July 2006
News | ComputerWeekly.comHighlights from the July 2006 issue of Information Security magazine.
Security Bytes: Investigators slam VA over data breach
News | ComputerWeekly.comMeanwhile: Cisco patches a router application flaw, a Washington law firm sues IBM over a server attack; and spammers sucker Web surfers with fake ...