Email Alerts
-
Austrian hospital improves access to patient data with Imprivata
Klinikum Wels-Grieskirchen hospital in Austria explains how it improved speed of access and security to its works stations. News | 15 Oct 2012
-
Mozilla fixes security flaw in latest Firefox
Mozilla has released a fix for the latest version of its Firefox browser after withdrawing it the day before after identifying a security flaw Cyber security | 12 Oct 2012
-
RSA Europe: Thousands of unprotected virtual servers exposed to the web
Organisations are failing to protect data in virtual environments, says Jason Hart, vice-president cloud solutions, SafeNet News | 11 Oct 2012
-
RSA Europe: Security must take human factor into account
Security needs to start taking into account the differences in users, says Hugh Thompson, RSA Conference programme committee chair Security software | 11 Oct 2012
-
RSA Europe: Security concerns whole supply chain, says Misha Glenny
Targeted attacks affect the whole supply chain, not just big corporations, author Misha Glenny tells RSA Conference Europe 2012 attendees News | 11 Oct 2012
-
RSA Europe: Cloud key to future information security, says Qualys
Cloud computing is an opportunity information security professionals should not miss, says Philippe Courtot, CEO of security firm Qualys News | 10 Oct 2012
-
Cyber crime costs UK organisations £2.1m a year
Ponemon Institute's 2012 Cost of Cyber Crime Study estimates cyber crime costs UK organisations an average of £2.1m a year each News | 08 Oct 2012
-
Swedish government sites targeted by Anonymous
The websites of several Swedish government agencies were knocked offline on Friday after being targeted by hacktivist collective Anonymous News | 08 Oct 2012
-
Microsoft encryption key deadline approaching
Any organisations that have not yet replaced outdated security certificates will have to act quickly to meet the Microsoft deadline News | 08 Oct 2012
-
Security firm warns against Samsung Galaxy Tab for enterprise use
Security specialist Context Information Security says vulnerabilities in the Samsung Galaxy Tab make it unsuitable for use in the enterprise News | 05 Oct 2012
- See More: News on IT risk management
-
CW500: Managing the mobile workforce (part 2)
Glenn Morgan, head of service transformation at British Airways, explains how the airline is harnessing consumer technology Feature
-
CW500: Managing the mobile workforce (part 1)
Mobile working has transformed Colt Telecommunications beyond recognition over the past three years Feature
-
CW500 Security Club: Dealing with attacks inside networks
Perimeter defences are no longer enough to keep data safe, experts told IT security leaders at the CW500 Security Club CW500
-
How to make your business Flame-proof
Advanced threats such as Flame can show CIOs what cyber attack tools of the future could look like Feature
-
Setting up a botnet is easier than you think
Acquiring, installing, configuring and using a powerful data-stealing banking Trojan toolkit is not as difficult as it sounds Feature
-
BYOD: Can enterprise mitigate the risks?
What can businesses do to mitigate the risks of employees using their own devices as the trend for IT consumerisation gathers momentum? Feature
-
Interview: Angela Tucci, chief strategy officer, Symantec
Angela Tucci, chief strategy officer at Symantec, talks to Computer Weekly about the company's strategic plans Feature
-
Compliance, risk and the coming EU data protection framework: a CISO's perspective
Compliance and risk managers in Europe are facing one of the biggest challenges for decades as the region moves to a new data protection framework Feature
-
Best practice in outsourcing security
The issues CIOs must consider in balancing security needs and budgetary constraints Feature
-
CW500: The business case for social media
BT, the Met Office and the Department of Work and Pensions reveal how they are using social media to interact with staff and customers Feature
- See More: Features on IT risk management
-
Security Think Tank: Block IP theft with policy, process and controls
IP theft affects almost all buinesses, observes no national boundaries and costs economies billions - so who should be tackling it and how? Opinion
-
Consumer capital: The new reality of 21st century data exchange
Consumers are beginning a counter-offensive against the monopoly that industry has enjoyed over the spoils of big data Opinion
-
How IT security can drive business and enable innovation
The most critical IT security challenge is to be able to see the whole picture, understand the business needs and find solutions Opinion
-
Where does the ICO's new cloud guidance take you?
It is not possible to follow the ICO's advice on cloud computing and still have a “cloud” solution Opinion
-
How to ensure you are getting the right cloud service
How can an organisation use an indirect governance to assure trust in cloud services? Opinion
-
Security Think Tank: Several factors feed SQLi attacks
Why does SQL injection remain a successful way of attacking web applications? Opinion
-
Security Zone: Scada exploit fans the Flame of data risk
Analysis of the sophisticated and evidently well-resourced code behind the Flame malware exploit raises the stakes of data security exponentially Opinion
-
Security Think Tank: Best practice to target SQLi
Why does SQL injection remain a successful way of attacking web applications? Opinion
-
How to secure a SharePoint environment
Five lines of defence you need to secure your Microsoft SharePoint environment Opinion
-
Security Think Tank: No quick fix to SQLi attacks
Why does SQL injection remain a successful way of attacking web applications? Opinion
- See More: Opinion on IT risk management
-
CW500 Security Club: Mike St John Green
The inaugural CW500 Security Club, titled "You're probably infected, now what?" invited experts to pass on their experiences to our audience of IT security leaders. Video
-
Computer Weekly and FT video debates: Tackling cyber crime
In a series of video debates, Computer Weekly and the Financial Times invite a panel of experts to discuss business and IT issues. Video
-
Royal Signals ‘Unsung Heroes’ Awards
IT experts from the Royal Signals were rewarded for their support and commitment to the service during an event for "unsung heroes" at Mansion House. Photo Story
-
InfoSec Europe 2012: A look at IT security skills in the current climate
At InfoSec Europe 2012 security industry experts gave their view on IT skills in the security sector Infosec 2012
-
Tim Wilson, deputy head of ICT at NHS City & Hackney, on ISO 27000 compliance
ISO 27000 has reduced the number of information security incidences dramatically at NHS City & Hackney Video
-
Input from the business vital to risk management in infosec, says CISO for Steria UK
In this video, Mathew Lord, chief information security officer at Steria UK discusses the top of risk management in the context of information security. Infosec
-
Latest data breach survey "uncomfortable reading", says PwC's Chris Potter
In this video, Chris Potter, information security partner at PricewaterhouseCoopers (PwC) discusses the findings of the latest Information Security Data Breach Survey. Infosec 2012
-
CW500: Antonis Patrikios, senior associate at law firm Field Fisher Waterhouse
In this CW500 Club video interview, Antonis Patrikios, senior associate at law firm Field Fisher Waterhouse talks to Computer Weekly editor in chief Bryan Glick about IT security in the digital age and the biggest challenges faced by IT leaders. Video
-
CW500: Lloyds of London CIS Marcus Alldrick
In this CW500 Club video interview, Lloyd’s of London chief information security officer Marcus Alldrick talks to Computer Weekly editor in chief Bryan Glick about IT security in the digital age and the biggest challenges faced by IT leaders. Video
-
CW500: LSE professor and cyber war expert Peter Sommer
In this CW500 Club video interview, London School of Economics professor and cyber war expert Peter Sommer talks to Computer Weekly editor in chief Bryan Glick about IT security in the digital age and the biggest challenges faced by IT leaders. Video
- See More: Multimedia on IT risk management
-
IT in Europe
Download an issue of the IT in Europe digital magazine and find out news, features, tips and guides on hot topics in the UK and across the continent. guide
-
Supplier profile: Symantec
In this Symantec guide you will find a special nine-page report from Computer Weekly analysing the challenges facing Symantec. guide
-
InfoSec Europe 2012: Conference coverage
Keep up date with all the news from InfoSec Europe 2012, taking place 24-26 April at London’s Earls Court. guide
-
London 2012 Olympic Games Coverage
Read all our London Olympics IT coverage so far including IT preparations, the website, power concerns and the creation of thousands of new jobs. guide
-
How to comply with the EU cookie law
Effective from 26 May 2012 the EU cookie law requires websites to gain permission from users, before planting cookies. Find out how to comply and what fines you may face if you don’t. Learning Guide
-
A UK guide to government and public sector IT
A guide to support IT professionals in making well informed decisions about technologies used within public sector organisations. guide
-
Austrian hospital improves access to patient data with Imprivata
Klinikum Wels-Grieskirchen hospital in Austria explains how it improved speed of access and security to its works stations. News
-
Security Think Tank: Block IP theft with policy, process and controls
IP theft affects almost all buinesses, observes no national boundaries and costs economies billions - so who should be tackling it and how? Opinion
-
Consumer capital: The new reality of 21st century data exchange
Consumers are beginning a counter-offensive against the monopoly that industry has enjoyed over the spoils of big data Opinion
-
Mozilla fixes security flaw in latest Firefox
Mozilla has released a fix for the latest version of its Firefox browser after withdrawing it the day before after identifying a security flaw Cyber security
-
RSA Europe: Thousands of unprotected virtual servers exposed to the web
Organisations are failing to protect data in virtual environments, says Jason Hart, vice-president cloud solutions, SafeNet News
-
RSA Europe: Security must take human factor into account
Security needs to start taking into account the differences in users, says Hugh Thompson, RSA Conference programme committee chair Security software
-
RSA Europe: Security concerns whole supply chain, says Misha Glenny
Targeted attacks affect the whole supply chain, not just big corporations, author Misha Glenny tells RSA Conference Europe 2012 attendees News
-
RSA Europe: Cloud key to future information security, says Qualys
Cloud computing is an opportunity information security professionals should not miss, says Philippe Courtot, CEO of security firm Qualys News
-
CW500: Managing the mobile workforce (part 2)
Glenn Morgan, head of service transformation at British Airways, explains how the airline is harnessing consumer technology Feature
-
CW500: Managing the mobile workforce (part 1)
Mobile working has transformed Colt Telecommunications beyond recognition over the past three years Feature
- See More: All on IT risk management
About IT risk management
Risk management is an increasingly important discipline for IT leaders, with regulatory compliance an ever-present consideration and the amount of legislation and regulation concerning data security on the rise. We examine the issues around IT risk management and the best practices that IT managers need to know.