Email Alerts
-
Cookie law needs more than ‘do not track’, says Neelie Kroes
Website owners still need consent to use cookies even if web users' browsers offer 'do not track' (DNT), says EC vice-president Neelie Kroes News | 15 Oct 2012
-
AMD cuts 20% of workforce
Chip maker Advanced Micro Devices (AMD) plans to cut as many as 2,340 jobs, or about 20% of its workforce News | 15 Oct 2012
-
US prepares cyber offensive capability
The US admits to preparing cyber offensive capabilities amid growing evidence that Iran conducted cyber attacks on the Saudi oil industry News | 15 Oct 2012
-
Mozilla fixes security flaw in latest Firefox
Mozilla has released a fix for the latest version of its Firefox browser after withdrawing it the day before after identifying a security flaw Cyber security | 12 Oct 2012
-
Draft Data Communications Bill a security risk, says Jimmy Wales
The UK’s Draft Data Communications Bill will be useless and quite dangerous, says Wikipedia founder Jimmy Wales News | 12 Oct 2012
-
RSA Europe: Thousands of unprotected virtual servers exposed to the web
Organisations are failing to protect data in virtual environments, says Jason Hart, vice-president cloud solutions, SafeNet News | 11 Oct 2012
-
RSA Europe: Security must take human factor into account
Security needs to start taking into account the differences in users, says Hugh Thompson, RSA Conference programme committee chair Security software | 11 Oct 2012
-
Job prospects improving for IT graduates, says HECSU report
Job prospects for IT graduates have improved for the first time during the recession, says the Higher Education Careers Services Unit (HECSU) News | 11 Oct 2012
-
RSA Europe: Security concerns whole supply chain, says Misha Glenny
Targeted attacks affect the whole supply chain, not just big corporations, author Misha Glenny tells RSA Conference Europe 2012 attendees News | 11 Oct 2012
-
RSA Europe: Cloud key to future information security, says Qualys
Cloud computing is an opportunity information security professionals should not miss, says Philippe Courtot, CEO of security firm Qualys News | 10 Oct 2012
- See More: News on IT for utilities and energy
-
M2M technology ushers in the age of total connection
Machine-to-machine (M2M) communications is transforming the world into one where everything and everyone is networked. Feature
-
Tune Raid performance to get the most from your HDDs
Tune Raid performance at the storage controller to match application I/O demands to optimal hard drive (HDD) performance Feature
-
How to make your business Flame-proof
Advanced threats such as Flame can show CIOs what cyber attack tools of the future could look like Feature
-
Is cloud data storage right for your organisation?
Find out if cloud data storage is a serious option for you with this evaluation of its suitability for primary, nearline, backup and archive data Feature
-
Setting up a botnet is easier than you think
Acquiring, installing, configuring and using a powerful data-stealing banking Trojan toolkit is not as difficult as it sounds Feature
-
Big Data: Utilities rise to the smart meter challenge
The mass of information from smart meters is leading utility suppliers to reconsider how they use their data Feature
-
Compliance, risk and the coming EU data protection framework: a CISO's perspective
Compliance and risk managers in Europe are facing one of the biggest challenges for decades as the region moves to a new data protection framework Feature
-
Mandatory carbon reporting: Indirect emissions guidelines for IT managers
As the UK government announces mandatory carbon reporting for listed companies, how are IT managers to interpret guidelines on indirect emissions? Feature
-
How to formulate an effective smartphone security policy
The mobile revolution offers new ways of working, but what are the challenges and how can they be overcome? Feature
-
How smart is the Smart Metering Implementation Programme?
The Smart Grid will allow people to manage energy consumption with smart meters, but carries all the risks of a large government IT project. Feature
- See More: Features on IT for utilities and energy
-
Security Think Tank: Block IP theft with policy, process and controls
IP theft affects almost all buinesses, observes no national boundaries and costs economies billions - so who should be tackling it and how? Opinion
-
Security Zone: Passwords: Help users discover what is available!
As company policy requires passwords to be stronger than ever, here are some tips to help employees cope Opinion
-
A new age of sentimental data
Sentiment-analysis is nothing new - we just have new ways of capturing multiple digital sources and making better sense of the data Opinion
-
How history of security shows we have not learnt our lesson
There is no security control more effective than a diligent system administrator Opinion
-
How IT security can drive business and enable innovation
The most critical IT security challenge is to be able to see the whole picture, understand the business needs and find solutions Opinion
-
How to ensure you are getting the right cloud service
How can an organisation use an indirect governance to assure trust in cloud services? Opinion
-
Security Think Tank: Several factors feed SQLi attacks
Why does SQL injection remain a successful way of attacking web applications? Opinion
-
Security Zone: Scada exploit fans the Flame of data risk
Analysis of the sophisticated and evidently well-resourced code behind the Flame malware exploit raises the stakes of data security exponentially Opinion
-
Security Think Tank: Best practice to target SQLi
Why does SQL injection remain a successful way of attacking web applications? Opinion
-
How to secure a SharePoint environment
Five lines of defence you need to secure your Microsoft SharePoint environment Opinion
- See More: Opinion on IT for utilities and energy
-
London 2012 Olympic Games Coverage
Read all our London Olympics IT coverage so far including IT preparations, the website, power concerns and the creation of thousands of new jobs. guide
-
Security Think Tank: Block IP theft with policy, process and controls
IP theft affects almost all buinesses, observes no national boundaries and costs economies billions - so who should be tackling it and how? Opinion
-
Cookie law needs more than ‘do not track’, says Neelie Kroes
Website owners still need consent to use cookies even if web users' browsers offer 'do not track' (DNT), says EC vice-president Neelie Kroes News
-
AMD cuts 20% of workforce
Chip maker Advanced Micro Devices (AMD) plans to cut as many as 2,340 jobs, or about 20% of its workforce News
-
M2M technology ushers in the age of total connection
Machine-to-machine (M2M) communications is transforming the world into one where everything and everyone is networked. Feature
-
US prepares cyber offensive capability
The US admits to preparing cyber offensive capabilities amid growing evidence that Iran conducted cyber attacks on the Saudi oil industry News
-
Security Zone: Passwords: Help users discover what is available!
As company policy requires passwords to be stronger than ever, here are some tips to help employees cope Opinion
-
Mozilla fixes security flaw in latest Firefox
Mozilla has released a fix for the latest version of its Firefox browser after withdrawing it the day before after identifying a security flaw Cyber security
-
Draft Data Communications Bill a security risk, says Jimmy Wales
The UK’s Draft Data Communications Bill will be useless and quite dangerous, says Wikipedia founder Jimmy Wales News
-
RSA Europe: Thousands of unprotected virtual servers exposed to the web
Organisations are failing to protect data in virtual environments, says Jason Hart, vice-president cloud solutions, SafeNet News
-
RSA Europe: Security must take human factor into account
Security needs to start taking into account the differences in users, says Hugh Thompson, RSA Conference programme committee chair Security software
- See More: All on IT for utilities and energy
About IT for utilities and energy
Utility firms and energy companies rely on IT to support their often highly complex operations. The industry is being forced by politial and customer pressure to be greener and technology is central to achieving greater energy efficiency, through major initiatives such as smart meters. Our stories about energy and utility firms examine how IT is helping to enable change and improvement in these companies.